Security Challenges Facing Enterprise Manufacturers and Global Supply Chains

Clark Crain, CTO Nuspire Networks and Mark Yakabuski, Vice President Product Management - HSM, SafeNet
As manufacturers integrate their internal business process systems with those of contract manufacturers, suppliers, customers, and employees in order to reduce operations costs, they are met with increasing security challenges related to the protection of intellectual property and corporate information, and the revenue loss associated with the production of counterfeit market goods. Manufacturing effectiveness requires a solution that offers security, cost-effectiveness and scale in order to meet the evolving demands in this market. In order to meet these demands vendors often leverage industry compliant digital identities in infrastructure to meet their needs, such as the use of digital identities to protect; chips, hard drives, printer components, mobile devices, smart meters and a host of manufactured goods.

Join Clark Crain, CTO Nuspire Networks and Mark Yakabuski, VP of Product Management SafeNet, for a discussion on the importance of using hardware security modules in secure manufacturing environments. Hardware Security modules are the Trust anchor for protecting digital identities. Mr. Crain has worked in the trenches of the automotive industry, overseeing and crafting security policy for brands like Delphi, Chrysler, General Motors and various global automotive suppliers such as Siemens Automotive. Clark has a wealth of experience in building sustained, flexible, seamless and compliant security solutions in the global manufacturing, distribution, supply chain, and global retail space. Mark Yakabuski is a veteran of the security industry and has over 12 years of security experience developing digital identity solutions. Throughout his tenure at SafeNet, Mark has worked to successfully deploy secure manufacturing environments for a global network of partners and customers. Mr. Yakabuski is currently the Vice President of Product Management for the Hardware Security Module business unit at SafeNet.
Jun 6 2012
45 mins
Security Challenges Facing Enterprise Manufacturers and Global Supply Chains
More from this community:

Application Development

  • Live and recorded (1476)
  • Upcoming (25)
  • Date
  • Rating
  • Views
  • HP Propel on-premise was introduced in the summer of 2014, and since then, its set of features is growing at a brisk pace. Join us for this webinar and learn about our newest features from the HP Propel 1.1 release. We will discuss the new Jumpstart module which helps you extend the portal so that you can provide more services to your business users without increasing costs or resources. You will hear about our SDK (Software Development Kit) module for Service Exchange which enables you to modify the existing connectors or create brand new integration.

    This session will include live demos of:
    HP Propel portal and aggregated catalog, including the composite bundling from different catalogs
    Case exchange
  • Mobile is no longer a supplementary channel for the enterprise; It is quickly becoming the primary channel to deliver business critical information and experiences to partners, customers and employees. Join Sarvesh Jagannivas, VP of Product Marketing at MuleSoft, and Uri Sarid, CTO at MuleSoft, as they discuss the mobile enterprise opportunity, and the biggest challenges preventing successful mobile delivery.

    Join this webinar to learn:
    - Why mobile applications are the new imperative for the enterprise
    - The top challenges preventing rapid, scalable and secure mobile application development
    - Three case studies of industry leaders who are building mobile enterprises
  • SaaS-based applications like Salesforce.com are increasingly relevant to companies to compete and grow their business. However, the opportunity of faster time to value and availability offered by Cloud and SaaS comes with an urgent need to automate the application development and release processes. Learn how CA’s internal IT team used CA Release Automation to reduce software release times by simplifying and standardizing the release process and minimizing errors.
    oAn 80% reduction in release errors during deployment
    oSoftware release times reduced by 4-5x times
  • Building your own connector may be a good option to explore whether you need a connector with a specific functionality or want to connect to a system without a pre-built connector. While getting started can seem daunting at first, the challenge often becomes much more manageable when you understand the tools and resources that are available.

    Join this webinar to:
    - Get an introduction to MuleSoft’s SDK, DevKit
    - Watch a demo on how to build a reusable connector in 15 minutes
    - Get tips and advice from experts who’ve successfully built connectors using DevKit
    - Learn what’s coming in the roadmap
  • The ROI numbers don’t lie. Service virtualization technology is critical to the success of a vibrant application economy. That’s the conclusion from voke, Inc. on their research of 500 companies across the globe. Organizations using service virtualization experience reduced defects and software lifecycles, and increased customer satisfaction.

