Hi [[ session.user.profile.firstName ]]

Digital Banking: Customizing security to avoid customer fatigue

A convenient and consistent online user experience breeds trust in a service. How it’s executed can alter a user’s perception either positively or negatively. When it comes to online security, consumers have different perceptions. What banks want to avoid is “security fatigue.”

Risk management systems make sensitive online transactions more user friendly by customizing security in response to the risk. The real-time assessment of a user’s transaction is instantly evaluated and an authentication step can be sent if needed. Adapting strong authentication to the online transactions improves the customer experience and avoids fatiguing your users with security if it’s not necessary.

Not all online transactions are created equal, so successful security solutions need to be intelligent and smart. Join us for a webinar on Tuesday November 16, 2016 as we discuss:
•What not to do when it comes to online banking security
•How to build a customized risk-based authentication process
•Security as a business enabler
•The influence of a user’s security persona toward risk
Recorded Nov 16 2016 37 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Philippe Regniers, Director of Marketing for Online Banking and Payments
Presentation preview: Digital Banking: Customizing security to avoid customer fatigue
  • Channel
  • Channel profile
  • A Single Platform to rule them all - Control your data, encryption and keys Jul 20 2021 10:00 am UTC 60 mins
    Axel Debray - Cyber Security Specialist, Thales UKI
    Encryption has shown to be one of the strongest solutions to support most organisations' data protection strategy. However, the growing number of data encryption tools (and respective key managers) for on-premises and cloud systems, increases complexity and reduces visibility. Ultimately resulting in unexpected costs and security risks.

    Join Axel Debrary to discover:
    • How you can centrally manage all your encryption keys from a single pane of glass and simplify auditing
    • How CipherTrust Manager can help you gain full control and visibility over your encryption keys
    • How CipherTrust Manager delivers enterprise-grade key management and encryption for leading software and hardware vendors solutions
    • The added benefits of a unified data security platform to reduce cost and minimise risk
  • Mission Possible - Luna 7 HSMs land to deliver the way forward Jun 15 2021 10:00 am UTC 60 mins
    Manoj Bhati - Cyber Security Specialist, Thales
    The Thales Luna 5/6 HSMs are going end of life in Sept 2022 and as such we have released the latest version of Luna HSM's i.e. Luna 7 Network HSM's. These HSM’s are not only faster than their predecessors but are packed with additional features to provide a more efficient offering and are also the HSM’s that we have submitted for FIPS 140-3 certifications.

    There are different ways to upgrade your legacy Luna HSM’s to the latest ones. Join the session to learn more about the FIPS roadmap and explore the different ways to upgrade to the latest HSM.
  • Did you know there is a better way to secure your critical data network? May 26 2021 3:00 am UTC 45 mins
    Brian Grant, Regional Director Thales & Andrew Younger, Manager Security Consultants Thales
    For many of us, securing our core data network using good old TLS, IPSEC, MACsec etc. low-assurance encryption, that is embedded in existing router, firewall or SDWAN devices, is adequate. However, some of us, face risks and attacks from well-resourced or technically knowledgeable actors that are experienced in compromising commercial network security.

    If this is you or your organisation, join us at Thales as we share with you a more secure, yet easy way to protect your critical data network without compromising speed, latency, efficiency or dare we say it, budget.

