Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Beyond the Vendor: Managing Fourth, Fifth, and Nth-Party Risks in PCI Environments

Автор: PCI SSC Global Content Library

Загружено: 2025-12-04

Просмотров: 157

Описание:

Presented by: Brian Willis, PCI QSA, CISSP, ISO 27001 LA, Partner, LBMC, PC and Kyle Hinterberg, Sr. Manager, LBMC, PC

A compliant third party doesn’t mean a secure ecosystem. As supply chains expand, so do the risks—often beyond direct vendor relationships. This session dives into managing security threats from fourth, fifth, and even Nth-party providers in PCI DSS-regulated environments. We’ll discuss mapping critical dependencies, implementing contractual protections, and ensuring continuous security oversight across complex vendor ecosystems. Attendees will gain actionable strategies to build resilience beyond direct third-party relationships, aligning security expectations with PCI DSS compliance.


Subscribe to the PCI Perspectives Blog to receive all of the latest PCI DSS v4.0 and Council News: https://training.pcisecuritystandards...

SUBSCRIBE to our channel!
Follow PCI SCC on X: https://x.com/PCISSC
Follow PCI SSC on LinkedIn:   / pcissc  
PCI SSC Blog: https://blog.pcisecuritystandards.org/
PCI SSC Events: https://events.pcisecuritystandards.org/

Beyond the Vendor: Managing Fourth, Fifth, and Nth-Party Risks in PCI Environments

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Unlocking the Path to Growing and Securing Biometrics Payment at a Global Scale

Unlocking the Path to Growing and Securing Biometrics Payment at a Global Scale

TECH EXCHANGE: Beyond the Checkbox: Uncovering Hidden Risks in PCI Compliance

TECH EXCHANGE: Beyond the Checkbox: Uncovering Hidden Risks in PCI Compliance

Risk-Directed Security: From Enforcers of PCI DSS to Enablers of a Secure Payment Ecosystem

Risk-Directed Security: From Enforcers of PCI DSS to Enablers of a Secure Payment Ecosystem

TECH EXCHANGE: Revolutionizing PCI DSS Assessments: ​How AI Drives Efficiency and Enhances Quality

TECH EXCHANGE: Revolutionizing PCI DSS Assessments: ​How AI Drives Efficiency and Enhances Quality

CISSP Exam Cram - Cryptography Drill-Down

CISSP Exam Cram - Cryptography Drill-Down

The Evolution of Payments and the Future of Unified Commerce

The Evolution of Payments and the Future of Unified Commerce

Что такое разведка киберугроз и как выделиться на фоне остальных в качестве аналитика по киберугр...

Что такое разведка киберугроз и как выделиться на фоне остальных в качестве аналитика по киберугр...

Blueprint for the Future: Modernizing PCI SSC Standards and Supporting Documentation

Blueprint for the Future: Modernizing PCI SSC Standards and Supporting Documentation

The Cycle of Cyber Threat Intelligence

The Cycle of Cyber Threat Intelligence

#173 — Освоение управления уязвимостями

#173 — Освоение управления уязвимостями

Как создавать системы (чтобы ваш бизнес работал без вас)

Как создавать системы (чтобы ваш бизнес работал без вас)

Keynote: Stronger Together – Advancing Payment Security Through Global Collaboration

Keynote: Stronger Together – Advancing Payment Security Through Global Collaboration

Accessibility​ and Payment Security​ - Aligning Compliance, Inclusion, and Innovation

Accessibility​ and Payment Security​ - Aligning Compliance, Inclusion, and Innovation

How I Hacked the CISSP Exam: Passed in 1 Hour with 2 Weeks of Study (No Bootcamp Needed!)

How I Hacked the CISSP Exam: Passed in 1 Hour with 2 Weeks of Study (No Bootcamp Needed!)

CISSP Exam Cram - 2024 Addendum

CISSP Exam Cram - 2024 Addendum

Secure Software Development MindMap (1 of 2) | CISSP Domain 8

Secure Software Development MindMap (1 of 2) | CISSP Domain 8

Карта мышления модели OSI (1 из 4) | Домен CISSP 4

Карта мышления модели OSI (1 из 4) | Домен CISSP 4

Next Generation PKI for Financial Services

Next Generation PKI for Financial Services

The Secret to Vulnerability Management

The Secret to Vulnerability Management

Implementing DSS Requirements 6.4.3 & 11.6.1 for Merchants and Enterprise providers

Implementing DSS Requirements 6.4.3 & 11.6.1 for Merchants and Enterprise providers

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com