    Specific ROI data from companies surveyed include:
    •46% reported a 41% or greater reduction in TOTAL defects
    •More than one-third reduced test cycle times by 50% or more
    •36% reported a 41% or greater reduction in production defects
    •More than 25% at least doubled test execution rates

    Hear service virtualization should be a cornerstone of testing automation to remove the barrier to releasing software faster and with greater quality.

    voke, Inc., will review the research showing how service virtualization is an essential technology with a strong and proven ROI used to deliver software that drives optimal business outcomes and removes constraints throughout the software delivery lifecycle.
  • The answer is YES! The ‘I’ in team doesn’t represent one single person in the apps development plan, rather it highlights the transformation of the once silo’d teams who support specific functions within the app lifecycle. The straight line of the ‘I’ symbolizes the one team approach that is making DevOps successful. Operations people are showing up in the testing phase of the application and the apps people are doing some measures and monitoring in operations. Recently, TechTarget named DevOps as one of six major data center trends for 2015. DevOps is no longer a new way to think about transformation; it is the ONLY way to bring together the silos that weigh down your business’ bottom line.

    Join our lively panel discussion with DevOps industry experts Paul Muller and Damon Edwards as they discuss:

    Common problems in traditional DevOps teams
    How these teams have changed to truly transform and become innovators
    How you can apply these ideas to your business to boost your bottom line
  • Many organizations have not been able to demonstrate that they have effective compliance management. In this session Stu Henderson describes failed attempts at compliance management, the factors causing the failures, and what you can do to develop effective compliance management. Recommendations will address relevant changes in technology, regulation, and tools, as well as organizational and procedural issues. Stu's practical recommendations are based on over a decade of observing real-life mainframe security practices, and the factors blocking their effectiveness. If you are a CISO, mainframe auditor, or the person responsible for regulatory compliance, you will learn useful steps you can take to improve the quality of your compliance and your ability to demonstrate it!
  • What’s new in ALM and Quality Center 12.2—Enhancing your teams efforts to delivering amazing Apps with confidence

    In March of 2014, HP Software released Apps 12, bringing a new standard of efficiency, ease of use and insight for application teams working to deliver high quality applications fast with confidence. Now, we are doubling-down on this experience and launching HP ALM and HP Quality Center 12.2, continuing to break new ground in ease of use, expanding the web client experience and driving simplified reporting and business rules support to meet your unique organizational needs.

    Join the HP ALM team as we walk through the key newly released capabilities of ALM and Quality Center 12.2 and visually demonstrate the enhanced user experience and web feature set.
  • Virtualization has come a long way since just being able to offer more efficient resources and improved HA. You’ve already invested heavily in VMware technology, but are you really getting the most from what they have to offer? Naturally you can’t be experts in everything, so join this session with Rackspace, the VMware specialists, as Lindsay shows you how to fully benefit from the latest developments and enable you to offer IT as a more cloud-like experience, without having to re-write any of your applications.

    o Understand the benefits of an Outsource model v’s On-Premise

    o Critical Success Factors to consider when outsourcing IT to managed hosting or the cloud

    o How to start your journey to the Managed Infrastructure Services

    o DR-to the-Cloud: Best Practices

    o VMware Dedicated vCenter, Server Virtualization and Dedicated VMware vCloud offerings
  • Channel
  • Channel profile
  • IAM and Authentication Trends in 2015 Mar 24 2015 2:00 pm UTC 75 mins
    The Identity and Access Market (IAM) is undergoing exciting changes. Increased cloud adoption, cyber-threats and the speedy adoption of mobile computing is affecting how enterprises approach access security and authentication.

    Getting insight into these trends can help you prepare your organization for better and more effective Identity and Access policies during the coming year.

