Companies Home Search Profile

Safeguarding Customer Credit Card Data: PCI Compliance

Focused View

Laura Louthan

1:03:01

0 View
  • 01 - Safeguarding credit card data.mp4
    00:40
  • 01 - Credit cards How payments work.mp4
    02:53
  • 02 - Merchants and consumers.mp4
    03:13
  • 03 - Banks, payment processors, and card brands.mp4
    03:05
  • 04 - Whats on a card and why.mp4
    02:44
  • 05 - Stolen cards Where do they go.mp4
    02:58
  • 06 - Tokenization.mp4
    02:27
  • 01 - Card-present transactions.mp4
    02:36
  • 02 - Magnetic swipe vs. chip and pinsig.mp4
    03:40
  • 03 - Physical card skimmers.mp4
    02:47
  • 04 - POS breaches.mp4
    02:59
  • 05 - Alternative physical payments.mp4
    04:24
  • 01 - Card not present How does it work.mp4
    02:40
  • 02 - Card on file.mp4
    01:33
  • 03 - The risks of taking payments online.mp4
    02:50
  • 04 - Impact of chip cards.mp4
    01:56
  • 05 - E-skimming.mp4
    02:29
  • 01 - What are the PCI Standards.mp4
    03:45
  • 02 - Reporting levels and becoming compliant.mp4
    03:24
  • 03 - ROCs and SAQs.mp4
    03:10
  • 04 - AI and PCI compliance.mp4
    04:56
  • 01 - Next steps for PCI compliance and safeguarding payment data.mp4
    01:52
  • Description


    How are credit card payments processed behind the scenes? And when a credit card is stolen, how is that typically happening? In this course, Laura Louthan answers these questions and more, explaining how payments get from consumers to banks and to the final merchants, as well as the risks associated with the theft or compromise of credit card data—both to customers and merchants. Laura highlights the various entities involved in payment processing and how they protect against card data loss. She covers the difference between in-store and online payments, how chip cards have increased online fraud, and the pros and cons of alternative payment systems like digital wallets. Plus, learn about the different ways that organizations need to report compliance to the Payment Card Industry (PCI) Security Standards Council. After finishing this course, you’ll be prepared to explain why protecting credit card data matters to merchants and service providers; break down the flow of a credit card number during a payment process; and identify where security weaknesses may lie in a payment process flow.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Laura Louthan
    Laura Louthan
    Instructor's Courses
    Experienced Information Security and IT Leader Delivering Enterprise Security and Compliance Solutions for Global Corporations With more than 15 years’ experience in IT architecture and data management, I have had the opportunity over the past five years to direct information security and compliance initiatives for global corporations. Managing risk while improving security in complex international environments has provided the opportunity for me to implement fully IT solutions in support of business objectives while maintaining a competitive edge. ■ IT Security Compliance Provided secure network design, established policies and standards enterprise-wide, collaborated with IT across multiple business units to build compliant and secure environment, and brought legacy systems into compliance by identifying various options that minimized impact to the business and controlled costs. ■ Audit and Assessment As a PCI-certified Internal Security Assessor (ISA), ensured PCI Compliance assessments and subsequent documentation for multiple assessment environments, including highly complex situations that previously were not thoroughly reviewed. Based on ISA requirements, implemented various security improvements in assessment years. Qualified as an ISACA CISA in 2021. ■ Contract and Agreement Negotiation Oversaw contracts and questionnaires group, handling the review of all security wording in external facing contracts for both customers and suppliers. Brought insourced employees onboard to perform Tier 1 review and redline bilingually, improving and creating metrics, formulating SLAs and building efficiencies in process and institutional sharing of knowledge. ■ Specialty Skills :: Information Security :: Cloud Security :: PCI Compliance and Readiness :: ISO 27001 Implementation and Maintenance :: Security Risk Management :: Regulatory Compliance (HIPAA) :: Infrastructure Operations :: Strategic Planning :: Security Compliance Frameworks (SOC, NIST) :: Program and Project Management :: Third Party Risk Management
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 22
    • duration 1:03:01
    • English subtitles has
    • Release Date 2024/12/14