    • How to identify whether network independent high-speed encryption or plain old network security will suffice?
    • What exactly is network independent encryption and why is it easy to deploy and operate across existing core data networks?
    • What level of security certification or accreditation is achievable from network independent encryption?
    • Why is network independent encryption considered “affordable” versus enabling embedded commercial network security?
    • Why is cryptographic agility so important in addressing emerging threats such as state sponsored cyber attacks and quantum computing?
  • Why Hardware-Based PKI is one of the Best Passwordless Authentication? May 20 2021 9:00 am UTC 45 mins
    John Asan, Technical Consultant, Versasec and Yarden Gaon, IAM Product Manager, Thales
    So why is hardware-based PKI considered one of the best passwordless authentication methodologies?
    Join Thales and our technology partner, Versasec for a coffee break discussion on why enterprises should use strong authentication methods and why chose a hardware-based PKI offering. We‘ll look at how hardware-based PKI compares with other 2FA authentication technology culminating with a dive into deep into the advantages of two-factor authentication using hardware-based Public Key Infrastructure ( PKI ) and the role of vSEC:CMS and the device management system.
    Versasec is a leader in identity and access management, providing customers with a secure solution for managing digital identities. With its flagship product, vSEC:CMS S - Series, Versasec eases the deployment of physical and virtual smart cards for enterprises of any size.
    Key Discussion Points:
    1. Why should enterprises use strong authentication?
    2. Why hardware-based PKI?
    3. What hardware-based PKI brings compare to other 2FA authentication?
    4. How can an organization address it’s security requirements with PKI
    5. What is the role of vSEC:CMS and the device management?
    6. The benefits of Thales PKI devices specifically integrated with vSEC.
  • Securely run critical workloads in the Cloud with Microsoft, Dell and Thales May 19 2021 3:00 am UTC 60 mins
    • Nick Psomas, Dell APJ • Jay Doyle, Microsoft • Trichy (Prem) Premkumar, Dell APJ • Brian Grant, Thales CPL
    Organisations who rely on SAP, Oracle and other critical workloads want to leverage the benefits of operating in the Cloud, with optimal performance, resilience and security. Join Microsoft, Dell and Thales as we share with you how Enterprises can leverage the integrated capabilities of Microsoft Azure, Dell Data Protection and Thales CipherTrust Data Security to achieve the best possible solution for mission-critical workloads.

    • Microsoft will share how Azure is the perfect high performance cloud platform on which to run your critical workloads
    • Dell will explain how to build a highly resilient, yet efficient, backup for critical Azure data with Dell Data Protection
    • Thales will show how to easily embed enterprise-wide data security into Azure and Dell to achieve security and compliance
  • Trends, Technologies and Challenges of Payments Industry May 18 2021 10:00 am UTC 60 mins
    Simon Keates, Head of Payment Strategy and Radovan Bruncak, CyberSecurity Specialist
    The payments industry is undergoing intense transformation caused by customer demands, technology advancements, globalisation, disintermediation by new entrants, and increasing regulatory requirements. On top of this, fraud by cyber criminals continues to evolve with attacks becoming increasingly sophisticated.

    Join this webinar where will discuss evolving trends, technologies and regulations affecting the payments industry and how Thales can help meet these challenges.
  • The Role of Security in 5G Recorded: May 12 2021 37 mins
    Rohini Deepak, Senior Manager of Strategy at Thales, and Claire Pitman-Massie, Director of Field Marketing for EMEA, Thales
    Although 5G offers many benefits including higher bandwidth, lower latency, and the ability to connect billions of devices, there are concerns over security. Justly so, as the transition to virtualized and containerized networks continues; and new scenarios for managing data at the edge emerge - expanding from private to hybrid and public cloud; along with RAN dis-aggregation; all bring vulnerability and complexity. The result is an increased risk of a cyberattack, and the need to plan for security early in the process.
    Join Rohini Deepak, Senior Manager of Strategy at Thales, and Claire Pitman-Massie, Director of Field Marketing for EMEA, Thales, as they discuss the potential security gaps within critical infrastructure, and how enterprises can approach 5G in a secure manner to ensure integrity and trust.
  • Own your Own Risks - Modern Manufacturers on-prem security journey to the Cloud Recorded: May 12 2021 55 mins
    Paul Hampton, Cyber Security Specialist, Thales and Tomas Gustavsson, CTO, PrimeKey
    Primekey will showcase how adopting Thales technology can help manufacturing organisations meet industrial-specific regulations, ensure business continuity for their services, scale their businesses and remain flexible to market conditions. Multiple factors can influence the decisions on which security infrastructure to implement and we will explore the options and benefits available.

    Learn how:
    • a flexible implementation of PKI can support both “silos” and “centralized” models.
    • a hybrid approach can offer the robust security of on-prem with the scalability and coverage benefits afforded by the cloud
    • to achieve greater control and flexibility with a unified interface for on-prem and cloud-accessible HSMs
  • Bring Your Own Encryption Strategies for a Multicloud World Recorded: May 5 2021 41 mins
    Eric Wolff, Data Protection Product Marketing
    Are companies prepared to protect their sensitive data in the cloud? According to Thales Data Threat Report 2020 Global Edition 50% of all corporate data is store in the cloud and 48% of is sensitive data.

