Hi [[ session.user.profile.firstName ]]

Decoding New PCI DSS Guidelines for Cloud Computing

This webinar will review the new PCI Guidelines published on February 7, 2013, with a focus on relevant DSS requirements for cloud computing. In this discussion, we will review the implications of the newly published PCI Guidelines and recommend best practices for businesses to achieve compliance when deploying in the cloud.

Attendees should expect the following:

•A summary of the implications of new PCI Guidelines for cloud computing.
•A review of requirements that are fulfilled by Infrastructure as a Service providers and specifically by Amazon Web Services (AWS).
•Practical guidance on best practices for clients to address their requirements for compliance.

Join this panel of experts from Accuvant, Amazon Web Services and Trend Micro for a concise roadmap of how to navigate PCI compliance in cloud computing's shared risk model.
Recorded Feb 19 2013 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ryan Holland, Solutions Architect, Amazon Web Services Chris Gray, Ent Mnger, Accuvant Dave Asprey, VP Cloud Sec, Trend Micro
Presentation preview: Decoding New PCI DSS Guidelines for Cloud Computing

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Realities Of Defending Multiple Cloud Services In Today’s Enterprise Recorded: Jun 18 2016 101 mins
    Mark Nunnikhoven, VP, Cloud & Emerging Technologies, Trend Micro
    How do you properly evaluate the risk across cloud computing services? Can you move beyond knowing what services are in use to knowing how they are being used? Can your choice of service provider reduce your risk and the operational impact of adopting cloud services?

    Join us as we discuss the scope of the issue, the roadmap to resolve it, and share experiences and perspectives of two leading executives grappling with these issues today.
  • May Monthly Threat Webinar: Go From Hunted to Hunting Recorded: May 31 2016 48 mins
    Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro
    Data breaches and targeted attacks continue to plague organizations across the globe. Threat actors seem to be able to penetrate and then reside within a network for a very long time, siphoning off data they can use to profit from. In this webinar, learn what the latest attack techniques are and how to change your strategy to one which takes you from being hunted to becoming the hunter.
  • Cloud automation in Microsoft Azure with CHEF and Trend Micro Deep Security Recorded: May 26 2016 39 mins
    Keith Vidal, Microsoft; Jessica Devita, CHEF; and Jeffrey Westphal, Senior Sales Engineer Trend Micro
    Join us to hear from Microsoft Azure, Chef and Trend Micro experts on how to best develop a cloud automation strategy in your Azure environment, keeping the agility of the cloud while ensuring that your Azure workloads are protected.

