Hi [[ session.user.profile.firstName ]]

IoT Security over Tea: Brewing in the Business

For businesses and consumers the Internet of Things (IoT) is about the value of data, whether it’s for better decision making, for navigation to future goals or immediate maneuvering. The value of the data will vary based on numerous factors like its perceived value, intrinsic value, monetary value, etc. and may change over time. Being able to identify the value of data will help businesses better understand the associated risks and thereby the necessary security.

According to Gartner, worldwide spending on IoT security will reach $348 million in 2016, a 23.7% increase from 2015 spending of $281.5 million. Companies need to understand and evaluate the business impact of data to determine its value and consequently the appropriate security. Following our introductory webinar “Steeping out the Hype,” the next in our series on IoT security will focus on the building an IoT security blueprint based on the estimated value of the data. The calculation will not always be linked to a monetary value but also the data’s impact if breached on brand recognition and stock price or data used to make strategic decisions, competitive information and/or intellectual property.

Join us for a webinar to learn more about evaluating the value of your data and building an IoT security strategy to match the eight point business journey. Attendees will have a better understanding of the:
-Eight point business journey and its connection to securing the data
-Factors impacting the value of the data, the IoT personas outlook on each type of data and using them to calculate estimates and risk assessment to understand the cost of a breach
-Messages to educate management and business leaders on the investment needed to support a secure IoT
-A blueprint for building an IoT security strategy
Recorded Jun 20 2017 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Gorav Arora, CTO Office's Director of Strategy
Presentation preview: IoT Security over Tea: Brewing in the Business
  • Channel
  • Channel profile
  • Desafios de Segurança com a LGPD para o Processo de Retomada do Brasil Dec 9 2020 8:00 pm UTC 75 mins
    Marcus Almeida, Sales Manager, McAfee; Bryan Rivera, Sales Engineer e Abilio Branco, GM Data Protection Brasil, Thales
    A McAfee e a Thales convidam para o Talk Show | Desafios de Segurança com a LGPD, para o processo de retomada do Brasil, que acontecerá no dia 9 de dezembro, às 17:00 horas.
    Nesta oportunidade nossos experts discutirão tópicos relevantes que vão impactar na exigência e no nível de maturidade de segurança, que as empresas que tem processos orientados a dados terão que enfrentar em 2021, como:

    • Proteção e monitoramento completo de todas as camadas do banco de dados;
    • Proteção de dados, privacidade e anonimização dos dados;
    • Criptografia;
    • Gerenciamento e controle de todos os eventos de segurança, entre outros.

    Marcus Almeida, Sales Manager, McAfee
    Abilio Branco, GM Data Protection Brasil, Thales
    Bryan Rivera, Sr. Sales Engineer LATAM, Thales
  • Securing OpenShift Container-Based Application Development Dec 9 2020 6:00 pm UTC 60 mins
    Cameron Skidmore, Global Partner Solutions Architect, Red Hat; Sol Cates, CTO Office, Thales; Rohini Deepak, Thales
    Join Thales and Red Hat for a series of interactive Tech Talks, where we’ll explore the blueprint for implementing trust in the cloud native development lifecycle across Development, Build/Test & Operator phases. In this first session, we’ll discuss the application development phase of the DevOps lifecycle, with its specific challenges and needs, highlighting application level encryption & tokenization. Key takeaways for the first session will be:
    • Thales and Red Hat solutions available for container-based application development
    • Use cases enabled by Thales and Red Hat solutions
    • Specifics around Thales solutions and OpenShift integration
  • Trends, Technologies and Challenges of Payments Industry the Irish Market Recorded: Dec 3 2020 47 mins
    Simon Keates, Head of Payment Strategy
    The payments industry is undergoing intense transformation caused by customer demands, technology advancements, globalisation, disintermediation by new entrants, and increasing regulatory requirements. On top of this, fraud by cyber criminals continues to evolve with attacks becoming increasingly sophisticated.