    This informative webinar will cover:

    Latest Cloud Security trends 
    Who is responsible of the data
    The approaches for taking responsibility and control of the data
    The advantages of BYOE
  • Uwierzytelnianie bezhasłowe – rozwiązanie czy proces? Recorded: Apr 29 2021 59 mins
    Jarosław Ulczok, CEE Pre-Sales Consultant w firmie Thales
    Sposoby uwierzytelniania użytkowników, ich dostępu do aplikacji i systemów stanowią zasadniczą warstwę obrony w strategii bezpieczeństwa firmy.
    Mobilność pracowników, praca zdalna spowodowana pandemią i nowe sposoby kradzieży danych wymuszają powszechne stosowanie silniejszych, zaawansowanych metod uwierzytelniania. Metody bezhasłowe (passwordless) wydają się w tym kontekście bezpieczniejsze i pożądane.

    Podczas seminarium omówimy jak zmodernizować system uwierzytelniania w przedsiębiorstwie o metody bezhasłowe.
  • The first step to make sure your Business is more Secure and Cloud agile Recorded: Apr 28 2021 63 mins
    Tzach Kaufmann, Director Product Management and Sercan Koc, Pre-Sales Consultant
    Know your Data is the first step for a data protection strategy. You are responsible of data so you must know where all data is, on which platform and who has got access to it. 

    This informative webinar will cover:

    How to gain complete visibility and control of you sensitive data
    How you can accelerate the path to compliance
    The advantages of visualizing your data in a single pane of glass
  • Jak szybko i sprawnie zaimplementować idee BYOK w chmurze MS Azure Recorded: Apr 28 2021 46 mins
    Jarosław Ulczok, CEE Pre-Sales Consultant w firmie Thales
    Gwałtowny wzrost wykorzystania usług w chmurze i ilość wrażliwych danych przechowywanych w chmurze stwarza nowe ryzyka i zagrożenia, z którymi organizacje nigdy wcześniej nie musiały się zmierzyć.
    Cloud Security Alliance i analitycy branżowi twierdzą, że klucze szyfrujące powinny być przechowywane przez klientów, co to oznacza? Jak łatwo zarządzać cyklem życia klucza i jak łatwo zaimplementować idee BYOK?

    W tym webinarze Jarosław Ulczok opowie o odpowiedzialności jaka spoczywa na właścicielu danych wrażliwych przechowywanych w chmurze oraz o sposobie na trzymanie kontroli nad kluczami szyfrującymi.
  • Nejčastější příčina kybernetických útoků a jak jim předcházet Recorded: Apr 28 2021 50 mins
    Petr Kunstat, CEE Presales Consultant ve společnosti Thales
    Co nám hrozí, pokud nám někdo zcizí uživatelské heslo neboli přístup k uživatelské identitě? V soukromém prostoru nejčastěji hrozí, že například náš facebookový profil bude zaplaven sprškou inzertních “postů” nebo útočník osloví přátele pod naší identitou se snahou získat profit nebo nás kompromitovat. Ve firemním prostředí jde ale o víc! Mluvíme o ztrátě kredibility společnosti, případně o přímé finanční ztrátě nebo finančním postihu.

    Nejsnazším způsobem získání cizí identity je Phishing - získání důvěry přes sociální sítě nebo přes email, případně Lazy Phishing, který podvrhne logovací “okno” nebo DeepFake, který umožní útočníkovi vydávat se za někoho jiného. Způsoby útoků bývají různorodé.

    Připojte se na náš webinář, kde Vám představíme, jak těmto útokům předcházet a zabránit a jaké jsou možnosti řešení. Představíme si trendy v oblasti IAM a ukážeme si některé use casy naživo.

    Agenda :
    • Identity and Access management
    • Safanet Trusted Access
    • Demo
    • Q&A
  • So schaffen Sie Sicherheit für Ihre Digitalisierungsprojekte Recorded: Apr 22 2021 58 mins
    Armin Simon, Regional Sales Director Germany, Thales
    Digitalisierungs-Initiativen und Cloud-Nutzung gehen in Unternehmen Hand in Hand. Grundvoraussetzungen für eine erfolgreiche Umsetzung digitaler Initiativen sind dabei Vertrauen in den Service, Unabhängigkeit von den jeweiligen Cloud-Anbietern und natürlich die Einhaltung gesetzlicher Datenschutz-Vorgaben. Allerdings zeigt das EuGH-Urteil Schrems II auch Grenzen und Risiken der Cloud-Adaption in Verbindung mit den großen Anbietern auf.

