Hi [[ session.user.profile.firstName ]]

Are you vulnerable? Benchmark your PKI and IoT security

Organizations are expanding the scope of their PKIs for IoT projects and other core enterprise initiatives, but are continuing to miss the mark on security best practices. Skill and resource shortages particularly around PKI security leave enterprises vulnerable and unprepared to combat the latest threats.

Join this webcast to learn about:
• Top PKI and overall security capabilities most needed for the IoT
• How to address best PKI security practices that organizations are most often failing to implement
• Trends in PKI deployment by industry and by country
Recorded Nov 13 2019 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Grimm, nCipher Security and Larry Ponemon
Presentation preview: Are you vulnerable?  Benchmark your PKI and IoT security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Strengthening containerized application deployments with HSMs Jun 23 2020 8:30 am UTC 45 mins
    Amogh Ranade, Senior Solutions Consultant at nCipher Security
    The adoption of container technology continues to intensify. In fact, Gartner predicts that more than 75% of organizations will use containerized applications by 2022.

    When containerized applications incorporate the use of encryption to protect sensitive data and systems, the underlying encryption keys must be secured. The use of hardware security modules (HSMs) to safeguard cryptographic keys is not only a recognized best practice but is often required by compliance mandates.

    With containerization development to release phases being fast-paced it is critical for you to have a proven deployment model and scripts to help reduce the overall cycle.

    Join this live webcast to:
    -Learn how nShield Container Option Pack makes it easy to build HSM support into containerized solutions and provides a template deployment model that allows you to focus on the containerized application without having to worry about the HSM integration
    -Understand how the flexible deployment options allow you to easily create brand new containerized applications, integrate an HSM with an existing containerized application, or use nShield as a Service for cloud hosted HSM deployments
    -Discover the extensive scalability offered with no enforced limitation on the number of hardserver or application containers, working with any number of container hosts (physical or virtualized server instances
  • Remote agreements & approvals: keep secure and compliant with digital signatures Jun 18 2020 12:00 pm UTC 60 mins
    Sebastien Tormos, Director, Entrust Datacard
    With remote work becoming today’s new normal, organisations need to rethink their processes as face-to-face and paper-centric interactions are no longer necessarily acceptable.

    This webinar will give you information and insight into efficient processes around business agreements, contracts and approvals with the help of digital signatures.

    You will learn:

    - What digital signatures are
    - Which types of document they cover
    - Which benefits they bring to organisations, not just from a remote working perspective but also taking other areas into account such as legal, finance, compliance, security etc.
  • PKI Heute, neue Entwicklungen und Zukunftsaspekte Jun 17 2020 12:00 pm UTC 45 mins
    Bernd Stamp – nCipher, Stefan Bumerl – CRYPTAS
    PKI hat sich in mehr als 30 Jahren zu einem umfassenden Security Backbone entwickelt der vielfach unterschätzt wird. Alternative Systeme bieten bei weitem keine vergleichbaren Möglichkeiten. Die Funktionsvielfalt in Kombination mit Theoretikern haben zum Teil verschreckt, dabei ist PKI heute jünger und frischer denn je und mit einem praktischen Blick darauf auch sehr gut einzusetzen!

    In drei aufeinander folgenden Webinaren beantworten die Spezialisten von nCipher und CRYPTAS die Frage: Wo geht es mit den aktuellen Entwicklungen der PKI hin und was saget/bietet der Markt dazu?

    PKI Heute - In diesem ersten von drei Webinaren werden die folgenden Themen diskutiert:

    - PKI -> Ein Überblick.
    - Von Personen zu Dingen.
    - Entwicklung von Bedarf und Wichtigkeit.
    - Heutige und künftige Herausforderungen.


    Im Anschluss an diese drei Webinare wird CRYPTAS in Zusammenarbeit mit nCipher und anderen Partnern im Herbst 2020 einen PKI-Roundtable organisieren. Weitere Informationen werden folgen, und Sie sind im Voraus herzlich willkommen.
  • Take your workforce passwordless and touchless - APAC Jun 12 2020 5:00 am UTC 30 mins
    Jenn Markey - Product Marketing, Entrust Datacard
    Long before this year brought about a new normal, passwords were no one’s favorite – insecure from an IT perspective and annoying to users. Now there’s even more issues with passwords with remote workforces being particularly susceptible to phishing attacks and concerns over surface transmission for essential workers. Now, more than ever before, it’s time to go passwordless and touchless. Participants in this webinar will gain:

