Hi [[ session.user.profile.firstName ]]

Persistent Information Protection, Deploying Microsoft RMS with Thales HSMs

"Want to have a deeper understanding of how to deploy Microsoft Rights Management Services (RMS) with the added capability of generating and controlling your own key that secure your sensitive data? Join us for a joint webinar with Microsoft, Synergy Advisors, and Thales to learn how to deploy Microsoft RMS with the unique bring your own key (BYOK) capability across multiple operational scenarios including:

• Subscription-based service in Azure
• On-premises in Windows Server
• Cross-premises in mixed environments

You will also learn how to take advantage of the BYOK offering to secure your RMS private key within a Thales hardware security module (HSM) to maintain control of the critical keys securing your most sensitive data and intellectual property."
Recorded Feb 12 2014 87 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Microsoft, Synergy and Thales
Presentation preview: Persistent Information Protection, Deploying Microsoft RMS with Thales HSMs

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Steering Clear of Key Management Pitfalls in Banking Oct 1 2019 12:00 pm UTC 60 mins
    Ed Wood - Director of Product Management at Cryptomathic and Kevin McKeogh - Director, Product Management at nCipher Security
    This webinar offers pragmatic advice to help Banks and financial services navigate towards confident compliance and reduced risk, while improving operational efficiency.

    This webinar will look at:
    ● Current trends and challenges of lifecycle key management in banks and FSIs
    - The reality of key-management practices in even mature organisations today
    - What we have seen happening over the last 10 years
    ● Confidently complying with internal / external standards
    - Latest developments and updates about PCI PTS PIN (key blocks)
    - FIPS and PCI: what you need to know about their intersection
    - Pathway to efficiently or effectively demonstrating compliance
    ● Risk : the obvious and not-so-obvious
    - Common mistakes: errors or omissions in key management practice
    - Conspiracy: rogue / bad-actors have huge potential for damage
    - Spelling out the consequences.
    ● Real-world example / case study from leading acquirer in Europe – Swedbank adopts
    centralised key management across acquiring and terminal network
    - Hear from a bank about their motivation and experience of implementing automated
    lifecycle key management
    ● Why is it important to act now?

    This webinar is for you if you are responsible for:
    1. Managers of products / services highly dependent on cryptography.
    2. Security / Cryptography practitioners (key and cryptography policy management).
    3. Auditors / Compliance managers.

    Cryptomathic and nCipher address the key management challenges experienced by banks and FSIs with a certified centralised banking-grade key lifecycle management platform.

    could you also add this paragraph above the agenda please:
    Loss, theft or misuse of a single critical key can put your organisation on the front page; damaging your reputation, credibility and even put you out of business. Despite its critical importance, key management often doesn't get the attention and investment it requires.
  • nCipher Micro Focus Voltage Recorded: Aug 16 2019 15 mins
    Carole Murphy, Global Product Marketing Senior Manager for Micro Focus Voltage
    Carole Murphy, Global Product Marketing Senior Manager for Micro Focus Voltage, explains how to achieve data-centric information protection across the enterprise with Micro Focus Voltage and nCipher technology.

    Learn how to:
    - Make safe use of data for innovation
    - Protect data for privacy and analytics
    - Securely manage cryptographic keys
    - Establish a certified HSM root of trust
  • Don’t Just Manage Your Keys. Orchestrate Them! Recorded: Aug 16 2019 10 mins
    Mr. Jeremy Sturm - Director of Sales Engineering at Fornetix
    Today's interconnected business environment increasingly uses security technologies to protect data confidentiality and integrity. This need is creating a growing challenge for traditional cryptographic key management practices that demands careful orchestration of keys and their use policies across the many platforms deployed across organizations.

    - Problems with traditional key management practices
    - Challenge integrating them with existing technologies
    - Advantage of a comprehensive key orchestration plan
    - Establishing a root of trust for key lifecycle automation
  • Integrating nCipher and IBM Security Key Lifecycle Manager for customer success Recorded: Aug 14 2019 10 mins
    Rick Robinson, World wide Offering Manager at the IBM Security Group
    This brief presentation describes the threats that customer data is typically exposed to during rest, transit, and use, and the challenges involved in protecting the data through cryptography. The session focuses on the need to establish a root of trust for the safeguarding and management of underpinning cryptographic keys throughout their lifecycle, and highlights how nCipher and IBM solutions address this with standards-based systems designed to provide maximum efficiency and robustness.

