The eSkimming Security Illusion in PCI DSS

CSP & SRI Don't Work - Scope is Wrong and Much More You Need to Know 

Register Now!

PCI-PPO-Statement

February 18th at 2:00 PM EST

Content Security Policy (CSP) and Subresource Integrity (SRI) are called out specifically in the current version of the PCI DSS- they should not be. These are insufficient controls for securing third-party JavaScript and stopping eSkimming.

These controls are trivial to bypass for modern eSkimming attackers and should be removed from the DSS as they create a false sense of security that leaves organizations exposed.

This webinar breaks down why CSP and SRI fail against today’s dynamic, behavior-based client-side attacks like eSkimming, formjacking, and credential harvesting. We will explain where these controls were intended to help, where they fundamentally break down, and why auditors, attackers, and compliance teams increasingly recognize their limitations.

What you'll learn:

  • Why CSP and SRI cannot stand up in the face of modern attacks
  • A detailed breakdown of recent threat research in eSkimming
  • How the current version of the PCI DSS is missing the mark
  • What effective client-side protection looks like in practice
  • How to avoid common architectural mistakes that undermine WebSec/AppSec programs