Hi [[ session.user.profile.firstName ]]

Healthcare Goes Passwordless and Touchless

In this the fourth webinar in the Passwordless Series, we will look at Passwordless and Cloud-based Identities for Healthcare Workers

As we all prepare for a new era of work, there are some workforce authentication considerations specific to healthcare environments. Healthcare workers often access patient records and medical systems on shared workstations. As well, many employees work across multiple locations. This makes using a physical authenticator like a smart card a risk factor for surface transmission. Session participants will hear about:

- The unique authentication challenges and requirements for healthcare workers
- The importance of credential-based touchless authentication
- The real-world touchless identity case study of a critical care hospital network
Recorded Aug 26 2020 43 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jenn Markey - leads product marketing for Entrust Datacard’s authentication business segment
Presentation preview: Healthcare Goes Passwordless and Touchless

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Lanzamiento de nuestra nueva generación de impresoras,Sigma:Impresión inteligent Jan 27 2021 6:00 pm UTC 60 mins
    Karim Hala, LAC Instant ID Issuance Sales Director Entrust
    Acerca de este seminario web
    Nuestra nueva solución de emisión de tarjetas de identificación, Sigma, es simple, segura e inteligente resultando en la impresora de tarjetas de identificación más avanzada del mundo. Este seminario web destacará las características inteligentes de Sigma.

    Acerca de este seminario web
    Nuestra nueva solución de emisión de tarjetas de identificación, Sigma, es simple, segura e inteligente resultando en la impresora de tarjetas de identificación más avanzada del mundo. Este seminario web destacará las características inteligentes de Sigma.
  • Next Generation Sigma Launch: Smart ID Card Printing Dec 16 2020 6:00 pm UTC 60 mins
    Martin Hoff, Product Marketing Manager, Entrust
    Our new Sigma ID issuance solution is simple, secure, and smart. And together, that adds up to the world’s most advanced ID card printer ever. This webinar will highlight the smart features of Sigma.
  • Lanzamiento de nuestra nueva generación de impresoras, Sigma: Impresión segura d Dec 9 2020 6:00 pm UTC 60 mins
    Karim Hala, LAC Instant ID Issuance Sales Director Entrust
    Acerca de este seminario web
    Nuestra nueva solución de emisión de tarjetas de identificación, Sigma, es simple, segura e inteligente resultando en la impresora de tarjetas de identificación más avanzada del mundo. Este seminario web destacará las características de seguridad de Sigma.

    Acerca de este seminario web
    Nuestra nueva solución de emisión de tarjetas de identificación, Sigma, es simple, segura e inteligente resultando en la impresora de tarjetas de identificación más avanzada del mundo. Este seminario web destacará las características de seguridad de Sigma.
  • Managing secrets sprawl – 3 reasons why you need a root of trust Nov 26 2020 12:00 pm UTC 58 mins
    John Boero, Sr. Solutions Engineer, HashiCorp and Juan C. Asenjo, Ph.D., CISSP, nCipher Security
    As organizations migrate to the cloud to manage workloads in a more flexible and cost-effective manner, the number of passwords, PINs, keys, tokens, and other secrets used to access application platforms and data is increasing exponentially. Maintaining centralized repositories of secrets enables organizations to apply consistent protection policies that strengthen security and facilitate auditing and compliance.

    This webcast will look at the growing challenge faced when deploying centralized secrets management tools and how to mitigate risks associated with aggregation of sensitive assets. Our speakers will examine how cloud migration, DevOps, and regulatory compliance require a root of trust, and will describe best practices for deploying these solutions.

