|
Retail system breaches continue to grab headlines with millions of consumer records exploited and hundreds of lawsuits filed. What lessons have we learned from the most recent breaches such as Target, Niemen Marcus and others? What role can the OEM take to address future breaches? New PCI DSS v 3.0 requirements look to further address security vulnerabilities in all system components included in, or connected to, the cardholder data environment. What is expected of the OEM to ensure their customers comply with those regulations? In this webinar McAfee will share lessons learned from some of the most recent retail system breaches and what every embedded device manufacturer should know about protecting their customers. The speaker will explore customer expectations of the OEM to help protect devices against attacks and considering the new PCI regulations how the OEM can help their customers reach and maintain compliance. Attend this Webinar to learn: • Various security and compliances implications of changes in PCI DSS for retail systems • Best practices to address these security risks and compliance requirements • Insights to how the McAfee Defense in Depth approach can protect your OEM retail systems There is Shared responsibility for retail PCI Compliance. The device manufacturer has a responsibility to help their retail end-users. With the onslaught of targeted attacks, checking a box isn’t enough. Speakers: Joe McMahon, Enterprise Solutions Architect, McAfee Cayce Beames, Technical Practice Director, Foundstone Gina Tammo, Supplier Business Manager, Avnet Embedded Moderator: Curt Schwaderer, OpenSystems Media |
||||||