    - An overview of the current threat landscape with respect to passwords
    - Insight into passwordless specific use cases like healthcare and remote workforces
    - An understanding of the difference between passwordless experience and passwordless authentication
    - Best practices for implementing passwordless authentication
  • Take your workforce passwordless and touchless Jun 10 2020 3:00 pm UTC 30 mins
    Jenn Markey - leads product marketing for Entrust Datacard’s authentication business segment
    Long before this year brought about a new normal, passwords were no one’s favorite – insecure from an IT perspective and annoying to users. Now there’s even more issues with passwords with remote workforces being particularly susceptible to phishing attacks and concerns over surface transmission for essential workers. Now, more than ever before, it’s time to go passwordless and touchless. Participants in this webinar will gain:

    - An overview of the current threat landscape with respect to passwords
    - Insight into passwordless specific use cases like healthcare and remote workforces
    - An understanding of the difference between passwordless experience and passwordless authentication
    - Best practices for implementing passwordless authentication
  • Il primo passo verso la conformità al Regolamento eIDAS Jun 10 2020 12:00 pm UTC 60 mins
    Umberto Sansovini, Territory Sales Manager, nCipher Security and Serafini Claudio, Senior Sales Engineer, nCipher Security
    Il Regolamento eIDAS presenta opportunità significative per le aziende che gestiscono transazioni online con i cittadini europei. Al tempo stesso, introduce anche nuovi requisiti.

    Gli hardware security module (HSM) nShield sono una componente fondamentale che contribuisce alla sicurezza delle soluzioni per l'emissione di certificati e firme digitali o di marcature temporali conformi al Regolamento eIDAS.

    Partecipa a questo webcast in diretta per:

    - capire in che modo un HSM nShield costituisce la root of trust dei sistemi di protezione dei dati crittografici utilizzati per la creazione e la gestione delle chiavi di crittografia e di firma, oltre che per l'esecuzione di codice sensibile;

    - scoprire come i nostri HSM si integrano perfettamente con la tecnologia dei nostri partner, tra cui Cryptomathic, Intesi Group, Safelayer e Nexus, all'interno di prodotti e servizi che soddisfano i requisiti del Regolamento eIDAS;

    -apprendere come i nostri clienti utilizzano gli HSM per offrire soluzioni conformi al Regolamento eIDAS, come certificati, passaporti e documenti di identità elettronici, l'autorizzazione delle transazioni e la PKI per i dispositivi mobili.

    Ti aspettiamo.

    Umberto Sansovini
    Territory Sales Manager – Italy
  • How to quickly and securely verify consumer identities - APAC Jun 5 2020 2:00 am UTC 30 mins
    Jenn Markey, Product Marketing, Entrust Datacard
    2020 has brought about a new normal. One of the biggest changes has been the rapid rise in businesses and consumers interacting and transacting online. While ecommerce, online banking, and other digital services are hardly new, many people and businesses that were slow to adopt such models now find themselves wanting, and in many cases, needing to go online. And that introduces the challenge of securely verifying customer identities, especially when an in-person identity check is not feasible.
    Modern identity proofing keeps your customers safe and protects your organization.

    Learn best practices to:

    - Securely verify consumer identities
    - Limit user friction in the verification process
    - Protect consumer identities
    - Minimize fraud exposure
  • Meeting Demand for Telemedicine with Secure IoT Solutions Recorded: Jun 3 2020 47 mins
    James Penney and Julio Merette, Device Authority and Juan Asenjo, nCipher Security
    Learn how healthcare providers & hospitals can leverage IoT technology to deliver safe routine care.

    As front-line healthcare workers address the novel coronavirus pandemic, optimization of healthcare resources has become critical. In parallel, healthcare professionals delivering routine care must continue to treat their patients with existing conditions. The current situation is testing telemedicine’s ability to deliver safe and secure routine medical care.

    Telemedicine, along with remote monitoring and diagnostic capabilities, enable the delivery of routine care, particularly during times when face-to-face appointments are not always possible or deemed essential. Being able deliver these services safely and securely is critical.

    This webinar will explore how healthcare service providers and hospitals can leverage telemedicine and IoT technology to help tackle resource constraints and continue to deliver safe routine care.

    Telemedicine and the deployment of connected/IoT medical devices enables doctors to continue to deliver care remotely. Ensuring the safety and security of this delivery method relies on the privacy and integrity of data collected from patients.

