Hi [[ session.user.profile.firstName ]]

@theCOREofIT - Leveraging Existing Security Hardware While Adopting Modern IT

Join Unbound CEO and Co-founder Prof. Yehuda Lindell and Microsoft MVP Nick Cavalancia for a brief discussion on leveraging existing security hardware while adopting modern IT.
Recorded Sep 16 2021 21 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Unbound CEO and Co-founder, Prof. Yehuda Lindell & Microsoft MVP and Conversational Geek CEO, Nick Cavalancia
Presentation preview: @theCOREofIT - Leveraging Existing Security Hardware While Adopting Modern IT

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cryptographic Virtualization – The Shift to Modern IT Nov 2 2021 3:00 pm UTC 60 mins
    Prof. Yehuda Lindell – world-renowned cryptographer and CEO of Unbound Security
    Whether you are a large-scale enterprise, finance centric multinational or an organization authenticating data, users, or transactions, then you are on your way to modern IT adoption.

    The only digital divide that exists today, is the division between understanding risks and mitigating risks. As our digital footprint continues to grow, organizations need to prepare by asking themselves:

    - How do we adopt modern IT, embrace crypto agility and improve infrastructure efficiencies?
    - How do we leverage existing IT while centralizing policy and realizing the benefits of the cloud?
    - How do I institute a dependable Root of Trust across all the data we encrypt, sensitive data we exchange and mission critical applications, on-premise or in the cloud?

    Join world renowned cryptographer, Prof. Yehuda Lindell, CEO from Unbound Security for an exclusive look at our latest release of Unbound CORE, highlighting key client deployments that have realized cryptographic virtualization across their infrastructure using CORE.
  • Introducing the Next Generation of Code Signing Recorded: Sep 23 2021 58 mins
    Unbound CEO and Co-founder, Prof. Yehuda Lindell and Unbound VP, R&D and Co-founder Guy Peer
    Protecting code against supply chain attacks is a top cybersecurity concern for organizations. With the shift toward more frequent software updates and a remote workforce, having the proper infrastructure and processes in place for secure code signing is critical for ensuring trust and protecting against attacks. How can enterprises enforce code signing policies company-wide that deliver transparency, ease of use and security?

    Unbound Security’s CORE Code Signing Services & Portal is taking enterprise code signing to a whole new level. This new solution offers better security, better user experience and unprecedented scale using the latest cloud technologies and micro-service architecture. Instead of deploying client-side code signing tools, a scalable set of services runs on the server side, making code signing as simple as calling a REST API. The included queuing, block storage and reporting system simplify operations. The self-service portal) allows users to see the and manage status of operations, effortlessly initiate code signing using “drag & drop” web functionality.

    This solution leverages Unbound’s Cryptographic Firewall technology, ensuring code signing keys are protected from both theft and misuse. CORE Code Signing Services enforce the enterprise policy, ensuring, for example, that all code is scanned using malware-detection tools, before being signed. The combination of key misuse prevention and code signing work together to address critical supply chain attack vectors. Ongoing support is also simplified, as it is no longer mandatory to install, manage and routinely patch or upgrade client-side code signing tools.

    Join Unbound CEO and Co-founder, Prof. Yehuda Lindell and Unbound VP, R&D and Co-founder Guy Peer as they introduce this revolutionary new way of managing and securing your enterprise code signing.
  • @theCOREofIT - Leveraging Existing Security Hardware While Adopting Modern IT Recorded: Sep 16 2021 21 mins
    Unbound CEO and Co-founder, Prof. Yehuda Lindell & Microsoft MVP and Conversational Geek CEO, Nick Cavalancia
    Join Unbound CEO and Co-founder Prof. Yehuda Lindell and Microsoft MVP Nick Cavalancia for a brief discussion on leveraging existing security hardware while adopting modern IT.
  • Unbound Security - IBM Partnership Recorded: Aug 11 2021 3 mins
    Prof. Yehuda Lindell – co-founder/CEO of Unbound Security
    Learn how Unbound Security CORE integrates with IBM mainframes using the HPVS reference architecture.
  • Unbound Security - Code Signing Demo Recorded: Aug 11 2021 5 mins
    Prof. Yehuda Lindell – co-founder/CEO of Unbound Security; Ken Kelly - Senior Solution Architect, Unbound Security
    In our demo we show how Unbound CORE secures the code signing process throughout the software development lifecycle to mitigate risk and streamline operations.
  • @ the CORE of IT - Google Cloud in Southeast Asia Recorded: Jul 14 2021 32 mins
    Unbound Security, Google Cloud, Akar Inti Teknologi
    Join thought leaders from Google Cloud, AIT and Unbound Security as they discuss the evolution of cloud in Southeast Asia.
  • WhatWorks in Deploying Effective and Efficient Key Management Services Recorded: Jun 21 2021 56 mins
    John Pescatore, SANS Institute and Mathew Newfield, Unisys
    Business damages from ransomware and phishing attacks have made it clear that sensitive business information and application must be better protected. Increased enforcement of national- and state-level privacy laws, as well as the need to secure data across multiple cloud environments, has highlighted the need for reliable and transparent data encryption services to protect information while enabling business access.

