Zeitenwende durch Edward SnowdenArmin Simon, Senior Manager Channel Sales, SafeNet/GemaltoSeit Edward Snowden ist bekannt, wie systematisch Informationen ausgespäht und manipuliert werden. Was hat sich seither wirklich verändert und was ist die konsequente Schlussfolgerung? Wir zeigen Ihnen, wie sie auf Basis einer angepassten Sicherheitsstrategie die richtigen Lösungen für Ihre Sicherheitsanforderungen finden.Read more >
From their first cup of coffee, to meetings in the field and late night conference calls—today’s workers expect a seamless continuum of access to enterprise resources. And while remote network access, virtual desktops and cloud applications are invaluable assets for these employees, the increasingly splintered data ecosystem is wreaking havoc among the unprepared—be they IT, security or compliance professionals. So how can IT administrators service 100s, 1000s or even 10,000s of users while keeping management overhead low? Can security staff support mobility and remain unruffled in the face of a data breach? And exactly how can compliance stewards ensure they have the visibility they need to smoothly undergo audits? This webinar will provide the answers.
Join Gemalto in collaboration with Ponemon on May 12th as we reveal recent study results on how hackers are attacking the cloud.
This presentation will use live demos to show how vulnerable cloud and virtual environments can be without the correct controls. Examples will include the following topics:
•Do companies really know how to store data in the cloud?
•The need for multi-factor authentication and why software keys are not good enough
•Data governance rules and regulations
The Identity and Access Market (IAM) is undergoing exciting changes. Increased cloud adoption, cyber-threats and the speedy adoption of mobile computing is affecting how enterprises approach access security and authentication.
Getting insight into these trends can help you prepare your organization for better and more effective Identity and Access policies during the coming year.
Join us on for a webinar on “IAM and Authentication Trends in 2015”, on March 24, 2015, where you can hear all about Identity and Access trends and developments from an industry expert.
The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. Join us on February 17th to learn how the Internet of Things will play a role in your future and what changes will be happening in security.
As a defender of sensitive information, you are no stranger to the ever-changing breadth of security threats your organization faces. Not only are you expected to protect sensitive corporate and customer information from those threats, you are also expected to support massive IT infrastructure changes around where sensitive data is being stored and who and how it can be accessed. All of this with little internal enthusiasm for new projects and a stagnant security budget!
Whether you are a CISO, CIO, or any employee responsible for protecting sensitive information it is time to fight for the resources you deserve!
This session will reveal new strategies for:
•Finding financial and operational support for information security initiatives across the organization;
•Enlisting new, and at times, surprising allies for your information security projects;
•Building a virtual team of ‘defenders’ across the organization.
REGISTER TODAY for this insightful best practices session
The retail payment ecosystem is a complicated and highly vulnerable system filled with multiple stakeholders responsible for security, such as hardware device manufacturers, software application providers and financial institutions. As a retailer, you rarely control the security for each piece of the payment ecosystem. But you still need to know everything about the process including:
•The 6 ways your data is most vulnerable
•How your data could be attacked
•Which security stakeholder is responsible for protecting your data
•What security solution should be implemented
Join our live webcast on December 9th for more information on the vulnerabilities of the retail payment ecosystem, and what they mean for all security stakeholders, especially retailers.
We’re sure you’ve all heard about it in the news. With more than 2 billion records lost or stolen since 2013, how can you be sure your organization’s current security scheme will stand up against malicious attacks?
Join SafeNet’s webinar, “Encryption and Payments: How Recent Breaches are Changing the Approach to Data Protection in the Payment Ecosystem” to learn how your organization can improve its current strategy. Encryption and tokenization have long been used to secure transactions that occur in the payment ecosystem, but our HSM experts will discuss how to take this approach to the next level. By dissecting the payment ecosystem, we’ll uncover a variety of vulnerabilities in the current process and demonstrate how to use encryption and key management more effectively.