SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

PCI FORENSIC INVESTIGATOR (PFI)

PCI SSC

1 min read
in Career, Certification, Learning

In the event of an actual or suspected attack, compromise or vulnerability affecting payment card transactions or cardholder data a forensic investigation may be required. Forensic investigation of credit card data can be challenging and complex, requiring forensic investigators with highly specialized skills and proven staff and experience, capable of rapid response.
Prior to the PFI Program, Participating Payment Brands maintained separate requirements for forensic investigators for such events, and the process of selecting or being qualified as an investigator could be complicated and cumbersome, especially when the Security Issue in question affected multiple Participating Payment Brands.
In an effort to help ensure that each PFI Company and PFI Employee possesses the requisite knowledge, skills, experience and capacity to perform PFI Investigations in a proficient manner in accordance with industry expectations, each PFI Company and each PFI is required at all times to satisfy all applicable PFI Qualification Requirements, including PCI SSC required training.

FIND OUT MORE

 

Related

Tags: CertificationCyber securityLearningPCIPCI CertificationPCI Education
1
VIEWS
ADVERTISEMENT

Related Posts

Network Forensic Analyst (GNFA)

Network Forensic Analyst (GNFA)

June 29, 2022
Cyber Threat Intelligence (GCTI)

Cyber Threat Intelligence (GCTI)

June 29, 2022
Cyber Threat Intelligence

Cyber Threat Intelligence

June 29, 2022
Threat Hunter

Threat Hunting Professional

June 29, 2022

More Articles

Indicators of compromise Finding the footprints that attackers leave behind when they breach your defenses

December 13, 2021
Certification

Cyber and Electronic Warfare Officer

May 6, 2022
Incidents

Spirit Super suffers data breach following phishing attack

May 30, 2022
Quotes

“There was a jump in those enterprises deploying MFA—from about half in last year’s survey to 61% in this year’s survey…”

January 20, 2022

APT6

August 10, 2021
Alerts

CISA Adds Nine Known Exploited Vulnerabilities

February 15, 2022
APIs

87% of the phishing attacks on mobile devices use avenues other than emails like gaming, messaging, and social media apps.

November 16, 2020
APIs

56% of Consumers expect their governments should take the primary role for protecting an individual’s data.

November 14, 2020
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
    • Threats
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....