Hi [[ session.user.profile.firstName ]]

Their Cloud. Your Data. The Global State of Cloud Data Security

This webinar will discuss the recent findings of a global cloud data security study conducted by the Ponemon Institute on behalf of Gemalto. The study surveyed 3,476 IT and IT security professionals in the United States, United Kingdom, Australia, Germany, France, Japan, Russian Federation, India and Brazil about the governance policies and security practices their organizations have in place to secure data in cloud environments. The findings will reveal adoption trends for IaaS, PaaS and SaaS; the prevalence of Shadow IT; the role of data governance; and data security practices in the cloud, including the usage of encryption and multi-factor authentication. In addition, participants will also learn new data security strategies that can help them realize the benefits of the cloud while protecting sensitive applications and information in cloud.
Recorded Aug 16 2016 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dr. Larry Ponemon Chairman & Founder The Ponemon Institute, Joe Pindar Director of Strategy, CTO Office Gemalto
Presentation preview: Their Cloud. Your Data. The Global State of Cloud Data Security
  • Channel
  • Channel profile
  • Fintech, Compliance & Data Protection – Steps to Secure the Breach Recorded: Aug 14 2018 43 mins
    Ferry de Koning, Director Business Development, Gemalto and Gary Marsden, Senior Director, Encryption Products
    Fintech startup companies are disrupting the financial services industry, raising more than $120 billion over the last three years. Although these new entrants are changing how money and markets operate, they must still do business within the realities of regulations like GDPR and Australia's Notifiable Data Breaches scheme that the rest of the financial industry must operate. This means that data security and trust are just as important to Fintech companies as it is to traditional banks.

    Fintech companies are unique because of their agility, lean operations and that most are built using the cloud and digital technologies that banks are just now adopting. While this makes Fintech companies more nimble and they can enter new markets faster, it also presents more complexities for how Fintech companies need to manage security and meet compliance mandates.

    In this webinar you will learn about:

    •Fintech compliance and regulation from a data protection perspective.
    •How to build a secure the breach strategy using a case study from the physical world
    •Understand key elements for building cloud-based data security strategy that fits the needs of Fintech companies
  • ISSA Thought Leadership Series: The Definitive Need for Crypto-Agility Recorded: Aug 8 2018 64 mins
    ISSA International
    On the eve of quantum computing, the definitive need for crypto-agility is greater than ever. The ability to locate, manage, and securely update digital certificates on a network or on a device seems like a simple task, yet with the advent of new Enterprise use cases and flourishing IoT device introductions, management at massive scale becomes a challenge. Facing mounting pressures, IT security personnel and product managers are tasked with implementing solutions fit for today’s environment plus tomorrow’s post-quantum world. Join renowned Public Key Infrastructure (PKI) expert and Certified Security Solutions (CSS) CTO, Ted Shorter, as he outlines the defense against quantum computing and the IoT device invasion, crypto-agility:

    · How can crypto-agility lend itself to a truly future-proof Enterprise and IoT device security strategy?
    · Cryptographic kryptonite: demystifying quantum computing
    · Challenges with digital certificate/device management at scale

    Moderator:

    Dr. Shawn Murray, Principal Scientist, US Missile Defense Agency & Director, ISSA International

    Presenters:

    Ted Shorter, CTO, Certified Security Solutions (CSS)
    Michael Gardiner, Principal Architect, Gemalto
    Michele Mosca, Founder, Institute for Quantum Computing
    Mike Brown, CTO & Co-Founder, ISARA Corporation
  • Secure the Breach (by Gemalto) Recorded: Jul 2 2018 2 mins
    Gemalto
    Cloud, mobile, big data, the internet of things. Your enterprise is undergoing its digital transformation. But these new technologies mean more risk to your data as it moves beyond the perimeter.
    You know that a data breach is inevitable. So, when it happens to your business, will your data be secure?

    Gemalto’s portfolio of SafeNet identity and data protection solutions provide the centralized data security you need to secure the breach.

    Keep your data protected and secure your enterprise’s digital transformation.

    Learn more today at securethebreach.com
  • Implementing Virtualized Network Encryption to Secure SD-WANs Recorded: Jun 21 2018 60 mins
    Stan Mesceda, Senior Product Manager at Gemalto and Julian Fay, CTO at Senetas
    Today enterprises and service providers are increasingly using network functions virtualization (NFV) and software-defined networking (SDN) technologies to design, deploy and manage their networks and cloud-based services. These software-based technologies give organizations cost and operational benefits because they move network functions from dedicated hardware appliances to virtual servers. These same technologies can be now be applied to how encryption is deployed and managed to protect sensitive data and communications the flow across SD-WANs.