    During this SANS WhatWorks, Mathew Newfield, CIO and CSO at Unisys, will provide details about the selection and deployment of Unbound Securitys CORE Key Management product across the Unisys business environment. The deployment supported code signing, digital certificates, and encryption key management across the entire business services life cycle, from app dev to service delivery and transaction support.

    Join SANS Director of Emerging Security Trends John Pescatore and Mathew Newfield to hear details on the selection, deployment, and experience using Unbound Security's cryptographic key management capabilities. The webcast will feature a discussion of lessons learned and best practices as well as detail the key security gains achieved.
  • Cyber Security Summit (Silicon Valley) - Cloud Security Panel Recorded: Jun 21 2021 46 mins
    Michael Hughes, Chief Business Officer - Unbound Security
    Over the past few years, the number of organizations that have adopted cloud-based systems has grown exponentially, largely due to the COVID-19 pandemic. In turn, cloud security has become a critical issue for IT security executives and their teams. McAffee reported an increase of 630% in attacks by external actors targeting cloud services between January and April of 2020. This uptick in cloud security breaches is projected to persist even after the pandemic as many companies continue to utilize the cloud and leverage its benefits.

    While migrating to the cloud offers numerous advantages, it also poses certain threats and challenges. In a recent report by Oracle & KPMG, over 90% of IT Professionals felt their organization had a cloud security readiness gap. A significant concern for many who are adapting to a cloud-based workforce is misconfigurations and gaps in cloud security programs. Additionally, cloud-based infrastructure requires adopting new security policies and processes. Many companies believe their existing security teams lack the necessary skillsets and knowledge that the cloud environment requires, especially as organizations turn to multi-cloud, hybrid cloud, and distributed cloud models.

    This panel will highlight the areas where cloud systems can leave enterprises vulnerable, ways to minimize common misconfiguration errors, and other best practices to mitigate threats when migrating to the cloud. Our lineup of Industry Experts will provide their expertise on developing a robust cloud security strategy that addresses these issues and insight on how to stay secure in the future of cloud security.
  • @ the CORE of IT - Evolution of Cloud Recorded: Jun 16 2021 24 mins
    Microsoft MVP and Conversational Geek CEO, Nick Cavalancia and Unbound’s Chief Business Officer, Michael Hughes
    Join Microsoft MVP and Conversational Geek CEO, Nick Cavalancia and Unbound’s Chief Business Officer, Michael Hughes as they discuss the challenges of key management in the cloud.
  • @ the CORE of IT - Machine Identity with Venafi Recorded: Jun 16 2021 20 mins
    Venafi’s VP, Security Strategy & Threat Intelligence, Kevin Bocek and Unbound’s CEO, Prof. Yehuda Lindell
    Venafi’s VP, Security Strategy & Threat Intelligence, Kevin Bocek and Unbound’s CEO, Prof. Yehuda Lindell discuss the challenges of protecting machine identities.
  • Cyber Security Summit (Dallas) - Cloud Security Panel Recorded: Jun 11 2021 46 mins
    Michael Hughes, Chief Business Officer - Unbound Security
    Watch our panel discussion from the May 13, 2021 Dallas Cyber Security Summit virtual event, where we discussed the threats and challenges of cloud migrations in the Future of Cloud Security panel.
  • The Future of Payment Security: Digital Wallet Edition Recorded: Apr 6 2021 51 mins
    Unbound CEO, Prof. Yehuda Lindell; Global Sales Leader for IBM Systems Digital Assets, Peter Demeo; BRD CEO, Adam Traidman
    Wallet technology is evolving and traditional financial institutions entering this digital arms race to become the financial hub where the consumer begins and ends their day financially. Unlike other digital assets like consumer sales data, consumer behavior data, real time analytics data, etc., -- money has its own set of critical requirements. Regulatory mandates, legal liability, consumer privacy, data security, reliability, and integrity, are all key to customer success – and security and privacy controls cannot be bolted on after the fact with these applications. Security and privacy controls MUST be built in from the inception stage of these projects or waste valuable time and money.

