Outmoded, Neglected, And Misused. The “POS As A Threat Vector” Probe

If you run a business that uses a point of sale machine... do you really know what they are used for? Chances are your employees are using your cash registers for far more than completing the sale with your customer. And... those activities could mean your POS systems could be used as a vector by cybercriminals as a mean to enter the rest of your business IT infrastructure. Join this panel of experts as they explore the risks associated with this often-ignored threat which could have already impacted your business. Do you know if it has?
 

FEATURED EXPERTS

William Dixon, VP Cyber Resilience, Stroz Friedberg, an Aon Company

Andreas-Kaltsounis.png

Andreas Kaltsounis, Managing Director, Stroz Friedberg, an Aon Company

Nir Valtman, Head of Application Security at NCR Corporation

Stroz Friedberg, and AON company, is a specialized risk management focused on cybersecurity with leading experts in digital forensics, incident response, and security science; investigations; eDiscovery; and due diligence.

ncr-logo.png

For more than 130 years, NCR has helped companies better connect, interact and transact with customers.

 

 

YOUR MODERATOR


Sean Martin, CISSP, Founder and Editor-in-Chief, ITSPmagazine

 
 

 

Register and Watch Now


Point of sale (PoS) systems run a significant portion of a retail business and can be found in many other businesses outside of pure retail shops as well. Oftentimes, these systems are running outdated, un-patched operating systems and applications, leaving them wide open for a breach. What’s worse, is that these systems are often used by employees that, many times, have no other computer through which they can access their personal email and social media accounts; further opening them up to both phishing scams and insider abuse.

In this expert webinar, we took a deep dive into the mounds of post-breach forensics programs to uncover the commonalities, nuances, and trends that all point to these systems as being one of the top threat vectors within an organization. The findings from multiple viewpoints will lead the attendees through a discussion that prepares them for a breach (protection), how best to respond in during an incident, and how best to manage the forensics aspects after a breach.

Some of the topics explored include:

  • Retail industry challenges with PoS systems
  • Challenges outside the pure retail space
  • Flaws in the architecture of the systems and the networks they connect to
  • Flaws and other misconfigurations that leave these system open for attack
  • Recommendations based on real-world experience pre- and post-breach
  • Review of items often missed during a breach investigation