Meeting PCI DSS compliance requirements with a data management program

Meeting PCI DSS compliance requirements with a data management program

Meeting PCI DSS compliance requirements with a data management program

Date: Feb 05, 2013

This special presentation is part of SearchSecurity.com's Compliance School lesson, "Normalize information security and compliance data management,"featuring Mike Chapple of the University of Notre Dame.

More webcasts in this series

Creating a normalized corporate compliance program

Security data mining: Weeding through data overload

In order for organizations to meet PCI DSS compliance requirements and remain compliant over time, they must be able to build an effective data management program. PCI DSS is nothing new to security professionals, but it is important to adapt to the complexities PCI DSS adds to the way organizations manage their data.

This special video presentation from Mike Chapple, SearchSecurity.com's resident expert on enterprise compliance, focuses on dealing with PCI DSS requirements in relation to data management practices, emphasizing how to manage sensitive data that is subject toPCI DSS standards. Additionally, this presentation provides an overview and history of PCI DSS, a look at full requirements and analysis, the basics of a PCI DSS data management program, and ways to use data mining techniques to facilitate PCI DSS compliance as well as other regulatory requirements that apply to organizations.

About the speaker
Mike Chapple, Ph. D., CISA, CISSP, is an IT security manager with the University of Notre Dame. He previously served as an information security researcher with the National Security Agency and the U.S. Air Force. Chapple is a frequent contributor to SearchSecurity.com and serves as its resident expert on network security for its Ask the Experts panel. He is a technical editor for Information Security magazine and the author of several information security titles, including the CISSP Prep Guide and Information Security Illuminated.

Editor's note: This presentation was originally recorded in March 2012.

More on Enterprise Compliance Management Strategy

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: