PKI used to be difficult to implement, and was seen as complex, labor intensive and expensive. The development of powerful credential management software has brought considerable improvements. It now does much of the manual work that used to be left up to the administrators saving them valuable time in the war against security threats. In our last webinar, we found almost 50% of those you voted cited the Internet of Things as the main driver for PKI. More connected devices and users will create a need for higher levels of security in all organizations as the number of possible threats and attacks increase.
For security professionals, implementing and modernizing their PKI systems will be crucial, keeping in mind not all PKI implementations are created equal. Some are inherently more complex, depending on the level and layers of security needed for within your organization. Following our previous PKI foundational webinar, this one will cover the elements you need to consider when designing a PKI environment.
Join us for the “PKI – Your Ally in the War Against Security Threats” to learn how you can maximize your organization’s security and the things you need to know to get started including:
•PKI use cases in an enterprise environment to secure access and protect data
•Budgeting for your PKI deployment of modernization
•Outlining the deployment size, scope and timeline
•Analyzing and reviewing current and/or future security policies
•Maintenance and administration of the PKI system
•Configuring and understanding certificate authorities
•Developing a scalable approach to prepare for future needs
•Addressing the protection of sensitive keys and the ecosystem integration
According to a report from the Ponemon Institute, 62% of businesses surveyed regard cloud-based services as the most important trend driving the deployment of applications using PKI, an increase from 50% in 2015. While 28% say IoT will drive PKI deployment. PKI is once again in the spotlight, thanks to the growing number of use cases.
The foundations of PKI technology and it’s future potential will help professionals determine the best security strategy for the long term. This session will go over the building blocks of a PKI ecosystem and discusses the functionality and use cases of the technology. Whether you’re a security professional looking for a PKI refresher or you are starting from scratch, you will find this webinar useful.
During our webinar, The Foundations and Future of PKI: Yes, it’s Alive and Kicking, we will cover:
•Brief overview of PKI technology and it’s components
•PKI for identity and data protection
•Advanced security functions of PKI
•Basic PKI practices
•PKI vertical use cases
•The brave new world of PKI – a look at emerging trends and technology
Over the past year, we have seen data breaches shift towards identity-based breaches, targeting personal information of either employees or consumers. The access to the information is used to craft and construct highly organized attacks on enterprises and is a growing contributor to identity theft. The problem is compounded by the convergence of personal and work place identities, ultimately creating major security challenges for companies.
Our 2016 Authentication and Access Management survey found 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. During the webinar, we’ll be discussing this and other trends in the strong authentication and access management market, including:
-The status of the two-factor authentication market and what we can expect in the years to come
-The enterprise risk issues of using social media credentials to access to corporate resources
-The role the cloud is playing in the enterprise especially as it relates to single sign on and application management and access
-The ongoing challenges enterprises cite as barriers to mass adoption of a mobile workforce
The cloud isn’t consumed by enterprises in just one way. Enterprises have varying internal capabilities and infrastructure means using different deployment models, on or off-premises, private and public clouds, hosted clouds through via multiple cloud vendors, which lends to a complex environment. Today, enterprises run roughly 41% of applications in the cloud, but workloads in cloud environments are expected to increase to 60% over the next two years. Organizations with multiple cloud platforms is becoming a fact of life, but creates challenges for businesses needing to secure them.
Understanding the risks of each cloud platform is crucial to defining and implementing strong, dynamic data protection policies with comprehensive key management across all cloud-enabled environments. When encryption is used, the risk is transferred from the data itself to the cryptographic key. This is why it is essential that organizations control their own key infrastructure. Diving deeper into the topic, Eric Hanselman from 451 Group and John Ray from Gemalto will discuss the three key considerations to a successful multi-cloud security strategy: interoperability, control and compliance.