    In this webinar you will learn about:
    •What is the best network fit for virtualized encryption
    •How to implement a virtual network encryption appliance in software-defined network
    •What are the cost, operational and performance benefits of virtual encryption
    •What it means to be transport layer independent and how you can protect network traffic simultaneously across Layers 2, 3 and 4
  • Gemalto SafeNet Trusted Access Demo Recorded: Jun 20 2018 4 mins
    Gemalto
    Thanks to SafeNet Trusted Access by Gemalto you can centrally manage access to cloud applications. The solution is flexible enough to easily adapt to business and security requirements but also convenient for employees thanks to the enhanced Single Sign On capability.

    With Safenet Trusted Access, you have a central service that lets you manage single sign on with granular access control and enforce appropriate levels of authentication across your enterprise cloud applications.

    For more information visit https://safenet.gemalto.com/access-management/idaas-safenet-trusted-access/
  • Gemalto and Venafi: Securing Machine Identities at Machine Speed Recorded: Jun 12 2018 48 mins
    Gorav Arora, Director, Office of CTO, at Gemalto & Ben Rogers, Solution Architect, Venafi
    Machines are increasingly taking over tasks traditionally conducted by humans. Moreover, they often work independently to improve business productivity. As more and more machines come into existence, we need to be able to reliably identity which machines should be trusted and which shouldn’t. But the security that protects machine identities can no longer be slowed down by traditional manual or homegrown methods. These methods are no longer sufficient to allow organizations to scale and thrive at the speed of business.

    Join us at this webinar to learn how Gemalto and Venafi help organizations address these challenges.
  • HSM 101: What is a Hardware Security Module? Recorded: Jun 11 2018 2 mins
    Gemalto
    What is a hardware security module?

    A hardware security module is a dedicated crypto processor, designed to protect the crypto key lifecycle, validated for security by third parties (FIPS 140-2, Common Criteria, PCI HSM, FIPS 201).

    A hardware security module is a trust anchor. A trust anchor that protects the things we use every day. Things like SSL, DNS, banking and websites. Mobile devices. Smart meters. Medical devices. National identity cards. Credit card data and PINs. Mobile payments and verbal banking. Digital documents. Passports.

    And so much more. Hardware security modules typically are appliances or cards. Appliances or cards that ensure compliance. Simplify audits. Improve performance. Securely generate and store keys.

    Hardware security modules are trusted by the most security-conscious companies, agencies, banks, and service providers in the world.

    Hardware security modules: trust anchors in a digital world.

    For more information, visit https://safenet.gemalto.com/data-encryption/hardware-security-modules-hsms/
  • IoT Security Over Tea: Steeping Out the Hype Recorded: Jun 5 2018 63 mins
    Gorav Arora, CTO Office Director of Technology at Gemalto
    A familiar buzz word over the past few years has been the Internet of Things (IoT). We have all heard the talk about it being the next big thing, its massive growth potential and the benefits to everyone. The IoT will generate more data, connect more devices and enable more users, and somehow these interactions will be safe and secure.

    We take a pragmatic view of IoT, cutting through the hype to uncover the core objective. Furthermore, we take a persona based approach to IoT security, and have identified four main ones: cloud service providers, consumers, device makers and third-party service providers. Each persona faces the obstacle of securing different parts of the ecosystem whether its access, the device, data and/or the user. However, it is necessary that security is provided holistically, as the weakest security link in the chain could compromise it all. In addition to security, the personas are used to demonstrate the ‘Stages of IoT’ from the digital identity of physical products to actualization of new business opportunities. No matter what persona in the IoT ecosystem you are (or are not), the webinar cuts through the hype to understand the real business opportunities and share with attendees the technology tool box (predictive analytics, security, connectivity, data collection and business intelligence) to create and improve services and leverage the generated data internally and externally.

    Join us for the webinar, “IoT Security Over Tea: Steeping out the Hype”, to learn more about:
    •A grounded perspective on IoT
    •Why IoT security matters for everyone
    •The persona analysis of IoT security
    •Key considerations as it begins to take off
    •How to protect what matters most to you
  • SafeNet Data Protection On Demand Recorded: Jun 1 2018 2 mins
    Gemalto
    SafeNet Data Protection On Demand is a cloud-based platform providing a wide range of on-demand key management and encryption services through a simple online marketplace. Security is now simpler, more cost effective and easier to manage because there is no hardware to buy, deploy and maintain. Just click and deploy the services you need, provision users, add devices and get usage reporting in minutes.
  • SafeNet Data Protection On Demand: NTT Security & Gemalto Provide Encryption Key Recorded: Jun 1 2018 2 mins
    Frank Balow and Chris Knowles of NTT Security
    NTT Security executives introduce the benefits of NTT's Key Protection Platform, powered by SafeNet Data Protection On Demand.

    https://safenet.gemalto.com/data-protection-on-demand
  • What is PKI (Public Key Infrastructure)? Recorded: May 21 2018 2 mins
    Gemalto
    What is PKI (Public Key Infrastructure)?
    Discover what you need to know about the level of security PKI provides, how easy it is to implement and how convenient it is for users.

