Hi [[ session.user.profile.firstName ]]

Security Management

  • Date
  • Rating
  • Views
  • Reality Check for Digital Wallet Security Reality Check for Digital Wallet Security Hannah Preston (Hannah.Preston@ca.com), Solution Strategist, Payment Security, CA Technologies & D.J. Murphy, CNP Recorded: Sep 29 2016 25 mins
    Consumers want payment options that function in all channels—research confirms it. They want to buy things with as little frustration as possible and merchants want to accept payments from legitimate customers. It seems so simple.

    As digital wallets emerge, however, security remains the primary hurdle facing mobile payments. How do digital wallets fit into the formula of customer convenience and merchant confidence?

    Join Hannah Preston, Solution Strategist, Payment Security Division, CA Technologies and D.J. Murphy, Editor-in-Chief, CardNotPresent.com as they discuss digital wallet adoption and how companies can keep pace with the demands of mobile commerce, while balancing fraud risks.

    Learn the "must haves" for any digital wallet solution:
    • Specifically designed to fuel the mobile economy, avoiding the frustration and complexity of legacy payment infrastructure
    • Securely provisioned with the cardholder's credentials, a vital feature for card issuers who want to offer cardholders digital wallet platforms
    • Industry sanctioned to effect a large scale shift in payment culture for merchants, issuers and customers
  • Compliance = Security: Why the Math Doesn’t Add Up Compliance = Security: Why the Math Doesn’t Add Up Gedeon Hombrebueno, Director of Security Solutions (CA Technologies) and Piyush Pandey, Senior Manager Cyber Risk (Deloitte) Recorded: Sep 8 2016 54 mins
    Business leaders believe compliance can keep them out of harm’s way. Yet the majority of organizations are not anywhere close to being safe from attacks. Why the disconnect?

    Join Gedeon Hombrebueno (CA Technologies) and Piyush Pandey (Deloitte) as they discuss the importance of taking IT security measures beyond standards or regulations, and how to establish the necessary privileged access management controls to not only prevent data breaches, but also to satisfy audit and compliance demands.

    You will learn:
    • Why a “compliance based approach” to security is inadequate and flawed
    • How to move from a compliance-based approach to risk-based approach
    • How Privileged Access Management can help address compliance requirements, using PCI DSS compliance as an example
  • Payment Security: Aligning to a Broader “Digital Business Transformation” Agenda Payment Security: Aligning to a Broader “Digital Business Transformation” Agenda James Jenkins, Director, Payment Security Solutions, CA Technologies and Karen Webster, CEO, Market Platform Dynamics Recorded: Sep 2 2016 59 mins
    It’s no secret that e-commerce is one of the biggest drivers of digital business transformation. This is due, primarily, to customers demanding the highest quality experience. No interruptions. No complex passwords. No incessant authentication requests … all without sacrificing security.

    Enter Payment Security solutions from CA. These intelligent solutions not only let you build a secure e-commerce strategy centered on customer value, but also a broader digital business transformation plan focused on competitive advantage.

    Want to learn more? Join James Jenkins, Director, Payment Security Solutions, CA Technologies and Karen Webster, CEO, Market Platform Dynamics as they discuss why banks and card issuers are at a pivotal juncture to embrace digital business transformation. Discover:
    What technology, applications, and digital all have in common when it comes to the new e-commerce strategy.
    •How business units can collectively drive enhanced digital services, combat fraud, and increase business performance.
    •Why these evolutionary times are accelerating the Digital Business Transformation agenda
    •What the experts are saying about digital strategies, focus areas, and best practices
  • CA Briefings Part 1: The Digital Marketplace & Cybersecurity CA Briefings Part 1: The Digital Marketplace & Cybersecurity Michelle Waugh, Security Business, CA Technologies; Brandon Dunlap Recorded: Sep 1 2016 61 mins
    Your business is part of a new digital reality and the digital relationships you have with individuals are your greatest assets. They are also the new perimeter, where identities are the unifying control point across apps & data and users demand access and insight with an exceptional user experience. While all this drives your business, it also opens you up to attacks and breaches. Join CA Technologies and (ISC)2 on September 1, 2016 at 1:00PM Eastern for this first event of a six-part webcast series where you will learn how leaders can adapt to the new digital reality -- embrace new identity and access management strategies that allow you to innovate in ways you never imagined.
  • Navigating a Perfect Storm of Payments Disruption hosted by PYMNTS.com Navigating a Perfect Storm of Payments Disruption hosted by PYMNTS.com Carol Alexander, Sr Dir Product Marketing PaySec, CA; Hannah Preston, Solution Strategist PaySec, CA; Karen Webster, CEO MPD Recorded: Jul 4 2016 55 mins
    Brace yourself, there's a storm coming. Soon you will see more and more global regulatory changes that could impact your payment security strategy. In fact, you may not even be aware that some changes are already underway.
    Find out how to leverage innovative, already-available payment technologies during this evolution in the payment industry.
    Join our distinguished panelists as they discuss regulatory disruption. Learn the steps you should be taking - right now - to help implement best practices in your fraud prevention strategies:
    •Are you future-proofing your e-Commerce operations?
    •Is your data at the center of your security strategy?
    •Are you tracking the predictions for next 18 months?
  • You've Got Basic Identity Governance Working. Now What? You've Got Basic Identity Governance Working. Now What? John Hawley, CA Technologies Recorded: Jun 28 2016 54 mins
    Your identity and governance practices are well established, but they might not be as comprehensive as they need to be. Going beyond the basics is critical to greatly reduce security risk and improve efficiencies.