    Before the pandemic, Forbes had predicted that approximately 161 million connected medical devices were going to be deployed in hospitals, clinics, and medical offices by 2020. However, along with the growing digitization of medical records and services comes rising cybersecurity threats. Not only is privacy a concern, but integrity is paramount in order to ensure patient safety and trust.

    Join this webcast to learn how:
    • Technology can help healthcare practitioners deliver routine care at a time when people can’t or don’t want to visit a doctors’ office
    • Telemedicine platform/service providers can enhance security with trusted device authentication and data protection
    • Secure IoT can deliver more comprehensive and safe telemedicine services
  • eIDAS Trust Services – go paperless with an electronic seal Recorded: Jun 2 2020 51 mins
    Michal Hanzal, Solution Consultant at SEFIRA and Ena Hurmola, Senior solutions consultant from nCipher
    nCipher hardware security modules (HSMs) play a vital role in helping companies meet eIDAS regulation through integrations with a number of leading technology vendors who provide a range of services including digital signing and electronic seals.

    Going paperless and embracing a fully digital approach has become increasingly important. Sefira, one of nCipher’s technology partners, provides an electronic seal solution that supports digital signing.

    Join us on June 2 for an informative webinar to learn more about eIDAS and electronic seals including:
    • How to go digital with confidence
    • What is an electronic seal and how does it work
    • The Sefira solution - the OBELISK Seal
    • The need for hardware security modules (HSMs)
    • A robust electronic seal solution with nCipher HSMs

    Register today and learn how nCipher HSMs combine with Sefira’s technology to provide electronic seals for a paperless future.
  • How to quickly and securely verify consumer identities online Recorded: May 27 2020 24 mins
    Jenn Markey, Product Marketing, Entrust Datacard
    2020 has brought about a new normal. One of the biggest changes has been the rapid rise in businesses and consumers interacting and transacting online. While ecommerce, online banking, and other digital services are hardly new, many people and businesses that were slow to adopt such models now find themselves wanting, and in many cases, needing to go online. And that introduces the challenge of securely verifying customer identities, especially when an in-person identity check is not feasible.
    Modern identity proofing keeps your customers safe and protects your organization.

    Learn best practices to:

    - Securely verify consumer identities
    - Limit user friction in the verification process
    - Protect consumer identities
    - Minimize fraud exposure
  • The future of the payment card Recorded: May 27 2020 60 mins
    Jean-Louis Director of Payment Solutions EMEA
    Payment markets have historically tended to evolve slowly over time. People are creatures of habit, and this is no less true for the way that we pay for things than it is for other aspects of day-to-day life. In recent years however, we have seen a rapid rate of technological change and significant innovation in payment methods that have brought ever-greater choice in how we pay for things!

    Entrust Datacard have been in business for over 50 years and continue to be global leaders in the field of payment cards!

    So, I guess the question is; how can we prepare ourselves for the future?

    In our unique webinar Entrust Datacard’s Director of Payment solutions looks at the evolution of the payment card, and why change brings valuable opportunity!

    We will look at:

    - Alternative payment methods and threats for the card (payment apps, digital wallet, cryptocurrencies, QR code, IoP, regulations).

    - New opportunities in the world of the payment card! Especially with the impact of COVID 19.

    - Entrust Datacard will also look at why it’s going towards a physical and digital convergence.
  • Best practices for verification to support reduced certificate lifetimes Recorded: May 22 2020 35 mins
    Dathan Demone, Director Verification Services, Entrust Datacard
    Join us for our "Road to 398" webinar that discusses upcoming certificate lifetime reductions.

    During this 30-minute webinar, our verification expert will share tips, tools, and best practices for verification processes that support reduced TLS/SSL certificate lifetimes and maintain compliance.