    You will learn how to:
    • Automate your security posture within Azure
    • Use Chef to build compliance and resiliency into your Azure workloads
    • Take security automation to the next level
  • Life after platform EOS: Vulnerabilities keep coming…and they don't expire Recorded: May 19 2016 31 mins
    Steve Neville, Director of Hybrid Cloud Security Solutions, Trend Micro
    If you’re like 58% of organizations out there, you're still in the process of migrating off Windows Server 2003...almost a year after it went End of Support. Regardless of the end of support environment you’re dealing with, vulnerabilities will still keep coming...and so will the attacks looking to take advantage of them, including high profile varieties like Ransomware. The good news is that there are effective ways to deal with end of support platforms while you transition. In this session you will learn about:
    • The latest in vulnerabilities, including those affecting EOS platforms like Windows Server 2003
    • Best practices for protecting EOS platforms from attacks, including Ransomware
    • How Trend Micro’s proven security can help
  • 3 Secrets to Becoming a Cloud Security Superhero Recorded: May 16 2016 34 mins
    Pat McDowell, Solutions Architect, AWS; and Dawn Smeaton, Director AWS Workload Security, Trend Micro
    Learn how to leverage AWS and security ‘super’ friends like Trend Micro to create an impenetrable fortress for your workloads, without hindering performance or agility. Join this session and learn three cloud security super powers that will help you thwart villains interested in your workloads. We will walk through three stories of Amazon EC2 security superheroes who saved the day by overcoming compliance and design challenges using a (not so) secret arsenal of AWS and Trend Micro security tools.
  • April Monthly Threat Webinar – 0-Days & Virtual Patching Recorded: Apr 29 2016 31 mins
    Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro
    This month’s threat webinar will discuss how 0-days are used, who uses them, and what the good vulnerability researchers do to ensure people and organizations are protected.
  • How to Defeat Ransomware Recorded: Apr 27 2016 63 mins
    Ed Cabrera, VP Cybersecurity Strategy. Jon Clay, Cybersecurity Expert
    Join Ed Cabrera, former CISO for US Secret Service and now VP Cybersecurity Strategy and Jon Clay, Cybersecurity Expert for Trend Micro in a webinar that will give you the latest information you need to know on how to effectively protect you and your organization from ransomware and the more insidious crypto-ransomware. Ed and Jon will share the latest trends being used by cybercriminals into this threat which the FBI recently asked for support from businesses and security organizations due to the invasiveness of the attacks against businesses. Trend Micro will also share best practices you can implement to minimize the risk but also specific advanced detection capabilities available within multiple solutions to block the threat across its entire lifecycle.
  • Times of Risk and Cybersecurity Recorded: Apr 22 2016 29 mins
    Fernando Thompson, CIO, UDLAP
    This is the 2nd installment of this webinar series and features Fernando Thompson Chief Information Officer of UNIVERSIDAD DE LAS AMERICAS PUEBLA (UDLAP). Universidad De Las Americas Puebla. Fernando’s presentation will centre around:
    • the biggest security challenges are that are facing the university,
    • what lead him to look for a breach detection solution,
    • how he and his team went about researching the best solution,
    • if they used third party/industry tools to help validate their decisions on breach detection solutions.
    • What other solutions they looked at besides Trend Micro Deep Discovery,
    • why they chose Deep Discovery,
    • how they deployed,
    • the results they have achieved; and
    • recommendations on best practices for organizations looking to select a breach detection solution.
  • Accelerating PCI Compliance in the Hybrid Cloud Recorded: Apr 21 2016 98 mins
    Steve Neville, Director of Hybrid Cloud Security Solutions, Trend Micro
    The modernization of the data center and move to the cloud—in combination with increasing consumer pressure to protect cardholder information and an expanding corporate focus on data protection—can make the process of PCI compliance daunting. The good news is that help is available and can make things easier for CISOs trying to balance security and compliance with business agility.
  • How to Make Ironclad Security Purchase Decisions Recorded: Apr 20 2016 31 mins
    Andrew Braunberg, VP, NSS Labs; and Thomas Skybakmoen, VP, NSS Labs
    Andrew Braunberg and Thomas Skybakmoen of NSS Labs discuss:
    • The nature and role of third-party testing.
    • Trend Micro Deep Discovery’s results in the 2015 BDS Testing.
    • Considerations for decision makers when making security purchasing decisions.
  • PCI Compliance for the Enterprise Recorded: Apr 18 2016 28 mins
    Farshad Ghazi, Global Product Manager, HPE Security; Steve Neville, Director, Hybrid Cloud Security, Trend Micro
    Protecting PCI was difficult enough when US-based consumers thought it was done by mirrors and magic. For the past six months, consumers have had hands-on experience with chip-protected bank cards, yet data breaches still occur. This webinar will look at how PCI compliance is changing due to pressures from consumers on one side, corporate management that finally is starting to take data security seriously, and the CISO in between them who must implement bank card security while balancing the pressures from consumer and management.
  • Thinking About Replacing AV with Next Gen Endpoint? Recorded: Apr 12 2016 44 mins
    Andrew Stevens, Director, Global Product Marketing User Protection - Endpoint Solutions
    Organizations are looking at their endpoint security with a critical eye these days, with more awareness than ever that traditional signature-based antivirus (AV) alone is not enough against modern threats. Learn about next gen techniques like behavioral analysis / machine learning, application whitelisting / control, vulnerability shielding, memory inspection, endpoint detection & response (EDR), lateral movement protection and what the 2016 Gartner Endpoint Magic Quadrant says about endpoint protection. In this webinar, you’ll also learn about Trend Micro’s 's combination of proven and next gen endpoint capabilities, which will help your organization protect, detect, and respond to threats better in an automated, integrated solution.
  • March Monthly Threat Webinar - Business Email Compromise Recorded: Mar 31 2016 32 mins
    Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro
    Hear the latest on the most recent data breaches, web threats, and cyber security topics in the news.
    In this month's threat webinar, Jon will be sharing the latest trends we've seen with a new threat recently identified by the FBI called Business Email Compromise. Learn how it works and how best to protect your organization from this threat.
  • Deploying Scalable & Secure Web Apps with AWS Elastic Beanstalk & Deep Security Recorded: Mar 15 2016 30 mins
    Paul Hidalgo
    Elastic Beanstalk gives developers and system administrators a fast and easy way to deploy and manage their applications without worrying about AWS infrastructure. Explore the best ways to use AWS Elastic Beanstalk to automatically provision your AWS workloads and fit your security strategy. You’ll see how AWS Elastic Beanstalk works with Trend Micro’s Deep Security to take security automation to the next level.
  • February Monthly Threat Webinar Recorded: Feb 25 2016 39 mins
    Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro
    Hear the latest on the most recent data breaches, web threats, and cyber security topics in the news.
    In this month’s threat webinar, Jon will be sharing the latest trends we’ve seen with ransomware and the more common crypto-ransomware. Learn why this threat has been increasing, what some of the latest crypto-ransomware threats do, and how best to protect your organization from this threat.
  • Chef integration with AWS and Deep Security Recorded: Feb 24 2016 51 mins
    Jeffrey Westphal
    Chef has quickly become one of the leading delivery methods for DevOps application and infrastructure deployments. As a platform Chef can be used to build compliance, resiliency, analytics, and high availability into your AWS workloads. What if you could also use Chef to automate your security posture within AWS?

