Branden Williams

Branden Williams

Dallas-Fort Worth Metroplex
4K followers 500+ connections

About

Dr. Branden Williams is an experienced (25+ years) technology executive who has served…

Articles by Branden

Activity

Join now to see all activity

Experience

Education

  • Capella University Graphic

    Capella University

    -

    Activities and Societies: With Highest Honors, President's List, Sigma Iota Epsilon

    * Research included studying business intelligence, strategy, innovation, and the affects of e-commerce strategies on retail performance.
    * Additional focus on strategy, innovation, and corporate social responsibility

  • -

    Activities and Societies: Sigma Iota Epsilon, Entrepreneurial Society

  • -

    Activities and Societies: President, Pi Sigma Epsilon, Alpha Delta Chapter

    Recognized as a Presidential Scholar.

Licenses & Certifications

Volunteer Experience

  • Information Systems Security Association (ISSA) Graphic

    Editorial Advisory Board

    Information Systems Security Association (ISSA)

    - 12 years 1 month

    Education

    I assist in the production of the ISSA Journal in two forms. First, I write a monthly column and secondly as a member of the Editorial Advisory Board. We help select articles for publication.

  • Merchant Acquirers'​ Committee Graphic

    Director

    Merchant Acquirers'​ Committee

    - 5 years 4 months

    Science and Technology

    Member of MAC Board serving as a Director as of April 2015. Advisor from April 2014 to April 2015. MAC’s mission is to strengthen the payment ecosystem through ongoing education, communication and cooperation among acquirers, card brands, and enforcement agencies.

  • PCI Security Standards Council Graphic

    Member Of The Board Of Advisors

    PCI Security Standards Council

    - 2 years

    Science and Technology

    I operated under a platform of relevance, value, and simplicity. My goal was to reduce the complexity of PCI DSS while ensuring all actions performed by the body was done so with value in mind.

  • Capella University Graphic

    Ambassador

    Capella University

    - Present 10 years

    Education

  • EMVCo Graphic

    Member Of The Board Of Advisors

    EMVCo

    - 1 year 6 months

    Member of the EMVCo Board of Advisors. Primarily contributing to 3DSecure 2.0 and the Payment Account Reference (PAR).

  • Pilot

    American Airlines Sky Ball

    - Present 11 years

    I do a few things for Sky Ball every year. Primarily I volunteer during their Air Expo, which brings in at-risk kids from all over the metroplex to expose them to aviation. I fly in an aircraft and talk with the kids about my experiences as a pilot and ways they can get into aviation. I also donate to the cause financially and volunteer for the setup of the event.

  • Facilitator

    Upgrades for Soldiers

    - Present 10 years

    I started this program to collect expiring or donated upgrades from frequent fliers to give to veterans heading for medical treatment or family of fallen heroes traveling on behalf of their service member.

  • Volunteer

    Denton Medical Reserve Corp

    - Present 10 years 5 months

    Disaster and Humanitarian Relief

    Volunteer for the MRC in Denton county. Specifically, my specialties are in both manning amateur radio comms and IT support, although I will also act as a general volunteer when needed. Typical requests would be disaster relief after severe weather or other acts of God, supporting community events such as 5/10K charity races, and most recently volunteering at the COVID-19 Mass Vaccination sites.

  • Advisory Board Member

    University of Dallas Gupta College of Business Cybersecurity

    - Present 3 years 3 months

    Education

Publications

  • PCI Compliance, Version 3.2: The Latest on PCI DSS Compliance

    Amazon Digital Services

    As PCI DSS is now well into its second decade, the standard is now mature. The dramatic between early versions have fizzled to clarifications and select new requirements. While the expanse of documentation for PCI DSS continues to grow without bounds, the piece that kicked off careers, products, and the ecosystem is now stable.

    PCI DSS version 3.2, the latest in a string of updates to the original PCI DSS standard, is the target for many companies who handle cardholder data. In this…

    As PCI DSS is now well into its second decade, the standard is now mature. The dramatic between early versions have fizzled to clarifications and select new requirements. While the expanse of documentation for PCI DSS continues to grow without bounds, the piece that kicked off careers, products, and the ecosystem is now stable.

