Hi [[ session.user.profile.firstName ]]

Security Challenges Facing Enterprise Manufacturers and Global Supply Chains

As manufacturers integrate their internal business process systems with those of contract manufacturers, suppliers, customers, and employees in order to reduce operations costs, they are met with increasing security challenges related to the protection of intellectual property and corporate informat
As manufacturers integrate their internal business process systems with those of contract manufacturers, suppliers, customers, and employees in order to reduce operations costs, they are met with increasing security challenges related to the protection of intellectual property and corporate information, and the revenue loss associated with the production of counterfeit market goods. Manufacturing effectiveness requires a solution that offers security, cost-effectiveness and scale in order to meet the evolving demands in this market. In order to meet these demands vendors often leverage industry compliant digital identities in infrastructure to meet their needs, such as the use of digital identities to protect; chips, hard drives, printer components, mobile devices, smart meters and a host of manufactured goods.

Join Clark Crain, CTO Nuspire Networks and Mark Yakabuski, VP of Product Management SafeNet, for a discussion on the importance of using hardware security modules in secure manufacturing environments. Hardware Security modules are the Trust anchor for protecting digital identities. Mr. Crain has worked in the trenches of the automotive industry, overseeing and crafting security policy for brands like Delphi, Chrysler, General Motors and various global automotive suppliers such as Siemens Automotive. Clark has a wealth of experience in building sustained, flexible, seamless and compliant security solutions in the global manufacturing, distribution, supply chain, and global retail space. Mark Yakabuski is a veteran of the security industry and has over 12 years of security experience developing digital identity solutions. Throughout his tenure at SafeNet, Mark has worked to successfully deploy secure manufacturing environments for a global network of partners and customers. Mr. Yakabuski is currently the Vice President of Product Management for the Hardware Security Module business unit at SafeNet.
Recorded Jun 6 2012 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Clark Crain, CTO Nuspire Networks and Mark Yakabuski, Vice President Product Management - HSM, SafeNet
Presentation preview: Security Challenges Facing Enterprise Manufacturers and Global Supply Chains
Recommended for you:
  • Date
  • Rating
  • Views
  • Running Successful Risk Workshops Running Successful Risk Workshops Ian Beale Executive Advisor - CEB Audit and Risk Leadership Councils Recorded: May 3 2016 62 mins
    This event is designed for Heads of ERM, ERM Directors, ERM Managers, and other direct reports of the Chief Risk Officer. It is designed to teach the basics and also best practices of conducting a successful risk assessment workshop plus tactics for impactful workshop facilitation. Participants will learn a number of tactical ERM practices that can be implemented immediately.
  • April Monthly Threat Webinar – 0-Days & Virtual Patching April Monthly Threat Webinar – 0-Days & Virtual Patching Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro Recorded: Apr 29 2016 31 mins
    This month’s threat webinar will discuss how 0-days are used, who uses them, and what the good vulnerability researchers do to ensure people and organizations are protected.
  • Building An IT Vendor Risk Management Program Building An IT Vendor Risk Management Program Mike Rothman, Securosis | Tom Turner, BitSight Recorded: Apr 28 2016 58 mins
    Recent high profile data breaches have made it obvious that organizations often underestimate the risk their vendors present, and struggle to evaluate third party cyber risk.

    In this webinar Mike Rothman, Analyst & President of Securosis, and Tom Turner, President and COO of BitSight describe how organizations can build a systematic means to evaluate their IT risk presented by business partners and vendors.

    Viewers will learn about:

    - Understanding Third Party IT Risk
    - Structuring Vendor Risk Management Programs
    - Evaluating Vendor Risk
    - Ongoing Vendor Monitoring and Communication
  • Adopt IT Operations Analytics to Make Better Decisions, Faster Adopt IT Operations Analytics to Make Better Decisions, Faster Donnie Berkholz and Erin Avery Recorded: Apr 28 2016 53 mins
    In the digital era, IT has an extraordinary opportunity to become a data-driven business partners helping the business achieve its goals of revenue generation, cost reduction, and risk mitigation. However, IT reporting and analytics have historically focused on descriptive and diagnostic work – describing what happened and why. The speed and agility of the digital revolution demands the ability to not only describe what happened in the past but to predict what might happen in the future and to make recommendations about what should be done.

    IT operations analytics offers IT organizations a path to evolve the use of machine, operational and business data for more effective, forward-looking prioritization and decision-making. And in a recent BMC sponsored survey, 79% of IT pros said they would be more effective at their job if they had access to non-IT sources of data to help them make decisions in business context.

    Join Donnie Berkholz, 451 Research, and Erin Avery, BMC Software, for a high energy, fast paced discussion on adaptive, real-time analytics that any IT operations organization can adopt to become highly prescriptive and predictive.
  • Black Duck Hub 3.0:  Enhanced Policy Management Black Duck Hub 3.0: Enhanced Policy Management Pat Durante - Senior Director Education Services, John Beaudoin - Senior Instructional Designer, Dave Gruber - VP of Product Recorded: Apr 28 2016 58 mins
    Join us for our next customer webinar covering the new features available in Black Duck Hub 3.0.

