Webinar

Protecting Payments: Understanding the Layers

EMV, P2PE, Tokenization, Fraud Protection – what do they all mean? We hear that these are used to “secure payments,” but what do they actually do for a merchant?

EMV, P2PE, Tokenization, Fraud Protection – what do they all mean? We hear that these are used to “secure payments,” but what do they actually do for a merchant?

Event Type

How Edge/IoT Can Unleash Innovation in the Food Service Industry

Subscribe

 

In this second session of the IoT Series, we will discuss innovations in food service and discover new ways to think about IoT, including what to consider under the hood. Come learn how data orchestration leads to delivering quality food service every time.

About the Speakers

Hauke Fedderson

Director of Global Operations, PreciTaste

Subscribe

 

In this second session of the IoT Series, we will discuss innovations in food service and discover new ways to think about IoT, including what to consider under the hood. Come learn how data orchestration leads to delivering quality food service every time.

About the Speakers

Hauke Fedderson

Director of Global Operations, PreciTaste

Event Type

Connect with Conexxus

Subscribe

 

Every other month, we hold an open forum event inviting all paid Conexxus365 subscribers and Conexxus members to attend. This “cameras on” opportunity allows us to gather and connect through an informal guided-topic conversation. It's the time for those who want to meet and talk shop in a casual, comfortable, virtual environment.

 

Subscribe

 

Every other month, we hold an open forum event inviting all paid Conexxus365 subscribers and Conexxus members to attend. This “cameras on” opportunity allows us to gather and connect through an informal guided-topic conversation. It's the time for those who want to meet and talk shop in a casual, comfortable, virtual environment.

 

Event Type

Securing Payments Across the C-Store Environment with PCI-Validated P2PE

Subscribe

 

Every year, the number of cyberattacks rise and the number of records compromised soar, while the threat landscape continues to expand. The number of cards reissued and consumer dissatisfaction with a lack of payment and data protection has also grown.

Subscribe

 

Every year, the number of cyberattacks rise and the number of records compromised soar, while the threat landscape continues to expand. The number of cards reissued and consumer dissatisfaction with a lack of payment and data protection has also grown.

Event Type

New Directions for Customer Loyalty

Subscribe

 

Many retailers have made statements to shareholders and stakeholders expressing their commitment to become a customer-centric organization. Making the changes necessary to truly put the customer first in any business can be a challenging and complex task.

Subscribe

 

Many retailers have made statements to shareholders and stakeholders expressing their commitment to become a customer-centric organization. Making the changes necessary to truly put the customer first in any business can be a challenging and complex task.

Event Type

IoT for Everyone

Subscribe

 

The Internet of Things continues to grow rapidly, and IoT can seem like an out-of-reach technology to small businesses.  We will explore some opportunities that small businesses can implement and benefit from today, such as door sensors.   Our speakers are Charity McGill, a small store owner, Brad McGuinness, a POS veteran and IoT entrepreneur, and Jack Dickinson, a POS and retail veteran and Chair of the Conexxus IoT Working Group.

Subscribe

 

The Internet of Things continues to grow rapidly, and IoT can seem like an out-of-reach technology to small businesses.  We will explore some opportunities that small businesses can implement and benefit from today, such as door sensors.   Our speakers are Charity McGill, a small store owner, Brad McGuinness, a POS veteran and IoT entrepreneur, and Jack Dickinson, a POS and retail veteran and Chair of the Conexxus IoT Working Group.

Event Type

Autopsy of the SolarWinds Attack and Modern Malware Weaponization

Subscribe & Register

 

The SolarWinds attack was one of the most sophisticated that the industry has experienced - and reinforced the need for improved threat intelligence and incidence response measures.
 
Attend this Webinar to better understand the dynamics behind this well-orchestrated attack and techniques to better defend.  Topics include:

Subscribe & Register

 

The SolarWinds attack was one of the most sophisticated that the industry has experienced - and reinforced the need for improved threat intelligence and incidence response measures.
 
Attend this Webinar to better understand the dynamics behind this well-orchestrated attack and techniques to better defend.  Topics include:

Event Type