    - Threat
    - Challenge
    - Solution
    - Why IBM and nCipher
  • What's driving security trends in the Middle East? Recorded: Jul 17 2019 30 mins
    Hamid Qureshi, Territory Sales Manager - Middle East, nCipher Security
    We surveyed hundreds of organizations in the UAE and Saudi Arabia for our annual Middle East Encryption Trends Study with global researchers, Ponemon Institute. The results reveal an increase in the use of emerging technologies like IoT and Docker containers, which open the door to new security vulnerabilities. In response, security leaders are broadening their use of encryption and strong key protection to protect sensitive data against theft and other threats. Join Hamid Qureshi in this session to;

    -discover these key security trends
    - learn how your peers are addressing their evolving business
    - understand how nCipher can help you secure your critical data and
  • Innovative Information Protection for a Data-Driven Economy Recorded: Jun 26 2019 103 mins
    Juan C. Asenjo, nCipher Security and Carole Murphy, Micro Focus Voltage
    This web conference will provide insights on how to secure the growing data flows driving today’s global economy. Our experts will outline best practices for safely using data to optimize performance, enable new services, and transform existing business models, while addressing evolving threats and managing risks. The web conference will focus on the best ways of handling sensitive customer and transactional data, including healthcare and financial information, in light of the impact that the growing Internet of Things (IoT) is having on the capability to collect, analyze, and derive new customer insights and other business intelligence. Our speakers will identify the challenges faced by organizations that collect and use increasing amounts of data and need to maintain its confidentiality and integrity, and ensure compliance with data privacy requirements. The conference will close with a description of associated solutions underlining encryption, cryptographic key management, and the establishment of a secure root of trust, and recommendations on how to put these solutions in practice.

  • Scalable web traffic visibility with Gigamon and nCipher Recorded: May 28 2019 14 mins
    Bassam Khan, VP - Product and Technical Marketing at Gigamon
    This presentation highlights the importance of having web traffic visibility and ensuring that your tools can keep a watchful eye over the whole of your network using technology from Gigamon and nCipher.
  • In PKI we trust – secure & high-performing identity management Recorded: May 22 2019 11 mins
    Graham McCord, Senior Manager for Strategic Alliances at Entrust Datacard
    This presentation highlights the importance of trusting your public key infrastructure to deliver secure and high performing identity management services, and how you can achieve this objective using technology from Entrust Datacard and nCipher.
  • Global encryption trends -- is your organization keeping pace? Recorded: May 15 2019 61 mins
    Dr. Larry Ponemon, Ponemon Institute and John Grimm, nCipher Security
    Corporate data breaches are in the headlines on an almost daily basis, while business critical applications face malicious threat, or are accidentally compromised by employee mistakes. The 2019 Global Encryption Trends study, with data from almost 6000 respondents in 14 countries/regions, reveals:

    - How organizations in different industries and countries are using encryption to protect sensitive data
    - What use cases for hardware security modules (HSMs) are growing the fastest
    - Features of encryption solutions that organizations value the most

    Join Dr. Larry Ponemon and John Grimm for an overview of the top findings of this industry-leading study on encryption trends, and advice on addressing encryption's top challenges.
  • Perform Like a Conductor – Automated and Secure Key Orchestration with Venafi Recorded: May 1 2019 11 mins
    Ben Rogers,Senior Solutions Architect, Venafi
    nFinity partners spoke at nCipher RSA booth to highlight strengths of a combined nCipher / partner product integration.
  • Proactive Data Defence for Digital Transformation Recorded: Nov 22 2018 32 mins
    Brett Bourke Abela, Senior Sales Engineer, UK, Thales eSecurity
    In the third of our #CoffeeBreak webcasts, Chris Ogilvie interviews Brett Abela, Thales eSecurity Sales Consultant on proactive data defence for digital transformation.

    Digital transformation is business enhancing but fraught with danger. With services moving into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, with more and more of your corporate attack surface being exposed.

    The rise of cloud and the Internet of Things (IoT), has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.

