Hi [[ session.user.profile.firstName ]]

Gemalto SafeNet APAC Data Security

  • Date
  • Rating
  • Views
  • The Big Challenge of Big Data: Untangling the Security Conundrum The Big Challenge of Big Data: Untangling the Security Conundrum Alex Hanway, Marketing Manager for Encryption at Gemalto Recorded: Dec 1 2016 39 mins
    Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they break many of the traditional security approaches and spark questions like:

    With massive volumes of data, how are organizations going to ensure that their customer information is safe from people looking to exploit it?

    Is it possible to adopt big data technologies while demonstrating compliance with industry regulations?

    Will security get in the way of the analytics tools?

    How can security apply to different data consumption technologies like Hadoop and NOSQL?

    Join Gemalto on Thursday, December 1, 2016 as we discuss what’s in store for the ‘big data’ technologies of the future and how security models like encryption can solve the security conundrum.
  • GDPR Blueprint; Tackling Confidentially, Integrity and Availability of Data GDPR Blueprint; Tackling Confidentially, Integrity and Availability of Data Jason Hart, CTO, Identity and Data Protection, Gemalto, Adrian Davis, Managing Director, (ISC)² EMEA Recorded: Nov 24 2016 63 mins
    The new EU regulation of the Privacy world (the GDPR) is rapidly approaching. This webinar will reveal a back to basics approach in relation to GDPR. Specifically, Jason Hart - Gemalto CTO will identify a GDPR blueprint that tackles the privacy concerns around confidentiality, integrity and availability of sensitive data.
  • Digital Banking: Customizing security to avoid customer fatigue Digital Banking: Customizing security to avoid customer fatigue Philippe Regniers, Director of Marketing for Online Banking and Payments Recorded: Nov 16 2016 37 mins
    A convenient and consistent online user experience breeds trust in a service. How it’s executed can alter a user’s perception either positively or negatively. When it comes to online security, consumers have different perceptions. What banks want to avoid is “security fatigue.”

    Risk management systems make sensitive online transactions more user friendly by customizing security in response to the risk. The real-time assessment of a user’s transaction is instantly evaluated and an authentication step can be sent if needed. Adapting strong authentication to the online transactions improves the customer experience and avoids fatiguing your users with security if it’s not necessary.

