Security Challenges Facing Enterprise Manufacturers and Global Supply Chains
As manufacturers integrate their internal business process systems with those of contract manufacturers, suppliers, customers, and employees in order to reduce operations costs, they are met with increasing security challenges related to the protection of intellectual property and corporate informat
As manufacturers integrate their internal business process systems with those of contract manufacturers, suppliers, customers, and employees in order to reduce operations costs, they are met with increasing security challenges related to the protection of intellectual property and corporate information, and the revenue loss associated with the production of counterfeit market goods. Manufacturing effectiveness requires a solution that offers security, cost-effectiveness and scale in order to meet the evolving demands in this market. In order to meet these demands vendors often leverage industry compliant digital identities in infrastructure to meet their needs, such as the use of digital identities to protect; chips, hard drives, printer components, mobile devices, smart meters and a host of manufactured goods.
Join Clark Crain, CTO Nuspire Networks and Mark Yakabuski, VP of Product Management SafeNet, for a discussion on the importance of using hardware security modules in secure manufacturing environments. Hardware Security modules are the Trust anchor for protecting digital identities. Mr. Crain has worked in the trenches of the automotive industry, overseeing and crafting security policy for brands like Delphi, Chrysler, General Motors and various global automotive suppliers such as Siemens Automotive. Clark has a wealth of experience in building sustained, flexible, seamless and compliant security solutions in the global manufacturing, distribution, supply chain, and global retail space. Mark Yakabuski is a veteran of the security industry and has over 12 years of security experience developing digital identity solutions. Throughout his tenure at SafeNet, Mark has worked to successfully deploy secure manufacturing environments for a global network of partners and customers. Mr. Yakabuski is currently the Vice President of Product Management for the Hardware Security Module business unit at SafeNet.
RecordedJun 6 2012
Your place is confirmed, we'll send you email reminders
Creating seamless digital experiences for customers can require hundreds of systems and services to work together. Not only do you have to worry about your own internal systems, but now in the world of APIs and microservices you also have to worry about how these external systems are going to work with yours.
Testing dependencies on 3rd party services presents unique challenges. Many 3rd parties charge access fees for test interfaces and the availability and performance of the interfaces may not be the same as the production versions.
Learn how service virtualization can be used to:
•Virtualize 3rd party services so they are accessible all the time without fees
•Replicate production like dependencies for testing
•Reproduce production defects for faster remediation
•Eliminate scheduling conflicts and enable parallel development
•Generate virtualized data
Working in QA and testing has never been more challenging. Development is turning out new code faster than ever, and test backlogs just keep piling up. Errors that make it into production then need to be traced and fixed, adding to the backlog.
Discover how test automation, service virtualization, and test data management can help you make your testing more agile—and permanently eliminate the excuses.
You will learn how to avoid these common excuses with the following skills:
•The dog ate my data: Simplify test data management and increase test coverage
•That application was before my time: Automate tests for poorly documented systems
•Nobody told me that: Improve test case requirements with visualization
•I didn’t have time to test that: Accelerate testing with test automation and open source code
•It worked fine on my machine: Use service virtualization to create production-like test environments in minutes
Chef Compliance lets you express your compliance rules as code. You can easily run those rules as tests whenever you want. You get immediate feedback on whether your servers are configured as they should be.
Chef Compliance scans your servers to see if they are configured in accordance with your rules and generates a report that identifies the issues it found. You can then use Chef to remediate those problems.
In this webinar, Joe Gardiner will demonstrate how Chef Compliance works by scanning a default installation of RHEL 7.0 on the public cloud to see if it is CIS compliant. After the scan identifies the problem areas, Joe will use Chef to bring the server in line with the CIS benchmarks.
You’ll also learn about an offer from Chef to help you perform a scan of your infrastructure and get you started on the road to compliance.
Moving to the cloud can be daunting; often organizations struggle understanding where to begin and the steps required to realize a migration. In this one hour webinar, Google's migration architect, Peter-Mark Verwoerd will walk through a framework on how to assess cloud migration. Though the course of this presentation, you will also become familiarized with the services offered by Google Cloud Platform.
Don’t miss part two of our Subversion and Git High Availability webinar series taking an in-depth look how global enterprises are achieving 100% availability with Subversion and Git.
