Compliance Audit - Assessing POS Devices for Tampering
Offered By: YouTube
Course Description
Overview
Learn about assessing Point of Sale (POS) devices for tampering in this informative conference talk from Louisville Infosec 2017. Explore the evolution of skimming attacks, understand the true cost of breaches, and examine PCI standards on skimming and substitution. Delve into common tampering examples, general recommendations for the public, and discover who is responsible for checking device integrity. Gain insights into developing a comprehensive tampering assessment program, including creating a perfect state profile and implementing essential checklist items. This presentation equips you with valuable knowledge to enhance security measures and protect against POS device vulnerabilities.
Syllabus
Intro
In the Beginning...
Skimming Attacks on the Rise
The REAL Cost of a Breach
PCI on Skimming/Substitution
Framing the Problem, Addressing Myths
Common Tampering Examples
General Recommendations for the Public
Who Checks for Tampering?
Tampering Assessment Program Definition
Perfect State Profile
Tampering Assessment Program Essentials
High Level Tampering Assessment Checklist
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube