Главная
Study mode:
on
1
Intro
2
In the Beginning...
3
Skimming Attacks on the Rise
4
The REAL Cost of a Breach
5
PCI on Skimming/Substitution
6
Framing the Problem, Addressing Myths
7
Common Tampering Examples
8
General Recommendations for the Public
9
Who Checks for Tampering?
10
Tampering Assessment Program Definition
11
Perfect State Profile
12
Tampering Assessment Program Essentials
13
High Level Tampering Assessment Checklist
Description:
Learn about assessing Point of Sale (POS) devices for tampering in this informative conference talk from Louisville Infosec 2017. Explore the evolution of skimming attacks, understand the true cost of breaches, and examine PCI standards on skimming and substitution. Delve into common tampering examples, general recommendations for the public, and discover who is responsible for checking device integrity. Gain insights into developing a comprehensive tampering assessment program, including creating a perfect state profile and implementing essential checklist items. This presentation equips you with valuable knowledge to enhance security measures and protect against POS device vulnerabilities.

Compliance Audit - Assessing POS Devices for Tampering

Add to list