Global enterprises demand highly available SCM systems to power their development and delivery pipelines, but what does it take to get 100% availability with Subversion or Git? In this webinar we’ll take a look at best practices and hardening techniques learned from years of administration experience.
Our Senior Product Manager and resident expert Doug Robinson will share details such as:
Enterprise SCM requirements
Achieving greater than 99.9% availability
Best practices for enterprise SCM deployment
Joe Pindar, Director of Strategy, CTO Office, Gemalto
Many companies are making big investments in Cloud Foundry with providers such as Pivotal, IBM Bluemix, and GE Predix. The Cloud Foundry platform-as-a-service makes it easier for companies to build, test, and deploy applications more quickly – allowing them to focus on adding business value. This webinar will give an overview of how developers can build enhanced security into their applications using hardware security modules as the root of trust for their encryption and cryptographic operations.
RSA’s Data Protection Manager (DPM), BSAFE and tokenization products are quickly approaching EOL/EOPS, presenting RSA customers with an opportunity to reassess their encryption key management architecture and needs. With so many technologies available today that seemingly offer the same capabilities, how do you select the vendor and solution that is right for you?
Join Stephen Kingston, Product Manager for SafeNet KeySecure, Gemalto, where you will learn how you can:
• Benefit from proven, successful RSA to Gemalto migration use cases, including Healthcare, PII Protection and Retail PoS applications
• Easily migrate with the same one-to-one functionality offered by SafeNet KeySecure and SafeNet Data Protection Connectors
• Avoid encryption silos with a centralized key manager whether on-premises, virtual, or in the cloud
• Painlessly expand your encryption solution as your future needs grow, be it files, databases, applications, or tokenization
• Quickly get started with our 5 easy migration steps
Adrian Davis, MD (ISC)² EMEA; Jason Hart, CTO Gemalto; Tom De Cordier, Lawyer and Partner, CMS DeBacker
Until recently, EU data protection laws mainly focused on data subject consent, proportionality, purpose limitation, transparency, etc. Information security, however, was very often deemed to be an area for the techies, not an area of legal compliance.
This will change as a result of two recent and major pieces of EU legislation: the General Data Protection Regulation (GDPR) and the Network and Information Security Directive (NIS Directive).
Under the GDPR and the NIS Directive, businesses and operators of essential services (eg. hospitals; airports; etc.) will have to implement robust information and system security measures. In addition, the new rules contain a new name-and-shame mechanism: businesses and operators will have to inform the relevant authorities of security incidents. And they will have to inform the affected data subjects, unless the affected data were rendered unintelligible (for example by means of encryption).
Finally, the EU wants the new data protection rules to become a board-level issue and it has therefore decided to make the rules subject to hefty fines:
•If a business fails to comply with its data security obligations under the GDPR, it may get a fine of up to 10,000,000 EUR or 2 % of its total worldwide annual turnover, whichever is higher.
•Worse even, if a business is found to be in breach of certain other obligations under the GDPR, the fine may go up to a dazzling 4 % of its total worldwide annual turnover.
During this webinar, you will learn from Jason Hart, CTO at Gemalto and Tom De Cordier, an expert in data protection and information security law at CMS in Brussels, what the new rules mean in practice and what businesses should do to bring themselves in line with the upcoming requirements.
Moderator: Adrian Davis, (ISC)² EMEA; Speaker: Jason Hart, IDP CTO, Gemalto
Every day, we create 2.5 quintillion bytes of data — so much that 90% of the data in the world today has been created in the last two years alone.
More data in more places is leading to an increasing number of data breaches with attackers intent on trying to monetize your sensitive information.
Jason Hart, IDP CTO at Gemalto will explain why data is the new oil and how easy it is to get hacked with a live hacking demo.
In this interactive webinar we will also discuss:
- Why your data is wanted
- The new data Protection paradigm
- Live Hacking demo
- What’s next and what to do now to remain on the safe side
Join the webinar to find out what you should know about Data Protection, how Cloud, IOT and big data impact your information security solutions and to how to keep your data safe.
Organizations today need to employ cloud services in their day-to-day operations, but determining where to start and what works best is not an easy task. To build a hybrid-cloud platform, one must take into consideration a variety of factors including security, location, application requirements, and costs. Join us on April 21st to gain expert advice to help determine what mix of private and public clouds is right for you.
