YoVDO

Compliance Audit - Assessing POS Devices for Tampering

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Risk Assessment Courses PCI Compliance Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about assessing Point of Sale (POS) devices for tampering in this informative conference talk from Louisville Infosec 2017. Explore the evolution of skimming attacks, understand the true cost of breaches, and examine PCI standards on skimming and substitution. Delve into common tampering examples, general recommendations for the public, and discover who is responsible for checking device integrity. Gain insights into developing a comprehensive tampering assessment program, including creating a perfect state profile and implementing essential checklist items. This presentation equips you with valuable knowledge to enhance security measures and protect against POS device vulnerabilities.

Syllabus

Intro
In the Beginning...
Skimming Attacks on the Rise
The REAL Cost of a Breach
PCI on Skimming/Substitution
Framing the Problem, Addressing Myths
Common Tampering Examples
General Recommendations for the Public
Who Checks for Tampering?
Tampering Assessment Program Definition
Perfect State Profile
Tampering Assessment Program Essentials
High Level Tampering Assessment Checklist


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network