Hi [[ session.user.profile.firstName ]]

NCIPHER

  • Date
  • Rating
  • Views
  • Proactive Data Defence for Digital Transformation
    Proactive Data Defence for Digital Transformation
    Brett Bourke Abela, Senior Sales Engineer, UK, Thales eSecurity Recorded: Nov 22 2018 32 mins
    In the third of our #CoffeeBreak webcasts, Chris Ogilvie interviews Brett Abela, Thales eSecurity Sales Consultant on proactive data defence for digital transformation.

    Digital transformation is business enhancing but fraught with danger. With services moving into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, with more and more of your corporate attack surface being exposed.

    The rise of cloud and the Internet of Things (IoT), has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.

    Join Chris and Brett for the third “coffee break” webcast when they will discuss:
    a) Key security considerations for a digital transformation strategy
    b) Why a proactive data defence strategy is crucial
    c) The benefits of maximising the level of control over data irrespective of where it is created, stored or shared.
    d) How can enterprises regain control of their data security?
  • Thales nShield non+ to nShield XC Migration
    Thales nShield non+ to nShield XC Migration
    Marc Class, Sales Engineer, Thales Australia Recorded: Mar 28 2018 36 mins
    "The new Thales nShield XC is set to replace the Thales nShield Solo and nShield Connect non-plus hardware security modules in the next few months. With a whole host of new features and capabilities, the XC will outperform the non-plus by an order of magnitude – and this webinar will help you understand the new model and the recommended migration plan, so you can get ready to make the switch.

    Join us on Wednesday March 28th March @ 11am AEDT for a briefing on:

    • New Features of the XC

    • Recommended migration steps from non-plus to XC

    • End of Support timelines

    We will have lots of time for Q&A at this session.

    We look forward to talking to you then.
    "
  • Proactive Data Defence for Digital Transformation
    Proactive Data Defence for Digital Transformation
    Ian Greenwood, Regional Sales Manager UK&I Recorded: Mar 23 2018 35 mins
    "Digital transformation is business enhancing and fraught with danger. With services moving online and into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, more and more your corporate attack surface is being exposed.

    With data breaches at an all-time high and incidents of identity theft risen by 57% in a year, consumers are questioning the security of their personal data held by organisations. The rise of cloud and the Internet of Things, has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.

    This webinar will consider:

    • Key security considerations for a digital transformation strategy

    • Why a proactive data defence strategy is crucial

    • The benefits of maximising the level of control over data irrespective of where it is created, store or shared."
  • GDPR Compliance Roadmap
    GDPR Compliance Roadmap
    Sanjay Parikh - Director of Risk & Compliance at Critical Start Recorded: Feb 21 2018 55 mins
    "Join Critical Start and Thales, Wednesday, Feb 21 for a Virtual Lunch and Learn as we glide through the General Data Protection Regulation (GDPR) regulatory articles and identify the key sticking points for achieving compliance. GDPR becomes enforceable on May 25, which means the clock is ticking to prepare your organization’s infrastructure and avoid costly penalties.
    We’ll discuss:
    •The importance of your controls related to data protection
    •Areas that impact compliance which most organizations don’t realize
    •A roadmap for tackling GDPR head on towards your road to compliance

    What is GDPR?
    A new intended to strengthen and unify data protection for all individuals in the European Union. The new law affects any organization that processes or handles the information of EU citizens, regardless of where that organization is located. The regulation applies to any personal information, whether it belongs to a customer, an employee, or other relationship with the organization.

    About the Speaker: For more than 20 years, Sanjay Parikh has helped organizations assess, design and strengthen IT security programs. As Director of Risk & Compliance for Critical Start, he applies deep expertise in both security and compliance to help organizations of all sizes to navigate complex regulatory requirements related to ISO27001, GDPR, NIST, FFIEC, HIPAA, PCI and more. He develops strategic security roadmaps to identify gaps, streamline workflows, reduce audit costs, and ensure compliance while meeting business objectives."
  • 2017 Global PKI Trends: PKI at the Crossroads
    2017 Global PKI Trends: PKI at the Crossroads
    Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute and John Grimm, Sr Director of Security Strategy, Thales e-Security Recorded: Nov 8 2017 62 mins
    "PKI (public key infrastructure) has quietly become one of the most critical assets for enterprises today. Our 2017 study, conducted by the Ponemon Institute and sponsored by Thales e-Security, reveals an increase in the number of applications that use digital certificates, that enterprises are investing in fortifying the security posture of their PKIs, and that the IoT is the next game-changer for the future of PKI.

