General Strategies: Intro
General Strategies: Convenience
General Strategies: Convenience Quiz
General Strategies: Social Engineering
General Strategies: Social Engineering Quiz
General Strategies: Internal Fraud
General Strategies: Internal Fraud Quiz
General Strategies: Identity Theft
General Strategies: Identity Theft Quiz
Specific Executions: Intro
Specific Executions: Consumer Fraud
Specific Executions: Consumer Fraud Quiz
Specific Executions: Card Block Fraud
Specific Executions: Card Block Fraud Quiz
Specific Executions: Single-Use Fraud
Specific Executions: Single-Use Fraud Quiz
Specific Executions: Cash Return Fraud
Specific Executions: Cash Return Fraud
Specific Executions: Collusive/Affiliate Fraud
Specific Executions: Collusive/Affiliate Fraud Quiz
Specific Executions: Dynamic/Tested Fraud
Specific Executions: Dynamic/Tested Fraud Quiz
Perpetrators: Consumers Quiz
Perpetrators: Hackers and Crackers
Perpetrators: Hackers and Crackers Quiz
Perpetrators: White-Collar Criminals
Perpetrators: White-Collar Criminals Quiz
Perpetrators: Organized Crime Rings
Perpetrators: Organized Crime Rings Quiz
Data Verification: Velocity Checks
Data Verification: Velocity Checks Quiz
Data Verification: Card Verification
Data Verification: Card Verification Quiz
Data Verification: Charge/Deposit Verifications
Data Verification: Charge/Deposit Verifications Quiz
Identity Verification: Intro
Identity Verification: Lists
Identity Verification: Lists Quiz
Identity Verification: Simple Field Verification
Identity Verification: Simple Field Verification Quiz
Identity Verification: Address Verifications
Identity Verification: Address Verifications Quiz
Identity Verification: Manual Authentication
Identity Verification: Manual Authentication
Identity Verification: Automated Lookups
Identity Verification: Automated Lookups Quiz
Technological Verification: Intro
Technological Verification: Device/Token Authentication
Technological Verification: Device/Token Authentication Quiz
Technological Verification: Digital Signatures
Technological Verification: Digital Signatures Quiz
Technological Verification: Consumer Location
Technological Verification: Consumer Location Quiz
Processes: Insurance and Guarantees
Processes: Insurance and Guarantees Quiz
Processes: Reviews/Representment
Processes: Reviews/Representment Quiz
Technique Considerations Quiz
Data Usage Considerations
Data Usage Considerations Quiz
Data Processing Considerations
Data Processing Considerations Quiz
Fraud: Not Authorized/Recognised
Fraud: Not Authorized/Recognised Quiz
Fraud: Fraudulent Processing
Fraud: Fraudulent Processing Quiz
Fraud: Monitored Merchant or Card
Fraud: Monitored Merchant or Card Quiz
Fraud: EMV Liability Shift
Fraud: EMV Liability Shift Quiz
Authorization: Introduction
Authorization: Missing/Declined Authorization
Authorization: Missing/Declined Authorization Quiz
Authorization: Card in Recovery/Lost/Stolen
Authorization: Card in Recovery/Lost/Stolen Quiz
Authorization: Invalid Information
Authorization: Invalid Information Quiz
Processing Errors: Introduction
Processing Errors: Invalid Code or Data
Processing Errors: Invalid Code or Data Quiz
Processing Errors: Invalid Amount/Account
Processing Errors: Invalid Amount/Account Quiz
Processing Errors: Duplicate/Other Payment
Processing Errors: Duplicate/Other Payment Quiz
Processing Errors: Currency Mismatches
Processing Errors: Currency Mismatches Quiz
Processing Errors: Late Presentment
Processing Errors: Late Presentment Quiz
Consumer Disputes: Introduction
Consumer Disputes: Mismatch of Goods
Consumer Disputes: Mismatch of Goods Quiz
Consumer Disputes: Cancelled/Not Completed
Consumer Disputes: Cancelled/Not Completed Quiz
Consumer Disputes: Credit Not Processed
Consumer Disputes: Credit Not Processed Quiz
Requirement 1: Keep a Firewall
Requirement 1: Keep a Firewall Quiz
Requirement 2: No Defaults
Requirement 2: No Defaults Quiz
Requirement 3: Protect Stored Data
Requirement 3: Protect Stored Data Quiz
Requirement 4: Protect Transmitted Data
Requirement 4: Protect Transmitted Data Quiz
Requirement 5: Prevent Malware
Requirement 5: Prevent Malware Quiz
Requirement 6: Develop Securely
Requirement 6: Develop Securely Quiz
Requirement 7: Need-to-Know Access
Requirement 7: Need-to-Know Access Quiz
Requirement 8: Identify Access
Requirement 8: Identify Access Quiz
Requirement 9: Restrict Physical Access
Requirement 9: Restrict Physical Access Quiz
Requirement 10: Monitor Networks
Requirement 10: Monitor Networks Quiz
Requirement 11: Test Regularly
Requirement 11: Test Regularly Quiz
Requirement 12: InfoSec Policy
Requirement 12: InfoSec Policy Quiz
General Patterns and Recap
General Patterns and Recap Quiz
Acquisition Strategy Quiz
Controls by Data Classification
Controls by Data Classification Quiz
Criticality Analysis Quiz
Cryptographic Protection Quiz
Cyber Threat Hunting Quiz
Data De-Identification and Anonymisation
Data De-Identification and Anonymisation Quiz
Data Governance Structures
Data Governance Structures Quiz
Data Purpose and Authority
Data Purpose and Authority Quiz
Data Retention and Disposal
Data Retention and Disposal Quiz
Information Tainting Quiz
Locked Rooms/Devices/Ports
Locked Rooms/Devices/Ports Quiz
Media Downgrading/Redacting
Media Downgrading/Redacting Quiz
Physical Media Protection
Physical Media Protection Quiz
Provider Assessment and Monitoring
Provider Assessment and Monitoring Quiz
Security/Privacy Architectures
Security/Privacy Architectures Quiz
Thin/Diskless Devices Quiz
Assembling: Actions and Implementation
Assembling: Roles and Responsibilities
Assembling: Scope Framework Roadmap
Assembling: Governance Structures
Assembling: Trackable Metrics
Presenting: Recency and Primacy
Presenting: Leveraging Specifics
Presenting: Displayed Authority
Presenting: The Hero's Journey
Presenting: Tiredness and Distraction
Dealing with Objections: Introduction
Dealing with Objections: Flipping and Diagnosing
Dealing with Objections: UP Answers
Dealing with Objections: Progress and Loss
Dealing with Objections: Political Capital
Securing Buy-In: Introduction
Securing Buy-In: Implementation and Opinions
Securing Buy-In: Tailored Benefits
Securing Buy-In: Effort Shaping
Securing Buy-In: Future Lock-In
Full Runthroughs: Introduction
Full Runthroughs: Pitching PCI-DSS
Full Runthroughs: Pitching Vendor Assessments
Full Runthroughs: Pitching Data Governance
Full Runthroughs: Pitching Data Management