About
Dr. Branden Williams is an experienced (25+ years) technology executive who has served…
Articles by Branden
-
Ten Things Companies Get Wrong About CIAM
Ten Things Companies Get Wrong About CIAM
By Branden Williams
Activity
-
I'm back on the mWISE program committee for 2024! This event will be held in Denver this year on September 18th and 19th. The call for speakers has…
I'm back on the mWISE program committee for 2024! This event will be held in Denver this year on September 18th and 19th. The call for speakers has…
Shared by Branden Williams
-
Proud wife moment! My husband graduated Magna Cum Laude last Friday from MSU Denver’s College of Business with a degree in Business Management. He…
Proud wife moment! My husband graduated Magna Cum Laude last Friday from MSU Denver’s College of Business with a degree in Business Management. He…
Liked by Branden Williams
-
Every end has a new beginning. I have taken time over the last six months to determine the next phase of my career. After thinking a lot about it, I…
Every end has a new beginning. I have taken time over the last six months to determine the next phase of my career. After thinking a lot about it, I…
Liked by Branden Williams
Experience
Education
-
Capella University
-
Activities and Societies: With Highest Honors, President's List, Sigma Iota Epsilon
* Research included studying business intelligence, strategy, innovation, and the affects of e-commerce strategies on retail performance.
* Additional focus on strategy, innovation, and corporate social responsibility -
-
Activities and Societies: Sigma Iota Epsilon, Entrepreneurial Society
-
-
Activities and Societies: President, Pi Sigma Epsilon, Alpha Delta Chapter
Recognized as a Presidential Scholar.
Licenses & Certifications
-
Certified Information Security Manager
ISACA
IssuedCredential ID 0605919 -
Certified Payment-Card Industry Security Auditor
Society of Payment Security Professionals
Issued Expires -
Certified Payment-Card Industry Security Manager
Society of Payment Security Professionals
Issued Expires -
Qualified Security Assessor
PCI Security Standards Council/Visa
Issued Expires -
Certified Checkpoint System Administrator
Checkpoint
Issued Expires -
Certified Checkpoint System Expert
Checkpoint
Issued Expires
Volunteer Experience
-
Editorial Advisory Board
Information Systems Security Association (ISSA)
- 12 years 1 month
Education
I assist in the production of the ISSA Journal in two forms. First, I write a monthly column and secondly as a member of the Editorial Advisory Board. We help select articles for publication.
-
Director
Merchant Acquirers' Committee
- 5 years 4 months
Science and Technology
Member of MAC Board serving as a Director as of April 2015. Advisor from April 2014 to April 2015. MAC’s mission is to strengthen the payment ecosystem through ongoing education, communication and cooperation among acquirers, card brands, and enforcement agencies.
-
Member Of The Board Of Advisors
PCI Security Standards Council
- 2 years
Science and Technology
I operated under a platform of relevance, value, and simplicity. My goal was to reduce the complexity of PCI DSS while ensuring all actions performed by the body was done so with value in mind.
-
Member Of The Board Of Advisors
EMVCo
- 1 year 6 months
Member of the EMVCo Board of Advisors. Primarily contributing to 3DSecure 2.0 and the Payment Account Reference (PAR).
-
Pilot
American Airlines Sky Ball
- Present 11 years
I do a few things for Sky Ball every year. Primarily I volunteer during their Air Expo, which brings in at-risk kids from all over the metroplex to expose them to aviation. I fly in an aircraft and talk with the kids about my experiences as a pilot and ways they can get into aviation. I also donate to the cause financially and volunteer for the setup of the event.
-
Facilitator
Upgrades for Soldiers
- Present 10 years
I started this program to collect expiring or donated upgrades from frequent fliers to give to veterans heading for medical treatment or family of fallen heroes traveling on behalf of their service member.
-
Volunteer
Denton Medical Reserve Corp
- Present 10 years 5 months
Disaster and Humanitarian Relief
Volunteer for the MRC in Denton county. Specifically, my specialties are in both manning amateur radio comms and IT support, although I will also act as a general volunteer when needed. Typical requests would be disaster relief after severe weather or other acts of God, supporting community events such as 5/10K charity races, and most recently volunteering at the COVID-19 Mass Vaccination sites.
-
Advisory Board Member
University of Dallas Gupta College of Business Cybersecurity
- Present 3 years 3 months
Education
Publications
-
PCI Compliance, Version 3.2: The Latest on PCI DSS Compliance
Amazon Digital Services
As PCI DSS is now well into its second decade, the standard is now mature. The dramatic between early versions have fizzled to clarifications and select new requirements. While the expanse of documentation for PCI DSS continues to grow without bounds, the piece that kicked off careers, products, and the ecosystem is now stable.