    Join this webcast to learn about the top findings of this research, including:

    • The increasing influence of the IoT in PKI planning
    • The increasing security maturity of enterprise PKIs including the use of Hardware Security Modules
    • Identification of enterprise applications that commonly depend on PKI credentials
    • The ongoing challenges associated with PKI deployment and management"
  • Beyond GDPR: Best Practices for Data Protection
    Beyond GDPR: Best Practices for Data Protection
    Aaron Davis, Sr Product Marketing Manager, PKI, Entrust Datacard & Juan Asenjo Sr Partner Marketing Manager, Thales eSecurity Recorded: Sep 14 2017 49 mins
    "In this webinar, we will examine the key elements necessary to protect sensitive data. The focus will be on comprehensive security aspects that enterprises need to consider going forward. The webinar will expand on how the General Data Protection Regulation (GDPR) is just the beginning; a set of best practices that every organization should adhere to, not just in the EU but globally, to use security as an enabler for a safe digital future.
    Topics discussed will include the expanded ecosystem of users, devices, applications, and things that must coexist in a trusted environment, as enterprises transform operations to depend on an all-digital infrastructure.

    Join the webinar to learn:

    • Why GDPR is only the beginning - cutting through the noise
    • How digital business is driving new approaches to data security
    • What are the best practices for improving data hygiene"
  • 2017 Global Encryption State of the State: The Latest Cloud Trends and More!
    2017 Global Encryption State of the State: The Latest Cloud Trends and More!
    Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute, John Grimm, Sr. Director of Security Strategy, Thales e-Security Recorded: Apr 19 2017 62 mins
    "This twelfth installment of the Ponemon Global Encryption Trends study, sponsored by Thales e-Security, reveals both deployment plans and pains associated with increasingly aggressive cloud and data protection strategies. Although compliance remains a top driver for encryption, the gap has narrowed as organizations move to protect sensitive IP and customer information from both external and internal threats. Join Larry Ponemon and John Grimm to learn about some of the top findings in this year’s Global Encryption Trends Study, including:

    • Variation in encryption and key management trends across multiple vertical industries
    • Attitudes regarding protection of sensitive data and control of keys in the cloud
    • Types of data most commonly encrypted, and associated applications that perform the encryption
    • The role of Hardware Security Modules (HSMs) in addressing cloud and enterprise encryption and key management use cases."
  • Protecting Data in line with the Australian Data Breach Notification
    Protecting Data in line with the Australian Data Breach Notification
    "Brian Grant, Vormetric & Marta Ganko, Deloitte Touche Tohmatsu " Recorded: Sep 15 2016 36 mins
    "Organisations in Australia now have a renewed focus and urgency on the protection of personal information assets with the proposed mandatory data breach notification laws back in the forefront of Australia Parliament priorities.
    With cybercrime and cyber threats exponentially increasing, organisations need to ensure their data security strategy is both comprehensive and stringent enough to deal with internal, external threats, audits and legislation.
    This webcast will explain and guide organisations in order to effectively prepare for the forthcoming legislation but to also better prepare your business to thwart the on-going cyber risks it faces daily.
    During the session, you will:
    a)Understand how the complexity and sophistication of cyber threat can damage your business
    b)Outline the proposed data breach notification and what it means for your business
    c)Highlight a best practice approach to safe-guarding your data"
  • Thwarting Advanced Threats with Trusted Crypto
    Thwarting Advanced Threats with Trusted Crypto
    John Grimm of Thales e-Security and John Pescatore of the SANS Institute Recorded: Sep 3 2015 60 mins
    "The dangers posed by advanced targeted attacks are real. Enterprises have come up against the limitations of approaches such as intrusion detection and signature-based malware detection. One promising avenue to explore is trusted crypto, which can help ensure that an application, for example, is doing just what its developers intended and has not been tampered with. Things can be taken a step further with trusted execution environments.

    In this webcast, John Grimm of Thales e-Security and John Pescatore of the SANS Institute will discuss the gaps in current best-practice defenses and the ways that trusted crypto and trusted execution environments can help fill those gaps."
  • Protecting Your Sensitive Data Does Not Have to Impact Business Operations
    Protecting Your Sensitive Data Does Not Have to Impact Business Operations
    Juan Asenjo, Senior Product Marketing Manager, Thales e-Security, Mark Bower, VP Product Management , Voltage Security Recorded: Sep 17 2014 61 mins
    "Highly publicized software attacks and data breaches, combined with strict regulatory requirements, reinforce the ongoing risks associated with cardholder data at all points in the payment stream. The risks to data are everywhere, and your organization is ultimately responsible for the security of customers’ personally identifiable information (PII). This means you must protected PII not only during transaction processing, but also through business processes such as charge-backs, loyalty or repeat payments, storage and analytics – including outsourced environments.
    Voltage SecureData™ enables you to ensure sensitive data is de-identified while maintaining logical and referential integrity so it can remain in a protected state while still usable for critical business processes. Integration of Voltage SecureData with Thales nShield® hardware security modules (HSMs) provides enhanced safekeeping and management of critical cryptographic keys that underpin the security of the process. Enforced protection of sensitive data using policy driven data security enables you to protect PII across your entire workflow without disrupting operations and ensuring you can adhere to privacy regulations."

Embed in website or blog