Ed TALKS: Paying it Forward – Securing Technology in the Payment Ecosystem

Logo
Presented by

Ed Adams, Security Innovation | Kara Gunderson, CITGO | Ira Winkler-Skyline Technology | Phil Agcaoili, Ponemon Institute

About this talk

The payment ecosystem is a complex one that is exposed from multiple points: Data interception, identify theft, and other attacks primarily target insecure software, APIs, and communication protocols that are difficult to lock down. To secure data within the payment infrastructure retailers, software providers, financial institutions, and device manufacturers need to implement risk-based practices. Come hear three industry experts - Kara Gunderson (CITGO) and Ira Winkler (author, "You Can Stop Stupid"), Phil Agcaoili (Ponemon Institute Fellows) - discuss how to do this in a practical manner. Topics include: • Biggest threats and common attack vectors • Dealing with POS (point of sale) systems • End to End encryption – is it even possible? • Managing software updates • Passing with A’s: Authentication, Authorization & Access
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (70)
Subscribers (14911)
Security Innovation is an authority on software security and helps organizations build and deploy more secure software. Global technology vendors and enterprise IT organizations such as Microsoft, IBM, FedEx, ING, Symantec, Coca-Cola and GE rely on our expertise to understand the security risks in their software systems and facilitate the software and process change necessary to mitigate them. Security Innovation specializes in software security, an area where traditional “information security” and “business” consultants tend to struggle. We have been analyzing application vulnerabilities and risk for almost a decade and were one of the first providers of software risk solutions to Fortune 500 firms. Our unrivaled proficiency in technical analysis, coupled with sound knowledge of business processes, results in world-class solutions that bridge the gap between application security holes and risk management optimization.