    Join Chris and Brett for the third “coffee break” webcast when they will discuss:
    a) Key security considerations for a digital transformation strategy
    b) Why a proactive data defence strategy is crucial
    c) The benefits of maximising the level of control over data irrespective of where it is created, stored or shared.
    d) How can enterprises regain control of their data security?
  • Thales nShield non+ to nShield XC Migration Recorded: Mar 28 2018 36 mins
    Marc Class, Sales Engineer, Thales Australia
    "The new Thales nShield XC is set to replace the Thales nShield Solo and nShield Connect non-plus hardware security modules in the next few months. With a whole host of new features and capabilities, the XC will outperform the non-plus by an order of magnitude – and this webinar will help you understand the new model and the recommended migration plan, so you can get ready to make the switch.

    Join us on Wednesday March 28th March @ 11am AEDT for a briefing on:

    • New Features of the XC

    • Recommended migration steps from non-plus to XC

    • End of Support timelines

    We will have lots of time for Q&A at this session.

    We look forward to talking to you then.
  • Proactive Data Defence for Digital Transformation Recorded: Mar 23 2018 35 mins
    Ian Greenwood, Regional Sales Manager UK&I
    "Digital transformation is business enhancing and fraught with danger. With services moving online and into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, more and more your corporate attack surface is being exposed.

    With data breaches at an all-time high and incidents of identity theft risen by 57% in a year, consumers are questioning the security of their personal data held by organisations. The rise of cloud and the Internet of Things, has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.

    This webinar will consider:

    • Key security considerations for a digital transformation strategy

    • Why a proactive data defence strategy is crucial

    • The benefits of maximising the level of control over data irrespective of where it is created, store or shared."
  • GDPR Compliance Roadmap Recorded: Feb 21 2018 55 mins
    Sanjay Parikh - Director of Risk & Compliance at Critical Start
    "Join Critical Start and Thales, Wednesday, Feb 21 for a Virtual Lunch and Learn as we glide through the General Data Protection Regulation (GDPR) regulatory articles and identify the key sticking points for achieving compliance. GDPR becomes enforceable on May 25, which means the clock is ticking to prepare your organization’s infrastructure and avoid costly penalties.
    We’ll discuss:
    •The importance of your controls related to data protection
    •Areas that impact compliance which most organizations don’t realize
    •A roadmap for tackling GDPR head on towards your road to compliance

    What is GDPR?
    A new intended to strengthen and unify data protection for all individuals in the European Union. The new law affects any organization that processes or handles the information of EU citizens, regardless of where that organization is located. The regulation applies to any personal information, whether it belongs to a customer, an employee, or other relationship with the organization.

    About the Speaker: For more than 20 years, Sanjay Parikh has helped organizations assess, design and strengthen IT security programs. As Director of Risk & Compliance for Critical Start, he applies deep expertise in both security and compliance to help organizations of all sizes to navigate complex regulatory requirements related to ISO27001, GDPR, NIST, FFIEC, HIPAA, PCI and more. He develops strategic security roadmaps to identify gaps, streamline workflows, reduce audit costs, and ensure compliance while meeting business objectives."
  • 2017 Global PKI Trends: PKI at the Crossroads Recorded: Nov 8 2017 62 mins
    Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute and John Grimm, Sr Director of Security Strategy, Thales e-Security
    "PKI (public key infrastructure) has quietly become one of the most critical assets for enterprises today. Our 2017 study, conducted by the Ponemon Institute and sponsored by Thales e-Security, reveals an increase in the number of applications that use digital certificates, that enterprises are investing in fortifying the security posture of their PKIs, and that the IoT is the next game-changer for the future of PKI.

    Join this webcast to learn about the top findings of this research, including:

    • The increasing influence of the IoT in PKI planning
    • The increasing security maturity of enterprise PKIs including the use of Hardware Security Modules
    • Identification of enterprise applications that commonly depend on PKI credentials
    • The ongoing challenges associated with PKI deployment and management"
  • Beyond GDPR: Best Practices for Data Protection Recorded: Sep 14 2017 49 mins
    Aaron Davis, Sr Product Marketing Manager, PKI, Entrust Datacard & Juan Asenjo Sr Partner Marketing Manager, Thales eSecurity
    "In this webinar, we will examine the key elements necessary to protect sensitive data. The focus will be on comprehensive security aspects that enterprises need to consider going forward. The webinar will expand on how the General Data Protection Regulation (GDPR) is just the beginning; a set of best practices that every organization should adhere to, not just in the EU but globally, to use security as an enabler for a safe digital future.
    Topics discussed will include the expanded ecosystem of users, devices, applications, and things that must coexist in a trusted environment, as enterprises transform operations to depend on an all-digital infrastructure.

