PCI/PII Awareness Training
Ben Jordan Security Specialist
PCI/PII Awareness Training Ben Jordan Security Specialist Credit - - PowerPoint PPT Presentation
PCI/PII Awareness Training Ben Jordan Security Specialist Credit Card Security: Chip Cards The chip contains a cryptographic key for authentication Downfall Online transactions do not require any authentication from the chip Chip
Ben Jordan Security Specialist
from the chip
report any issues found immediately
abnormal (e.g. cover over terminal or skimmer unordinary sticking out of the reader
area (e.g. desk, office) or lock facility where key access is managed
credit card number
number it should be on an authorized form
be securely stored
must be destroyed after use
identity theft
Resources, Finance, etc.
and may need different ways to deal with identity theft
Step 1: Identify Red Flags
Step 2: Detect Red Flags
requesting photo ID)
schedule or phone number) Also monitoring and verifying validity of account changes
Step 3: Prevent and Mitigate
manager/supervisor
Step 3: Update The Program
make updates to any internal procedures to detect, prevent and mitigate identity theft.