Solving the PCI Security Puzzle: Putting the Access Control, Privilege Management, and Server Protection Pieces Together

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Complying with PCI regulations in heterogeneous environments can be a complex and costly initiative.

Leveraging your existing IT infrastructure offers a simpler and cost-effective way to address the sections of the Payment Card Industry’s Data Security Standard (PCI DSS) that matter most to IT managers – and without sacrificing manageability and productivity.

Join our panel of experts for an informative webinar to learn how you can address the regulatory requirements of the PCI standards by linking all your access rights, privileges, and audit logs into a single, definitive Active Directory identity.

Along the way you’ll discover how this comprehensive approach to identity and access management not only helps meet several PCI requirements, but also strengthens security while simplifying IT administration.

The panel will answer your questions at the conclusion of the program.

This webinar will help you to:

  • Discover more about PCI DSS best practise and recommendations
  • Address PCI technology issues in mixed IT environments that include UNIX, Linux, Macs, and non-Microsoft applications.
  • Reduce the scope and related costs of PCI audits by focusing them on just the affected systems
  • Establish end-to-end encryption without requiring any application or network infrastructure changes
  • Better understand how to develop a least privilege security model to address specific sections of PCI-DSS rules
  • Assure accountability with comprehensive user activity surveillance on PCI systems

 

This webinar is for:

  • IT security managers concerned about meeting PCI deadlines
  • IT staff wanting to better understand the problems and solutions available in the audit security marketplace.
  • Managers concerned about the rapidly changing world of compliance
  • Anyone wanting to improve their knowledge about regulatory issues like PCI DSS

CISSP SSCP logo
CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.

 

 

Speakers

Steve Gold

Infosecurity Magazine

David McNeely

Director of Product Management, Centrify Corporati

Eugene Schultz

Chief Technology Officer at Emagined Security, an

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.