    Join the webinar to learn:

    • Why GDPR is only the beginning - cutting through the noise
    • How digital business is driving new approaches to data security
    • What are the best practices for improving data hygiene"
  • 2017 Global Encryption State of the State: The Latest Cloud Trends and More! Recorded: Apr 19 2017 62 mins
    Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute, John Grimm, Sr. Director of Security Strategy, Thales e-Security
    "This twelfth installment of the Ponemon Global Encryption Trends study, sponsored by Thales e-Security, reveals both deployment plans and pains associated with increasingly aggressive cloud and data protection strategies. Although compliance remains a top driver for encryption, the gap has narrowed as organizations move to protect sensitive IP and customer information from both external and internal threats. Join Larry Ponemon and John Grimm to learn about some of the top findings in this year’s Global Encryption Trends Study, including:

    • Variation in encryption and key management trends across multiple vertical industries
    • Attitudes regarding protection of sensitive data and control of keys in the cloud
    • Types of data most commonly encrypted, and associated applications that perform the encryption
    • The role of Hardware Security Modules (HSMs) in addressing cloud and enterprise encryption and key management use cases."
  • Protecting Data in line with the Australian Data Breach Notification Recorded: Sep 15 2016 36 mins
    "Brian Grant, Vormetric & Marta Ganko, Deloitte Touche Tohmatsu "
    "Organisations in Australia now have a renewed focus and urgency on the protection of personal information assets with the proposed mandatory data breach notification laws back in the forefront of Australia Parliament priorities.
    With cybercrime and cyber threats exponentially increasing, organisations need to ensure their data security strategy is both comprehensive and stringent enough to deal with internal, external threats, audits and legislation.
    This webcast will explain and guide organisations in order to effectively prepare for the forthcoming legislation but to also better prepare your business to thwart the on-going cyber risks it faces daily.
    During the session, you will:
    a)Understand how the complexity and sophistication of cyber threat can damage your business
    b)Outline the proposed data breach notification and what it means for your business
    c)Highlight a best practice approach to safe-guarding your data"
  • Thwarting Advanced Threats with Trusted Crypto Recorded: Sep 3 2015 60 mins
    John Grimm of Thales e-Security and John Pescatore of the SANS Institute
    "The dangers posed by advanced targeted attacks are real. Enterprises have come up against the limitations of approaches such as intrusion detection and signature-based malware detection. One promising avenue to explore is trusted crypto, which can help ensure that an application, for example, is doing just what its developers intended and has not been tampered with. Things can be taken a step further with trusted execution environments.

    In this webcast, John Grimm of Thales e-Security and John Pescatore of the SANS Institute will discuss the gaps in current best-practice defenses and the ways that trusted crypto and trusted execution environments can help fill those gaps."
  • Protecting Your Sensitive Data Does Not Have to Impact Business Operations Recorded: Sep 17 2014 61 mins
    Juan Asenjo, Senior Product Marketing Manager, Thales e-Security, Mark Bower, VP Product Management , Voltage Security
    "Highly publicized software attacks and data breaches, combined with strict regulatory requirements, reinforce the ongoing risks associated with cardholder data at all points in the payment stream. The risks to data are everywhere, and your organization is ultimately responsible for the security of customers’ personally identifiable information (PII). This means you must protected PII not only during transaction processing, but also through business processes such as charge-backs, loyalty or repeat payments, storage and analytics – including outsourced environments.
    Voltage SecureData™ enables you to ensure sensitive data is de-identified while maintaining logical and referential integrity so it can remain in a protected state while still usable for critical business processes. Integration of Voltage SecureData with Thales nShield® hardware security modules (HSMs) provides enhanced safekeeping and management of critical cryptographic keys that underpin the security of the process. Enforced protection of sensitive data using policy driven data security enables you to protect PII across your entire workflow without disrupting operations and ensuring you can adhere to privacy regulations."

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Persistent Information Protection, Deploying Microsoft RMS with Thales HSMs
  • Live at: Feb 12 2014 7:30 pm
  • Presented by: Microsoft, Synergy and Thales
  • From:
Your email has been sent.
or close