    Join the webcast and learn:
    • What challenges secrets sprawl represents for organizations
    • How centralized key management ensures consistent policy
    • Why cloud, DevOps, and regulations require a focus approach
    • Where is a root of trust required for high assurance security

    This webinar is for you if you are responsible for:
    1. Managing digital transformation and cloud migration
    2. Overseeing security best practices in your organization
    3. Auditing and ensuring your organizational compliance
  • Comment fermer votre coffre-fort à double tour: Hashicorp + nCipher Nov 25 2020 12:00 pm UTC 44 mins
    Gauthier DONIKIAN, Solutions Engineer, Hashicorp and Jerome Beclin, Sales Engineer, nCipher Security
    Au fur et à mesure que les organisations migrent vers le cloud, le nombre de mots de passe, PIN, clés, jetons et autres secrets utilisés pour accéder aux plates-formes applications et aux données augmente de façon exponentielle. La gestion centralisée de répertoires de secrets permet aux organisations d'appliquer des politiques de protection cohérentes qui renforcent la sécurité et facilitent l'audit et la conformité.

    Ce Webinar présentera le défi croissant rencontré lors du déploiement d'outils de gestion centralisée des secrets et les solutions pour atténuer les risques associés à l'agrégation d'actifs sensibles. Nous examinerons le besoin d'une racine de confiance pour la migration vers le cloud, les DevOps et la conformité réglementaire et nous décrirons les meilleures pratiques pour déployer ces solutions.

    Rejoignez ce Webinar et découvrez:

    • Quels défis représente la multiplication des secrets pour les organisations
    • Comment la gestion centralisée des clés garantit une politique de sécurité cohérente
    • Pourquoi le cloud, les DevOps et les réglementations nécessitent une approche ciblée
    • Où une racine de confiance est-elle nécessaire pour garantir une sécurité élevée

    Ce webinaire est pour vous si vous êtes responsable de:

    • La gestion de la transformation numérique et de la migration vers le cloud
    • La mise en place des meilleures pratiques de sécurité dans votre organisation
    • Auditer et assurer la conformité de votre organisation
  • IoT, Hybrid Cloud & the Broadening of Enterprise Security Nov 25 2020 12:00 am UTC 60 mins
    Jon Ferguson, Director of Product Management for Public Key Infrastructure (PKI) and Internet of Things (IoT)
    In a recent report, ABI Research forecasts that IoT connections will exceed 28 billion by 2026, as adoption increases enterprises are adapting to support a wide range of on premise and cloud based services to keep pace. As the number of tools and the network boundaries become blurred, the attack surface is expanded. With more data out the door, and corporate infrastructures running remotely, organizations become more vulnerable and at high risk of cybersecurity attacks. Current centralized security architectures aren’t enough, and it’s critical for organizations to understand and embrace a new reality.

    In this webinar, we’ll discuss:
    1. The market trends and drivers of IoT security
    2. Understanding the connection between Hybrid Cloud models and IoT
    3. How organizations need to plan and design to support the move to this environment
    4. The need for a specialized integrated IoT security solution
  • 2020 Global Encryption Trends: Are you protecting what matters the most? Nov 24 2020 12:00 pm UTC 60 mins
    Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute; John Grimm, VP Strategy & Business Development, nCipher Security
    With the explosion and proliferation of data that comes from new digital initiatives and increased mobility, most organizations are expanding their use of encryption. And for the first time protecting customer data has become the number one priority.

    The 2020 Global Encryption Trends Study highlights how leading organizations are applying their encryption strategies, with detailed insights into the use cases that are growing the fastest.

    Join Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute, and John Grimm, VP of Strategy and Business Development at nCipher Security, as they review key insights and findings from this industry-leading study, and give advice on addressing encryption's top challenges. You'll take away:

    - Data to benchmark your encryption strategy by industry and by country
    - Where organizations are using Hardware Security Modules for increased trust and key protection
    - Features of encryption solutions that provide the most value
  • Secure Identity – The Foundation in Driving Smart Campus Initiatives Nov 24 2020 3:00 am UTC 60 mins
    Max Ebdy Regional Sales Manager, IIDI, Asia Pacific
    Digital transformation is happening everywhere and the higher education sector is not spared. With the current pandemic, the need to have a robust approach to continue their businesses and to offer relevant education offerings and services is key to their survivals.
    By expanding their education services wider and deeper, the need to have relevant tools to connect, to communicate and to collaborate drives this industry to develop Smart Campus initiatives. Secure Identity will be one of the key foundation blocks to enable and drive these initiatives.
    In this webinar, we will look at the current drivers for existing education institutes to embrace online and digital tools and what would be the impact if there is an absence of this secure identity. We will also discuss the approach of an secure identity issuance that will benefit education institutes whether they are serving their students within the physical building compounds, or in a mixture of both digital and physical environments.