    Join us on for a webinar on “IAM and Authentication Trends in 2015”, on March 24, 2015, where you can hear all about Identity and Access trends and developments from an industry expert.
  • Stop SSL-Encrypted Attacks in their Tracks! Mar 17 2015 4:00 pm UTC 45 mins
    Join us on March 17th to learn how SafeNet Luna HSMs integrate with F5 Networks Firewall Platforms to protect the integrity of the SSL communications.
  • Security and The Internet of Things Recorded: Feb 17 2015 64 mins
    The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. Join us on February 17th to learn how the Internet of Things will play a role in your future and what changes will be happening in security.
  • Building a Crypto Foundation Recorded: Jan 29 2015 57 mins
    Building a Crypto Foundation
  • The Cyber Security Playbook: Securing Budget and Forming Allies Recorded: Jan 20 2015 49 mins
    As a defender of sensitive information, you are no stranger to the ever-changing breadth of security threats your organization faces. Not only are you expected to protect sensitive corporate and customer information from those threats, you are also expected to support massive IT infrastructure changes around where sensitive data is being stored and who and how it can be accessed. All of this with little internal enthusiasm for new projects and a stagnant security budget!

    Whether you are a CISO, CIO, or any employee responsible for protecting sensitive information it is time to fight for the resources you deserve!

    This session will reveal new strategies for:

    •Finding financial and operational support for information security initiatives across the organization;
    •Enlisting new, and at times, surprising allies for your information security projects;
    •Building a virtual team of ‘defenders’ across the organization.

    REGISTER TODAY for this insightful best practices session
  • The 6 Vulnerabilities of the Retail Payment Ecosystem Recorded: Dec 9 2014 40 mins
    The retail payment ecosystem is a complicated and highly vulnerable system filled with multiple stakeholders responsible for security, such as hardware device manufacturers, software application providers and financial institutions. As a retailer, you rarely control the security for each piece of the payment ecosystem. But you still need to know everything about the process including:

    •The 6 ways your data is most vulnerable
    •How your data could be attacked
    •Which security stakeholder is responsible for protecting your data
    •What security solution should be implemented

    Join our live webcast on December 9th for more information on the vulnerabilities of the retail payment ecosystem, and what they mean for all security stakeholders, especially retailers.
  • Encryption and Payments: How Recent Breaches are Changing the Approach Recorded: Dec 3 2014 73 mins
    We’re sure you’ve all heard about it in the news. With more than 2 billion records lost or stolen since 2013, how can you be sure your organization’s current security scheme will stand up against malicious attacks?

    Join SafeNet’s webinar, “Encryption and Payments: How Recent Breaches are Changing the Approach to Data Protection in the Payment Ecosystem” to learn how your organization can improve its current strategy. Encryption and tokenization have long been used to secure transactions that occur in the payment ecosystem, but our HSM experts will discuss how to take this approach to the next level. By dissecting the payment ecosystem, we’ll uncover a variety of vulnerabilities in the current process and demonstrate how to use encryption and key management more effectively.
  • Secure Enterprise & Cloud Applications w/ SafeNet Next Generation Authentication Recorded: Oct 29 2014 42 mins
    The ability to access any corporate application, whether it resides on the network or in the cloud, ensures your employees have mobility and business agility. Anywhere, anytime remote access from any device however, increases management loads for IT professionals and obscures visibility into which employees are accessing what applications – and when.

    Next Generation Authentication from SafeNet offers frictionless authentication delivered from the cloud, combined with transparency, trust and control, allowing you to secure access to diverse applications and meet security regulations in a shifting IT landscape.

    Featuring fully automated processes and support for a broad IT eco-system, frictionless authentication empowers organizations to protect numerous applications with strong authentication. A broad range of authentication methods and form factors ensures optimal risk mitigation and end user satisfaction.

    Join us to find out how Next Generation Authentication from SafeNet let’s you more easily secure more applications, protect more identities - and adapt to changing IT environments – while achieving the right balance for your business and security needs.
  • Busting the Top 5 Myths of Protecting Data in Motion Recorded: Oct 8 2014 59 mins
    Fibre tapping is on the increase due to the high success rate currently enjoyed by cyber criminals targeting data in motion. A recent survey* conducted by Trustwave and published in their 2013 global security report, found that “Attackers were more successful at maintaining persistence and harvesting data in transit than they were at attacking stored data. Despite this a recent Spiceworks survey* of IT pros found that “29% of respondents are not encrypting ANY data in motion.”

    Add to this that high profile fibre tapping cases are becoming public news and increasing, and all of this contributes to the real need to protect data in motion from cyber threats.