Stephen Helm, Sr Product Marketing Manager - Gemalto
Code signing protects the Devices we use every day; in devices you expect as well as ones you may not have thought about. Code signing is used heavily in transportation; cars, planes, busses, tractors, etc all leverage code signing on various parts to ensure from the manufacturer that they are all up to spec, safe and have a valid origin.
As the Internet of Things expands so does the need for trust that the code comes from the correct source. From Fridges to Bridges, Satellites to street lights, code signing is everywhere. Unfortunately, our adversaries have started to recognize value of stealing the sensitive cryptographic keys that underpin the code signing process.
Join Gemalto on this webinar to learn:
•The value of code signing in IoT
•How hackers are increasingly trying to steal signing keys
•Methods for high-assurance code signing
The breach is going to happen and when it does, you better make sure you are prepared. When your mission-critical applications such as industrial control systems are hacked, it’s not only about data being exposed. By injecting data into the system, the hacker can override the entire system and even shut it down. Join us on April 12th at 10am EST to learn how to prevent this happening through a layered security approach that includes encrypting your data in motion and at rest, and the cryptographic keys that secure it, while ensuring only authorized personnel can access the systems.
Adrian Davis, Managing Director (ISC)² EMEA; Joe Pindar, Director of Strategy in CTO Office, Gemalto
The Safe Harbor agreement allowed American and European countries to share personal data. This agreement is now invalid and a new one has taken its place. This not only impacts the ways companies conduct business and make their IT decisions, but also how they set up their data protection infrastructures.
This webinar will present:
• New proposed regulations
• Business implications
• A solution to stay compliant and avoid penalties
Join (ISC)² and Gemalto in this webinar to find out what you should know about the Safe Harbour agreement, how its invalidation impacts you and how to be compliant with the new EU regulation framework.
Konstantin Rabin (Kontomatik), Paul Hampton (Gemalto), Rashee Pandey (Bankable), Anders La Cour (Saxo Payments)
Moderator Konstantin Rabin will provide general numbers on the payment industry, will take a look into start-up fundings and some examples of innovative companies in the payments industry.
Then, he will ask the esteemed panel of experts the following questions:
1) What are the main drawbacks of the current payment options?
2) What should be the primary focus of the innovation in payments and why? (speed, cost reduction, transparency or anything else)
3) Name a greatest innovation in payments happened till date
4) Importance of cryptocurrencies in the realm of payments
5) How do millennials change the way payments are going to develop?
6) What are the main obstacles that prevent innovation in payments? (regulation, lack of funding, absence of common technology or anything else )
7) What is more important to innovate, online or offline payment systems?
8) What is the most crucial part of the Payment Service Directive 2? (or perhaps any other local directive)
9) How large will be a share of businesses using alternative payments in 3 years from now?
10) How would just a regular payment look in 2026?
The evolution of banking systems has led to a surge in digital banking and has drastically changed the security regulatory landscape. Banks are now required to understand and comply with a slew of new regulations which are affecting all areas of banking but specifically security, risk management, how to authenticate users and protect data and services. During this webinar, we’ll review the latest trends in EU regulations, the implications they have for banks and discuss best practices on how banks can effectively and efficiently comply with evolving requirements.
As the switch to the cloud blurs the boundaries of the traditional enterprise security perimeter, organizations are challenged with maintaining visibility into access events and enforcing consistent access controls across their data estate, which spans on-premises, virtualized and cloud-based applications. Applying uniform authentication policies on different types of applications may often require diverse integration methods, such as the RADIUS and SAML 2.0 industry standards, as well as custom agents or APIs. In this webinar, you will learn how Office 365, AWS Workspaces and SFDC—as well as other SaaS applications—can be easily secured using SafeNet Authentication Service.
Growing concern over climate change, increasing utility prices and the availability of sustainable energy like solar are driving increased demand for conservation, pricing transparency and cost savings. Smart energy solutions provide real time visibility into consumption and billing data helping consumers to conserve resources, while energy and utility companies are better able to balance production to meet actual demand reducing brown outs and other potential issues. At a time when energy utilities play an increasingly important part of our everyday lives, smart grid technologies introduce new security challenges that must be addressed.