    Die Praxis zeigt, dass gesetzliche Vorgaben sowohl Cloud-Anbieter als auch deren Kunden schnell in datenschutzrechtliche Zwickmühlen bringen können. Betroffen von möglichen Sanktionen sind dabei nicht nur große, global agierende, sondern durchaus auch mittelständische Unternehmen.

    Der Europäische Datenschutzausschuss (EDSA) empfiehlt Unternehmen die Verschlüsselung der Daten in Verbindung mit der vollständigen Kontrolle über die Schlüssel. Mit den zukunftsorientierten Verschlüsselungslösungen von Thales können sie diesen Herausforderungen in verschiedensten Cloud-Plattformen begegnen und Risiken aktiv entgegenwirken.

    Armin Simon behandelt unter anderem die folgenden Themen:
    • Die zentralen Security-Herausforderungen der digitalen Transformation
    • Die Auswirkungen von Schrems II
    • Welchen Schutz bieten die Cloud-Service-Provider?
    • Verschlüsselung als strategische Entscheidung
    • Lösungsbeispiel: Deutsche Bahn
  • Moderní způsob ochrany citlivých dat pomocí HSM a Double Key Encryption Recorded: Apr 22 2021 71 mins
    Petr Kunstat, CEE Presales Consultant ve společnosti Thales
    Ochrana citlivých dat pomocí šifrování závisí nejvíce na způsobu ochrany tohoto klíče. Nejbezpečnější metodou je samotný klíč generovat a ukládat v tzv. HSM - Hardware security modulu. Takový klíč nikdy neopustí HSM, všechny šifrovací operace se provádějí v HSM a navíc je samotné HSM chráněno proti útokům – tamper protection.
    Pokud se citlivá data spravují lokálně, může být proces šifrování integrován s HSM jednoduše a bezpečně. Pokud chceme chránit data v cloudu např. v MS Azuru, nabízí se šifrování pomocí klíčů generovaných v Key Vaults. Zde ale zákazník nemá plnou kontrolu nad klíči. Řešením je DKE – Double Key Encryption, který oba přístupy šifrování kombinuje a poskytuje jistotu, že se k šifrovaným datům nedostane nikdo, kdo nemá přístup k lokálnímu HSM.

    Připojte se na náš webinář a dozvíte se, jak šifrování pomocí HSM funguje. Představíme si nejčastější use casy a podíváme se na Thales řešení pro Double Key Encryption.


    • Šifrování dat
    • Potrebuji HSM nebo Enterprise Key Management
    • Řešení Double Key Encryption
    • Demo
    • Q&A
  • Schrems II and the Security of International Data Flows Recorded: Apr 21 2021 57 mins
    Rob Elliss, VP EMEA, Thales; Enza Iannopollo, Senior Analyst, Forrester; Arjen Slim, Managing Director, Security, Accenture
    In July of 2020 the Court of Justice of the European Union issued the Schrems II decision in the case Data Protection Commission v. Facebook Ireland. That decision invalidated the EU-U.S. Privacy Shield Framework, on which more than 5,000 U.S. companies rely to conduct transatlantic data flows in compliance with EU data protection rules. The Schrems II decision not only impacts EU-U.S. data transfers, but also affects data transfers of EU data across the world. However, the level of the impact depends on the geography and the strategic privacy planning they have done to maintain compliance with GDPR.

    In this webinar, panelists from Accenture, Forrester and Thales will discuss data transfers in a post-Schrems II and post-Brexit era and examine how the current rules and regulations for securing information and maintaining privacy will impact organizations that rely on global access to data. The panelists will address the organizational and technical measures organizations can adopt, including encryption and key management, to ensure GDPR level compliance for data moved out of the EU. In addition, this webinar will discuss how the work and lifestyle changes brought about by COVID-19 will affect the regulations that organizations need to plan for.
  • How to Build End-to-End IoT Device Security at Scale Recorded: Apr 21 2021 44 mins
    Ted Shorter (CTO), Ellen Boehm (VP, IoT Strategy), Kim Bybjerg (VP at Tata Communications), Paul Hampton (Sr. Product Mgr.)
    Connected things include a variety of IoT endpoint devices across several critical infrastructure segments, including utilities, automotive, healthcare, retail, and building automation. Complex manufacturing supply chains make it difficult to build electronic devices that can be trusted – forcing security to be bolted on as a feature rather than being a critical element designed at the start of a product’s lifecycle.