    • Updates on CA/B Forum requirements for verification around shorter certificate lifetimes
    • Tools for renewing certificates in bulk with fewer touch points
    • Methodologies for streamlining certificate verification
    • Insights and best practices from some of our other customers
  • How to effectively secure your remote workforce - Asia Pacific Recorded: May 22 2020 24 mins
    Jenn Markey, Product Marketing, Entrust Datacard
    2020 has introduced many new normals, working from home being one of them. This also increases the threat landscape for IT. Employees are connecting to company resources in a different way, many using their own devices. Then there are the added distractions that come with working from home. Attendees will learn authentication best practices to:

    - Keep corporate assets secure
    - Protect and verify worker identities
    - Help remote employees stay productive
    - Reduce the administrative burden on IT

    Jenn Markey leads product marketing for Entrust Datacard’s authentication business segment. She is responsible to help build the company’s authentication market profile, customer footprint, and strategic business value. Over the duration of Jenn’s career, she has held senior marketing, product management, and business development positions with several dynamic technology companies across the software (including SaaS), security, video production, telecom, and semiconductor industries. Jenn resides in Ottawa, where she is also a practicing yoga teacher.
  • Key Management for the Hybrid-cloud: 3 steps to enforce security Recorded: May 21 2020 58 mins
    Johannes Lintzen, Cryptomathic, Sander Temme, nCipher
    As the banking and financial services industry adopts more cloud-based services to better serve their customers, they must keep in mind that the loss, theft, or misuse of a single critical cryptographic key can have significant impact on the business. Despite its critical importance, key management often doesn't get the attention and investment it requires. This webinar will highlight why it is essential to maintaining robust key management to secure on-premises and cloud-based services.

    Our speakers will review current cloud migration trends in the industry, and discuss the challenges that these present. The painful and surprising reality of current key management practices in many mature banks will be examined, and practical solutions presented using a real-world case study. The webinar will focus on the urgent need to properly orchestrate and manage key life-cycles across growing volumes of applications, to ensure security and compliance with internal and external standards.

    Join this webinar and learn:

    • Why is it important to act now as you migrate to cloud?
    • How to navigate the FIPS and PCI standards landscape?
    • How to effectively prove compliance with regulations?

    This webinar is for you if you are responsible for:

    1.Managing financial organizations’ secure online services
    2.Establishing / enforcing cryptographic security policies
    3.Overseeing security best practices in your organization
    4.Auditing and ensuring your organizational compliance

    Cryptomathic and nCipher address the key management challenges experienced by banks and FSIs with a certified centralized banking-grade key lifecycle management platform.
  • Fully digital, trusted, and open for business Recorded: May 19 2020 45 mins
    Claudio Serafini - nCipher, Guillaume Forget - Cryptomathic and Elzbieta Wlodarczyk, KIR
    Ensuring continuity of service with eIDAS remote signatures.

    Now, more than ever, we need to be taking every opportunity to create a secure, cashless and paperless world, one that appropriately supports citizens and businesses. During prolonged periods of social distancing, which may prevent legally binding documents from being signed, the availability of remote qualified e-signature (QES) services is essential for business continuity.

    We invite you to join us for an informative webinar about the technology available to meet eIDAS-compliant QES. Discover how to deliver remote digital signatures for business continuity, enhanced security, and superior customer experience, while reducing operational costs. You’ll also hear from KIR, the Polish national payments processor, about what they learned while deploying a remote QES service and the value it offers to internal and external stakeholders.

    Join this webinar and learn about:

    · How a leading qTSP deployed remote QES for an end-to-end digital customer journey
    · Market observations and digitalization trends
    · Achieving the highest qualified assurance level and passing compliance audits
    · Using existing IT infrastructure for e-signatures
    · Reducing operational cost of document management

    This webinar is for you if you are responsible for:

    - Managing digitalization and IT delivery
    - Overseeing security best practices in your organization
    - Auditing and ensuring your organizational compliance
  • Securing your PSD2 transactions Recorded: May 14 2020 50 mins
    Kornel Reti,PKI expert-Research engineer,Microsec,Ena Hurmola-PKI Security Consultant nCipher Security
    How to make the most of PSD2 opportunities while improving security

    Join us on May 14 for this PSD2 security webinar with Ena Hurmola, PKI Security Consultant at nCipher Security and Kornel Reti, PKI expert research engineer at Microsec (QTSP).