    PCI DSS version 3.2, the latest in a string of updates to the original PCI DSS standard, is the target for many companies who handle cardholder data. In this text, readers will learn all of the updates and nuances for this latest version of the standard. If you are a merchant, I sincerely hope your PCI DSS scope reduces to nothing!

    This book is meant to be a companion to PCI Compliance: Understand and Implement Effective PCI Compliance, 4th Ed. (Syngress) bringing the changes in PCI DSS 3.1 and 3.2 into this supplementary reference text.

    See publication
  • PCI DSS 3.1: The Standard that Killed SSL

    Syngress

    PCI DSS has recently updated its standard to 3.1. While the changes are fairly minor in nature, there are massive implications to companies relying on SSL as a scope reducing tool inside their enterprise. This update book goes through the specific changes to PCI DSS 3.1, and includes new case studies that discuss the specific implications for making the change to 3.1. This concise supplement also includes a detailed explanation of each changed requirement and how it will impact your…

    PCI DSS has recently updated its standard to 3.1. While the changes are fairly minor in nature, there are massive implications to companies relying on SSL as a scope reducing tool inside their enterprise. This update book goes through the specific changes to PCI DSS 3.1, and includes new case studies that discuss the specific implications for making the change to 3.1. This concise supplement also includes a detailed explanation of each changed requirement and how it will impact your environment. PCI Compliance, 3.1 Addendum serves as an update to Syngress’ comprehensive reference volume PCI Compliance, Fourth Edition.

    * Includes all system updates to the new version of PCI DSS 3.1
    * Details and describes each update and enhancement
    * Includes case studies that illustrate when and where these changes will effect and improve your enterprise

    See publication
  • 3 Experts teach you how to properly scope your PCI assessment

    CSO

    When it comes to PCI, getting your scope right is more important than just getting a cheaper, faster assessment. Learn how to do it right with insights from 3 experts.

    Other authors
    See publication
  • PCI Compliance, Fourth Edition: Understand and Implement Effective PCI Data Security Standard Compliance

    Syngress

    Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI…

    Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. This is the first book to address the recent updates to PCI DSS. The real-world scenarios and hands-on guidance are also new approaches to this topic. All-new case studies and fraud studies have been added to the Fourth Edition.

    Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need in order to understand the current PCI Data Security standards and how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and help you protect sensitive and personally-identifiable information.

    * Completely updated to follow the most current PCI DSS standard, version 3.0
    * Packed with help to develop and implement an effective strategy to keep infrastructure compliant and secure
    * Includes coverage of new and emerging technologies such as NFC, P2PE, CNP/Mobile, and EMV
    * Both authors have broad information security backgrounds, including extensive PCI DSS experience

    Other authors
    See publication
  • The Digitization of Business: The Effect of E-Commerce Strategies on Revenue Growth in Retail Companies

    ProQuest, UMI Dissertations Publishing 2014

    E-commerce is relevant to business strategy as technology advances and consumers integrate it into their daily lives. Companies vary in their performance based on their e-commerce strategies, but the strategy alone is not a predictor of future performance. The literature is rich with differing opinions and measures of information technology investments and their performance, but there is a gap in the literature regarding the analysis of the financial performance of e-commerce strategies. This…

    E-commerce is relevant to business strategy as technology advances and consumers integrate it into their daily lives. Companies vary in their performance based on their e-commerce strategies, but the strategy alone is not a predictor of future performance. The literature is rich with differing opinions and measures of information technology investments and their performance, but there is a gap in the literature regarding the analysis of the financial performance of e-commerce strategies. This research contributes to the literature by exploring the extent to which an e-commerce strategy can affect financial performance as measured by annual revenue and net income growth. The financial performance of S&P 500 retail companies was analyzed, as measured by annual revenue and net income growth, after being classified into three categories: Pure Online Retail Companies (PORCs), Pure Physical Location Retail Companies (PPLRCs), and Mixed Retail Companies (MRCs). The results indicated that there are statistically significant differences in the above measured financial performance for some of the years analyzed (2008-2012). Firms that chose a mixed strategy (MRC) reported less volatile results than those with a pure strategy (PORC and PPLRC), PPLRCs had the best net income growth, and PORCs had the best gross revenue growth.

