Hi [[ session.user.profile.firstName ]]

Gemalto SafeNet EMEA Data Protection Channel

  • Date
  • Rating
  • Views
  • GDPR – The monster under the bed or an opportunity to enhance security? GDPR – The monster under the bed or an opportunity to enhance security? James Leaton Gray, The Privacy Practice, Jason Hart, Gemalto, Adrian Davis, (ISC)² Recorded: Oct 13 2016 62 mins
    The new EU regulation of the Privacy world (the GDPR) is frequently portrayed as a scary and formidable piece of legislation that’s going to rock the online & off-line world. This webinar will explore what the implications really are. How much will change from the present regime? How difficult will it be to comply? Also is there an opportunity hidden in the challenge? And where will security and security professionals fit in the new picture?
  • Their Cloud. Your Data. The Global State of Cloud Data Security Their Cloud. Your Data. The Global State of Cloud Data Security Dr. Larry Ponemon Chairman & Founder The Ponemon Institute, Joe Pindar Director of Strategy, CTO Office Gemalto Recorded: Jul 28 2016 36 mins
    This webinar will discuss the recent findings of a global cloud data security study conducted by the Ponemon Institute on behalf of Gemalto. The study surveyed 3,476 IT and IT security professionals in the United States, United Kingdom, Australia, Germany, France, Japan, Russian Federation, India and Brazil about the governance policies and security practices their organizations have in place to secure data in cloud environments. The findings will reveal adoption trends for IaaS, PaaS and SaaS; the prevalence of Shadow IT; the role of data governance; and data security practices in the cloud, including the usage of encryption and multi-factor authentication. In addition, participants will also learn new data security strategies that can help them realize the benefits of the cloud while protecting sensitive applications and information in cloud.
  • Breach Prevention is Dead - Long Live the Secure Breach Breach Prevention is Dead - Long Live the Secure Breach Jason Hart, CTO, Data Protection - Gemalto Recorded: Jul 12 2016 38 mins
    Today’s changing and sophisticated threat landscape and increasing use of the cloud and mobile devices have rewritten the rules of data security. However, many companies continue to rely on breach prevention as the foundation of their security strategies. If one thing has been learned in recent years it is that data breaches are inevitable, and that is why IT organizations must shift a from mindset that is entirely focused on Breach Prevention to Breach Acceptance and finally to a Secure the Breach approach to data security. This presentation will review why IT professionals need to adopt a new data security mindset if they are to effectively protect sensitive information and users accessing it using a three step process of securing user access, encrypting sensitive data, and secure management of encryption keys.
  • Security or convenience in digital banking? We want it all! Security or convenience in digital banking? We want it all! Frederique Richert, Marketing Manager, Digital Banking - Gemalto, Vincent Truffier-Blanc, Head of Market Research - Gemalto Recorded: Jul 7 2016 33 mins
    How closely are banks listening to their customers about their desire to embrace mobile services? Join Gemalto to understand firsthand what banking customers want and expect when it comes to mobile banking. During this session we’ll share the findings of a recent survey Gemalto conducted with more than 200 digital banking users. From the results we can get an in depth understanding of users’ attitudes to digital banking and their expectations of security, and can help banks fine tune their mobile offerings to address both security and convenience.
  • Next-Generation Security: Don’t Go Soft on Security in SDN Next-Generation Security: Don’t Go Soft on Security in SDN Stan Mesceda, Sr Product Manager – Gemalto Recorded: Jun 22 2016 50 mins
    Technologies like software defined networking (SDN) provide flexibility and efficiency, but where does security fit in? SDN, like any network can be attacked at each network component. And as bandwidths increase to 100G and beyond, the rate of data transfer and the risks escalate, both on the physical and virtual plane. So what can you do to protect your networks and the data that travels through them?
  • SAML – The Cloud Defender You've Never Heard Of SAML – The Cloud Defender You've Never Heard Of Mor Ahuvia, Product Marketing Manager, Authentication - Gemalto Recorded: Jun 15 2016 35 mins
    The cloud provides an easy way for companies to consume and manage colossal amounts of data, but is it secure? SAML—the Cloud Defender You never Heard Of--can make sure it stays out of the hands of hackers and fraudsters.
    What is SAML? How does it work? And how can it protect all your favorite cloud apps, while keeping citizens happy and slashing helpdesk workloads? Join the webinar on Wednesday, June 15th to learn how to extend identities to the cloud with SafeNet Authentication Service’s native identity federation, which lets IT administrators manage a single identity per user, for all cloud, virtual and on-premises applications. SafeNet Authentication Service extends strong authentication to Office 365, Salesforce.com, Dropbox, Google Apps, Amazon Workspaces, Jira, ZenDesk, and 100s of other cloud applications.
  • GDPR: La violazione dei dati nel nuovo Regolamento Europeo sulla Privacy GDPR: La violazione dei dati nel nuovo Regolamento Europeo sulla Privacy Gloria Marcoccio, Senior Advisor IT and International Privacy & Security Compliance, Simone Mola Sr Sales Engineer at Gemalto Recorded: Jun 15 2016 64 mins
    Fino a poco tempo fa, le leggi europee riguardanti la protezione dei dati erano principalmente focalizzate sul consenso della persona, limitazione delle finalità e trasparenza nei trattamenti, etc. mentre gli aspetti inerenti la sicurezza delle informazioni erano considerati, in linea generale, questioni squisitamente tecniche più che di conformità legale.

