Are your e-commerce merchants acting illegally?

Neville Ogilvie
If you are not sure of the answer to this question it is possible your business could be in violation of the card brands' industry regulations.

Trustwave presents this webinar for acquirers, ISO's and processors that work with e-commerce merchants. In support of Visa's merchant inspection requirement and MasterCard's BRAM program, Trustwave's automated scanning engine actively monitors e-commerce merchants to make sure they are selling the types of products that are acceptable.

This webinar will walk through:
•The risk to your business
•How to take action
•How Trustwave's solution mitigates this problem
Sep 12 2012
43 mins
Are your e-commerce merchants acting illegally?
Join us for this summit:
  • Channel
  • Channel profile
Up Down
  • Death of Windows XP Gives Life to Hackers Jun 5 2014 9:30 pm UTC 60 mins
    If you’re a small- or medium-sized business running Windows XP, you’ve likely heard that support will be cut off for the 13-year-old operating system in less than three weeks. But you may not have heard what impact that will have on your company’s security and compliance.

    Sign up for this important webinar to learn:
    • What Windows XP “end-of-life” exactly means to the security of your business.
    • Why you should especially care about this if you take credit cards for payment.
    • How you can safeguard your business and remain compliant.
  • Addressing Phishing and Targeted attacks Recorded: Apr 3 2014 60 mins
    IT pros in EMEA are feeling pressured to protect themselves from phishing and targeted attacks. In this webinar we will look at recent investigations into targeted and phishing attacks and their potential impact on businesses risks and options for remediation.
  • Threat intelligence makes you smarter Recorded: Mar 27 2014 36 mins
    In this webinar we will talk about how threat intelligence can be used to get the most out of your staff by helping them work smarter rather than harder. We are all under pressure in our jobs and missing the early warning signs to an attack can lead to devastating consequences. In this webinar we will take you through threat intelligence and how it can be used to your advantage.
  • DATABASE SECURITY SOLUTIONS: Protect Data Where It Lives Recorded: Feb 13 2014 46 mins
    Join Josh Shaul, Head of Products for SpiderLabs as he discusses why databases and big data remain the primary target for attackers and hear about today's biggest threats and how our solutions help protect against them.

    During this webinar we'll discuss:

    • Common issues and threats that lead to database attacks
    • Get a closer look at some specific database exploits
    • Our solutions and how they help organizations stay on top of these threats

    Please share with others in your organization who would benefit from learning about these strategic recommendations and how it can help them manoeuvre through the ever changing threat landscape.
  • Dissecting web attacks and remediation Recorded: Nov 27 2013 62 mins
    In this webinar we take a look at some of the common attacks seen against web applications and look to innovative ways for remediation and defence in depth strategies that take the pain out of protecting applications on the internet.
  • PCI 3.0 is Coming – Are you Ready? Recorded: Nov 21 2013 59 mins
    We’ve all heard it by now - the PCI standard is changing – to match an advancing threat landscape, new business and technology platforms, and evolving requirements of the payments community. Join Trustwave’s PCI compliance and threat intelligence experts in this expert webcast, to get a holistic view of PCI 3.0 from both a compliance management and threat intelligence perspective. They’ll answer your questions on both the “what” and the “why” of the new mandate, and you’ll learn:

    · the key changes that are part of the PCI DSS 3.0
    · what is driving those changes and why they’re needed
    · steps you can take to prepare your organization for the new mandate
  • Advanced mobile attacks and impacts Recorded: Nov 13 2013 51 mins
    Trustwave takes a look at some of the more advanced attacks against mobile applications and looks at ways to help organisations to be more aware of the risks of a mobile workforce. We identify some top tips and remediation advise for all skill levels.
  • Better Vulnerability Management Recorded: Oct 29 2013 62 mins
    Many organisations find coordinating the different streams of a vulnerability management program a challenge. Often vulnerability scan result data is independent from penetration testing results, making triage, prioritisation and tracking of remediation unnecessarily hard. To add an additional layer of complexity its very rare that organisations have a standardized approach to penetration tests that allows them reasonably compare security profiles of one of their environments against another, or to track the security posture trends over time.