Join our webinar “The Keys to Multi-Cloud Security” on Tuesday, December 13th 2016 and learn about:
• Recent findings on enterprise cloud usage from 451 Group
• How to analyze the security risks of your cloud platforms
• Security practices for different cloud platforms and business processes
• Future-proofing your Cloud security and data protection compliance
• How security can work in the multi-cloud universe
• Implementing a key management system that you own
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they break many of the traditional security approaches and spark questions like:
With massive volumes of data, how are organizations going to ensure that their customer information is safe from people looking to exploit it?
Is it possible to adopt big data technologies while demonstrating compliance with industry regulations?
Will security get in the way of the analytics tools?
How can security apply to different data consumption technologies like Hadoop and NOSQL?
Join Gemalto on Thursday, December 1, 2016 as we discuss what’s in store for the ‘big data’ technologies of the future and how security models like encryption can solve the security conundrum.
The new EU regulation of the Privacy world (the GDPR) is rapidly approaching. This webinar will reveal a back to basics approach in relation to GDPR. Specifically, Jason Hart - Gemalto CTO will identify a GDPR blueprint that tackles the privacy concerns around confidentiality, integrity and availability of sensitive data.
A convenient and consistent online user experience breeds trust in a service. How it’s executed can alter a user’s perception either positively or negatively. When it comes to online security, consumers have different perceptions. What banks want to avoid is “security fatigue.”
Risk management systems make sensitive online transactions more user friendly by customizing security in response to the risk. The real-time assessment of a user’s transaction is instantly evaluated and an authentication step can be sent if needed. Adapting strong authentication to the online transactions improves the customer experience and avoids fatiguing your users with security if it’s not necessary.
Not all online transactions are created equal, so successful security solutions need to be intelligent and smart. Join us for a webinar on Tuesday November 16, 2016 as we discuss:
•What not to do when it comes to online banking security
•How to build a customized risk-based authentication process
•Security as a business enabler
•The influence of a user’s security persona toward risk
Last year, cyber criminals started turning their focus to hacking people’s personal information. This year, more than half of all data breaches are identity theft. Hackers have been targeting government databases to get the information. It’s currently the industry with the largest number of records stolen and/or compromised. The cyber criminal’s shift from credit card and financial data to personal information begs the question “how much is your identity really worth?” While it might start as a nuisance, the true impact of identity theft to an individual can be catastrophic and costly. With the Internet of Things taking off and the number of connected devices increasing, it is important to make your data worthless to fraudsters. This webinar looks at the major data breach trends in 2016. Who is doing the hacking, how they are doing it, what needs to be protected in the Internet of Things era and what data is under attack. In addition, listeners can get a new understanding of how to approach data security and “Secure the Breach”.
The new EU regulation of the Privacy world (the GDPR) is frequently portrayed as a scary and formidable piece of legislation that’s going to rock the online & off-line world. This webinar will explore what the implications really are. How much will change from the present regime? How difficult will it be to comply? Also is there an opportunity hidden in the challenge? And where will security and security professionals fit in the new picture?
This webinar will discuss the recent findings of a global cloud data security study conducted by the Ponemon Institute on behalf of Gemalto. The study surveyed 3,476 IT and IT security professionals in the United States, United Kingdom, Australia, Germany, France, Japan, Russian Federation, India and Brazil about the governance policies and security practices their organizations have in place to secure data in cloud environments. The findings will reveal adoption trends for IaaS, PaaS and SaaS; the prevalence of Shadow IT; the role of data governance; and data security practices in the cloud, including the usage of encryption and multi-factor authentication. In addition, participants will also learn new data security strategies that can help them realize the benefits of the cloud while protecting sensitive applications and information in cloud.
Today’s changing and sophisticated threat landscape and increasing use of the cloud and mobile devices have rewritten the rules of data security. However, many companies continue to rely on breach prevention as the foundation of their security strategies. If one thing has been learned in recent years it is that data breaches are inevitable, and that is why IT organizations must shift a from mindset that is entirely focused on Breach Prevention to Breach Acceptance and finally to a Secure the Breach approach to data security. This presentation will review why IT professionals need to adopt a new data security mindset if they are to effectively protect sensitive information and users accessing it using a three step process of securing user access, encrypting sensitive data, and secure management of encryption keys.