PCI DSS version 3.2, the latest in a string of updates to the original PCI DSS standard, is the target for many companies who handle cardholder data. In this…As PCI DSS is now well into its second decade, the standard is now mature. The dramatic between early versions have fizzled to clarifications and select new requirements. While the expanse of documentation for PCI DSS continues to grow without bounds, the piece that kicked off careers, products, and the ecosystem is now stable.
PCI DSS version 3.2, the latest in a string of updates to the original PCI DSS standard, is the target for many companies who handle cardholder data. In this text, readers will learn all of the updates and nuances for this latest version of the standard. If you are a merchant, I sincerely hope your PCI DSS scope reduces to nothing!
This book is meant to be a companion to PCI Compliance: Understand and Implement Effective PCI Compliance, 4th Ed. (Syngress) bringing the changes in PCI DSS 3.1 and 3.2 into this supplementary reference text. -
PCI DSS 3.1: The Standard that Killed SSL
Syngress
PCI DSS has recently updated its standard to 3.1. While the changes are fairly minor in nature, there are massive implications to companies relying on SSL as a scope reducing tool inside their enterprise. This update book goes through the specific changes to PCI DSS 3.1, and includes new case studies that discuss the specific implications for making the change to 3.1. This concise supplement also includes a detailed explanation of each changed requirement and how it will impact your…
PCI DSS has recently updated its standard to 3.1. While the changes are fairly minor in nature, there are massive implications to companies relying on SSL as a scope reducing tool inside their enterprise. This update book goes through the specific changes to PCI DSS 3.1, and includes new case studies that discuss the specific implications for making the change to 3.1. This concise supplement also includes a detailed explanation of each changed requirement and how it will impact your environment. PCI Compliance, 3.1 Addendum serves as an update to Syngress’ comprehensive reference volume PCI Compliance, Fourth Edition.
* Includes all system updates to the new version of PCI DSS 3.1
* Details and describes each update and enhancement
* Includes case studies that illustrate when and where these changes will effect and improve your enterprise -
3 Experts teach you how to properly scope your PCI assessment
CSO
When it comes to PCI, getting your scope right is more important than just getting a cheaper, faster assessment. Learn how to do it right with insights from 3 experts.
Other authorsSee publication -
PCI Compliance, Fourth Edition: Understand and Implement Effective PCI Data Security Standard Compliance
Syngress
Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI…
Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. This is the first book to address the recent updates to PCI DSS. The real-world scenarios and hands-on guidance are also new approaches to this topic. All-new case studies and fraud studies have been added to the Fourth Edition.
Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need in order to understand the current PCI Data Security standards and how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and help you protect sensitive and personally-identifiable information.
* Completely updated to follow the most current PCI DSS standard, version 3.0
* Packed with help to develop and implement an effective strategy to keep infrastructure compliant and secure
* Includes coverage of new and emerging technologies such as NFC, P2PE, CNP/Mobile, and EMV
* Both authors have broad information security backgrounds, including extensive PCI DSS experienceOther authorsSee publication -
The Digitization of Business: The Effect of E-Commerce Strategies on Revenue Growth in Retail Companies
ProQuest, UMI Dissertations Publishing 2014
E-commerce is relevant to business strategy as technology advances and consumers integrate it into their daily lives. Companies vary in their performance based on their e-commerce strategies, but the strategy alone is not a predictor of future performance. The literature is rich with differing opinions and measures of information technology investments and their performance, but there is a gap in the literature regarding the analysis of the financial performance of e-commerce strategies. This…
E-commerce is relevant to business strategy as technology advances and consumers integrate it into their daily lives. Companies vary in their performance based on their e-commerce strategies, but the strategy alone is not a predictor of future performance. The literature is rich with differing opinions and measures of information technology investments and their performance, but there is a gap in the literature regarding the analysis of the financial performance of e-commerce strategies. This research contributes to the literature by exploring the extent to which an e-commerce strategy can affect financial performance as measured by annual revenue and net income growth. The financial performance of S&P 500 retail companies was analyzed, as measured by annual revenue and net income growth, after being classified into three categories: Pure Online Retail Companies (PORCs), Pure Physical Location Retail Companies (PPLRCs), and Mixed Retail Companies (MRCs). The results indicated that there are statistically significant differences in the above measured financial performance for some of the years analyzed (2008-2012). Firms that chose a mixed strategy (MRC) reported less volatile results than those with a pure strategy (PORC and PPLRC), PPLRCs had the best net income growth, and PORCs had the best gross revenue growth.
