Skip to content
I Help Women In Tech Earn More Money

I Help Women In Tech Earn More Money

  • Home
  • Secure The InfoSec Bag
  • About Keirsten
  • Why I Do This
  • FAQS
  • Resources

Tag: PCI DSS

How She Passed Her First PCI Audit

Inclusive Security Conference Alert: Hou.Sec.Con is April 3-4, 2018! Click here for details. Jordanne Barrett tweeted about how excited she was to…

Continue Reading →

Posted in: Career Tips, PCI, Security Case Studies Filed under: Audits, Newbies, PCI DSS, Security+

Secure The Bag.
Then Put Your $$ To Work For You.

Get that raise. Cheat on your main source of income.

Free Security+ Vouchers. Dominate 2021.

    ​

    Built with Kit

    Let’s Connect!

    • LinkedIn
    • Twitter

    Reader Favorites

    • #WeCyberToo: Quiessence Phillips, VP-Cybersecurity Ops
    • Secure The InfoSec Bag: Six Figure Career Guide For Women
    • How To Keep Your Accomplishments In Front Of Your Boss
    • How Credentials Impacted My Career
    • Salary Negotiation Tips from White Men in Tech: Part 1
    • Pass the new CISSP Exam
    • Security+ Exam Prep Tips
    • #FinanceFridays Recap: Life Insurance
    • Salary Negotiation Tips from White Men in Tech: Part 2

    Categories

    Recent Posts

    • Promote Yourself. But Also, How Does Wealth Work?
    • ASK FOR THE DAM BONUS! + Last Chance for Stocks101
    • Stop Underestimating Your Value
    • Sip & Stocks101: Feb 14
    • Stocks101 Resources
    • #FinanceFridays Recap: Life Insurance
    • Closing Keynote Speaker at Diana Initiative Virtual Conference!
    • Cyberjutsu Con Speaker!
    • How I Passed My GICSP Exam
    • Women’s Society of Cyberjutsu Career Webinar Oct. 17th
    • HouSecCon2019 ICS Track Speaker
    • Salary Negotiation Tips from White Men in Tech: Part 2
    • Salary Negotiation Tips from White Men in Tech: Part 1
    • Tripwire Resources for Aspiring Engineers
    • Tribe of Hackers out January 28th!
    • Walker’s Legacy Power15 Houston Honoree
    • University of Houston Energy Sector Cyber Career Event
    • How To Keep Your Accomplishments In Front Of Your Boss
    • Keynote Speaker at Diana Initiative!
    • Digital Security Check-up
    • Listen While You Work
    • Did You Earn Certs & Expect a $20,000 Raise?
    • Support Other Women + Save The Date!
    • Secure The InfoSec Bag: Six Figure Career Guide For Women
    • Dark Reading Women Changing The Game
    • Women in Security Panel at HouSecCon
    • Tripwire Post: Security Research Ideas to Improve Post-Graduation Outcomes
    • It’s Ok To Be Extra
    • Go to Grad School or Get a Job?
    • How Credentials Impacted My Career
    • How She Passed Her First PCI Audit
    • Should Researchers Hack Back? My answer: NO
    • Talent Shortage Sanity Check
    • #WeCyberToo: Sakinah Tanzil, Sr. Security Pro
    • How To Write a Business Continuity Paper
    • How To Write An Abstract
    • Medical Records Breach: Part 2
    • Medical Records Breach: Part 1
    • #WeCyberToo: Nicole Fagin, Sr. InfoSec Pro
    • #WeCyberToo: Dr. Stephanie Carter, CEO
    • Forensics Sources Part 4: Logs
    • HOU.SEC.CON 7.0 Review
    • Forensics Sources Part 3: File Systems
    • #WeCyberToo: Quiessence Phillips, VP-Cybersecurity Ops
    • Forensics Sources Part 2: Memory
    • #WeCyberToo: Cassandra Giddings, Security Engineer
    • #WeCyberToo: Tiffany L. Smith, Security Analyst, Fortune 100 Company
    • Forensics Sources Part 1: Packet Capture (PCAP)
    • Malware: How it hides, detects, and reacts
    • CASP Exam Prep. Fail. Give Back.
    • Jopwell: A Career Platform For Us, By Us
    • Security+ Exam Prep Tips
    • #WeCyberToo: Zilphia Martin, Cyber Defense Threat Analyst
    • #WeCyberToo: Krista Theodore, Security Engineer
    • Ladies: GET OUT!
    • Security is NOT Just Hacking!
    • A 3-Pronged Approach To Insider Threats
    • How To Communicate With Non-Technical Audiences
    • #WeCyberToo: Glenise Moore, Sr. Associate Schellman & Company
    • Review: Teaching Cyber at the Collegiate Level
    • 80+ Back Doors Into Cyber Careers
    • #WeCyberToo: Danyetta Magana, CEO of Covenent Security
    • SQL vs. XXS Injection Attacks Explained
    • Snort Rules for ACK Scans, Oh My!
    • ARP Attack Detection Limitations
    • IP Fragmentation vs IP Reassembly
    • How to Marry IT and OT Security
    • The Worst Cyber Crime Today
    • Cybercrime Law Review: Computer Fraud & Abuse Act
    • Samsung’s $1 Billion Mistake: 2 Week Data Retention Policy
    • Most Important in Digital Forensics: Preparation or Preservation?
    • Digital Forensics: Can You Find Hidden Data?
    • 2016 ICS Security Incidents
    • Ace Your Papers & Advance Your Career
    • Power Utility Attack Lessons Learned
    • Basic and Double Encapsulation VLAN Hopping
    • Security Design Case Study
    • Pass the new CISSP Exam
    Contact Me
    Fields marked with an * are required
    Copyright © 2020 @keirstenbrager

    Enjoy this blog? Please spread the love :)

    • TWITTER
    • FACEBOOK
      fb-share-icon
    • LINKEDIN
    • RSS
    • EMAIL