    Not all online transactions are created equal, so successful security solutions need to be intelligent and smart. Join us for a webinar on Tuesday November 16, 2016 as we discuss:
    •What not to do when it comes to online banking security
    •How to build a customized risk-based authentication process
    •Security as a business enabler
    •The influence of a user’s security persona toward risk
  • Data Breaches 2016: Make Your Data Worthless Data Breaches 2016: Make Your Data Worthless Jason Hart, CTO of Data Protection at Gemalto Recorded: Nov 9 2016 34 mins
    Last year, cyber criminals started turning their focus to hacking people’s personal information. This year, more than half of all data breaches are identity theft. Hackers have been targeting government databases to get the information. It’s currently the industry with the largest number of records stolen and/or compromised. The cyber criminal’s shift from credit card and financial data to personal information begs the question “how much is your identity really worth?” While it might start as a nuisance, the true impact of identity theft to an individual can be catastrophic and costly. With the Internet of Things taking off and the number of connected devices increasing, it is important to make your data worthless to fraudsters. This webinar looks at the major data breach trends in 2016. Who is doing the hacking, how they are doing it, what needs to be protected in the Internet of Things era and what data is under attack. In addition, listeners can get a new understanding of how to approach data security and “Secure the Breach”.
  • GDPR – The monster under the bed or an opportunity to enhance security? GDPR – The monster under the bed or an opportunity to enhance security? James Leaton Gray, The Privacy Practice, Jason Hart, Gemalto, Adrian Davis, (ISC)² Recorded: Oct 13 2016 62 mins
    The new EU regulation of the Privacy world (the GDPR) is frequently portrayed as a scary and formidable piece of legislation that’s going to rock the online & off-line world. This webinar will explore what the implications really are. How much will change from the present regime? How difficult will it be to comply? Also is there an opportunity hidden in the challenge? And where will security and security professionals fit in the new picture?
  • Their Cloud. Your Data. The Global State of Cloud Data Security Their Cloud. Your Data. The Global State of Cloud Data Security Dr. Larry Ponemon Chairman & Founder The Ponemon Institute, Joe Pindar Director of Strategy, CTO Office Gemalto Recorded: Jul 28 2016 36 mins
    This webinar will discuss the recent findings of a global cloud data security study conducted by the Ponemon Institute on behalf of Gemalto. The study surveyed 3,476 IT and IT security professionals in the United States, United Kingdom, Australia, Germany, France, Japan, Russian Federation, India and Brazil about the governance policies and security practices their organizations have in place to secure data in cloud environments. The findings will reveal adoption trends for IaaS, PaaS and SaaS; the prevalence of Shadow IT; the role of data governance; and data security practices in the cloud, including the usage of encryption and multi-factor authentication. In addition, participants will also learn new data security strategies that can help them realize the benefits of the cloud while protecting sensitive applications and information in cloud.
  • Breach Prevention is Dead - Long Live the Secure Breach Breach Prevention is Dead - Long Live the Secure Breach Jason Hart, CTO, Data Protection - Gemalto Recorded: Jul 12 2016 38 mins
    Today’s changing and sophisticated threat landscape and increasing use of the cloud and mobile devices have rewritten the rules of data security. However, many companies continue to rely on breach prevention as the foundation of their security strategies. If one thing has been learned in recent years it is that data breaches are inevitable, and that is why IT organizations must shift a from mindset that is entirely focused on Breach Prevention to Breach Acceptance and finally to a Secure the Breach approach to data security. This presentation will review why IT professionals need to adopt a new data security mindset if they are to effectively protect sensitive information and users accessing it using a three step process of securing user access, encrypting sensitive data, and secure management of encryption keys.
  • Security or convenience in digital banking? We want it all! Security or convenience in digital banking? We want it all! Frederique Richert, Marketing Manager, Digital Banking - Gemalto, Vincent Truffier-Blanc, Head of Market Research - Gemalto Recorded: Jul 7 2016 33 mins
    How closely are banks listening to their customers about their desire to embrace mobile services? Join Gemalto to understand firsthand what banking customers want and expect when it comes to mobile banking. During this session we’ll share the findings of a recent survey Gemalto conducted with more than 200 digital banking users. From the results we can get an in depth understanding of users’ attitudes to digital banking and their expectations of security, and can help banks fine tune their mobile offerings to address both security and convenience.
  • Next-Generation Security: Don’t Go Soft on Security in SDN Next-Generation Security: Don’t Go Soft on Security in SDN Stan Mesceda, Sr Product Manager – Gemalto Recorded: Jun 22 2016 50 mins
    Technologies like software defined networking (SDN) provide flexibility and efficiency, but where does security fit in? SDN, like any network can be attacked at each network component. And as bandwidths increase to 100G and beyond, the rate of data transfer and the risks escalate, both on the physical and virtual plane. So what can you do to protect your networks and the data that travels through them?
  • SAML – The Cloud Defender You've Never Heard Of SAML – The Cloud Defender You've Never Heard Of Mor Ahuvia, Product Marketing Manager, Authentication - Gemalto Recorded: Jun 15 2016 35 mins
    The cloud provides an easy way for companies to consume and manage colossal amounts of data, but is it secure? SAML—the Cloud Defender You never Heard Of--can make sure it stays out of the hands of hackers and fraudsters.
    What is SAML? How does it work? And how can it protect all your favorite cloud apps, while keeping citizens happy and slashing helpdesk workloads? Join the webinar on Wednesday, June 15th to learn how to extend identities to the cloud with SafeNet Authentication Service’s native identity federation, which lets IT administrators manage a single identity per user, for all cloud, virtual and on-premises applications. SafeNet Authentication Service extends strong authentication to Office 365, Salesforce.com, Dropbox, Google Apps, Amazon Workspaces, Jira, ZenDesk, and 100s of other cloud applications.