An ideal introduction to PCI DSS v4.0.1 Organisations that accept payment cards are prey for criminal hackers trying to steal financial information and commit identity fraud. Many attacks are highly automated, using increasingly sophisticated tools and techniques to search for website and payment card system vulnerabilities remotely. When a vulnerability is discovered, an attack can start with the management and staff of the target organisation unaware of what is going on.
The PCI DSS exists to ensure that organisations process credit and debit card payments in a way that effectively protects cardholder data.
This guide will help you understand:
How you can comply with the requirements of the Standard; How certification to ISO 27001:2022 can help with PCI DSS implementation; PTS (PIN Transaction Security); and P2PE (point-to-point encryption).
Get this guide to start your PCI DSS implementation journey today!
Chapter 1: What is the Payment Card Industry Data Security Standard (PCI
DSS)?
Chapter 2: High-profile cardholder breaches
Chapter 3: What is the scope of the PCI DSS?
Chapter 4: Compliance and compliance programmes
Chapter 5: Consequences of a breach
Chapter 6: How do you comply with the requirements of the Standard?
Chapter 7: Maintaining compliance
Chapter 8: PCI DSS the Standard
Chapter 9: Aspects of PCI DSS compliance
Chapter 10: The PCI self-assessment questionnaire (SAQ)
Chapter 11: Procedures and qualifications
Chapter 12: The PCI DSS and ISO/IEC 27001
Chapter 13: The Software Security Framework (SSF)
Chapter 14: PIN Transaction Security (PTS)
Chapter 15: Point-to-point encryption (P2PE)
Chapter 16: Software-based PIN entry on commercial off-the-shelf (COTS)
devices
Further reading
Stephen Hancock is a highly experienced cyber security consultant and auditor. He has been a PCI Qualified Security Assessor for more than ten years. He has advised on the PCI DSS and conducted assessments for clients all over the world, ranging from multinational retailers to start-up fintech organisations and payment service providers. Stephen has been involved in developing and delivering training courses for the PCI DSS and ISO 27001, and holds a number of information security qualifications.