Hi [[ session.user.profile.firstName ]]

Risk Factory: What is PCI?

Don't understand the PCI? Watch our video here for help.
Recorded May 19 2016 2 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Risk Factory
Presentation preview: Risk Factory: What is PCI?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Anatomy of an Effective Information Security Awareness Program Recorded: Oct 25 2017 24 mins
    Richard Hollis, Director of Risk Crew
    See Richard Hollis in action as he delivers an informative brief of the essential elements needed in designing an effective information security awareness program for your business.
    The session covers the four pathways that need to be taken and includes the way to identify the KPIs required to actually measure the success of the program and verify the real change in your business culture.
  • Risk Factory: What is PCI? Recorded: May 19 2016 2 mins
    Risk Factory
    Don't understand the PCI? Watch our video here for help.
  • Risk Factory: What is DPA Video? Recorded: May 19 2016 2 mins
    Risk Factory
    Don't understand the DPA? Watch our video here for help.
  • Risk Factory: What is ISO-27001? Recorded: May 19 2016 2 mins
    Risk Factory
    Don't understand the ISO-27001 ISMS standard? Watch our video here for help.
  • Deep Threat: Security Lessons from the Online Adult Entertainment Industry Recorded: Mar 15 2016 42 mins
    Richard Hollis, Director, Risk Factory
    Gross revenues for the online adult entertainment industry exceeded $150 billion dollars last year from transactions conducted over more than 5 million websites offering adult content. Every second $3,075.64 is being spent on adult entertainment websites. The annual revenues from this industry alone exceed the top ten online companies in the world combined (Microsoft, Google, Amazon, E-Bay, Yahoo, Dell etc).

    This industry is credited for creating the very financial model used by virtually everyone doing business on the Internet today in addition to being primarily responsible for launching the very technologies we now come to expect from service providers from broadband to streaming media. This is an industry that understands the financial benefits of aligning their technology to their business objectives.

    The industry is also reputed to be the largest purveyor of SPAM, viruses, Trojans, worms, adware and spyware. This fact along with the product it sells and enormous revenue it generates make it an extremely high value target for crackers, fraudsters, organised crime and vigilante groups. And yet, we never hear about a breach to their systems do we? Why is that? What is their secret? What do they know about data security that other industries don’t?

    The presentation covers the statistics of the industry and then explains the ten basic information security principles that online adult entertainment providers implement to ensure the security integrity of their systems. The material is based upon actual case studies and interviews with Directors of online adult entertainment provider companies.
  • Designing a GRC Framework Recorded: Feb 16 2016 43 mins
    Richard Hollis, Director, Risk Factory
    What is the essence of information security governance, risk & compliance? How do you meet your governance, risk and compliance requirements and prevent a data breach? The key is to understand the spirit of risk management and create a customised information security management system (ISMS) for your business. This presentation details a practical, step-by-step guide for designing and implementing a cost-effective ISMS to minimise your risk of a breach and meet your Association’s legislative (Data Protection Act), regulatory (Payment Card Industry), or industry standard (ISO-27001) compliance requirements to include:

    · Practical ISMS documentation structure

    · Scope, objectives & risk strategy examples

    · Risk treatment plan, asset register & classification guide examples

    · Policy frameworks

    · Control objectives, evidence & policy examples

    · Audit & testing documentation examples
  • Big Daddy Loves Big Data Recorded: Jan 20 2016 35 mins
    Richard Hollis, Director, Risk Factory
    Big Data has come from nowhere to become an integral part of our daily lives. It is a new and compelling way to see and understand the world we live in. Sadly, the information security industry has yet to harness the power of big data because we just don’t understand it.

    This presentation provides a clear, simple and useable perspective on big data to include:

    · Big data analytics

    · Where it came from

    · Where it is now

    · Where it’s going

    · Privacy issues

    · Potential data security uses
Educating you in Cyber Security, one webcast at a time
We are an elite group of product-independent, information governance, risk, and compliance management professionals and the forerunners in the design and delivery of effective business information and communication technology risk and security solutions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Risk Factory: What is PCI?
  • Live at: May 19 2016 2:45 pm
  • Presented by: Risk Factory
  • From:
Your email has been sent.
or close