Hi [[ session.user.profile.firstName ]]

Secure Data Gathering and Analytics: PKI Solutions with Hardware Root of Trust

Organizations today gather unprecedented amounts of data from their operations to create new opportunities and to customized marketing, business, and services for their users and customers. Every transactions and exchange within the enterprise is creating more data that when analyzed, can produce valuable insight. Whether the data comes from a person or from a connected device such as a sensor, data collected is becoming essential for decision-making. Therefore, protecting the integrity of connected devices collecting this data is critical to ensure the trustworthiness of the system. Public key infrastructures (PKIs) provide the framework to secure the identity of devices to ensure integrity and confidentiality of data collected and exchanged. Using asymmetric cryptography, PKIs sign all certificates used to identify devices collecting data. Protecting the signing keys used for this purpose is essential to ensure a root of trust. In this webinar, we will examine how PKI-based solution provide a mechanism for secure identification, so you can trust your devices and the data they collect. The session will explain how hardware security modules (HSMs) help establish a root of trust, and provide examples and use cases.

Join the webinar to learn how you can use connected devices with a PKI and an HSM to:

• Improve your data gathering capabilities
• Protect the integrity of your critical data
• Defend organization from data breaches
• Secure all analytics and decision making

** This webcast was recorded when nCipher Security was part of Thales **
Recorded Nov 6 2018 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Juan Asenjo, Sr. Mgr. for Solutions Mktg, Thales eSecurity & Julie Lassabliere, Digital Mktg and Communication PM, Safelayer
Presentation preview: Secure Data Gathering and Analytics: PKI Solutions with Hardware Root of Trust

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Primekey et nCipher génèrent efficacement des signatures certificats sécurisés Recorded: Mar 12 2020 39 mins
    Pierre Codis, Director of Sales, Southern Europe, PrimeKey and Jerome Beclin, Sales Solution Engineer, nCipher Security
    La digitalisation des entreprises, le commerce électronique, la vague Smart Factory, l’Internet des Objets en Industrie (IIoT) offrent des opportunités uniques, des réductions des coûts et l’augmentation de la productivité.
    Néanmoins, il est indispensable de connaître les risques que cela implique et les bonnes pratiques en cyber-sécurité.

    La base de la confiance numérique des individus, des serveurs, des machines et autres équipements, bref des objets, est fondée sur les Infrastructures à clés publiques (ICP ou PKI).
    Les systèmes de gestion des certificats numériques permettent des mesures efficaces, peu couteuses pour mettre en place un niveau élevé de sécurité numérique.

    La techno PKI est le standard de-facto en sécurité dans l’IIoT !

    Participez à ce webcast en direct afin de :

    • Découvrir comment la solution PKI de PrimeKey sécurise les objets connectés depuis leur fabrication usine jusqu’à leur déploiement et exploitation.

    • Connaitre l’importance clef des modules de sécurité matériels de nCipher (nShield HSM) combinés à la PKI et à la signature numérique des applications.

    • Découvrir comment l’Agence Nationale de Certification Électronique (ANCE), qui représente le plus haut niveau de confiance dans les transactions électroniques, a lancé le projet « Digital Tunisia 2020 » avec PrimeKey et nCipher Security, permet de sécuriser les transactions électroniques des citoyens et des entreprises en Tunisie, en conformité aux standard ETSI.
  • Enterprise code signing-Protecting your customers’ intellectual property & brand Recorded: Feb 13 2020 48 mins
    David Low, VP of Worldwide Professional Services, nCipher Security
    The digital signing of applications, firmware, and other software is growing rapidly – driven by regulatory requirements, customer demands, and the desire to increase overall security. The digital identities used to prove the authenticity and integrity of these valuable assets must be properly managed and protected to prevent malicious actors from using these assets as a means of attack. This webinar will discuss the potential ramifications of such attacks, how they can be mitigated, and how organizations can evolve existing code signing islands into a secure, well defined process.

    • Overview of Code Signing
    • Common issues/threats related to code signing
    • Business Risks of insecure code signing
    • Overall Code Signing Requirements
    • nCipher Code Signing Solution
  • Webinar - Building IoT security: cloud connected does not mean less protected Recorded: Jan 21 2020 60 mins
    James Penney - Chief Technology Officer, Device Authority and Juan Asenjo - Dir. Marketing, nCipher Security
    The Internet of Things (IoT) presents a business opportunity across almost every industry. But to be successful, IoT security must become a primary focus. IoT brings new security challenges introduced by the scale and pace of adoption, as well as the legal and safety consequences of compromised security.

