Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Solving the PCI Security Puzzle: Putting the Access Control, Privilege Management, and Server Protection Pieces Together

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Complying with PCI regulations in heterogeneous environments can be a complex and costly initiative.

Leveraging your existing IT infrastructure offers a simpler and cost-effective way to address the sections of the Payment Card Industry’s Data Security Standard (PCI DSS) that matter most to IT managers – and without sacrificing manageability and productivity.

Join our panel of experts for an informative webinar to learn how you can address the regulatory requirements of the PCI standards by linking all your access rights, privileges, and audit logs into a single, definitive Active Directory identity.

Along the way you’ll discover how this comprehensive approach to identity and access management not only helps meet several PCI requirements, but also strengthens security while simplifying IT administration.

The panel will answer your questions at the conclusion of the program.

This webinar will help you to:

  • Discover more about PCI DSS best practise and recommendations
  • Address PCI technology issues in mixed IT environments that include UNIX, Linux, Macs, and non-Microsoft applications.
  • Reduce the scope and related costs of PCI audits by focusing them on just the affected systems
  • Establish end-to-end encryption without requiring any application or network infrastructure changes
  • Better understand how to develop a least privilege security model to address specific sections of PCI-DSS rules
  • Assure accountability with comprehensive user activity surveillance on PCI systems

 

This webinar is for:

  • IT security managers concerned about meeting PCI deadlines
  • IT staff wanting to better understand the problems and solutions available in the audit security marketplace.
  • Managers concerned about the rapidly changing world of compliance
  • Anyone wanting to improve their knowledge about regulatory issues like PCI DSS

CISSP SSCP logo
CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.

 

 

Speakers

Steve Gold

Steve Gold, Infosecurity Magazine

    David McNeely

    David McNeely Director of Product Management, Centrify Corporati

      Eugene Schultz

      Eugene Schultz Chief Technology Officer at Emagined Security, an