Sunday May 2009 | Vol. 31 | 05.17.09
May 2009 Editions of bdpatoday from participating chapters feature TeraGrid 2009 Previews and an industry overview for the Class of 2009. National BDPA monthly news now online from BDPALINK.

|
|
|
Quick Links | BDPA-DC |
In case you missed one...
Technology Conference
|
Stay "Connected" in 2009 |
National BDPA & Groupsites
Join or Renew Online Click here to update NBDPA membership or MAP profiles with your newest or personal email account and mailing address. Join one of our chapters, or process current BDPA membership account renewals. Receive up-to-the-minute Industry, Career, Scholarship, Internship, Conference and Program Meeting announcements to empower your community. |
|
|
The Week Ahead |
Upcoming Technology & BDPA Events:
BDPA (Las Vegas) | Sunday May 17 thru May 19
Interop Las Vegas 2009: Business Technology Conference & Expo; learn more ...
BDPA (Washington, DC) | Sunday, May 17 Registration Open: Pre-registration for 2009 Regional Technology Conference [June 19-20] at Bowie State University now open through June 12th. Register today!
BDPA (Hampton Roads)|Sunday May 17 thru May 19 Government Leadership Conference: An Executive event; Williamsburg, Virginia. See details...
BDPA (DC & NoVA) | Tuesday, May 19 thru May 20
AFCEA Solutions Series: Critical Issues in C4I; Lansdowne, VA.; learn more ...
BDPA (DC & NoVA) | Wednesday, May 20 AFCEA Ft. Belvoir: May 2009 Educational & Technology Awards Luncheon; details ...
BDPA (DC & NoVA) | Thurs day, May 21
AFFIRM Forum & Monthly Luncheon: Obama administration's Government 2.0 and "The New IT Economics"; learn more ...
U.S. Senate Reconvenes, Monday, May 18, 2009 at 2:00 pm after a period of morning business.
U.S. House of Representatives Convenes, Monday, May 18, 2009. at 2:00 pm.
Community:
bdpatoday
|
|
|
|
bdpatoday
Acronym of the Day
PCI DSS
The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information. The PCI DSS was created jointly in 2004 by four major credit-card companies: American Express, Discover, MasterCard and Visa . The PCI DSS specifies and elaborates on six major objectives.
1) First, a secure network must be maintained in which transactions can be conducted. This requirement involves the use of firewalls that are robust enough to be effective without causing undue inconvenience to cardholders or vendors. Specialized firewalls are available for wireless LANs, which are highly vulnerable to eavesdropping and attacks by malicious hackers. In addition, authentication data such as personal identification numbers (PINs) and passwords must not involve defaults supplied by the vendors. Customers should be able to conveniently and frequently change such data.
2) Second, cardholder information must be protected wherever it is stored. Repositories with vital data such as dates of birth, mothers' maiden names, Social Security numbers, phone numbers and mailing addresses should be secure against hacking. When cardholder data is transmitted through public networks, that data must be encrypted in an effective way. Digital encryption is important in all forms of credit-card transactions, but particularly in e-commerce conducted on the Internet.
3) Third, systems should be protected against the activities of malicious hackers by using frequently updated anti-virus software, anti-spyware programs, and other anti-malware solutions. All applications should be free of bugs and vulnerabilities that might open the door to exploits in which cardholder data could be stolen or altered. Patches offered by software and operating system (OS) vendors should be regularly installed to ensure the highest possible level of vulnerability management.
4) Fourth, access to system information and operations should be restricted and controlled. Cardholders should not have to provide information to businesses unless those businesses must know that information to protect themselves and effectively carry out a transaction. Every person who uses a computer in the system must be assigned a unique and confidential identification name or number. Cardholder data should be protected physically as well as electronically. Examples include the use of document shredders, avoidance of unnecessary paper document duplication, and locks and chains on dumpsters to discourage criminals who would otherwise rummage through the trash.
5) Fifth, networks must be constantly monitored and regularly tested to ensure that all security measures and processes are in place, are functioning properly, and are kept up-do-date. For example, anti-virus and anti-spyware programs should be provided with the latest definitions and signatures. These programs should scan all exchanged data, all applications, all random-access memory (RAM) and all storage media frequently if not continuously.
6) Finally, a formal information security policy must be defined, maintained, and followed at all times and by all participating entities. Enforcement measures such as audits and penalties for non-compliance may be necessary.
___________________________
Source:
Tech Target: http://www.techtarget.com
|
Spring 2009 Edition
|
bdpatoday
Your Spring 2009 issue of bdpatoday now is available for local BDPA chapters, members, and industry stakeholders.
BDPA Members in certain media markets also receive monthly and daily online news directly from bdpatoday.
This special issue for Spring 2009 may vary from chapter to chapter as local content is provided or received from industry. Your Spring 2009 print edition features:
- National BDPA Technology Conference Preview | August 5-9, 2009
- IT milestones during the Obama Administration's First 100-Days
- An introduction to Green IT trends and careers
- BDPA and HBCU/MIs collaborate to provide greater STEM opportunities
- Government 2.0 - New sites and portals hosted by Uncle Sam
Join BDPA or subscribe to one of our newsletters today to remain connected to emerging industries and informed of important events happening near you.
|
2009 CONFERENCE REGISTRATION NATIONAL BDPA TECHNOLOGY CONFERENCE
Raleigh Convention Center Raleigh, North Carolina
Conference Theme: "Challenges for Today, Strategies for Tomorrow" Presentation Dates: August 5 - 7, 2009
If not already done, it is not too late to pre-register and take full advantage BDPA corporate or member discounts. Direct any questions for exhibits, career fair, plenary sessions, and group registrations (such as other non-profits, churches, schools, and camps interested in technological advances in our community and society) to conference@bdpa.org or call 1.800.727.BDPA (2372).
|
|
|
BDPA, formerly known as Black Data Processing Associates, was founded in 1975. The Washington, D.C. Chapter (BDPA-DC) received its charter in 1978, and was incorporated in 1981. | BDPA-DC is a 501(c)(3) public charity. | www.bdpa-dc.org
bdpatoday ISSN 1946-1429 is published by BDPA-DC and participating BDPA Chapters.
| |
|