-
PCI Compliance, Third Edition: Understand and Implement Effective PCI Data Security Standard Compliance
Syngress
The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version 2.0, and how to effectively implement security within your company to be compliant with the credit card industry guidelines and protect sensitive and personally…
The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version 2.0, and how to effectively implement security within your company to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. Security breaches continue to occur on a regular basis, affecting millions of customers and costing companies millions of dollars in fines and reparations. That doesn't include the effects such security breaches have on the reputation of the companies that suffer attacks. PCI Compliance, 3e, helps readers avoid costly breaches and inefficient compliance initiatives to keep their infrastructure secure.
*Provides a clear explanation of PCI.
*Provides practical case studies, fraud studies, and analysis of PCI.
*The first book to address version 2.0 updates to the PCI DSS, security strategy to keep your infrastructure PCI compliant.Other authorsSee publication -
PCI Compliance: Understand and Implement Effective PCI Compliance
Syngress
Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition: Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better…
Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition: Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need to understand the current PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information.
* Completely updated to follow the PCI DSS standard 1.2.1
* Packed with help to develop and implement an effective security strategy to keep infrastructure compliant and secure
* Both authors have broad information security backgrounds, including extensive PCI DSS experienceOther authorsSee publication
Patents
-
Method and Apparatus for Establishing and Maintaining PCI DSS Compliant Transaction Flows for Banking Entities Leveraging Non-EMV Tokens
Issued US 10423965
A payment processor or network receives an incoming PAN pursuant to a payment card transaction between a merchant and a customer and translates the PAN into a token having a token value for N digits within a middle portion of the PAN, while preserving a PAN value for M digits within a terminal portion of the PAN. Pursuant to generation of the token, the payment processor or network performs BIN substitution on the PAN to replace the BIN within the PAN with a different BIN. The payment processor…
A payment processor or network receives an incoming PAN pursuant to a payment card transaction between a merchant and a customer and translates the PAN into a token having a token value for N digits within a middle portion of the PAN, while preserving a PAN value for M digits within a terminal portion of the PAN. Pursuant to generation of the token, the payment processor or network performs BIN substitution on the PAN to replace the BIN within the PAN with a different BIN. The payment processor or network sends the token downstream for downstream processing of the transaction. Upon completion of downstream processing, the payment processor or network translates the token back into a PAN for any further processing of the transaction upstream.
Courses
-
Data Science Track at Coursera
-
Projects
-
pgMail
- Present
pgMail is a stored function written in TCL which takes 4 arguments of type 'text' (Who is it from, who is it to, subject, and body of message), contacts the email server via TCL sockets, and transmits your email.
Honors & Awards
-
Distinguished Fellow
ISSA
Branden was awarded Distinguished Fellow status in the ISSA due to his tenured membership in good standing and his volunteer work with the ISSA.
-
President's LIst
Capella University
Branden's outstanding academic performance during his doctoral studies at Capella have earned him a spot on the President's List for every quarter he was eligible.
-
Payment Security Professional of the Year
Society of Payment Security Professionals
-
Sigma Iota Epsilon (Honors Fraternity)
University of Dallas
Languages
-
English
Native or bilingual proficiency
Organizations
-
ISSA
Distinguished Fellow
-
Merchant Acquirers Committee
Board of Directors
Recommendations received
40 people have recommended Branden
Join now to viewMore activity by Branden
-
So it turns out to NOT be any kind of logic bug, just a lack of clarity on the manpage and usage notes from the tool. I clarified this in my blog…
So it turns out to NOT be any kind of logic bug, just a lack of clarity on the manpage and usage notes from the tool. I clarified this in my blog…
Shared by Branden Williams
-
When Man Pages Go Weird - Or, the story of how I found a tool that did not function the way the manual said it did. Also, if you want to learn the…
When Man Pages Go Weird - Or, the story of how I found a tool that did not function the way the manual said it did. Also, if you want to learn the…
Shared by Branden Williams
-
"History of RSA Conference" - Art Coviello, Jr spent nearly 20 years with RSA Security, from 1995 to 2015. He held positions including Executive…
"History of RSA Conference" - Art Coviello, Jr spent nearly 20 years with RSA Security, from 1995 to 2015. He held positions including Executive…
Liked by Branden Williams
-
Interested in learning more about tackling PCI DSS 4.0? I hosted a webinar today with several industry experts, including representation from the PCI…
Interested in learning more about tackling PCI DSS 4.0? I hosted a webinar today with several industry experts, including representation from the PCI…
Posted by Branden Williams
-
Thrilled to be part of such an exciting innovating company
Thrilled to be part of such an exciting innovating company
Liked by Branden Williams
People also viewed
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Branden Williams in United States
-
Branden Williams
Food and Beverage Manager at Governors Club
-
Branden Williams
Project Manager at BENTLEY ROOFING & PAINTING
-
Branden Williams
Director of Social Media and Creative, Fanatics Marketplace
-
Branden Williams
106 others named Branden Williams in United States are on LinkedIn
See others named Branden Williams