    Join this webinar where will discuss evolving trends, technologies and regulations affecting the payments industry and how Thales can help meet these challenges.
  • payShield 10K: features and benefits (Turkish language) Recorded: Dec 3 2020 64 mins
    Sercan Koc, Sales Engineers for Turkey and Greece and Batuhan Celikkol Sales Manager Verisoft Software
    Sercan Koc will illustrate the features and benefits of payShield 10k. This webinar is organsied with Verisoft Software
  • Compliance in the payments world leveraging HSMs Recorded: Nov 25 2020 31 mins
    Radovan Bruncak - PreSales Consultant, Thales
    Any organisation involved in card payment transactions, from issuance to processing, must be compliant with standards. These are increasingly becoming more robust, detailed and payment-specific to protect customer sensitive data. To meet these standards, HSMs are a mandatory requirement to both protect and support the cryptographic keys and operations throughout the payment transaction.

    As such, HSMs are a critical part of an organisation’s infrastructure and are expected to handle transactions seamlessly, 24/7. Performance, reliability and operating costs are all factors to consider during a procurement selection stage, while the operations team must have the available tools and knowledge to be able to remotely manage the HSMs for configuration, audit and key management, following industry best practise.

    Join Radovan Bruncak Pre-Sales Consultant at Thales:
    1) Learn how international standards are driving the payments industry
    2) Explore the best practice guidance to protect payment data and transactions
    3) Discover how HSMs are helping to meet compliance
  • Is "Free" Affordable When it Comes to Cloud Security? Recorded: Nov 20 2020 54 mins
    Garrett Bekker - Sr Research Analyst 451 Research, Il-Sung Lee Sr Product Mgr Google, Sol Cates Principal Technologist Thales
    The question of whether cloud security is better obtained via native tools from cloud providers or from neutral third-party vendors – or both - continues to be a source of debate. This panel discussion will consider the compliance, security and operational tradeoffs related to migrating workloads to public clouds, utilizing hybrid environments and managing multicloud deployments. Join your peers in discussing their considerations and criteria for architecting a cloud data security strategy that encompasses native cloud security features, cloud provider premium services and independent third-party solutions. Please arrive with questions and be prepared to share your experiences.
  • Adopting HSM in the Cloud - Multi Cloud Approaches Recorded: Nov 19 2020 47 mins
    Manoj Bhati - Pre-Sales Consultant, Thales
    Organisations are electing to move more of their applications to the cloud each year. As they make this transition, they are considering how they port their existing on-premise security solutions to the Cloud.

    Can organisations achieve the same level of security and trust as they enjoy on-premise? Are they able to use the same HSM or should they adopt an HSM service in a multi-cloud environment or hybrid infrastructure?

    Please join Manoj as he explores:
    - The different options for adopting HSMs in the cloud.
    - Using On-premise HSMs and an HSM service in: the Cloud, Multi-Cloud and Hybrid Cloud environments
    - The different use cases that can be addressed
    - How to achieve separation of roles/duties
    - Are the keys under your control?
  • Encryption & Key Management Strategies for 2020 and Beyond Recorded: Nov 18 2020 37 mins
    Enrique Gutierrez, Public Sector Data Security Sales Leader, IBM; Larry Metaxotos, Senior Sales Engineer, Thales
    In the era of COVID-19 with more employees working remotely and cloud adoption increasing, data security has become more complex. This is especially challenging as data breaches, especially those in Federal and Public sectors, continue to make headlines. There are solutions available to help protect your organization from external as well as internal threats as more organizations move to the cloud in the era of COVID-19. This panel discussion will look explore the fundamentals of encryption and key management and, more importantly, how to protect data in the cloud. The explosive growth of cloud services adoption and the amount of sensitive data stored in the cloud creates risks and threats that organizations have never had to face before.

