Maintaining PCI 2.0 Compliance—Infrastructure required for PCI continuity

Getting past the initial Payment Card Industry Data Security Standard (PCI DSS) implementation is just half the battle. Once you're compliant you must put infrastructure in place to ensure ongoing compliance and respond to new threats. IBM i systems have the necessary tools and interoperability to let you construct a robust PCI environment. And although you can count on the i's strong internal encryption and authorization controls to protect sensitive onboard data, staying compliant requires heterogeneous tools geared toward proactive, rather than reactive, security. In this presentation, PCI DSS implementation expert Mel Beckman describes the proactive tools and techniques you should employ to stay within PCI's requirements

Event Registration

Rate and Comment
  Select Registration Options
Select the items you want below.
Maintaining PCI 2.0 Compliance—Infrastructure required for PCI continuity
EVENT is Closed
Rate and Comment
Rate and Comment
  Please Confirm Your Information
Email:
 
 
Desired/Current Password:
 
New members continue filling out the form.
Returning Members Login now!
First Name: Last Name: Phone:
     
Address Line 1: Address Line 2: Postal Code:
   
City: State: Country:
     
Company: Title/Position:
   
Rate and Comment
Rate and Comment
  Attendee Survey
What is your primary job?    
Which of the following best describes your organization's industry or function?    
Rate and Comment
Updating Registration
Submitting Registration


I agree to the terms of use of this site including the privacy statement.
Your contact information will be shared with event sponsors.
By registering for the conference you agree to this disclosure.

Sponsors

Speakers

    Mel Beckman

    Mel Beckman, Senior Technical Editor
     Mel Beckman is a Senior Technical Director for Penton Media, publishers of Windows IT Pro and Power IT Pro  magazines, and president of Beckman Software Engineering, a technical consultancy specializing in large-scale, high-bandwidth application hosting networks. He has written extensively about information technology, and has presented seminars on software and network engineering throughout the United States, Europe, and Asia. Mel has received numerous writing awards, including the Excellence and Distinguished Technical Communication awards from the Society for Technical Communication. His past clients include Apple Computer, DuPont Displays, IBM, Loral Federal Systems, United Airlines, the U.S. Departments of Agriculture, Defense, and Energy.

Conference Registration

  • Your registration includes:
    • On-demand viewing for three months following the event
    • Access to the virtual event video content
    • Live, interactive chat with other attendees, speakers and sponsors
    Not sure you can attend? No problem, all the video content will be available on-demand for three months.