Text size Increase Font-SizeDecrease Font-SizeReset Font-Size

Meet the Trainers

Gareth Bowker

Gareth joined PCI SSC in April 2012, bringing 15 years of experience from the Information Security field. He initially started as a software developer and soon specialised in secure web application development processes. This led to him joining a PCI ASV company in 2005 where he worked as a penetration tester and consultant, becoming a QSA in 2006, followed by a PA-QSA in 2008. Gareth has worked with many large financial institutions and merchants on projects around PCI DSS, risk management, data loss prevention as well as conducting forensic and breach investigations. Gareth is a CISSP and holds a B.Sc. degree.

Jeff Wilder

Jeff joined the PCI Security Standards Council in August 2013 and brings over 20 years of IT-related and IT security experience. He joined the ranks of the QSAs in 2006 and PA-QSAs a few years later. Having performed numerous assessments from small brick and mortar companies to large Fortune 500 organizations, his experience has crossed multiple industries including hospitality, food service, international shipping, petroleum distribution, charitable foundations, and health services. He has assisted many organizations through remediation, providing PCI-related services as an SME and project manager in security, governance, implementation, and forensics activities. Jeff maintains a number of industry certifications including the CISSP, ISSAP, ISSMP, CISA, CGEIT, and C/EH.


Back to Top

The PCI Security Standards Council (the "Council") provides a variety of tools, questionnaires, guidance, FAQs, training resources and other materials and information to assist organizations seeking to achieve compliance with its standards (the "Standards"). Third party products and services are also available, but the Council does not endorse or recommend any such third party products or services, and advises all organizations seeking to achieve compliance to become familiar with the Standards and related requirements before purchasing third party products or services. Ultimately, all applicable requirements must be met in order to achieve compliance, regardless of whether or what third party products or services are used.