    Panelists in the session will discuss:
    • How data security in the cloud is different than protecting data on-premise
    • How quickly can your organization react when a breach is detected in the cloud
    • What is key management and why is key rotation important
  • Ensuring Data Protection for Governments to Safeguard Critical Data Recorded: Nov 18 2020 59 mins
    Rami Dawoodi, Country Sales Manager, Lakhwinder Singh and Neil Cosser, Country Sales Manager Africa at Thales
    Thales provides solutions that help government agencies and their organisations to secure their data and comply with the current regulations.
    Register to this webinar to find out how to protect critical data from the cloud to on premises.  From our core solutions developed specifically for the government Thales Cloud Protection & Licensing offerings address the most stringent federal requirements. Our extensive data security experience allows us to provide one of the most broad data protection portfolios specifically focused on government requirements for protecting mission critical data in data centers, cloud environments, and field deployments.
  • Access Management and Authentication Trends in the Asia-Pacific Region Recorded: Nov 18 2020 46 mins
    Danna Bethlehem Coronel, Director, Product Marketing, Identity and Access Management, Thales
    Thales research conducted this year captured the opinions from risk management and cloud security professionals just as the Covid-19 emergency erupted. Three months on, we have a unique vantage point to assess how this data lines up with the way remote access has played out in reality. Join us in this session to hear the latest trends and future directions in access management and remote working as we discuss the findings of Thales’s annual Access Management Index for the Asia-Pacific region.
  • Still using yesteryear’s technology to secure today’s modern High Speed Networks Recorded: Nov 12 2020 47 mins
    Peter Smith, Senior Sales Engineer, Thales
    Networks have developed incredibly quickly over the last 25 years, from low speed public and private network access to the high speed fibre and Software Defined Networks seen today. However, most of the sensitive data being transferred across modern networks still rely on the performance sapping, bandwidth hungry security technologies introduced decades ago.

    Join Thales on 12th November to learn how ultra-efficient certified network independent encryption can be deployed to secure today’s networks whether private layer 2 or public layer 3 networks with end points located on premise and in the Cloud.
  • What to Watch Out for in 2021: Top Trends in Crypto Recorded: Nov 11 2020 35 mins
    John Ray (Director of HSM Product Management, Thales), Mike Brown (CTO, ISARA), Chris Hickman (CSO, Keyfactor)
    We can agree 2020 was anything but ordinary – but what can we expect in the year ahead? From sleeping dragons to expected crypto-compromises, this panel discussion will cover some of the ways that cryptographic keys and digital certificates will be used (and misused) in 2021 and beyond.

    In this webinar, you’ll hear directly from those at the forefront of cryptography as they share insights on:

    -How IoT & DevOps are testing the limits of PKI
    -The impact of shorter SSL/TLS certificate lifecycles
    -Emerging code-signing and SSH-based attacks
    -The threat of Impending root CA expirations

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • クラウドトランスフォーメーションで必用な、アイデンティティ・セントリック・ゼロトラストセキュリティモデルの紹介 Recorded: Nov 10 2020 46 mins
    タレスDIS CPLジャパン株式会社 IAM事業本部 担当部長 芳賀 悟
  • Customer Needs: Increasingly Cloudy - Six ways to accelerate your XaaS Revenue Recorded: Nov 5 2020 48 mins
    Gary Marsden: Cloud Services Director, Thales Cloud Protection & Licensing (CPL)
    Today’s new normal has changed the market for data consumption and accelerated the need to protect data at multiple levels. With a feature-rich and comprehensive portfolio, partnering with an industry leader like Thales will help your business flourish. Our technologies enable you to cross-sell to existing customers, retain higher revenues per partner contract and increase stickiness for customer retention. It helps open doors to new markets, obtain new customers and enables you to wrap value add services as a competitive differentiator.

    Join Gary Marsden, Cloud Services Director to learn more about how the Thales New Normal provides unrivalled growth opportunities with zero investment, through data protection on demand, that can help accelerate your client revenues
  • Secure Your Cloud Databases with Searchable Encryption Recorded: Nov 4 2020 57 mins
    Itsik Musseri, VP Product Management, Kindite; Alex Hanway, Business Development Manager, Thales
    All organizations struggle to find some balance between the need to secure sensitive data with making it available for use. Often in large enterprise environments that data is also fragmented between different regions, physical data centers, or cloud service providers making it difficult for security personnel to keep data safe while also allowing operations to effectively use that data.

    Fortunately, Kindite and Thales can help. Kindite’s end-to-end encryption solution allows organizations to secure sensitive application and database data without requiring any changes to enterprise applications – all while allowing applications to continue to perform operations on data even as it remains encrypted. Thales CipherTrust Manager integrates with Kindite’s encryption to securely store and centrally manage keys so organizations can integrate these keys into their larger encryption strategy and demonstrate compliance with their regulatory obligations.

