Skip to main content

Cometh the Year, Month, Day, Hour

  • Chapter
  • First Online:
PCI DSS

Abstract

Given the importance of PCI DSS compliance to level 1 Merchant/Service Provider businesses, a great deal of nervousness is felt by organizations. As a result, they may end up feeling pressured into staying with the same qualified security assessment company (QSAC) to validate their compliance. These companies often become disenfranchised with the whole process. Either they feel that they start to receive less of a level of service that they received at the start of their engagement, they do not receive a consistent level of quality service from the QSAC, they receive promises that never come to bear, or they do not receive consistent QSA approaches. However, because of the inconsistencies between QSACs, they feel that they would be disadvantaged if they were to shop around.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    www.pcisecuritystandards.org/documents/PCI_SSC_Code_of_Professional_Responsibility.pdf

  2. 2.

    www.pcisecuritystandards.org/documents/QSA_Qualification_Requirements_v3_0.pdf?agreement=true&time=1516980594990

  3. 3.

    www.pcisecuritystandards.org/assessors_and_solutions/qualified_security_assessors_feedback

  4. 4.

    www.app.college.police.uk/app-content/investigations/investigative-interviewing/

  5. 5.

    (ISC)2 Certified Information System Security Professional (CISSP), ISACA Certified Information Security Manager (CISM), or Certified ISO 27001 Lead Implementer.

  6. 6.

    ISACA Certified Information Systems Auditor (CISA), GIAC Systems and Network Auditor (GSNA), Certified ISO 27001 Lead Auditor/Internal Auditor, IRCA ISMS Auditor or higher (e.g., Auditor/Lead Auditor, Principal Auditor), or IIA Certified Internal Auditor (CIA).

  7. 7.

    www.iso.org/iso-9001-quality-management.html

  8. 8.

    www.pcisecuritystandards.org/assessors_and_solutions/approved_scanning_vendors

  9. 9.

    www.pcisecuritystandards.org/assessors_and_solutions/qualified_security_assessors

  10. 10.

    www.pcisecuritystandards.org/assessors_and_solutions/qualified_security_assessors

  11. 11.

    https://acuityrm.com/use-benefits/control-assurance

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Jim Seaman

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Seaman, J. (2020). Cometh the Year, Month, Day, Hour. In: PCI DSS. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5808-8_16

Download citation

Publish with us

Policies and ethics