Episode 46 Real-World Insights into PCI DSS with PCI DSS Analyst Todd Ballard

Episode 46 Real-World Insights into PCI DSS with PCI DSS Analyst Todd Ballard

Author: Intex IT April 13, 2026 Duration: 1:03:53
Episode 46: Beyond Compliance  Real‑World Insights into PCI DSS In this episode of Cyber Security Happy Hour, host Christie is joined by PCI DSS Analyst and certified PCI Professional (PCIP) Todd Ballard for a practical, experience‑led conversation on what PCI DSS compliance really looks like beyond the checklist. Todd shares his journey into cybersecurity and explains why PCI DSS should be treated as a continuous business‑as‑usual process rather than a once‑a‑year audit exercise. Together, they explore the most common misconceptions around PCI compliance, the real‑world impact of PCI DSS v4.0, and why risk‑based validation, enhanced evidence requirements, and multi‑factor authentication are fundamentally changing how organisations must approach payment security. The discussion dives into practical challenges such as scoping complex cloud and hybrid environments, managing third‑party and supply‑chain risk, handling shared responsibility models, and avoiding common remediation mistakes. Todd also highlights often‑underrated controls like security awareness training and explains how automation, continuous monitoring, and AI‑driven tooling are shaping the future of PCI DSS compliance. Whether you’re responsible for PCI DSS compliance, preparing for v4.0, or looking to move from checkbox compliance to meaningful security outcomes, this episode delivers real‑world insight you can apply immediately. Key topics covered: PCI DSS v4.0 and the shift to risk‑based validation Defined vs customised approaches – benefits and risks Scoping PCI in cloud, containerised, and hybrid environments Third‑party and supply‑chain compliance management Automation, continuous monitoring, and the future of PCI DSS Why compliance is only the starting point for real security If you’d like to learn more about Todd you can reach him directly at www.pcisolutions.com   Remember: PCI DSS isn’t just a checklist — it’s a mindset. If you enjoyed this episode, please follow, rate, and share the podcast, and let us know what topics you’d like us to tackle next.     Follow Cyber Security Happy Hour and stay up to date with new episodes, expert discussions, and practical cybersecurity insights: Listen & subscribe Spotify Apple Podcasts Google Podcasts Join the conversation LinkedIn – follow Christie and engage with episode discussions Visit: https://intexit.co.uk/Podcast for updates and episode highlights   Want to move beyond checkbox compliance? If you’re preparing for PCI DSS v4.0, reviewing scope, or looking to strengthen payment security, explore more at https://intexit.co.uk     #PCIDSS#PCIDSSv4#PaymentSecurity#Compliance#BeyondCompliance #GRC#FinTech#RetailSecurity#CloudSecurity#ThirdPartyRisk    

Grab a drink and settle in for Cyber Security Happy Hour Podcast, where the conversation is as engaging as the topics are critical. Hosted by Christie Ogubere and brought to you by Intex IT, this series takes the intimidating world of digital defense and makes it accessible, relevant, and surprisingly conversational. Think of it as a regular catch-up with knowledgeable friends who work in the trenches of technology, business, and education, breaking down complex threats, strategies, and industry shifts without the jargon. You'll hear genuine discussions that range from practical advice for protecting a small business to analyzing major breaches and exploring the human elements behind the screens. This isn't a dry lecture; it's a lively dialogue designed for professionals who need to stay informed and anyone curious about the forces shaping our digital lives. Tune in for a podcast that feels like a necessary pit-stop in your week, offering clarity and perspective on everything from ransomware to regulatory changes, all while reminding you that cybersecurity is fundamentally about people.
Author: Language: English Episodes: 46

Cyber Security Happy Hour Podcast
Podcast Episodes
Episode 35 Conducting an ISO 27001 Risk Assessment [not-audio_url] [/not-audio_url]

Duration: 17:49
Welcome to the Cyber Security Happy Hour Podcast Host: Christie Episode 35 Conducting an ISO 27001 Risk Assessment In the podcast I will be discussing the steps to conduct RISK Assessment as part of the ISO 27001 Impleme…
Episode 34 ISO 27001 Gap Analysis [not-audio_url] [/not-audio_url]

Duration: 11:44
Welcome to the Cyber Security Happy Hour Podcast Host: Christie Topic: Episode 34 ISO 27001 Gap Analysis In the podcast I will be discussing the steps to conduct a ISMS Gap Analysis. Identify the scope: Obtain a copy of…
Episode 33 Defining your ISO 27001 ISMS Scope [not-audio_url] [/not-audio_url]

Duration: 11:52
Welcome to the Cyber Security Happy Hour Podcast Host: Christie Topic: Defining your ISO 27001 ISMS Scope The boundaries of the information security management system (ISMS) The Scope should be defined to ensure that all…
Episode 32 Changes to ISO/IEC 27001(2022) [not-audio_url] [/not-audio_url]

Duration: 11:34
Welcome to the Cyber Security Happy Hour Podcast Host: Christie Topic: Changes to ISO/IEC 27001(2022) What are the ISO 27001 and 27002 standards What is the difference between ISO 27001 and 27002? Annex A controls Certif…
Episode 31 Cyber Security vs Physical Security [not-audio_url] [/not-audio_url]

Duration: 11:46
Welcome to the Cyber Security Happy Hour Podcast Host: Christie Topic: Cyber Security vs Physical Security Cyber Security Physical Security Differences between Cyber and Physical Security Physical security components Phy…
Episode 30 Cyber Forensics [not-audio_url] [/not-audio_url]

Duration: 18:12
Welcome to the Cyber Security Happy Hour Podcast. Host: Christie Topic: Cyber ForensicsWhat is Computer Forensics? Examples of Cyber Forensics? Forensics ProceduresTypes of computer forensics Skills and Knowledge require…
Episode 28 Log4J Vulnerabilities [not-audio_url] [/not-audio_url]

Duration: 11:56
Welcome to Episode 28 of the Cyber Security Happy Podcast. I am your host Christie the topic of today podcast is Episode 28 is Log4J Vulnerabilities What is Log4J? How does Log4j Work? Systems Affected CVSS Patching and…
Episode 27 Why you need Cyber Insurance [not-audio_url] [/not-audio_url]

Duration: 11:33
Welcome to Episode 27 of the Cyber Security Happy Podcast. I am your host Christie the topic of today podcast is Episode 27 Why you need Cyber Insurance. What is Cyber Risk Insurance? How are you affected by Cyber Attack…
Episode 26 Robinhood‘s Data Breach - Cyber Attack [not-audio_url] [/not-audio_url]

Duration: 14:54
Welcome to Episode 26 of the Cyber Security Happy Podcast. I am your host Christie the topic of today podcast is Episode 26 Robinhood‘s Data Breach - Cyber Attack Robinhood who are they? What is a data breach? What happe…