    It’s one thing to connect an IoT device, but how do you manage the security lifecycle of thousands, possibly millions of devices? Often devices are in the field for 5-10 years. The management of these devices can become a resource headache with high costs if dealt with manually. Not to mention the risk of human error.

    Today there are various IoT platforms available to connect your devices, applications and data to in order to gain valuable insights. Microsoft Azure IoT is a popular choice and will be a focus point for the discussion.

    Join this webinar to:

    • Learn about at recent IoT breaches
    • Discover key aspects of managing IoT security operations and applying IoT lifecycle management
    • Explore best practice for building an IoT root of trust using Microsoft Azure
    • Find out about HSM as a Service and its key benefits
    • Learn about real IoT use cases: How to overcome/mitigate security risks in a cost-effective way
  • Why your encrypted data is at risk Recorded: Nov 14 2019 46 mins
    Jose Diaz, Prime Factors, Justin Teitt, Prime Factors and Juan Asenjo, nCipher Security
    Data has never been more plentiful or more valuable, nor has it ever been more at risk from theft. Though billions of dollars are spent each year on cybersecurity, data breaches continue – everywhere.

    To comply with both industry standards and government regulations as well as protect valuable sensitive information, most large enterprises deploy data protection solutions as part of their cybersecurity strategy. However, due in large part to vulnerabilities not addressed by traditional data protection solutions, most enterprises continue to have sensitive data unprotected where it is most at risk to unauthorized access.

    Join the webcast to learn:

    • Why traditional data protection solutions do not address all security threats
    • How you can identify particular vulnerabilities in enterprise data protection
    • What to do to protect data where it is most exposed and susceptible to theft
  • Are you vulnerable? Benchmark your PKI and IoT security Recorded: Nov 13 2019 61 mins
    John Grimm, nCipher Security and Larry Ponemon
    Organizations are expanding the scope of their PKIs for IoT projects and other core enterprise initiatives, but are continuing to miss the mark on security best practices. Skill and resource shortages particularly around PKI security leave enterprises vulnerable and unprepared to combat the latest threats.

    Join this webcast to learn about:
    • Top PKI and overall security capabilities most needed for the IoT
    • How to address best PKI security practices that organizations are most often failing to implement
    • Trends in PKI deployment by industry and by country
  • Why trust integrity and control are more important today than ever before Recorded: Oct 29 2019 52 mins
    Juan Asenjo, Ph.D., Director of Product, Solutions and Partner Marketing – nCipher Security
    Today’s interconnected business environment and data-driven economy depend on trust. As a critical resource, the security of data in storage, transit, and use is vital. Organizations must protect themselves from breaches that can affect their reputation and capitalize on using their data to stay competitive. Trusting systems to protect data integrity and derivative insights, organizations must stay in control.

    Technologies help protect data from the point of collection, through aggregation and analysis, to the time action is taken on analytical results. From credential management, digital signing, encryption, tokenization, cloud deployments, and analytics, cryptographic tools provide mechanisms to protect data. However, underpinning these processes, cryptographic keys must be protected and managed properly.

    This webcast examines best practices for sound data protection strategies that help you achieve digital transformation with confidence. Our speaker, Juan Asenjo from nCipher Security, an EDC company, identifies the challenges faced by organizations when collecting and using increasing amounts of data. He also highlights the need to maintain confidentiality and integrity, and ensure compliance with data privacy requirements.

    Join this webcast to learn:

    Importance of trusted devices, data, and analytics.
    Critical aspects of data confidentiality and integrity.
    Establishing a root of trust to manage cryptography.
  • Steering Clear of Key Management Pitfalls in Banking Recorded: Oct 1 2019 50 mins
    Ed Wood - Director of Product Management at Cryptomathic and Kevin McKeogh - Director, Product Management at nCipher Security
    Loss, theft or misuse of a single critical key can put your organisation on the front page; damaging your reputation, credibility and even put you out of business. Despite its critical importance, key management often doesn't get the attention and investment it requires.

    This webinar will look at:
    ● Current trends and challenges of lifecycle key management in banks and FSIs
    - The reality of key-management practices in even mature organisations today
    - What we have seen happening over the last 10 years
    ● Confidently complying with internal / external standards
    - FIPS and PCI: what you need to know about their intersection
    - Pathway to efficiently or effectively demonstrating compliance
    ● Risk : the obvious and not-so-obvious
    - Common mistakes: errors or omissions in key management practice
    - Conspiracy: rogue / bad-actors have huge potential for damage
    - Spelling out the consequences.
    ● Real-world example / case study from leading acquirer in Europe – Swedbank adopts
    centralised key management across acquiring and terminal network
    - Hear from a bank about their motivation and experience of implementing automated
    lifecycle key management
    ● Why is it important to act now?

