{"id":300,"date":"2026-01-05T17:03:01","date_gmt":"2026-01-05T17:03:01","guid":{"rendered":"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/?post_type=timeline_event&#038;p=300"},"modified":"2026-01-05T17:03:01","modified_gmt":"2026-01-05T17:03:01","slug":"tokenization-product-security-guidelines-published","status":"publish","type":"timeline_event","link":"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/timeline-event\/tokenization-product-security-guidelines-published\/","title":{"rendered":"Tokenization Product Security Guidelines published"},"content":{"rendered":"","protected":false},"featured_media":0,"template":"","class_list":["post-300","timeline_event","type-timeline_event","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tokenization Product Security Guidelines published - PCI SSC Turns 20<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/timeline-event\/tokenization-product-security-guidelines-published\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tokenization Product Security Guidelines published - PCI SSC Turns 20\" \/>\n<meta property=\"og:url\" content=\"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/timeline-event\/tokenization-product-security-guidelines-published\/\" \/>\n<meta property=\"og:site_name\" content=\"PCI SSC Turns 20\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/timeline-event\/tokenization-product-security-guidelines-published\/\",\"url\":\"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/timeline-event\/tokenization-product-security-guidelines-published\/\",\"name\":\"Tokenization Product Security Guidelines published - PCI SSC Turns 20\",\"isPartOf\":{\"@id\":\"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/#website\"},\"datePublished\":\"2026-01-05T17:03:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/timeline-event\/tokenization-product-security-guidelines-published\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/timeline-event\/tokenization-product-security-guidelines-published\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/timeline-event\/tokenization-product-security-guidelines-published\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tokenization Product Security Guidelines published\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/#website\",\"url\":\"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/\",\"name\":\"PCI SSC Turns 20\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tokenization Product Security Guidelines published - PCI SSC Turns 20","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/timeline-event\/tokenization-product-security-guidelines-published\/","og_locale":"en_US","og_type":"article","og_title":"Tokenization Product Security Guidelines published - PCI SSC Turns 20","og_url":"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/timeline-event\/tokenization-product-security-guidelines-published\/","og_site_name":"PCI SSC Turns 20","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/timeline-event\/tokenization-product-security-guidelines-published\/","url":"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/timeline-event\/tokenization-product-security-guidelines-published\/","name":"Tokenization Product Security Guidelines published - PCI SSC Turns 20","isPartOf":{"@id":"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/#website"},"datePublished":"2026-01-05T17:03:01+00:00","breadcrumb":{"@id":"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/timeline-event\/tokenization-product-security-guidelines-published\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/timeline-event\/tokenization-product-security-guidelines-published\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/timeline-event\/tokenization-product-security-guidelines-published\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/"},{"@type":"ListItem","position":2,"name":"Tokenization Product Security Guidelines published"}]},{"@type":"WebSite","@id":"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/#website","url":"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/","name":"PCI SSC Turns 20","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/wp-json\/wp\/v2\/timeline_event\/300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/wp-json\/wp\/v2\/timeline_event"}],"about":[{"href":"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/wp-json\/wp\/v2\/types\/timeline_event"}],"wp:attachment":[{"href":"https:\/\/preprod.pcisecuritystandards.org\/pcisscturns20\/wp-json\/wp\/v2\/media?parent=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}