We were PCI Compliant, We Still Got Breached

The webinar has ended

A post-incident breakdown of a real breach that occurred despite PCI compliance. Learn what actually failed, where assumptions break down, and how to evaluate risk beyond checklists.

Many organizations invest heavily in compliance. They complete assessments, follow required controls, and assume they are protected.

Then an incident happens.

In this on-demand webinar, Aaron Birnbaum shares a post-incident breakdown of a real breach that occurred despite PCI compliance. This is not a story about what happened. It is a clear look at what failed, why those failures were not obvious, and what leaders often misunderstand about risk, behavior, and accountability.

Before moving into cybersecurity leadership, Aaron operated a PCI-compliant payment processing business he believed was secure. When it was compromised, the assumptions many organizations rely on, compliance checklists, security training, and expected user behavior, broke down quickly.

This session focuses on what leaders need to understand before an incident, not after.

If you are responsible for security outcomes and want a clearer view of where real risk exists, this webinar will help you reassess how you approach compliance, culture, and decision-making.


What You Will Learn

What Actually Failed Before the Breach

  • Where assumptions broke down despite compliance
  • Why early warning signs are often missed
  • What leaders expect to fail versus what actually does

Why Compliance and Training Fall Short

  • Why check-the-box compliance does not change behavior
  • Gaps between policy, training, and real-world actions
  • Where traditional approaches create a false sense of security

How Leadership Decisions Create Risk

  • Tradeoffs that unintentionally increase exposure
  • How priorities and communication shape outcomes
  • Where accountability becomes unclear

What Happens After an Incident

  • What investigators and insurers focus on
  • How incidents are evaluated beyond compliance status
  • What leadership is expected to explain and prove

How to Evaluate Your Security Culture

  • Whether your organization would hold up under scrutiny
  • Signals that indicate deeper risk
  • How to think more clearly about accountability and prevention

Protect and defend with multiple layers of cybersecurity

Defend your business with All-In-One Cybersecurity®.

Explore layered
security

Learn more about Defendify’s three key layers and All-In-One Cybersecurity®.

How can we help?

Schedule time to talk to a cybersecurity expert to discuss your needs.

See how it works

See how Defendify’s platform, modules, and expertise work to improve security posture.