    Join CA Technologies security expert, John Hawley, to examine how to broaden the scope of governance to include privileged users, contractors, and business partners, as well as controlling access to physical assets. You’ll also learn the important role of identity performance analytics in a governance deployment.

    Register Now.
  • Breaking the Data Breach Kill Chain Breaking the Data Breach Kill Chain Dale R. Gardner, CA Technologies PAM Recorded: Jun 21 2016 60 mins
    Cybercrime costs the global economy $445 Billion a year, more than the worldwide illicit drug trade, and even the GDP of many countries. And, targeted breaches are increasingly a tool of nation-states seeking intellectual property, dossiers on influential individuals, and devastating disruptions of business operations.

    But for all their variety, each of these attacks share a common thread — a kill chain that exploits privileged users and their credentials to gain access to sensitive systems. Privileged access management is the most direct means of disrupting the kill chain and stopping attackers before they ever get started.

    Join CA Technologies Dale Gardner and ISACA in an informative discussion on how to break the kill chain.

    You will learn:
    • How risks from system breaches — and the potential for long-lasting damages — are increasing
    • How attackers exploit privileged users and their credentials in an ongoing string of data breaches and security incidents
    • How to master the processes and tools needed to easily disrupt the kill chain, stopping attackers in their tracks and preventing breaches.
  • Enable eCommerce with Security? You Bet! Enable eCommerce with Security? You Bet! Rob Marti - CA Security and Jeremy Britton - Deloitte, Managing Director of Cyber Risk Services Recorded: Jun 15 2016 43 mins
    Digital is everywhere—big data, cloud, mobile, social, the Internet of Things – and its changing the way we all work and play. Today, retailers are facing three major challenges: digital transformation initiatives, abandoned online shopping carts, and online identity fraud and data breaches. The common thread for success is to ensure that security becomes synonymous with a frictionless user experience.

    Join security experts from CA Technologies and Deloitte in a discussion on how leading retailers are addressing these challenges and how a comprehensive Omnichannel Access solution can enable you to engage your customers in a secure and frictionless fashion across multiple devices and channels.
  • 3D Secure: It’s All About the Data - Hosted by CardNotPresent.com 3D Secure: It’s All About the Data - Hosted by CardNotPresent.com Jonathan D. Hancock, TSYS; James Jenkins, CA; Paul Dulany, CA; Steve Casco, CardNotPresent Recorded: May 31 2016 56 mins
    3D Secure is “primed for ignition” … especially in the U.S., where the migration to EMV chip cards has resulted in an upward trend of card-not-present (CNP) fraud. In fact, it is estimated that in the U.S. alone, CNP fraud will reach approximately $7 billion by the year 2020.

    What many card issuers may not know is that 3D Secure is an ideal solution to combat this specific type of fraud. What’s more, card issuers can leverage the enhanced data set available with 3D Secure to support a broader fraud strategy across CNP, brick and mortar, and even omni-channel segments.

    Want to learn more? Join us to explore:

    • How 3D Secure has evolved since its introduction and common misconceptions about this protocol
    • Where to properly utilize various types of data available within 3D Secure and how it can enhance an overall fraud strategy
    • What industry experts say about the impact of 3D Secure data and existing partnerships to support U.S. issuers

    Panelists:
    •Jonathan D. Hancock, Fraud & Risk Management Solutions Director, TSYS
    •James Jenkins, NA Sales Director, CA Technologies
    •Paul Dulany, Data Science VP, CA Technologies
    Moderator:
    •Steve Casco, Founder, CardNotPresent.com
  • Closing Network Backdoors: Best Practices to Control Third-Party Risks Closing Network Backdoors: Best Practices to Control Third-Party Risks Dale Gardner, Director, CA Technologies Recorded: May 25 2016 60 mins
    In up to two-thirds of security breaches, stolen or compromised user credentials belonging to a privileged user with wide-ranging access to sensitive systems, served as the initial attack vector. In this way, attackers can steal sensitive data and wreak havoc. While you must provide access to third parties, you must also manage such high-impact security risks. Join us to learn the top five best practices for regaining control of third-party access, and the processes and technology necessary to stop unauthorized access and damaging breaches.

    In this webcast, you’ll learn:

    - The identity, access, and security governance processes needed to protect your network
    - How to ensure positive user identification to prevent credential theft and misuse
    - Techniques to limit access to only those resources required to satisfy work or business requirements
    - Preventing the unauthorized commands — and inadvertent mistakes — threatening your network
    - Establishing monitoring procedures that flag violations and speed forensic investigations

Embed in website or blog