Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of PCI DSS
process, and/or transmit cardholder data" How can you achieve
compliance? The Path to Compliance
Users, third-parties, devices,
applications, systems, network infrastructure Define PCI scope Scope
Reduction PCI Compliance
Inventory Tokenization Payment Card Industry Data Security Standard Bridge the gap Path to Compliance Gap
Execution Policies &
envionment PCI DSS Identify the gap How? Remove cardholder
data from environment... ...reduce PCI obligations. Vulnerability Scans
Code Reviews Web Application Firewalls
Intrusion Detection Systems
File Integrity Monitering
Firewalls Segmentation ...reduce PCI obligations. Isolate cardholder data... Business Objectives Assurance Clarity Insight