    Join the webinar to hear:
    • Drivers for higher education sector to embrace smart campus initiatives.
    • Why secure identity is so crucial to smart campus initiatives?
    • What makes an identity secure ?
    • Issuance approach that is simple, smart and secure.
  • Next Generation Sigma Launch: Secure ID Card Printing Nov 18 2020 6:00 pm UTC 60 mins
    Martin Hoff, Product Marketing Manager, Entrust
    Our new Sigma ID issuance solution is simple, secure, and smart. And together, that adds up to the world’s most advanced ID card printer ever. This webinar will highlight the secure features of Sigma.
  • Banking Security and Instant Issuance: Virtual learn & win Nov 18 2020 12:00 pm UTC 75 mins
    Vincent Carolius Ondiff - GM Fintech Group, Jean-Louis Meyer - Dir. Payment Solutions, Chris Saxton, Product Mktg Mgr ENTRUST
    In the last 50+ years in securing transactions we have seen many changes in our payment landscape; especially in these particular times. But it’s those years of experience that have allowed us to share insights and best practices to help financial institutions in Eastern Africa like yours to navigate your current and future challenges.

    Please join us in this virtual webinar to Learn and Win a leather bag

    Timely topics:

    We will kick-off the session navigating the payment landscape and discuss:

    • Latest payment trends
    • Contactless rapid growth (cards & mobile)
    • Innovation in card design and security
    • Future use cases: issuance of digital and physical cards

    Time for open discussion:

    Our market and solution specialists on hand to answer your questions

    This session has a limited capacity of 50 people among Eastern Africa regional banks and Financial institutions.

    As an incentive to join, the first 50 to register and participate will win a leather bag
  • Devenez conforme à l’eIDAS Nov 18 2020 10:00 am UTC 27 mins
    Jérôme Beclin, Pierre Ischan, nCipher Security
    Devenez conforme à l’eIDAS

    Si votre organisation gère les transactions en ligne de citoyens européens, le règlement eIDAS peut vous ouvrir de formidables opportunités, mais il introduit également de nouvelles exigences.

    Les modules de sécurité matériels (HSM) nShield jouent un rôle essentiel dans la sécurisation des solutions conformes à l’eIDAS, protégeant ainsi les certificats numériques, les horodateurs ou les signatures numériques.

    Ainsi, participer à cet évènement en ligne vous permettra de :
    comprendre comment un HSM nShield établit une base de confiance pour les systèmes de protection des données afin de générer et de gérer les clés de chiffrement afin de créer des signatures, et aussi d’exécuter des programmes sensibles

    découvrir comment nos HSM fonctionnent en parfaite harmonie avec les technologies de nos partenaires conformes à l'eIDAS tels que Cryptomathic, Intesi, Safelayer et Nexus