    This webinar is for you if you are responsible for:
    1. Managers of products / services highly dependent on cryptography.
    2. Security / Cryptography practitioners (key and cryptography policy management).
    3. Auditors / Compliance managers.

    Cryptomathic and nCipher address the key management challenges experienced by banks and FSIs with a certified centralised banking-grade key lifecycle management platform.
  • Encrypt Tokenize Repeat – Comprehensive data security for the enterprise Recorded: Sep 4 2019 14 mins
    Jose Diaz - Vice President of Products and Services at Prime Factors
    This presentation highlights the importance of encryption, tokenization, and masking as vital tools for a comprehensive enterprise data security program. The session describes how Prime Factors' EncryptRIGHT simplifies application level data protection with an nCipher nShield hardware security module (HSM) root of trust.

    Watch video and learn how to:
    - Address challenges of protecting sensitive enterprise data
    - Implement data protection policies at the application layer
    - Use encryption, tokenization, and data masking techniques
    - Anonymize and pseudonymize sensitive data for compliance
    - Establish robust hardware-based cryptographic root of trust
  • Perform Like a Conductor - Automated and Secure Key Orchestration Recorded: Aug 23 2019 10 mins
    Paul Cleary - Ecosystem Architect at Venafi
    Perform Like a Conductor - Automated and Secure Key Orchestration with Venafi and nCipher

    This presentation highlights how to orchestrate automatic and secure machine identity and code signing with a robust root of trust using Venafi and nCipher technology.

    - Demand for machine identities
    - Challenges with technology
    - Addressing key orchestration
    - Importance of code signing
    - Establishing the root of trust
  • In PKI we trust securing transactions & identities in a digital world Recorded: Aug 16 2019 8 mins
    Marlon Lorde - Senior Sales Executive at Entrust Datacard
    In PKI we trust securing transactions & identities in a digital world-Entrust Datacard & nCipher

    This presentation focuses on how connected employees, customers, systems, and things are transforming the way businesses is done. The need for secure identities in an increasingly digital world is discussed, and the impact that inadequate digital trust has on the way we conduct business transactions is described. The session presents how Public Key Infrastructure (PKI) solutions address these challenges with trust, integrity , and control.

    - Business transformation
    - Increasing digital identities
    - Critical role of the PKI
    - Need for root of trust
    - Available solutions
  • nCipher Micro Focus Voltage Recorded: Aug 16 2019 15 mins
    Carole Murphy, Global Product Marketing Senior Manager for Micro Focus Voltage
    Carole Murphy, Global Product Marketing Senior Manager for Micro Focus Voltage, explains how to achieve data-centric information protection across the enterprise with Micro Focus Voltage and nCipher technology.

    Learn how to:
    - Make safe use of data for innovation
    - Protect data for privacy and analytics
    - Securely manage cryptographic keys
    - Establish a certified HSM root of trust
  • Don’t Just Manage Your Keys. Orchestrate Them! Recorded: Aug 16 2019 10 mins
    Mr. Jeremy Sturm - Director of Sales Engineering at Fornetix
    Today's interconnected business environment increasingly uses security technologies to protect data confidentiality and integrity. This need is creating a growing challenge for traditional cryptographic key management practices that demands careful orchestration of keys and their use policies across the many platforms deployed across organizations.

    - Problems with traditional key management practices
    - Challenge integrating them with existing technologies
    - Advantage of a comprehensive key orchestration plan
    - Establishing a root of trust for key lifecycle automation
  • Integrating nCipher and IBM Security Key Lifecycle Manager for customer success Recorded: Aug 14 2019 10 mins
    Rick Robinson, World wide Offering Manager at the IBM Security Group
    This brief presentation describes the threats that customer data is typically exposed to during rest, transit, and use, and the challenges involved in protecting the data through cryptography. The session focuses on the need to establish a root of trust for the safeguarding and management of underpinning cryptographic keys throughout their lifecycle, and highlights how nCipher and IBM solutions address this with standards-based systems designed to provide maximum efficiency and robustness.

