Prioritized Approach V2.0
Tokenization: What's Next After PCI?
Hacking the NFC credit cards for fun and debit
What to Do When It All Goes
Bengt Berg, Cybercom Security, Polen
Securing MySQL for a Security Audit
esecurity
SGSB Webcast 2 : Smart grid and data security
It
OSSEC @ ISSA Jan 21st 2010
Matt DeLong - PCI Compliant Ecommerce Options
Verizon 2014 data breach investigations report dbir - my view ext