    By protecting the data itself with encryption you render it useless to a 3rd party, but as with all technology applied to a business need, this brings about some common myths.

    Join this live webinar and hear Stan Mesceda, Senior Product Manager, High Speed Encryption, de-mystify the top 5 most common myths about protecting data in motion, listed below:

    •Ethernet is inherently secure/Fibre is not tappable
    •VPN/MPLS/IPSEC doesn't affect performance
    •My carrier is required to let me know if my data is breached
    •Encryption is complicated
    •Encryption is only affordable for the big guys

    Then following this discussion, learn about the business and technology benefits of encryption data in motion.

    Register today to join this insightful webinar

    *survey stats quoted are from the Trustwave 2013 Global Security Report and Spiceworks Voice of IT survey deployed to 200 IT pros worldwide conducted on behalf of SafeNet, July 2014
  • Ready or Not... The CJIS Mandate Is Coming! Recorded: Sep 19 2014 51 mins
    Is your agency ready? The CJIS Security Mandate is Coming!
    The deadline is almost upon us and there's not much time left to get your agency compliant. See how cloud-based solutions can provide quick and affordable ways to become compliant.

    Attend this webinar to learn:
    * What choices do you have for multi-factor authentication?
    * How can you meet this unfunded mandate with minimal upfront expense?
    * How do you make a system flexible to accommodate future unknown requirements?
  • High-Assurance Encryption: Key Security Best Practices Recorded: Jul 17 2014 46 mins
    Encryption is fundamental for security but it is only as strong as the protection afforded to the cryptographic keys. If the keys are compromised, the encrypted data can be compromised.

    By utilizing a hardware root of trust to secure cryptographic keys and provision encryption, decryption, authentication, and digital signing services, you can provide your agency with reliable protection for transactions, identities, and applications.

    In this webinar, you will learn how to protect your cryptographic keys by easily integrating hardware security modules to your applications to secure:

    PKI/Certificate Services
    Digital Signatures
    Database and File Encryption
    Web Services
    Cloud Services

    Join your fellow professionals for this best practice session on effective encryption key management.
  • Fibre Tapping: How to Protect Your Data in Transit with Encryption Recorded: Jul 8 2014 5 mins
    Fibre tapping is not child’s play but if you’re criminally minded, there are options such as Evanescent Fibre Coupling to expose data in flight across high speed networks. With a very small signal loss – less than 1% - it’s practically undetectable. SafeNet shares how to protect data in motion against fibre tapping with encryption in this new video.
  • Dropbox + Encryption Made Simple Recorded: Jun 24 2014 36 mins
    Dropbox isn’t coming to your company someday. It’s here, now. BYOD (Dropbox) has happened, as employees try to make it easy to collaborate and access documents on the go. While this transition may have happened without your IT organization’s involvement or buy-in, IT teams still have a critical role to play when it comes to protecting sensitive corporate documents. You may have even implemented other file sharing or storage applications internally--but are your employees using them?

    Join us for this webcast where we will discuss:
    • How to say YES to Dropbox usage for sensitive documents, while eliminating associated security risks
    • Key management and the importance of tapproof security when it comes to safeguarding corporate IP in the cloud
    • Recommendations to help you embrace Dropbox within your organization, while securing the workloads that you need protected
  • How Well Prepared Are You For The Next Security Threat? Recorded: Jun 18 2014 49 mins
    Each and every day you face the risk of your network being hacked by the newest zero-day threat. Not long ago, it was the HeartBleed bug and then the IE vulnerability. And, while you’re still working to defend your infrastructure from these two critical threats, the cybercriminal community is working just as hard trying to exploit the weaknesses of your network. So how well are you prepared for the next attack?

    Florian Malecki, Product Marketing & Solution Director for EMEA at Dell Software discusses the threat landscape and suggests ways that you can take advantage and achieve ongoing protection.
  • The Cyber Security Playbook: Securing Budget and Forming Allies Recorded: Jun 17 2014 49 mins
    As a defender of sensitive information, you are no stranger to the ever-changing breadth of security threats your organization faces. Not only are you expected to protect sensitive corporate and customer information from those threats, you are also expected to support massive IT infrastructure changes around where sensitive data is being stored and who and how it can be accessed. All of this with little internal enthusiasm for new projects and a stagnant security budget!