    Questo quadro ora cambia profondamente con l'entrata in vigore il 25 maggio 2016 del nuovo Regolamento Privacy Europeo (GDPR), e con la prossima direttiva europea sulla sicurezza delle reti e dei sistemi informativi (NIS Directive). Tra le nuove e importanti prescrizioni in tema di sicurezza del GDPR spicca in modo particolare quella della violazione dei dati personali, che richiede alle aziende di tutti i settori di effettuare in tali casi la comunicazione al Garante privacy entro 72 ore e, in particolari condizioni, anche la comunicazione senza indebito ritardo a tutte le persone interessate dalla violazione a meno che i dati non siano stati resi inintellegibili (per esempio per mezzo di crittografia). Inoltre la direttiva NIS, una volta recepita nei Paesi Membri della UE, richiederà tra l'altro agli Operatori dei Servizi Essenziali (Energia, Trasporti, Sanità, etc.) e agli Operatori di Servizi Digitali (e-commerce, motori di ricerca on line, Cloud Computing) di comunicare alle autorità competenti nazionali i casi di incidenti di sicurezza.

    L’Unione Europea vuole che la conformità alle nuove normative in materia di protezione dei dati diventi una questione prioritaria e ha così prescritto che queste regole siano soggette a pesanti multe (sono previste sanzioni fino a 20 milioni di euro, e per le imprese fino a 4% del fatturato mondiale, se superiore).

    Partecipa al webinar organizzato da Symbolic e Gemalto che si terrà il prossimo 15 giugno alle ore 11:00 per conoscere il quadro normativo applicabile e le misure da predisporre per una corretta gestione dei casi di violazioni dati.
  • Security, Compliance and Hardware Security Modules in Cloud Foundry Security, Compliance and Hardware Security Modules in Cloud Foundry Joe Pindar, Director of Strategy, CTO Office, Gemalto; Abby Kearns, VP, Industry Strategy - Cloud Foundry Foundation Recorded: Jun 2 2016 43 mins
    Many companies are making big investments in Cloud Foundry with providers such as Pivotal, IBM Bluemix, and GE Predix. The Cloud Foundry platform-as-a-service makes it easier for companies to build, test, and deploy applications more quickly – allowing them to focus on adding business value. This webinar will give an overview of how developers can build enhanced security into their applications using hardware security modules as the root of trust for their encryption and cryptographic operations.
  • Alternatives to RSA Data Protection Manager for Centralized Key Management Alternatives to RSA Data Protection Manager for Centralized Key Management Steve Kingston, Product Manager - Gemalto Recorded: May 25 2016 27 mins
    RSA’s Data Protection Manager (DPM), BSAFE and tokenization products are quickly approaching EOL/EOPS, presenting RSA customers with an opportunity to reassess their encryption key management architecture and needs. With so many technologies available today that seemingly offer the same capabilities, how do you select the vendor and solution that is right for you?
    Join Stephen Kingston, Product Manager for SafeNet KeySecure, Gemalto, where you will learn how you can:

    • Benefit from proven, successful RSA to Gemalto migration use cases, including Healthcare, PII Protection and Retail PoS applications
    • Easily migrate with the same one-to-one functionality offered by SafeNet KeySecure and SafeNet Data Protection Connectors
    • Avoid encryption silos with a centralized key manager whether on-premises, virtual, or in the cloud
    • Painlessly expand your encryption solution as your future needs grow, be it files, databases, applications, or tokenization
    • Quickly get started with our 5 easy migration steps
  • GDPR Summary:  Why encryption and other measures are now a must? GDPR Summary: Why encryption and other measures are now a must? Adrian Davis, MD (ISC)² EMEA; Jason Hart, CTO Gemalto; Tom De Cordier, Lawyer and Partner, CMS DeBacker Recorded: May 24 2016 62 mins
    Until recently, EU data protection laws mainly focused on data subject consent, proportionality, purpose limitation, transparency, etc. Information security, however, was very often deemed to be an area for the techies, not an area of legal compliance.
    This will change as a result of two recent and major pieces of EU legislation: the General Data Protection Regulation (GDPR) and the Network and Information Security Directive (NIS Directive).
    Under the GDPR and the NIS Directive, businesses and operators of essential services (eg. hospitals; airports; etc.) will have to implement robust information and system security measures. In addition, the new rules contain a new name-and-shame mechanism: businesses and operators will have to inform the relevant authorities of security incidents. And they will have to inform the affected data subjects, unless the affected data were rendered unintelligible (for example by means of encryption).
    Finally, the EU wants the new data protection rules to become a board-level issue and it has therefore decided to make the rules subject to hefty fines:
    •If a business fails to comply with its data security obligations under the GDPR, it may get a fine of up to 10,000,000 EUR or 2 % of its total worldwide annual turnover, whichever is higher.
    •Worse even, if a business is found to be in breach of certain other obligations under the GDPR, the fine may go up to a dazzling 4 % of its total worldwide annual turnover.
    During this webinar, you will learn from Jason Hart, CTO at Gemalto and Tom De Cordier, an expert in data protection and information security law at CMS in Brussels, what the new rules mean in practice and what businesses should do to bring themselves in line with the upcoming requirements.

Embed in website or blog