Contact Sales
  •  

The real costs of complying with PCI DSS 8.3 and ways to avoid them


How to turn mobile device and BYOD trends into a security advantage


The hidden security risks in typical two-factor authentication approaches   

The benefits of reducing cardholder data environment "scope"


Sign up Today

Dug Song


CEO of Duo Security

CEO of Securisea

Josh Daymont

Dug Song, CEO of Duo Security, was previously Chief Security Architect at Arbor Networks and built the first commercial network anomaly detection system (acquired by NFR / Check Point). Dug's contributions to the security community include popular open source security (OpenSSH, libdnet, dsniff), distributed file system (NFSv4), and operating system (OpenBSD) projects, and co-founding the USENIX Workshop On Offensive Technologies (WOOT).

Joshua Daymont, Principal at Securisea, is a security expert and PCI QSA. His long track record of industry leadership includes discovering two significant vulnerabilities that led to import CERT advisories during the late 90’s. Josh has spoken at Black Hat Briefings, OWASP, ISSA and similar, and has been quoted by media outlets including Information Security Magazine, CNBC and Bloomberg TV. He holds a Masters in Management of Information Technology from the Georgia Institute of Technology.

Watch this informative webinar to learn how to get in compliance with PCI DSS 8.3 for a fraction of the expected cost and none of the hassle. Most importantly, learn about new technologies that make remote access more secure AND easier than the options that have been available until now.

About the presenters:

PCI DSS 8.3 specifically mentions two-factor authentication. Historically, the only available two-factor options have relied on physical tokens, forcing companies into one model that by today’s standards is expensive and cumbersome. Learn about new options that can save the average organization 90%.

In this webinar, you will learn:

Free OnDemand Webinar

Reduce PCI DSS 8.3 Compliance Costs By 90% in 30 Minutes

...without the high cost and hassle of traditional two-factor deployments.