    Using Trend Micro’s Deep Security we will evaluate different methods of automation using Chef Hosted Server, AWS Auto scaling Policies, and AWS OpsWorks and take security automation to the next level.
  • January Monthly Threat Webinar - Destructive Attacks to Critical Infrastructure Recorded: Jan 29 2016 38 mins
    Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro; Ed Cabrera VP Cybersecurity Strategy
    Hear the latest on the most recent data breaches, web threats, and cyber security topics in the news.
    The recent attacks on Ukrainian Power Utility are highlighting a recent shift in destructive attacks against Critical Infrastructure. In this webinar Ed Cabrera, VP Cybersecurity Strategy and former CISO of the US Secret Service, will be joining us to cover this latest trend we’re seeing in the use of destructive malware against both critical infrastructure and commercial organizations. Learn the latest in destructive malware and why this technique is being used by threat actors today.
  • December Monthly Threat Webinar Recorded: Dec 16 2015 45 mins
    Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro; and Pawan Kinger, Director, Deep Security Labs
    Join host Jon Clay and Pawan Kinger who manages our Deep Security Vulnerability Research team on what threats are affecting the data center servers and cloud infrastructures. Pawan will share which are the top vulnerabilities being exploited by threat actors against the critical servers hosted in data centers and cloud implementations. He’ll also cover differences we’re seeing between the cloud and on-premise servers and give best practices on how best to protect your servers from today’s threats.
  • Defending your workloads with AWS WAF and Deep Security Recorded: Dec 16 2015 61 mins
    Mark Nunnikhoven
    What is a WAF (web application firewall) and how can it help defend your AWS workloads? In this webinar, you’ll learn how to get started with the new AWS WAF service and where it fits in your security strategy. You’ll see how AWS WAF works with Trend Micro’s Deep Security to provide a strong, layered defense for your web applications.
  • PCI DSS 3.1 Compliance in the Modern Data Center & Cloud: Lessons & Advice from Recorded: Dec 8 2015 49 mins
    Forrest McMahon, Director Tech Advisory & Assessment Svcs Coalfire; & Steve Neville, Director Cloud & Data Center Trend Micro
    Join Forrest McMahon from Qualified Security Assessor (QSA) Coalfire for an insightful view of PCI DSS 3.1 requirements in the face of increasingly sophisticated cyber-attacks and more complicated deployment scenarios:
    1. How to approach the task of PCI DSS 3.1 compliance
    2. What the impacts of different deployment environments (physical, virtual, cloud) have on compliance
    3. What key tools & approaches can be used to streamline and ease compliance impacts
Global leader in security software and solutions.
Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. For the past 25 years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information.

· In today’s organizations, information has become the most strategic asset, embodying competitive advantage and powering operational excellence. With the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. Organizations need a smart protection strategy.

· Trend Micro enables the smart protection of information, with innovative security solutions that are simple to deploy and manage, and fits an evolving ecosystem. Trend Micro solutions provide layered content security for mobile devices, endpoints, gateways, servers and the cloud. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Decoding New PCI DSS Guidelines for Cloud Computing
  • Live at: Feb 19 2013 6:00 pm
  • Presented by: Ryan Holland, Solutions Architect, Amazon Web Services Chris Gray, Ent Mnger, Accuvant Dave Asprey, VP Cloud Sec, Trend Micro
  • From:
Your email has been sent.
or close