    The latest version is designed to help Hub and Protex users streamline Continuous Integration (CI) and DevOps processes through robust policy management and rapid scanning. These capabilities provide complete visibility into the open source in apps and containers, accelerating development through early and continuous detection of vulnerabilities and out-of-policy code.

    During this webinar, we’ll show you how to leverage Hub 3.0 to establish policies around the use of open source software in order to lower your organizational security, license and operational risk.

    Following the demonstration, we’ll leave plenty of time for you to ask our product experts questions.

    You will learn:
    •Overview of the new features, including policy management, improved scanning, additional Linux distribution support, and integration with TeamCity
    •How to quickly establish open source security policies for existing and new projects
    •Ways to leverage policy violations to flag or fail builds in a continuous integration environment (such as Jenkins)
  • Driving Effective Data Governance & Protection – a view from Prudential Plc Driving Effective Data Governance & Protection – a view from Prudential Plc Sunil Choudrie, Christian Brindley, Keith Vallance, Tim Davie-Baguley, Helen Orrick Recorded: Apr 28 2016 60 mins
    Like many organisations, Prudential has to ensure it protects sensitive data. Getting it right results in satisfied customers, regulators and shareholders and avoids the reputational damage and legal penalties associated with a data breach. With the forthcoming EU General Data Protection Regulation now agreed for implementation, we think now is the right time for organisations to review their data governance and protection requirements. During this webinar we will cover today’s challenges in ensuring good data governance and enter into a panel discussion with Prudential about their approach and lessons learned, including their implementation of Symantec Data Loss Prevention and Boldon James data classification technology. There will also be an opportunity to engage in a Question and Answer session.

    So if you want to give your data governance program a head start, register today.
  • Driving Effective Data Governance & Protection – a view from Prudential Plc Driving Effective Data Governance & Protection – a view from Prudential Plc Sunil Choudrie, Christian Brindley, Keith Vallance, Tim Davie-Baguley, Helen Orrick Recorded: Apr 28 2016 60 mins
    Like many organisations, Prudential has to ensure it protects sensitive data. Getting it right results in satisfied customers, regulators and shareholders and avoids the reputational damage and legal penalties associated with a data breach. With the forthcoming EU General Data Protection Regulation now agreed for implementation, we think now is the right time for organisations to review their data governance and protection requirements.

    During this webinar join panel experts from Prudential, Symantec and Boldon James who will explore today’s challenges in ensuring good data governance. The discussion will include practical advice from Prudential about their approach to data security and lessons learned, including their implementation of Symantec Data Loss Prevention and Boldon James data classification technology. There will also be an opportunity to engage in an interactive Question and Answer session.

    So if you want to give your data governance programme a head start, register today.
  • Learn What You Can Do To Help Avoid Ransomware Breaches Learn What You Can Do To Help Avoid Ransomware Breaches Liran Chen - Manager, Systems Engineering Recorded: Apr 27 2016 30 mins
    Register today for an insightful webinar with ForeScout Technologies.

    This webinar will discuss the recent ransomware breaches, malware attacks and potential protection strategies. Learn how ForeScout helps mitigate ransomware and other malware threats within your network environment. In addition, you’ll discover how ForeScout’s security platform helps organizations See, Control and Orchestrate enterprise security—and assist in identifying the potential risk that exists in your environment today.

    We hope you can join us for this timely webcast!
  • Future of Open Source Survey  2016 Results Future of Open Source Survey 2016 Results Black Duck Software and North Bridge Recorded: Apr 27 2016 61 mins
    Please join us to learn the results of the 2016 Future of Open Source Survey.

    Today, open source drives technology and development forward. Its adoption worldwide is visible in companies ranging in size from a single employee to companies like Microsoft and Apple. All of these organizations rely on open source to innovate, reduce development costs, and speed time to market. In this evolving market, important questions remain about open source management, security, policies and procedures, and governance.

    The Future of Open Source Survey includes input from new players, established leaders, and influencers across vertical markets and communities. This range of respondents drives broad industry awareness and discussions of key issues.

    Please join these industry influencers as they review the top level results from the survey, and bring your questions.

    Jeffrey Hammond - Forrester Research @jhammond
    Paul Santinelli - North Bridge @paulsantinelli
    Bill Ledingham - Black Duck Software @bill_ledingham
    Jay Jay Billings - Oak Ridge National Laboratory @jayjaybillings


    Follow the conversation on Twitter, using the hashtag #FutureOSS

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security Challenges Facing Enterprise Manufacturers and Global Supply Chains
  • Live at: Jun 6 2012 6:00 pm
  • Presented by: Clark Crain, CTO Nuspire Networks and Mark Yakabuski, Vice President Product Management - HSM, SafeNet
  • From:
Your email has been sent.
or close
You must be logged in to email this