We are sorry, this event is in the past, registrations are now closed. To view forthcoming events please see the Next Sessions tab or see our Schedule.

PCI DSS, PA DSS and PTS are now considered the defacto payment card industry standards. All institutions or entities which store process or transmit card holder data are subject to compliance with these constantly evolving standards. Many organisations have achieved compliance whilst others are making significant progress in achieving compliance not without its challenges. Organisations still face a significant challenge of interpreting and applying this evolving set of standards as well as ensuring that compliance is maintained at all times.
The PCI DSS 3.2 Training is designed for card payments and IT specialists focused on managing and implementing all aspects of PCI DSS. The intensive training covers key aspects related to implementation and ongoing management as well as best practices. Delegates who attend this course will find many answers to pressing questions and are equipped with clear and practical guidance helping save effort, time and money.

LnxImage object


Gain an in-depth understanding of the PCI DSS standard and its relation to other PCI standards such as PTS DSS and PA DSS
A unique opportunity to gain insight from multiple perspectives on gap analysis, remediation and assessment issues from certified ISAs & QSAs with years of experience in the field.
Practical demonstrations and guidance on interpretation, sampling, applicability and importance of PCI DSS controls.
Gain In-depth understanding of Interpretation, Scoping, Network Segmentation, Compensation Controlsand Control Applicability with practical case studies and group exercises.
Learn key concepts surrounding PCI Project Management, Reporting,m Prioritisation and Risk Management.
Keep up to date with the latest changes to the standard and how they affect your compliance status
Learn how to reduce your QSA costs and gain more control over the project
Learn about key aspects of managing and maintaining compliance with key aspects such as change control and continuous compliance monitoring
LnxImage object

Who Attends

CSOs, Security Management
CIO, IT Management
CISO, Information Security Manager
Network & System Security
Application Software Developers & Administrators
Business Continuity & Incident Response Teams
Compliance/PCI Project Managers
Internal Audit & Compliance Managers
And anyone generally interested in learning about PCI DSS in depth

It is recommended that attendees are familiar with key payment card industry terminology prior to attending the course.


Hundreds of delegates from all over the world have attended LiquidNexxus training sessions. Here are some testimonials related to this course/event.

View More Testimonials


The agenda covers all key aspects required in order to understand PCI DSS context and applicability as well as implement and manage the PCI DSS standard.
Topics include

Introduction and Context

- Payment Card Industry Threats - Security Breach Reports Overview Attack Vector Analysis

Payment Card Industry Stakeholders Overview & Their Relationship with PCI DSS

About the PCI SSC Card Brand Compliance Programs Standards Applicability & Levels Merchants, Service Providers PCI DSS , PA DSS, PTS

Scoping & Network Segmentation

Applicable Cardholder Data concepts Understanding & Finding Card Data CVV vs CVV2, Track 1 vs Track 2 Data, Full Track or Magnetic Stripe Track Data Characteristics and Guidelines for Searching, MOD-10 Card Data Flow & Network Diagrams Segmentation and Sampling of Business Facilities/System Components Scoping Procedure Network Segmentation & Exercise

Prioritising Compliance & Security: Risk Assessment Guidelines

PCI DSS Requirement 12.1.2 Risk Management Strategy, Assessments Prioritised Approach. Third-Party Risks Reporting, Critical Success Factors

Compensating Controls

Compensating Controls Worksheet Case Study

PCI DSS Requirements and Security Assessment Procedures

An overview of how to interpret and apply

Requirement 1: Install and maintain a firewall configuration to protect cardholder data

Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters

Requirement 3: Protect stored cardholder data

Requirement 4: Encrypt transmission of cardholder data across open, public networks

Requirement 5: Protect all systems against malware and regularly update anti-virus software or programs

Requirement 6: Develop and maintain secure systems and applications

Requirement 7: Restrict access to cardholder data by business need to know.

Requirement 8: Identify and authenticate access to system components

Requirement 9: Restrict physical access to cardholder data Skimming Fraud (ATM & POS card reader manipulation)

Requirement 10: Track and monitor all access to network resources and cardholder data

Requirement 11: Regularly test security systems and processes

Requirement 12: Maintain a policy that addresses information security for all personnel




The venue of this event will be announced shortly.

Next Sessions

LiquidNexxus regularly hosts open training sessions globally, below is a list of courses related to this course which are currently scheduled. If your region is not listed or you would like to discuss inhouse training or partnership please contact us.

View Full Schedule


The website keywords. Click on one to see associated contents.