    During this webinar we will explore some of these concepts and present our approach to solving this problem for organizations around the world.
  • Are you ready for the new generation of socially engineered malware attacks? Recorded: Oct 8 2013 40 mins
    The explosion in social media use has facilitated opportunities for hackers to create targeted socially engineered attacks on organisations. Discover how easily your employees can fall prey to these attacks, how hackers use them to compromise corporate end points, and what you can do to protect your organisation.
  • The early warning signs to attacks Recorded: Sep 24 2013 59 mins
    During this webinar we will discuss some of the signs missed during attacks that could have helped stop compromise and loss of sensitive data.

    Trustwave will provide some suggestions for remediation and automated review / procedural steps to limit exposure. The average from compromise to detection is 210 days – Trustwave GSR 2013.
  • Mobile Security Threats and Remediation Recorded: Jun 4 2013 52 mins
    Embracing BYOD to gain productivity and cost efficiencies is a good business practice. But how can you make sure you are securing your network from the threats mobile users and devices can introduce?

    Join our webinar to discover how to:

    - Understand hidden security vulnerabilities in BYOD deployments
    - Go beyond mobile device management to better protect your network
    - Establish a smart, cooperative technology ecosystem for BYOD
  • 2013 Trustwave Global Security Report: Threat Trends Webinar Recorded: Mar 19 2013 63 mins
    Listen Up. Lock Down.

    •The average time from breach to detection is 210 days.
    •Mobile malware samples increased by 400%.
    •E-commerce applications account for 48% of breach investigations.

    Do you want the inside track on the threats you’ll be facing this year? Then sign up for this expert webcast covering the highlights of the 2013 Trustwave Global Security Report.

    Hosted by Trustwave SpiderLabs elite research and threat intelligence team, what you see and hear in this session will help prepare your business and your teams for what’s ahead in 2013 and beyond.
  • Why Hackers Love Hotels, Restaurants, Retail and Other Businesses Recorded: Nov 29 2012 49 mins
    In 2011 investigations, more than 85% of data breaches took place in restaurants, diners, retail stores and hotels.

    Hackers are experts when it comes to stealing your data...including the credit card numbers of your customers.

    Learn how to easily and quickly protect your business. View Why Hackers Love Your Business and find out:

    - Why hackers are targeting your multi-site business
    - What data they steal and why they don't get caught
    - What you can do to protect all your sites
  • Are your e-commerce merchants acting illegally? Recorded: Sep 12 2012 43 mins
    If you are not sure of the answer to this question it is possible your business could be in violation of the card brands' industry regulations.

    Trustwave presents this webinar for acquirers, ISO's and processors that work with e-commerce merchants. In support of Visa's merchant inspection requirement and MasterCard's BRAM program, Trustwave's automated scanning engine actively monitors e-commerce merchants to make sure they are selling the types of products that are acceptable.

    This webinar will walk through:
    •The risk to your business
    •How to take action
    •How Trustwave's solution mitigates this problem
  • Defend Your Web Applications Recorded: Jun 19 2012 49 mins
    Web applications are increasingly the path of least resistance for hackers. Common flaws are not being fixed - for example - legacy code is still used and not enough preventative measures are being undertaken.

    Web application attacks can prove disastrous for your business, leading to downtime, defacement, loss of customer data, fraud and more. A properly configured Web Application Firewall (WAF) can make all the difference when it comes to identifying and preventing attacks.

    Join us to learn the following:
    • The problem space
    • The importance of Web Application Firewalls
    • Commercial WAF vs. Open Source WAF

    The informative webinar will be ideal for any IT or compliance professional who would like to better understand how a WAF could benefit their application security strategy.
  • 2012 Global Security Threats and Trends Recorded: Feb 14 2012 61 mins
    If the thought of a data breach is keeping you up at night, this presentation will give you tangible recommendations on strengthening your information security strategy. Based on the Trustwave 2012 Global Security Report, the presentation will feature data from more than 300 investigations and 2,000 penetration tests conducted in the previous 12 months.
Security begins with Trust
Securing information in every form in every environment.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Are your e-commerce merchants acting illegally?
  • Live at: Sep 12 2012 2:30 pm
  • Presented by: Neville Ogilvie
  • From:
Your email has been sent.
or close
You must be logged in to email this