Subscribe Subscribe
Text size Increase Font-SizeDecrease Font-SizeReset Font-Size

Upcoming Webinars

Upcoming Webinars

PCI SSC holds periodic webinars for participating organizations. Join today to be invited to future programs!

Webinar – Targeted Attacks: Spear Phishing and Social Engineering
Thursday, 16 July 2015 at 1:00 PM ET
Hackers utilize spear-phishing and social engineering methods to target organizations with emails and social media messages that trick users into providing confidential data, leading to more comprehensive forms of attack. These attacks are at the heart of many of today’s most serious cyber hacks, and can put your business and your customers at risk.

As part of the 2015 threats and vulnerabilities educational webinar series for PCI Participating Organizations, the Council welcomes guest speaker Jonathan Uzzo of MasterCard’s Account Data Compromise Team for this session on how to protect against these increasing attacks.

Join the PCI SSC for on Thursday 16 July, 1:00 p.m. Eastern: Targeted Attacks: Spear Phishing and Social Engineering.

The 60 minute webinar will cover the following topics, and include a live Q&A session:

· Key findings from real-world breach scenarios

· Prevention strategies for protecting against targeted attacks

· Recommendations for safeguarding point-of-sale systems

· PCI and industry resources
To register for the Thursday, 16 July 2015 at 1:00 PM ET session, please click here

Back to Top

The PCI Security Standards Council (the "Council") provides a variety of tools, questionnaires, guidance, FAQs, training resources and other materials and information to assist organizations seeking to achieve compliance with its standards (the "Standards"). Third party products and services are also available, but the Council does not endorse or recommend any such third party products or services, and advises all organizations seeking to achieve compliance to become familiar with the Standards and related requirements before purchasing third party products or services. Ultimately, all applicable requirements must be met in order to achieve compliance, regardless of whether or what third party products or services are used.