    voir comment nos clients utilisent les HSM pour fournir des solutions et des services conformes à l’eIDAS, tels que les certificats électroniques, les passeports électroniques, les cartes d’identité électroniques, sécurisant l’autorisation de transactions et les PKI mobiles
  • How the cloud and authentication are changing the game for PKI, and what’s next Nov 17 2020 4:00 pm UTC 60 mins
    John Grimm VP Strategy and Business Development, Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute
    Organizations are facing many challenges to evolve their PKI to meet new needs – and most of those challenges aren’t with the technology. The demands of new applications like the IoT, coupled with a lack of understanding of their current PKI security stance, are causing heightened angst in the face of all of 2020’s dynamics. Join this webcast to learn about
    • How industry leaders are changing their PKI deployment strategy
    • Trends in PKI security best practices
    • Shifts in IoT security priorities
  • Secure Identity – The Foundation in Driving Smart Campus Initiatives Nov 16 2020 7:00 am UTC 60 mins
    Taylor Lam Technical Sales Consultant, Asia Pacific
    Digital transformation is happening everywhere and the higher education sector is not spared. With the current pandemic, the need to have a robust approach to continue their businesses and to offer relevant education offerings and services is key to their survivals.
    By expanding their education services wider and deeper, the need to have relevant tools to connect, to communicate and to collaborate drives this industry to develop Smart Campus initiatives. Secure Identity will be one of the key foundation blocks to enable and drive these initiatives.
    In this webinar, we will look at the current drivers for existing education institutes to embrace online and digital tools and what would be the impact if there is an absence of this secure identity. We will also discuss the approach of an secure identity issuance that will benefit education institutes whether they are serving their students within the physical building compounds, or in a mixture of both digital and physical environments.

    Join the webinar to hear:
    • Drivers for higher education sector to embrace smart campus initiatives.
    • Why secure identity is so crucial to smart campus initiatives?
    • What makes an identity secure ?
    • Issuance approach that is simple, smart and secure.
  • Bring powerful cryptographic capabilities to your multi-cloud OpenShift projects Nov 12 2020 4:00 pm UTC 60 mins
    Tony Crossman,Oli Wade - nCipher, Adam Young -Cloud Solutions Architect
    The Red Hat OpenShift Kubernetes orchestration platform is used to build and manage applications that run across any single or multi-cloud environment. The acceleration in the adoption of containerized applications means there is an ever increasing volume of data being processed by containers. This in turn drives the need for cryptographic processes to protect sensitive data.

    Join our webinar to learn how easy it is to integrate your OpenShift projects with FIPS-certified nShield hardware security modules (HSMs). This powerful combination affords the same level of security to containerized apps that was previously only available with traditional development methods. As a result, organizations can build and deploy flexible, scalable applications with encrypt/decrypt, digital signing and other crypto capabilities.

    Based on examples and real-world scenarios, we will discuss:
    - Why developers prefer the OpenShift platform for enterprise deployments
    - Why HSMs are essential for protecting sensitive applications
    - How to tap into subscription-based or on-premises HSMs
  • Lanzamiento de nuestra nueva generación de impresoras, Sigma: Impresión sencilla Nov 5 2020 6:00 pm UTC 60 mins
    Karim Hala LAC Instant ID Issuance Sales Director Entrust
    Nuestra nueva solución de emisión de tarjetas de identificación, Sigma, es simple, segura e inteligente resultando en la impresora de tarjetas de identificación más avanzada del mundo. Este seminario web destacará las características sencillas y amigables de Sigma.

    Nuestra nueva solución de emisión de tarjetas de identificación, Sigma, es simple, segura e inteligente resultando en la impresora de tarjetas de identificación más avanzada del mundo. Este seminario web destacará las características sencillas y amigables de Sigma.
  • A New Era for Healthcare Digital Security Nov 4 2020 4:00 pm UTC 45 mins
    Jenn Markey - Product Marketing Director, Entrust
    The pandemic has redefined healthcare delivery, accelerating digital transformation initiatives from years to months and even weeks. Healthcare IT security professionals are being challenged to protect and digitally enable medical professionals, support staff, and patients with a strong root of trust built on identity, encryption, and verification. Participants in this session will learn:

    - Key IT security challenges and risks as medicine goes digital
    - Security implications of this transformation for users, data, devices and machines
    - Specific digital use cases including passwordless, identity proofing, and prescription signing
  • Bring visibility and compliance to your certificate management strategy Nov 4 2020 3:00 am UTC 30 mins
    Scott Shetler,Diana Gruhn,Entrust
    The policy to reduce TLS/SSL certificate lifetimes to 398-days has been in effect for over a month now.