    By adopting a Zero Trust approach, IoT manufacturers can ensure device trustworthiness and security at scale through their product's end-to-end lifecycle.

    In this panel with device security experts, discussion topics will include:

    -How businesses can gain a competitive advantage by embedding security in the devices they manufacture
    -Regulations relating to IoT security that manufacturers should be aware of
    -Where secure crypto fits into the product design and lifecycle process
    -Common IoT device security challenges that require a zero trust manufacturing approach

    Device security experts in this panel include:

    -Ted Shorter, Co-Founder & CTO at Keyfactor
    -Ellen Boehm, VP of IoT Strategy and Operations at Keyfactor
    -Kim Bybjerg, VP/Head of Continental Europe at Tata Communications & Chairman of IMC (IoT M2M Coucil)
    -Paul Hampton, Senior Product Manager, Thales
  • Data embarking beyond your secure control (Data in Motion Survey) Recorded: Apr 20 2021 28 mins
    Axel Debray - Cyber Security Specialist, Thales UKI
    Only 54% of enterprises feel confident their network security will protect them against cyber threats.
    As organisations of all sizes continue to adopt connected technologies in support of Cloud Services, Mobility, CCTV, BYOD and Business Continuity; their increased network traffic expose them to increased data in motion security risks.

    Thales has commissioned a global survey of IT and Cyber Security decision-makers and the findings are in. It highlights serious concerns about the security of data in transit across enterprise networks. Security vulnerabilities issues such as, emerging technologies and cyber-threats; the impact of legacy approaches to encrypting data in motion on business systems’ performance should be evaluated and acted upon immediately by organisations

    Join our Cyber Security Specialist as we reveal the survey findings. Assess where your organisation ranks amongst these findings. Learn:

    - How to take a more modernised approach to network encryption
    - Why legacy approaches are not fit for our modern networks
    - The advantages of a purpose built encryption solution for data in transit
    - How separation of duties and policy-based management can support full data sovereignty
    - Quantum readiness with Quantum Key Distribution (QKD)
  • Why Is Double Key Encryption Essential to Protect Sensitive Data? Let's Find Out Recorded: Apr 20 2021 55 mins
    Ignacio Berrozpe, Cyber Security Specialist and Senior Engineering Consultant, Thales
    A best practice for organisations focused on protecting sensitive data and adhering to compliance is to maintain control and own the keys used to encrypt sensitive data in all applications.

    This is especially true for organisations looking to embrace online collaboration solutions like Microsoft 365 while working remotely, or that operate in highly regulated industries such as financial services, governments and healthcare and their sensitive data requires the highest level of control and security.

    Join Ignacio Berrozpe, Cyber Securit Specialist and Senior Engineering Consultant to hear how Thales is helping enterprises protect sensitive data. During the session Ignacio will discuss:
    • What exactly is Microsoft Double Key Encryption (DKE)?
    • How does DKE help your Encryption Strategy?
    • How to gain enhanced control and security over sensitive data in Microsoft Azure with Luna HSMs
    • Best practice guidance for enterprises looking to adopt DKE
  • Protecting Cross-Border Data Flows with Quantum-Safe Security Recorded: Apr 15 2021 62 mins
    Stan Mesceda, Senior Product Manager, Thales and Eric Hay, Director of Field Engineering, Quantum Xchange
    Multinational organizations face difficult and unique compliance challenges to successfully meet the ongoing waves of government regulations for data privacy and security. The most sweeping and aggressive regulation, the European Union’s General Data Protection Regulation (GDPR), went into full force in May 2018. Things get even more complicated with the July 2020 Schrems II decision from the EU’s top court that the EU-U.S. Privacy Shield was unlawful.

    These new restrictions have many companies looking into more advanced encryption methods – like post-quantum crypto and Quantum Key Distribution (QKD) – to ensure data transmissions across the Internet or network are protected, secure, and compliant with local laws and regulations now and for years to come.

    Data security experts from Thales and Quantum Xchange have come together to discuss how to create a dynamic, crypto-agile infrastructure for future-proofing the security of your data and communications networks.
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Digital Banking: Customizing security to avoid customer fatigue
  • Live at: Nov 16 2016 4:00 pm
  • Presented by: Philippe Regniers, Director of Marketing for Online Banking and Payments
  • From:
Your email has been sent.
or close