    See publication
  • PCI Compliance, Third Edition: Understand and Implement Effective PCI Data Security Standard Compliance

    Syngress

    The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version 2.0, and how to effectively implement security within your company to be compliant with the credit card industry guidelines and protect sensitive and personally…

    The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version 2.0, and how to effectively implement security within your company to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. Security breaches continue to occur on a regular basis, affecting millions of customers and costing companies millions of dollars in fines and reparations. That doesn't include the effects such security breaches have on the reputation of the companies that suffer attacks. PCI Compliance, 3e, helps readers avoid costly breaches and inefficient compliance initiatives to keep their infrastructure secure.

    *Provides a clear explanation of PCI.

    *Provides practical case studies, fraud studies, and analysis of PCI.

    *The first book to address version 2.0 updates to the PCI DSS, security strategy to keep your infrastructure PCI compliant.

    Other authors
    See publication
  • PCI Compliance: Understand and Implement Effective PCI Compliance

    Syngress

    Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition: Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better…

    Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition: Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need to understand the current PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information.

    * Completely updated to follow the PCI DSS standard 1.2.1
    * Packed with help to develop and implement an effective security strategy to keep infrastructure compliant and secure
    * Both authors have broad information security backgrounds, including extensive PCI DSS experience

    Other authors
    See publication
  • PCI Compliance, 5th Ed.

    CRC Press

    The fifth edition to the de-facto standard for PCI Compliance education! Due to be out in December. ISBN: 978-0367570026

    Other authors

Patents

  • Method and Apparatus for Establishing and Maintaining PCI DSS Compliant Transaction Flows for Banking Entities Leveraging Non-EMV Tokens

    Issued US 10423965

    A payment processor or network receives an incoming PAN pursuant to a payment card transaction between a merchant and a customer and translates the PAN into a token having a token value for N digits within a middle portion of the PAN, while preserving a PAN value for M digits within a terminal portion of the PAN. Pursuant to generation of the token, the payment processor or network performs BIN substitution on the PAN to replace the BIN within the PAN with a different BIN. The payment processor…

    A payment processor or network receives an incoming PAN pursuant to a payment card transaction between a merchant and a customer and translates the PAN into a token having a token value for N digits within a middle portion of the PAN, while preserving a PAN value for M digits within a terminal portion of the PAN. Pursuant to generation of the token, the payment processor or network performs BIN substitution on the PAN to replace the BIN within the PAN with a different BIN. The payment processor or network sends the token downstream for downstream processing of the transaction. Upon completion of downstream processing, the payment processor or network translates the token back into a PAN for any further processing of the transaction upstream.

    See patent

Courses

  • Data Science Track at Coursera

    -

Projects

Honors & Awards

  • Distinguished Fellow

    ISSA

    Branden was awarded Distinguished Fellow status in the ISSA due to his tenured membership in good standing and his volunteer work with the ISSA.

  • President's LIst

    Capella University

    Branden's outstanding academic performance during his doctoral studies at Capella have earned him a spot on the President's List for every quarter he was eligible.

  • Payment Security Professional of the Year

    Society of Payment Security Professionals

  • Sigma Iota Epsilon (Honors Fraternity)

    University of Dallas

Languages

  • English

    Native or bilingual proficiency

Organizations

  • ISSA

    Distinguished Fellow

  • Merchant Acquirers Committee

    Board of Directors

Recommendations received

More activity by Branden

View Branden’s full profile

  • See who you know in common
  • Get introduced
  • Contact Branden directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Branden Williams in United States

Add new skills with these courses