Building a Comprehensive Program For PCI Compliance

Rusty Estes, CISSP, Ahold

  • Introduction (00:00:00)
  • Chapter Title (00:00:08)
  • Agenda (00:00:23)
  • PCI Data Security Standard (00:00:44)
  • Chapter Title (00:01:08)
  • Which Devices Are In-Scope? (00:01:25)
  • Chapter Title (00:01:52)
  • Cardholder Data/Sensitive Authentication Data (00:02:24)
  • The Key Players (00:02:46)
  • Chapter Title (00:03:07)
  • PCI DSS Requirement (00:03:09)
  • External Vulnerability Scan Requirements (00:03:36)
  • Chapter Title (00:04:12)
  • Chapter Title (00:04:35)
  • Ahold - External Vulnerability Scans (00:05:02)
  • Chapter Title (00:05:59)
  • Chapter Title (00:06:20)
  • Chapter Title (00:06:30)
  • Chapter Title (00:06:35)
  • Chapter Title (00:06:38)
  • Chapter Title (00:06:48)
  • Chapter Title (00:07:12)
  • Chapter Title (00:07:17)
  • Chapter Title (00:07:19)
  • Ahold Devices (00:08:13)
  • Aholds Challenges (00:08:34)
  • Ahold - Internal Vulnerability Scans (00:09:08)
  • Chapter Title (00:09:32)
  • Chapter Title (00:09:57)
  • Chapter Title (00:11:01)
  • Keys to Successful PCI DSS Compliance Program (00:12:02)
  • PCI DSS 24-Month Life Cycle (00:16:19)
  • Chapter Title (00:16:35)
  • Chapter Title (00:16:58)
  • Merchant QSA Training (00:17:17)
  • Resources (00:17:36)
Introduction