    - Threat
    - Challenge
    - Solution
    - Why IBM and nCipher
  • What's driving security trends in the Middle East? Recorded: Jul 17 2019 30 mins
    Hamid Qureshi, Territory Sales Manager - Middle East, nCipher Security
    We surveyed hundreds of organizations in the UAE and Saudi Arabia for our annual Middle East Encryption Trends Study with global researchers, Ponemon Institute. The results reveal an increase in the use of emerging technologies like IoT and Docker containers, which open the door to new security vulnerabilities. In response, security leaders are broadening their use of encryption and strong key protection to protect sensitive data against theft and other threats. Join Hamid Qureshi in this session to;

    -discover these key security trends
    - learn how your peers are addressing their evolving business
    - understand how nCipher can help you secure your critical data and
  • Innovative Information Protection for a Data-Driven Economy Recorded: Jun 26 2019 103 mins
    Juan C. Asenjo, nCipher Security and Carole Murphy, Micro Focus Voltage
    This web conference will provide insights on how to secure the growing data flows driving today’s global economy. Our experts will outline best practices for safely using data to optimize performance, enable new services, and transform existing business models, while addressing evolving threats and managing risks. The web conference will focus on the best ways of handling sensitive customer and transactional data, including healthcare and financial information, in light of the impact that the growing Internet of Things (IoT) is having on the capability to collect, analyze, and derive new customer insights and other business intelligence. Our speakers will identify the challenges faced by organizations that collect and use increasing amounts of data and need to maintain its confidentiality and integrity, and ensure compliance with data privacy requirements. The conference will close with a description of associated solutions underlining encryption, cryptographic key management, and the establishment of a secure root of trust, and recommendations on how to put these solutions in practice.

  • Scalable web traffic visibility with Gigamon and nCipher Recorded: May 28 2019 14 mins
    Bassam Khan, VP - Product and Technical Marketing at Gigamon
    This presentation highlights the importance of having web traffic visibility and ensuring that your tools can keep a watchful eye over the whole of your network using technology from Gigamon and nCipher.
  • In PKI we trust – secure & high-performing identity management Recorded: May 22 2019 11 mins
    Graham McCord, Senior Manager for Strategic Alliances at Entrust Datacard
    This presentation highlights the importance of trusting your public key infrastructure to deliver secure and high performing identity management services, and how you can achieve this objective using technology from Entrust Datacard and nCipher.
  • Global encryption trends -- is your organization keeping pace? Recorded: May 15 2019 61 mins
    Dr. Larry Ponemon, Ponemon Institute and John Grimm, nCipher Security
    Corporate data breaches are in the headlines on an almost daily basis, while business critical applications face malicious threat, or are accidentally compromised by employee mistakes. The 2019 Global Encryption Trends study, with data from almost 6000 respondents in 14 countries/regions, reveals:

    - How organizations in different industries and countries are using encryption to protect sensitive data
    - What use cases for hardware security modules (HSMs) are growing the fastest
    - Features of encryption solutions that organizations value the most

    Join Dr. Larry Ponemon and John Grimm for an overview of the top findings of this industry-leading study on encryption trends, and advice on addressing encryption's top challenges.
  • Perform Like a Conductor – Automated and Secure Key Orchestration with Venafi Recorded: May 1 2019 11 mins
    Ben Rogers,Senior Solutions Architect, Venafi
    nFinity partners spoke at nCipher RSA booth to highlight strengths of a combined nCipher / partner product integration.
  • Proactive Data Defence for Digital Transformation Recorded: Nov 22 2018 32 mins
    Brett Bourke Abela, Senior Sales Engineer, UK, Thales eSecurity
    In the third of our #CoffeeBreak webcasts, Chris Ogilvie interviews Brett Abela, Thales eSecurity Sales Consultant on proactive data defence for digital transformation.

    Digital transformation is business enhancing but fraught with danger. With services moving into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, with more and more of your corporate attack surface being exposed.

    The rise of cloud and the Internet of Things (IoT), has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.

    Join Chris and Brett for the third “coffee break” webcast when they will discuss:
    a) Key security considerations for a digital transformation strategy
    b) Why a proactive data defence strategy is crucial
    c) The benefits of maximising the level of control over data irrespective of where it is created, stored or shared.
    d) How can enterprises regain control of their data security?

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Secure Data Gathering and Analytics: PKI Solutions with Hardware Root of Trust
  • Live at: Nov 6 2018 3:00 pm
  • Presented by: Juan Asenjo, Sr. Mgr. for Solutions Mktg, Thales eSecurity & Julie Lassabliere, Digital Mktg and Communication PM, Safelayer
  • From:
Your email has been sent.
or close