Data Breaches 2015: This Time It’s More PersonalJason Hart, CTO of Data Protection, Encryption Products - GemaltoLast year, hackers targeted retail companies and their POS systems to steal vast amounts of credit card and financial data. This year, things have changed as cyber criminals are now going after identities, making data breaches much more personal. While credit cards can be easily replaced, personal identities cannot. This webinar looks at the major data breach trends in 2015. Who is doing the hacking, how they are doing it, and what industries are being targeted most. In addition, listeners can get a new understanding of how to approach to data security and “Secure the Breach”.Read more >
IT security risks are changing, and undoubtingly increasing in complexity and frequency. Enterprises across the globe are struggling to not only keep up, but to maintain a secure network environment. From a recent breach by hackers to gain sensitive information of more than 100,000 taxpayers, to the breach of 110 million consumer records, the cyber threat landscape is getting worse every year. Hackers are faster, and organizations are taking longer to discover the breaches, giving thieves hours, days, and even weeks to explore the most private and sensitive company data.
Gemalto has identified key steps to help secure your enterprise network, certainly one of the first areas fraudsters attempt to infiltrate.
Join us on September 15th for an informative presentation that will help you plan a strategy to protect your most critical assets.
In this webinar, we will show with concrete examples why it is so important to implement correct user and data security controls to secure your cloud and virtual environments. You will see how easily controls can be bypassed and compromised, why software keys are simply not good enough, and how your personal life threatens your business and work life. This presentation will stress the importance of using data and user centric security models vs. conventional data security practices. Join (ISC)² and Gemalto-Safenet in this webinar to learn what we call: unsharing your data.
Verschlüsselung ist langsam, kompliziert und schwer zu managen! Diese Vorurteile sind lange überholt. Verschlüsselung ist heute wichtiger Bestandteil einer umfassenden Sicherheitsstrategie.
Armin Simon zeigt Ihnen in diesem Webinar, wie Sie als Security-Verantwortlicher Verschlüsselung in Ihrem Unternehmen auf ein solides Fundament stellen. Welche Ansätze haben sich bewährt und wie finden Sie die für Ihr Unternehmen passendste Lösung?
Join us on August 11th to gain expert advice on enterprise application and mobile security. Here you will learn market dynamics, possible risks and effective solutions you can use while working within your budget.
In this presentation we will examine real cases that show how vulnerable cloud and virtual environments can be without the correct controls. You will see how easily controls can be bypassed and compromised, why software keys are simply not good enough, and how your personal life threatens your business and work life. Join us on July 8th to learn what we call, unsharing your data.
Traditionally, organizations needing encryption for cloud applications have had to purchase an HSM and manage encryption keys on premises, or have had to trust the cloud provider with the keys, complicating security and compliance matters. These challenges have prevented many of the most security conscious companies from migrating sensitive workloads and data to the cloud.
Join Stephen Helm as he explains how you can solve these issues, exploring crypto in the cloud, and providing best practices for key ownership and control.
Seit Edward Snowden ist bekannt, wie systematisch Informationen ausgespäht und manipuliert werden. Was hat sich seither wirklich verändert und was ist die konsequente Schlussfolgerung? Wir zeigen Ihnen, wie sie auf Basis einer angepassten Sicherheitsstrategie die richtigen Lösungen für Ihre Sicherheitsanforderungen finden.
From their first cup of coffee, to meetings in the field and late night conference calls—today’s workers expect a seamless continuum of access to enterprise resources. And while remote network access, virtual desktops and cloud applications are invaluable assets for these employees, the increasingly splintered data ecosystem is wreaking havoc among the unprepared—be they IT, security or compliance professionals. So how can IT administrators service 100s, 1000s or even 10,000s of users while keeping management overhead low? Can security staff support mobility and remain unruffled in the face of a data breach? And exactly how can compliance stewards ensure they have the visibility they need to smoothly undergo audits? This webinar will provide the answers.
Join Gemalto in collaboration with Ponemon on May 12th as we reveal recent study results on how hackers are attacking the cloud.
This presentation will use live demos to show how vulnerable cloud and virtual environments can be without the correct controls. Examples will include the following topics:
•Do companies really know how to store data in the cloud?
•The need for multi-factor authentication and why software keys are not good enough
•Data governance rules and regulations