    Whether you are a CISO, CIO, or any employee responsible for protecting sensitive information it is time to fight for the resources you deserve!

    This session will reveal new strategies for:

    •Finding financial and operational support for information security initiatives across the organization;
    •Enlisting new, and at times, surprising allies for your information security projects;
    •Building a virtual team of ‘defenders’ across the organization.

    REGISTER TODAY for this insightful best practices session
  • Securing Your Mission Critical Data in Storage Recorded: Jun 11 2014 46 mins
    Security is top of mind for storage professionals and their CIOs today. As enterprises look for ways to maximize storage efficiency, performance and capacity, keeping data safe from both hackers and rogue employees, is vital. For cyber criminals, storage is a major target as this is where the sensitive, mission-critical, and most other data is available.

    So how do you keep your storage secure? Encrypting your data is the foundation to protecting your assets. But what else can you do to ensure seamless access for authorized users, while keeping everyone else out? Find out more in this interactive presentation.
  • High-Assurance Encryption: Key Security Best Practices Recorded: May 20 2014 33 mins
    Encryption is fundamental for security but it is only as strong as the protection afforded to the cryptographic keys. If the keys are compromised, the encrypted data can be compromised.

    By utilizing a hardware root of trust to secure cryptographic keys and provision encryption, decryption, authentication, and digital signing services, you can provide your agency with reliable protection for transactions, identities, and applications.

    In this webinar, you will learn how to protect your cryptographic keys by easily integrating hardware security modules to your applications to secure:
    •PKI/Certificate Services
    •Digital Signatures
    •Database and File Encryption
    •Web Services
    •Cloud Services
  • How Encryption Key Management Enables Data Center Transformation Recorded: May 15 2014 44 mins
    In the past, companies had limited options for encrypting data, and the products that managed the encryption keys were complex, single-purpose, and expensive. Today, a virtualized data center requires a more nimble approach: new encryption solutions have been developed to encrypt data, and more powerful solutions for managing all of the necessary keys are required.

    Blair Semple, CISSP-ISSEP, Director of Business Development at SafeNet, will discuss the role of key management in the enterprise storage ecosystem, best practices, and the recommended characteristics of solutions.

    With this session, you can prepare for a key management system that meets your needs for security, scale, flexibility, and operational efficiency—both today and well into the future.
  • Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control Recorded: May 14 2014 49 mins
    Forget the geeky analysis of cloud security; risk is driven by people involved and the approach to adoption. This discussion will tackle the complex issues around data ownership and control in the hands of customers, providers, law enforcement, intelligence agencies and a pantheon of adversaries.

    If data is destiny, then too many people are in charge of your fate.

    We discuss how to get it back.
  • Multiple authentication solutions, but are they all equal? Recorded: May 8 2014 42 mins
    How to map the Ideal Authentication Solution to your IT Environment

    Today’s IT environments have become the sum of multiples: Multiple applications to protect; multiple identities to manage and multiple endpoints to secure. Doing the math about how you secure access to numerous applications, the time you spend on provisioning tokens and the overhead invested in managing users may lead you to re-calculate how you would ideally like to run your authentication environment.

    Join your fellow professionals to understand how you can map the Next Generation Authentication solution to your IT environment, equating the key factors that determine your authentication needs with the ideal authentication solution.

    Then we will discuss:

    •Current market trends around collaboration, cloud and security
    •Vulnerabilities associated with unsecured file sharing tools
    •The role of strong authentication in securing collaboration and file sharing tools
    •Authentication Case study
Protecting Data, Identities, Transactions & Communications
SafeNet is the only company trusted to protect the world’s most sensitive commercial and government assets. We do this through solutions that persistently protect throughout the information lifecycle and evolve to support changing business and market requirements without disruption.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security Challenges Facing Enterprise Manufacturers and Global Supply Chains
  • Live at: Jun 6 2012 6:00 pm
  • Presented by: Clark Crain, CTO Nuspire Networks and Mark Yakabuski, Vice President Product Management - HSM, SafeNet
  • From:
Your email has been sent.
or close
You must be logged in to email this