    Public key infrastructures (PKIs) are relied upon to secure a broad range of digital applications, validating everything from transactions and identities to supply chains. However, infrastructure vulnerabilities represent a significant risk to the organizations that rely on PKI alone to safeguard digital applications.

    Gemalto offers PKI encryption key management solutions to help you protect the keys at the heart of PKI as well as PKI-based authentication tokens that leverage the security benefits offered by PKI to deliver dependable identity protection

    Watch and learn how PKI can benefit you and your organization.

    For more information visit https://safenet.gemalto.com/data-protection/pki-credential-management/
  • Gemalto SafeNet Encryption and Tokenization Solutions Recorded: May 16 2018 3 mins
    Gemalto
    From the physical and virtual data center to the cloud, Gemalto's SafeNet encryption and tokenization solutions help organizations remain protected, compliant, and in control. Gemalto's solutions enable organizations to secure sensitive data in databases, applications, storage systems, virtualized platforms, and cloud environments.
  • 451 Research and Gemalto present "MSPs - Maximizing ROI with Security" Recorded: May 15 2018 60 mins
    Gary Marsden, Senior Director of Data Protection Solutions at Gemalto and William Fellows, Research VP 451 Research
    Digital transformation is a critical part of an enterprise business strategy. However, for many organizations, having more digital assets introduces major headaches due to the complexity of technologies, the lack of available and affordable skills and the ever-changing security threat landscape. The ability to use cloud based solutions to service digital strategies is helping reduce costs but is also increasing risks, isolating data and reducing controls.

    Many MSPs have recognized this as an opportunity and are building business plans and service strategies to help their customers. Being the one-stop shop for applications, cloud services and related security aspects is a path that is actively being trodden by MSP’s, MSSP’s and traditional resellers alike. According to 451 Research, it is about a “sell with” approach by addressing business requirements with security “built-in”. In this joint webinar, our guest William Fellows, 451 Research analyst will provide new research results this related data points and discuss how the cloud is creating opportunities as well as challenges. The interactive Q&A style webinar will cover:

    • A current view of the cloud’s impact on digital transformation
    • Opportunities for MSPs to expand service portfolios and generate new revenue streams
    • What a true “sell with” partnership looks like
    • Technology enabling this new sales and marketing strategy for MSPs

    Presenters:
    William Fellows is a co-founder of The 451 Group. As VP of Research, he is responsible for the Cloud Transformation Channel at 451 Research.

    Gary Marsden: Senior Director of Partnerships at Gemalto
  • New Data Breach Findings: The Year of Internal Threats & Misplaced Data Recorded: May 14 2018 52 mins
    Jason Hart, CTO of Data Protection at Gemalto
    2018 has started off as an eventful year with data breaches at Saks Fifth Avenue, Lord & Taylor and Under Armour’s MyFitnessPal app. And it will continue to be a catalyst year for data security with the 25th of May deadline for the European Unions’ General Data Protection Regulation, which regards “privacy as a fundamental human right and to protect it as such.” Data exposed or breached is not only a headache for security teams, but also impacts brand reputation, customer confidence and stock prices.

    Gemalto’s 2017 Breach Level Index found 2.6 billion records where compromised in 2017, a 88% increase from 2016. In this webinar our expert, Jason Hart, will walk attendees through the most shocking 2017 stats, new data breach tactics and how companies can manage risk by mapping out where your data resides. Join us to learn more about:
    -Internal threats and misconfigured cloud databases
    -Growing security threats like data integrity attacks
    -Innovative technology that is solving some of these issues
    -What we have in store for 2018
  • Secure Access to Cloud-Based Applications Recorded: May 10 2018 3 mins
    Gemalto
    Apply centralized, strong cloud authentication, securing access to all cloud-based applications with Gemalto’s Safenet Identity Protection Solutions.
  • Seal, Lock & Protect: How not to leave your networks and cloud vulnerable Recorded: May 7 2018 54 mins
    John Ray, Product Management and Danna Bethlehem, Product Marketing Gemalto and Josh Chambers, Product Management at F5
    Securing and monitoring your network and cloud environments has changed over the past few years and compliance and government regulations will add to it. Network traffic monitoring tools have been presented as a solution to meeting compliance and performance on a network. But monitoring alone is not enough. In terms of security, companies need to holistically secure their network, cloud and data, no matter where their users are accessing from.
    This joint webinar between F5 and Gemalto will help attendees prepare for the next-generation of secure network access as more data resides in more places with more people accessing it. It will also walk them through the integration between F5 and Gemalto and what options this partnership offers.