In this webinar we will discuss:
•The threat landscape
•Addressing security challenges in critical infrastructure with cryptography and strong authentication
•Compliance with NERC CIP Version 5
•The road ahead
Gemalto surveyed 900 IT decision makers from around the globe on the subject of securing user mobility. Our findings reveal that although most organizations (97%) recognize the importance of mobility in their work practices, 92% still restrict access to resources from mobile devices. Not only were mobile access challenges uncovered, but with 20% of support tickets resulting from lost or forgotten passwords, identity management hurdles were uncovered, as well. Based on the Gemalto 2015 Authentication and Identity Management Index survey results, this webinar covers obstacles encountered by IT leaders in their quest for greater mobility, and four takeaways on how they are overcome.
Jason Hart, VP Cloud Solutions, SafeNet, Larry Ponemon Chairman and Founder of the Ponemon Institute
Join Gemalto in collaboration with Ponemon on December 2nd as we reveal recent study results on how hackers are attacking the cloud.
This presentation will use live demos to show how vulnerable cloud and virtual environments can be without the correct controls. Examples will include the following topics:
•Do companies really know how to store data in the cloud?
•The need for multi-factor authentication and why software keys are not good enough
•Data governance rules and regulations
Gorav Arora – Director of Technology, Data Protection - Gemalto
IT organizations face rising challenges to protect more data and applications in the face of growing data security threats as they deploy encryption on vastly larger scales and across cloud and hybrid environments. By moving past silo-constrained encryption and deploying encryption as an IT service centrally, uniformly, and at scale across the enterprise, your organization can benefit from unmatched coverage— whether you are securing databases, applications, file servers, and storage in the traditional data center, virtualized environments, and the cloud, and as the data moves between these different environments. When complemented by centralized key management, your organization can apply data protection where it needs it, when it needs it, and how it needs it—according to the unique needs of your business. Join us on November 10th to learn how to unshare your data, while sharing the IT services that keep your data secure, efficiently and effectively in the cloud and across your entire infrastructure.
Adrian Davis, Managing Director, (ISC)² EMEA; Joseph Pindar, Senior Product Manager, Gemalto
The Internet of Things (IoT) promises to deliver better user experiences and increased efficiencies for business. But get the security wrong, and you will have a global recall on your hands with a large fine attached. Join (ISC)² and Gemalto-Safenet on November 3rd to learn how the Internet of Things will play a role in your future and what changes will be happening in security.
Employees are increasingly working out of the office. More and more of them are using mobile devices and logging in to cloud applications to perform business tasks. All this is creating a shift in habits termed ‘Enterprise Mobility’. Industry advancements in authentication and access management present new opportunities for organisations to increase their mobility posture.
Join (ISC)² and Gemalto in this webinar to find out how you can take advantage of a few guidelines to provide your employees with convenient, secure and compliant mobility.
Jason Hart, CTO of Data Protection, Encryption Products - Gemalto
Last year, hackers targeted retail companies and their POS systems to steal vast amounts of credit card and financial data. This year, things have changed as cyber criminals are now going after identities, making data breaches much more personal. While credit cards can be easily replaced, personal identities cannot. This webinar looks at the major data breach trends in 2015. Who is doing the hacking, how they are doing it, and what industries are being targeted most. In addition, listeners can get a new understanding of how to approach to data security and “Secure the Breach”.
Lemuel Williams - Channel Development Manager, Identity & Data Protection - Gemalto
IT security risks are changing, and undoubtingly increasing in complexity and frequency. Enterprises across the globe are struggling to not only keep up, but to maintain a secure network environment. From a recent breach by hackers to gain sensitive information of more than 100,000 taxpayers, to the breach of 110 million consumer records, the cyber threat landscape is getting worse every year. Hackers are faster, and organizations are taking longer to discover the breaches, giving thieves hours, days, and even weeks to explore the most private and sensitive company data.
Gemalto has identified key steps to help secure your enterprise network, certainly one of the first areas fraudsters attempt to infiltrate.
Join us on September 15th for an informative presentation that will help you plan a strategy to protect your most critical assets.
SafeNet is the only company trusted to protect the world’s most sensitive commercial and government assets. We do this through solutions that persistently protect throughout the information lifecycle and evolve to support changing business and market requirements without disruption.