We’ve compared the version 3.2.1 to version 4.0 Self-Assessment Questionnaires.

Join Viviana Wesley to learn about the differences in SAQ types, A, A-EP, B, B-IP, C, C-VT and P2PE.

View the recording

PCI Webinar Series

Session 1

Preparing for Your Transition to PCI DSS v4.0

Session 2

A Deep Dive into the New 4.0 DSS Requirements that are Applicable Immediately

Session 3

A Deep Dive into the Emerging New 4.0 DSS Requirements that are Due by March 2025

Session 4

How to do Targeted Risk Analysis using a Duty of Care Risk Analysis method | May 25, 2023, Thursday | 11am Central

Session 5

SAQ Comparison Summaries | June 1, 2023, Thursday | 11am Central

 

 

PCI DSS Requirements

PCI DSS Requirement 5.4.1: Anti-spoofing controls such as DMARC, which stands for Domain-based Message Authentication, Reporting and Conformance, Sender Policy Framework (SPF), and Domain Keys Identified Mail (DKIM) can help stop phishers from spoofing the entity’s domain and impersonating personnel. 

Clarification on eCommerce Outsourcing PCI DSS requirements 6.4.3 and 11.6.1

Unpacking the New PCI DSS Password Standards

Is Your Organization Prepared for PCI DSS Automation – Requirement 10.4.1.1?

What is the PCI DSS v4 Authenticated Scanning Mandate – Requirement 11.3.1.2?

What is the PCI DSS v4.0.1 Requirement for PoLP – Requirement 7.2.5?

PCI SSC Updates SAQ A: Removal of Key eCommerce Security and New Eligibility Criteria – Requirements 6.4.3, 11.6.1, 12.3.1

The New PCI DSS v4.0.1 Software Catalog Mandate – Requirement 6.3.2

How PCI DSS 4.0.1 Tackles Service Account Vulnerabilities – Requirements 8.6.1, 7.2.5.1, 8.6.2, 8.6.3, 10.2.1.2

Are You Keeping an Inventory of Cipher Suites and Certificates for the New PCI DSS – Requirements 12.3.3, 4.2.1.1?

How to Analyze An Attestation of Compliance (AOC)

 

INFORMATION SECURITY PRIMERS

Managing IoT Risk: A Primer

Primer on Post-Quantum Cryptography (PQC)

Primer on Cloud Security

A Primer for AI Legislation and Litigation: Trends and Resources

A Primer to Frictionless Authentication

A Primer to Russian Intelligence “Snake” Malware

A Primer to Security Access Service Edge (SASE)

A Primer to Digital Risk Protection Services (DRPS)

A Primer to Containerization

A Primer to Cloud Access Security Brokers (CASB)

A Primer to Zero Trust Security

A Primer to Deception Technology

Managing AI Risks in Organizational Adoption and Usage

What are DeepFakes?