    Together, Kindite and Thales ensure that data remains secure, and organizations remain compliant without disrupting business operations. Join us for this webinar for more information on how you can strike the right security balance while maintaining your business operations.
  • タレスが提供する最新鍵管理とデータ保護ソリューションとケーススタディ Recorded: Oct 29 2020 36 mins
    タレス DIS CPLジャパン株式会社 クラウドプロテクション&ライセンシング SEディレクター / CISSP 舟木 康浩
  • Maximize Your 5G Security without Compromising Performance Recorded: Oct 28 2020 60 mins
    Chen Arbel, VP BD, Joe Warren, Dir BD. Thales; Dr. Sundeep Oberoi, Global Head Cybersecurity, Prashant Deo, TCS
    5G connectivity promises to break traditional paradigms of data delivery by providing network connectivity virtually everywhere. New business opportunities are driving data in motion security requirements to include network transparency, low latency, high-level bandwidth, consistency in delivery and complete interoperability. To accommodate this new paradigm in data delivery, the build out of 5G infrastructures is underway and older, more traditional data in motion security methods are no longer viable solutions to meet these diverse 5G requirements. Additionally, these older technologies cannot meet today’s challenges of auditable compliance and the quantum threat challenges of the not-so-distant future. Security, performance, interoperability, and auditable compliance are just a few of the 5G challenges that require immediate attention. It is clear that there is a need for a more intelligent data in motion security solution that can accommodate the diverse range of 5G use cases.

    Join Thales and Tata Consultancy Services (TCS) on Oct 28 to learn about the security challenges and solutions for 5G data in motion.
  • Increase VMware Encryption Security with Thales Key Manager Recorded: Oct 28 2020 42 mins
    Axel Debray - PreSales Consultant UKI, Thales
    The Industry leading virtualisation platform VMware vSphere® protects virtual machine files, virtual disk files, and core dump files with VMware vSphere VM Encryption introduced in vSphere 6.5. The solution leverages the Key Management Interoperability Protocol (KMIP) for encryption key management and key vaulting. vSphere can be used with the CipherTrust Manager from Thales to provide the full range of protection for key management and role separation.

    The combined solution delivers non-disruptive encryption, ensuring the security of VMs, the applications they run and the sensitive data they process. The combination provides a cost-effective and comprehensive solution that meets the most stringent security requirements. Leveraging hardware-based data encryption ensures no adverse impact to system performance.

    During this webinar you will learn

    • Why encrypting VMWare is important for your organisation
    • How to integrate Key Management with VMWare
    • What the different VMware encryption methodologies are
    • Benefits of using an external Key Manager with VMware
    • How to meet compliance and security requirements with FIPS compliant solutions
  • How To Launch Payment Innovations Faster Recorded: Oct 27 2020 60 mins
    Dmitry Yatskaer, CTO, OpenWay
    The presentation by OpenWay, a global leader in digital payments software, will cover the use cases of a wallet-driven payment ecosystem in Asia, cloud-based payment processing for neobanks in Europe, domestic QR code and instant payments schemes and more.
  • Panel: Desafíos y oportunidades para la seguridad de pagos en América Latina Recorded: Oct 23 2020 76 mins
    Roman Baudrit, Thales; Isami Romero, PROSA; Imanol Garcia Murga, Seglan; Oscar Castellano, ATEFI
    Pagos móviles, contactless, etc., la adopción de nuevas tecnologías de pago ya avanzaba rápidamente antes de la pandemia. Ahora más que nunca se necesita una infraestructura de pago, ágil, flexible, capaz de optimizar costos, ingresos y procesos pero sin perder de vista la necesidad de una constante evolución en seguridad. Únase a nuestro panel de discusiones para hablar sobre los desafíos y oportunidades para la seguridad de pagos en América Latina.

    Isami Romero, Director de Seguridad de la Información y CISO, PROSA
    Oscar Castellano, Director Ejecutivo - ATEFI Redes Latinoamericanas de Medios de Pago
    Imanol Garcia Murga, CEO - Seglan
    Roman Baudrit, VP Data Protection LATAM - Thales
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: IoT Security over Tea: Brewing in the Business
  • Live at: Jun 20 2017 3:00 pm
  • Presented by: Gorav Arora, CTO Office's Director of Strategy
  • From:
Your email has been sent.
or close