    In this webinar, you will earn how to:
    •Reduce the risk of breaches by ensuring that only authorized users are accessing network, using the F5 environment as an example
    •Protect & encrypt your customer data
    •Manage secure cloud access
    •Comply with regulations
  • How Identity and Access Management (IAM) Works in the Cloud Recorded: Apr 23 2018 3 mins
    Gemalto
    Do you continuously verify users’ identities and enforce access management policies each time a user logs into a cloud application? Watch and learn how identity and access management works in the cloud, then explore how to improve security and management, visit https://safenet.gemalto.com/access-management
  • The future of smart connected (or IoT) devices, but what about security? Recorded: Apr 11 2018 61 mins
    Paul Lockley, VP of Partnerships at Device Authority and Gorav Arora, CTO Office Director of Products
    One of the biggest obstacles to IoT adoption is security. Our recent survey found 65% of consumers are concerned about hackers controlling IoT devices and 60% worry about their data being stolen. Recent widespread attacks using IoT device vulnerabilities has also highlighted how interconnected the system is and one weak link creates a ripple effect Securing the identities of both humans and machines, access to the devices and protecting the integrity of the data and device opens the door to more opportunities. For example, the ability to manage blockchain identities and data security policies across any IoT deployment.

    In our joint webinar with Device Authority, our experts will outline how security by design methodology helps future proof IoT deployments. They will have an open conversation and a question and answer session on topics that customers are dealing with, related news topics, compliance and government regulations, business opportunities and technologies that are changing the game. Join us to hear more about how using the security by design approach can help:

    •Identify and manage risks and challenges in the short and long term
    •Prepare for legislation and compliance
    •Create new opportunities for a secure blockchain-based IoT
    •Leverage new technology like machine learning and analytics
  • Developing and implementing risk-based access policies to match IAM strategies Recorded: Mar 28 2018 55 mins
    Amanda Rogerson, Product Expert at Gemalto
    The security challenges of companies large and small is changing. This is especially pronounced in the access management space as IT admins and CISOs are faced with more identities and devices across a growing number of cloud applications. In our recent survey, we found 72% of respondents found cloud access management tools as a solution to reducing the threat of large scale data breaches, while 62% highlighted the tools ability to help simplify the login process for their enterprise users.

    In an organization, individuals dealing with security have different goals and objectives. Aligning them can be a challenge. We will look at the priorities of the user, IT teams and CISOs – where they are linked and where they diverge. To build effective risk-based access policies, you need to start with a living IAM strategy that takes into account geolocation, threats, unusual behavior and scenario based data. Using policy-based access management, internally and externally for example in the cloud, is helping enables aligning the different security teams in an organization and automate and simplify the log-in process for users as well. During the webinar attendees will walk away with an understanding of:

    -Analyzing personas within your organizations security team to improve IAM solution implementations
    -Things to consider when building your access management strategy
    -Building risk-based access management policies across multiple applications or cloud environments
  • Trends in IAM: The Consumerization of Enterprise Security Recorded: Mar 7 2018 34 mins
    Danna Bethlehem, Director of Product Marketing
    With a growing number of cloud apps in use, more employees working remotely increasing the need for stronger authentication. This is driving IT decision makers to find ways to ‘consumerize’ the login process. To get a better understanding of access management challenges and views on the industry Gemalto surveyed 1,000 IT decision makers to compile the 2018 Identity and Access Management Index. During this webinar, we will share some of the fascinating key findings that will shape cybersecurity and the way enterprise IT professionals evaluate and implement access management technology. Join us to learn more about:

    •2018 key findings and trends
    •How consumerization of IAM can be achieve in the enterprise security space
    •How organizations can maintain security while lowering barriers to authentication
    •Evolution of IAM Trends: A look at the historical numbers compared to the new findings
Security for What Matters Most: Data & Identities
As the global leader in digital security, Gemalto brings trust to an increasingly connected world. From secure software to biometrics and encryption, our technologies and services enable businesses and governments to authenticate identities and protect data so they stay safe and enable services in personal devices, connected objects, the cloud and in between.

Gemalto’s solutions are at the heart of modern life, from digital payments and transactions to enterprise security and the Internet of things. We authenticate people, transactions and objects, encrypt data and create value for software – enabling our clients to deliver secure digital services for billions of individuals and things.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Their Cloud. Your Data. The Global State of Cloud Data Security
  • Live at: Aug 16 2016 3:00 pm
  • Presented by: Dr. Larry Ponemon Chairman & Founder The Ponemon Institute, Joe Pindar Director of Strategy, CTO Office Gemalto
  • From:
Your email has been sent.
or close