Winning the War on Segmentation
Included in the discussion:
- What should and could be a standard definition across all audits
- Methods for proper segmentation testing
- Exploration of implementation of gateways to help limit the risk from 3rd parties and support technicians
- Definition around “in-scope” and “connected to” devices
Proper segmentation is critical to protecting sensitive data. Learn how our penetration testing team has been able to bypass common segmentation and Multi-factor Authentication (MFA) technologies to gain access to cardholder data. And what you can do about it.

Paul Truitt
Chief Information Security OfficerAs our CISO, I have the opportunity to ensure we have the best cyber technology and services to simplify the lives of our customers as well as provide the most secure and compliant services possible.
Get to know PaulMore Insights
-
SageSECURE, Cybersecurity Consulting Services
Penetration Testing and Vulnerability Scans Provide the Foundation for Secure Remote Access
-
SageSECURE, Cybersecurity Consulting Services
Unlocking a Passwordless World
-
Assessments, ASV Scanning
How SIEM Can Help Protect Today’s Borderless Enterprise
-
Compliance, SageCONNECT
The Gas Pump EMV Deadline Has Been Extended … but the Clock Is Ticking