    Do you where your certificates are? When they expire? If they’re compliant?

    Join us for the final installment of our three-part “Road to 398” webinar series. Our Entrust TLS/SSL experts will discuss best practices to support reduced certificate lifetimes, and highlight the importance of visibility and compliance in managing your certificate inventory.

    Topics covered:

    • Why visibility into your certificate population is important
    • How to gain visibility and prevent certificate-related outages
    • Discovery and compliance tools that reduce the risk of certificate-related system outages
  • Next Generation Sigma Launch: Simple ID Card Printing Oct 29 2020 3:30 pm UTC 60 mins
    Martin Hoff, Product Marketing Manager, Entrust
    Our new Sigma ID issuance solution is simple, secure, and smart. And together, that adds up to the world’s most advanced ID card printer ever.

    Simple: Sigma is the world’s easiest printer to operate and manage.
    • Intuitive printer dashboard lets you see printer status, order supplies, and more – all from your mobile device
    • Seamless self-service lets you access helpful resources just by scanning a QR code on the LCD display
    Secure: A trusted IoT device, Sigma ensures customers and their data are safe from intruders.
    • Secure boot protects system from malware or virus on boot-up
    • Connection and data sent between software and printer is encrypted
    • Specialty card printing features protect from tampering and counterfeiting
    Smart: Sigma is a system that will work today and into the future.
    • Issuance capabilities include physical cards and digital mobile flash passes
    • Choose on-premises or cloud-hosted deployment
  • Encryption is Worthless Without Protecting Your Keys Oct 29 2020 9:00 am UTC 53 mins
    Simon Taylor, Channel Manager, nCipher Security
    Did you know that....
    Cryptographic keys stored in software are not hard to find?
    On average, a hacker has 160 days before they are detected in your network?
    Modern encryption solutions cannot be decrypted through deciphering techniques?
    View this webinar as we discuss why it's important to protect the crypto keys associated with Database Encryption, File Encryption, Digital Signatures & Certificates, IoT Device Certification, Blockchain, Digital Payments, SSL, PKI and more.

    We will also discuss why nCipher's general purpose hardware security modules (HSMs) are used to solve real-world issues; regardless of company size or vertical market. Crypto keys are everywhere: we directly integrate with F5, Palo Alto, CyberArk, Gigamon and HashiCorp, just to name a few.
  • Chiffrer vos données ne sert à rien si vous ne sécurisez pas vos clés de chiffre Recorded: Oct 28 2020 60 mins
    Benoit Simon, Fornetix, Jérôme Beclin, nCipher Security
    Chiffrer vos données ne sert à rien si vous ne sécurisez pas vos clés de chiffrement

    Aujourd’hui, notre environnement informatique dispose de plus en plus de technologies pour chiffrer nos données. La généralisation de cette pratique est salutaire pour en assurer leur confidentialité et leur intégrité. Mais elle n’est pas suffisante !

    En effet, elle crée de nouveaux défis :
    -Comment protéger les clés dispersées dans l’entreprise ?
    -Comment établir une racine de confiance pour ces clés ?
    -Comment automatiser le cycle de vie des clés ?
    -Comment centraliser les règles de sécurité ?
    -Comment contrôler qui est autorisé à accéder à quelles données ?

    Rejoignez-nous dans ce webinaire organisé conjointement par Fornetix et nShield pour obtenir les réponses à ces questions.
nCipher, an Entrust company
Entrust offers the trusted identity and secure transaction technologies that make those experiences reliable and secure. Solutions range from the physical world of financial cards, passports and ID cards to the digital realm of authentication, certificates and secure communications.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Healthcare Goes Passwordless and Touchless
  • Live at: Aug 26 2020 3:00 pm
  • Presented by: Jenn Markey - leads product marketing for Entrust Datacard’s authentication business segment
  • From:
Your email has been sent.
or close