All Episodes

Displaying 21 - 40 of 51 in total

Episode 31 — Leverage tokenization and vaulting to cut exposure

Tokenization replaces the Primary Account Number with a surrogate that has no exploitable mathematical relationship to the original value, while vaulting centralizes a...

Episode 30 — Right-size cloud and virtualization scope with evidence

Cloud and virtualization do not remove PCI obligations; they redistribute them, and the exam tests whether you can trace scope and evidence across shared responsibilit...

Episode 29 — Lock down wireless networks and remote access pathways

Wireless and remote access collapse distance for attackers, so the exam evaluates whether you treat them as high-risk edges with layered defenses and proof of enforcem...

Episode 28 — Secure e-commerce pages and third-party scripts thoroughly

E-commerce security on the exam centers on who controls the payment page and what executes in the user’s browser, because skimming and injection attacks often exploit ...

Episode 27 — Lead with policy and a living security program

Policies are not paperwork on the PCIP exam; they are the top layer that expresses intent, assigns responsibilities, and anchors procedures and standards that produce ...

Episode 26 — Test segmentation and controls for credible assurance

Segmentation only reduces PCI scope when it works in practice, and the exam looks for evidence that barriers are effective, not just diagrammed. This episode explains ...

Episode 25 — Monitor logs with intent and respond to signals

Logging is only valuable when it answers who did what, where, and when, with enough context to judge impact, so the exam stresses purposeful coverage over raw volume. ...

Episode 24 — Guard physical access to cardholder areas relentlessly

Physical controls protect the boundary conditions for systems and media that process or store account data, and the exam looks for designs that blend deterrence, detec...

Episode 23 — Make multifactor authentication resilient and user friendly

Multifactor authentication succeeds when it withstands real-world attacks without blocking legitimate work, and the exam expects you to parse both security and usabili...

Episode 22 — Enforce least-privilege access across systems and roles

Least privilege is not a slogan in PCI; it is a set of decisions that constrain what an identity can do, where, and when, with proof that those choices are reviewed. T...

Episode 21 — Build and release software using secure development practices

The exam expects you to treat software security as a life cycle with evidence at every phase, not as a post-build scan. This episode lays out how secure development in...

Episode 20 — Stop malware early using layered protective defenses

Malware defense in PCI environments is not a single product but a layered set of controls that prevent, detect, and respond in ways that are measurable and auditable. ...

Episode 19 — Encrypt data in transit across every open pathway

Data in transit crosses many boundaries—wired, wireless, internal, and external—and the exam expects you to secure each with protocols and configurations that stand up...

Episode 18 — Shield stored account data from theft and misuse

Protecting stored account data is a precision exercise on the exam: know which data elements may be stored, how they must be protected, and which elements are never pe...

Episode 17 — Lock down secure configurations across servers and endpoints

Secure configuration management converts general security principles into concrete, testable baselines for systems that can touch or influence cardholder data. This ep...

Episode 16 — Fortify network security controls against real-world attacks

The exam treats network security as a layered story that must hold under routine traffic and under active probing, so this episode frames controls as verifiable barrie...

Episode 15 — Run targeted risk analyses that withstand tough scrutiny

Targeted risk analyses support risk-based frequencies and certain requirement options in PCI, and the exam rewards clear, reproducible methods. This episode defines a ...

Episode 14 — Apply the Customized Approach correctly from start to finish

The Customized Approach exists for organizations that meet the intent of a PCI requirement using alternative controls, but the exam expects you to treat it as a rigoro...

Episode 13 — Prepare ROC and AOC submissions that actually pass

Report on Compliance (ROC) and Attestation of Compliance (AOC) packages succeed when they align evidence to requirements clearly, trace scope decisions, and leave no a...

Episode 12 — Choose the correct SAQ for your payment channels

Selecting the correct Self-Assessment Questionnaire (SAQ) depends on how you accept payments and where cardholder data flows, which the exam treats as a logic exercise...

Broadcast by