    Join Unbound’s CEO, Prof. Yehuda Lindell, Global Sales Leader for IBM Systems Digital Assets, Peter Demeo, and BRD’s CEO, Adam Traidman to discuss…
    - The payment sector’s unique security requirements
    - How security and regulation intersect in the digital payments industry
    - Approaches to building security into your payment architecture from the ground up
  • Simplify Authentication with Trust - CORE for Securing Identity Recorded: Mar 28 2021 17 mins
    Prof. Yehuda Lindell – world-renowned cryptographer & co-founder/CEO
    Join our latest whiteboard session with Professor and Unbound CEO Yehuda Lindell as he maps out how CORE can streamline authentication practices to support Go-passwordless initiatives and software only authentication with trust. .
  • Secure Digital Assets with Trust - CORE for Crypto Assets Recorded: Mar 28 2021 12 mins
    Prof. Yehuda Lindell – world-renowned cryptographer & co-founder/CEO
    Join our latest whiteboard session with Professor and Unbound CEO Yehuda Lindell as he maps out how digital assets are transferred, stored, and approved, on HSMs, and their virtualization with CORE, leveraging blockchain.
  • Encryption Key Management - CORE for Information Security Recorded: Mar 26 2021 27 mins
    Prof. Yehuda Lindell – world-renowned cryptographer & co-founder/CEO
    Join our latest whiteboard session with Professor and Unbound CEO Yehuda Lindell as he maps out how keys are managed in multiple encryption scenarios, inclusive of a code signing situation and other legacy solution.
  • Orchestration & Automation: Build Next-Gen Security From Tools You Already Have Recorded: Mar 25 2021 51 mins
    Guy Peer
    View this panel session from Dark Reading's virtual event: Cybersecurity’s Next Wave: What Every Enterprise Should Know, featuring Unbound's VP, R&D, Guy Peer.

    For many enterprises, the challenge of 2021 will not be which new cybersecurity technologies to implement, but how to make their old cybersecurity technologies work better together. In some cases, enterprises are seeking better ways to integrate and orchestrate their disparate security systems. In other cases, organizations seek to better automate the operation of these security tools so that they can detect new threats faster, with less human intervention. In this panel discussion, experts will offer advice on how to make orchestration work in complex IT environments, as well as recommendations on how to automate security tasks and processes.
  • Advancing HSMs - CORE Key Management Recorded: Mar 25 2021 25 mins
    Prof. Yehuda Lindell – world-renowned cryptographer & co-founder/CEO
    Join our latest whiteboard session with Professor and Unbound CEO Yehuda Lindell where he maps out the difference between how keys are managed and stored in Hardware Security Modules (HSMs), vs. virtual HSMs – and how the combination can enhance key management and security.
  • Unifying Diverse Key Stores for Business Recorded: Mar 15 2021 3 mins
    Prof. Yehuda Lindell – world-renowned cryptographer & co-founder/CEO
    Today's cryptographic key management space is extremely fragmented. Unbound CORE virtualizes cryptography to make it modular, interoperable, and flexible to move where your business needs it to.
  • Four Reasons Legacy Key Management Solutions Hinder Business Recorded: Mar 14 2021 3 mins
    Prof. Yehuda Lindell – world-renowned cryptographer & co-founder/CEO
    Today's data environments include dozens of key stores meant to be highly interconnected. Here's why legacy key management solutions fall short of today's standards.
  • Beyond HSM: Key Orchestration for the Enterprise Recorded: Mar 11 2021 60 mins
    Michael Hughes, Chief Business Officer - Unbound Security and Guy Peer, VP R&D and co-founder - Unbound Security
    This CyberRisk Alliance webinar examines how and where organizations are storing encryption keys, how they are managed and the challenges and risks associated. We also review the technical and business considerations for a Key Orchestration platform for the enterprise.
Cutting-edge key protection techniques for enterprise and blockchain
Learn about enterprise key management, blockchain key management, and cryptography from the cryptographic experts.

Unbound Tech serves Fortune 100 companies with their cryptographic key management needs - and we're backed by world-renowned experts. Our co-founders, Prof. Nigel Smart and Prof. Yehuda Lindell, have taken what was once deemed impossible: taken the academic theory of multi-party computation and turned it into a hardware-free, FIPS-ceritifed security platform for businesses of all kinds.

IT professionals, fintech executives, and cryptography junkies - we have content that will make you think.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: @theCOREofIT - Leveraging Existing Security Hardware While Adopting Modern IT
  • Live at: Sep 16 2021 8:19 pm
  • Presented by: Unbound CEO and Co-founder, Prof. Yehuda Lindell & Microsoft MVP and Conversational Geek CEO, Nick Cavalancia
  • From:
Your email has been sent.
or close