    This session is designed to support Payment Service Providers (PSPs) by offering knowledge on how to provide a secure background for PSD2 transactions based on Public Key Infrastructure (PKI). The webcast will cover:

    • PSD2 security requirements in access-to-account and strong customer authentication
    • Understanding the critical function of PSD2-specific qualified certificates (a.k.a. “eIDAS certificates”)
    • How to create trust between PSPs without a direct contractual link
    • Understanding the role of nCipher hardware security modules (HSMs) at a leading PSD2 certificate service provider
    • Insight for PSPs about the security aspects of access to accounts and user data protection during server to server communication
  • Arrow, F5 and nCipher stronger together Recorded: May 14 2020 31 mins
    Astrid van Luijken-Channel&Distribution-Manager-F5 Networks,Will Bowles,Sales-Engineer nCipher,Peter Gowdy,Channel SM,ncipher
    Jouw klanten zijn in toenemende mate afhankelijk van de digitale wereld bij het leveren van goederen en diensten. Om te kunnen vertrouwen op deze onlineapplicaties en om downtime te voorkomen, wordt gebruik gemaakt van application delivery controlers (ADCs).
    ADCs van F5 verwerken een hoog volume SSL/TLS, beschermen internetverkeer om een maximale transactiesnelheid te waarborgen waardoor gebruikers een optimale ‘user experience’ ervaren.
    nCipher hardware security modules (HSMs) bieden de noodzakelijke ‘root of trust’ om kritische SSL/TLS encryptiesleutels en -certificaten te beschermen. En te voldoen aan de meest strikte compliance-regelgeving, en beschermen van de klantgegevens.

    Leer in 30 minuten:
    · Alles over de kracht van de combinatie F5 ADCs samen met nCipher HSMs
    · Hoe deze combinatie een verbeterde bescherming biedt van kritische (applicatie) informatie met bijkomende compliancy voordelen
    · Wat de kansen in de markt zijn en hoe deze te verzilveren
    · Hoe je een F5-deal vergroot met nCipher
  • 2020 Global Encryption Trends: Are you protecting what matters the most? Recorded: May 13 2020 60 mins
    Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute; John Grimm, VP Strategy & Business Development, nCipher Security
    With the explosion and proliferation of data that comes from new digital initiatives and increased mobility, most organizations are expanding their use of encryption. And for the first time protecting customer data has become the number one priority.

    The 2020 Global Encryption Trends Study highlights how leading organizations are applying their encryption strategies, with detailed insights into the use cases that are growing the fastest.

    Join Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute, and John Grimm, VP of Strategy and Business Development at nCipher Security, as they review key insights and findings from this industry-leading study, and give advice on addressing encryption's top challenges. You'll take away:

    - Data to benchmark your encryption strategy by industry and by country
    - Where organizations are using Hardware Security Modules for increased trust and key protection
    - Features of encryption solutions that provide the most value
  • Protect your keys – or don’t waste your time encrypting your data Recorded: May 8 2020 31 mins
    Brad Beutlich Vice President of Sales Western Region and LATAM
    In these unprecedented times, our focus at nCipher Security is on protecting the health, security and productivity of customers, partners and colleagues. We also know that now more than ever, when dealing with new working environments, vulnerability risks and other issues, data protection is essential. We are here to support and protect your business critical data in these challenging times.

    Did you know that….
    • Cryptographic keys stored in software are not hard to find?
    • On average, a hacker has 160 days before they are detected in your network?
    • Modern encryption solutions cannot be decrypted through deciphering techniques?

    We’ll discuss why nCipher’s general purpose hardware security modules (HSMs) are used to solve real-world issues; regardless of company size or vertical market.

    You’ll also discover why it’s important to protect the crypto keys associated with Database Encryption, File Encryption, Digital Signatures & Certificates, IoT Device Certification, Blockchain, Digital Payments, SSL, PKI and more. Crypto keys are everywhere: We directly integrate with F5, Palo Alto, CyberArk, Gigamon and BeyondTrust, just to name a few.
  • Post Quantum Series: III. The Road to Post Quantum Crypto Agility Recorded: May 7 2020 51 mins
    Mike Ounsworth, Software Security Architect, Entrust Datacard
    Post quantum experts at Entrust Datacard have been working closely with think tanks and academic leaders who are doing advanced research on quantum computing. We’re sharing our insights on specific tasks that will help you plan and prepare your organization for a PQ world.

    • Common cryptographic protocols that will need to be migrated to post quantum
    • When to employ commonly used cryptographic applications and protocols and when to use different PQ algorithms
    • How to determine the right time to deploy post quantum crypto when different kinds of data have different “shelf-lives”
nCipher, an Entrust Datacard company
Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable and secure. Solutions range from the physical world of financial cards, passports and ID cards to the digital realm of authentication, certificates and secure communications.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Are you vulnerable? Benchmark your PKI and IoT security
  • Live at: Nov 13 2019 4:00 pm
  • Presented by: John Grimm, nCipher Security and Larry Ponemon
  • From:
Your email has been sent.
or close