Building Security into Payment Systems and Applications

This video program is a part of the Premium packages:


  • IEEE MemberUS $299.99
  • Society MemberUS $299.99
  • IEEE Student MemberUS $299.99
  • Non-IEEE MemberUS $299.99
Purchase

Building Security into Payment Systems and Applications


  • IEEE MemberUS $49.99
  • Society MemberUS $49.99
  • IEEE Student MemberUS $49.99
  • Non-IEEE MemberUS $49.99
Purchase

Building Security into Payment Systems and Applications

0 views
  • Share
Create Account or Sign In to post comments
Sarath Geethakumar, Senior Director of Global Information Security at VISA, explores how to build security into applications to ensure better, more reliable and scalable solutions. Rapid technology changes are forcing payment systems and solutions to constantly evolve. With global mobile adoption now at 91 percent, interconnected consumer devices and applications must perform faster and handle increasingly more complex and critical functionalities. This evolution not only paves the way for new and improved solutions, it also makes them lucrative and easy targets for attackers. Security as a development afterthought is not a scalable or secure approach for this rapidly evolving ecosystem. Building security into development methodologies ensures that even the weakest links can be secured in a timely and cost-effective manner.
Sarath Geethakumar, Senior Director of Global Information Security at VISA, explores how to build security into applications to ensure better, more reliable and scalable solutions. Rapid technology changes are forcing payment systems and solutions to constantly evolve. With global mobile adoption now at 91 percent, interconnected consumer devices and applications must perform faster and handle increasingly more complex and critical functionalities. This evolution not only paves the way for new and improved solutions, it also makes them lucrative and easy targets for attackers. Security as a development afterthought is not a scalable or secure approach for this rapidly evolving ecosystem. Building security into development methodologies ensures that even the weakest links can be secured in a timely and cost-effective manner.