We’ve compared the version 3.2.1 to version 4.0 Self-Assessment Questionnaires.
Join Viviana Wesley to learn about the differences in SAQ types, A, A-EP, B, B-IP, C, C-VT and P2PE.
View the recording
PCI Webinar Series
Session 1
Preparing for Your Transition to PCI DSS v4.0
Session 2
A Deep Dive into the New 4.0 DSS Requirements that are Applicable Immediately
Session 3
A Deep Dive into the Emerging New 4.0 DSS Requirements that are Due by March 2025
Session 4
How to do Targeted Risk Analysis using a Duty of Care Risk Analysis method | May 25, 2023, Thursday | 11am Central
Session 5
SAQ Comparison Summaries | June 1, 2023, Thursday | 11am Central
PCI DSS Requirements
PCI DSS Requirement 5.4.1: Anti-spoofing controls such as DMARC, which stands for Domain-based Message Authentication, Reporting and Conformance, Sender Policy Framework (SPF), and Domain Keys Identified Mail (DKIM) can help stop phishers from spoofing the entity’s domain and impersonating personnel.
Clarification on eCommerce Outsourcing PCI DSS requirements 6.4.3 and 11.6.1
Unpacking the New PCI DSS Password Standards
Is Your Organization Prepared for PCI DSS Automation – Requirement 10.4.1.1?
What is the PCI DSS v4 Authenticated Scanning Mandate – Requirement 11.3.1.2?
What is the PCI DSS v4.0.1 Requirement for PoLP – Requirement 7.2.5?
The New PCI DSS v4.0.1 Software Catalog Mandate – Requirement 6.3.2
How to Analyze An Attestation of Compliance (AOC)
INFORMATION SECURITY PRIMERS
Primer on Post-Quantum Cryptography (PQC)
A Primer for AI Legislation and Litigation: Trends and Resources
A Primer to Frictionless Authentication
A Primer to Russian Intelligence “Snake” Malware
A Primer to Security Access Service Edge (SASE)
A Primer to Digital Risk Protection Services (DRPS)
A Primer to Cloud Access Security Brokers (CASB)
A Primer to Zero Trust Security
A Primer to Deception Technology