Webinar
Understanding Payment Gateway Related Vulnerabilities
calendar-alt-min
Date:
December 18th, 2021
Time 2
Time:
2:00 PM IST
host
Host:
Vaishali Nagori, Subho Halder

Register Now

About Speaker
vaishali

Vaishali is a Penetration Tester, as well as a Dancer and a Learner. She works as a security analyst. She has worked with Web Applications, APIs, Android, and iOS Penetration Testing. She has secured over 70 applications from a variety of industries, including e-commerce, banking, management, gaming, trading, government, tax management, and financial services. She enjoys dancing and interacting with new people.

LinkedIn Twitter
Subho 160X160 - Webinar-2

Subho Halder  CISO and Co-Founder of Appknox (Highest rated mobile Security Solution in Gartner and G2Crowd ). Subho will run you through best practices that he has  accumulated from years of experience in Enterprise Security.

Subho is well known in the Security industry as a master hacker and creator of AFE (Android framework for Exploitation). He has also  detected critical loopholes in businesses like Google,Facebook  Microsoft, Skype, and  conducted workshops at conferences like BlackHat, Defcon, ToorCon, SysCan, ClubHack, NullCon, OWASP AppSec and  RSA Conference.
LinkedIn Twitter
Understanding Payment Gateway Related Vulnerabilities

Join us in an exciting webinar by Vaishali on Payment Gateway Related Vulnerabilities. Know how Fortune 500 companies have created superior & secure payment gateways for their customers.

Agenda

white_shield_icon
Introduction to payment gateway
white_shield_icon
Different types of payment gateway vulnerabilities
white_shield_icon
How to remediate all types of vulnerabilities
Happy Learners
Still need convincing? Check out what people are saying
photo3
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo2
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo1
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo3
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo2
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo6
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Back Next
This webinar will be of interest to:

  • Security / risk officers

  • Software / Mobile security architects

  • Product Managers

  • Mobile Developers

  • CISO’S