Hi [[ session.user.profile.firstName ]]

Turning the Table on Hackers and Breaches

Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations and identity theft. According to Gemalto’s Breach Level Index, the number of stolen, compromised or lost records increase by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.

Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a pulse on what is going on. It seems too simple to be true, but it goes back to the age-old principle of information is power. Getting the information comes from being aware of one’s surroundings. To become situationally aware, companies need to change their mindset- building a walled garden isn’t an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness. Join us as we cover topics like:

-What we can learn from Jason Bourne about knowing one’s surroundings
-What we can learn from hackers to better protect valuable data
-What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability and confidentiality
-How to change our mindset in a new era of a hacker driven gold rush
Recorded Jul 11 2017 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jason Hart, CTO of Data Protection at Gemalto
Presentation preview: Turning the Table on Hackers and Breaches
  • Channel
  • Channel profile
  • Customer Needs: Increasingly Cloudy - Six ways to accelerate your XaaS Revenue Nov 5 2020 11:00 am UTC 60 mins
    Gary Marsden: Cloud Services Director, Thales Cloud Protection & Licensing (CPL)
    Today’s new normal has changed the market for data consumption and accelerated the need to protect data at multiple levels. With a feature-rich and comprehensive portfolio, partnering with an industry leader like Thales will help your business flourish. Our technologies enable you to cross-sell to existing customers, retain higher revenues per partner contract and increase stickiness for customer retention. It helps open doors to new markets, obtain new customers and enables you to wrap value add services as a competitive differentiator.

    Join Gary Marsden, Cloud Services Director to learn more about how the Thales New Normal provides unrivalled growth opportunities with zero investment, through data protection on demand, that can help accelerate your client revenues
  • Trends, Technologies and Challenges of Payments Industry the Irish Market Oct 8 2020 10:00 am UTC 60 mins
    Simon Keates, Head of Payment Strategy
    The payments industry is undergoing intense transformation caused by customer demands, technology advancements, globalisation, disintermediation by new entrants, and increasing regulatory requirements. On top of this, fraud by cyber criminals continues to evolve with attacks becoming increasingly sophisticated.

    Join this webinar where will discuss evolving trends, technologies and regulations affecting the payments industry and how Thales can help meet these challenges.
  • Smart Data Security - Reducing noise on your network Sep 24 2020 10:00 am UTC 45 mins
    Manoj Bhati - Pre-Sales Consultant, Thales
    Organisations are receive hundreds if not thousands of alerts and reports every single day. Not only that, but organisations are using a many different security solutions from multiple vendors. All of these solutions are creating and sending alerts. This is their window to know if they are under attack. The resulting data means it is difficult for organisations to look into and respond, not to mention the false positives and the red herrings. Companies are becoming Cyber Fatigued.

    Thales provide solutions that allow customers to encrypt data at a given layer. With encryption in place any alert below this layer can be handled at a lower priority. We help organisations in prioritising the logs they are receiving and reducing the noise in the network by using encryption.
  • Customer Needs: Increasingly Cloudy - Six ways to accelerate your XaaS Revenue Sep 17 2020 10:00 am UTC 60 mins
    Gary Marsden: Cloud Services Director, Thales Cloud Protection & Licensing (CPL)
    Today’s new normal has changed the market for data consumption and accelerated the need to protect data at multiple levels. With a feature-rich and comprehensive portfolio, partnering with an industry leader like Thales will help your business flourish. Our technologies enable you to cross-sell to existing customers, retain higher revenues per partner contract and increase stickiness for customer retention. It helps open doors to new markets, obtain new customers and enables you to wrap value add services as a competitive differentiator.

    Join Gary Marsden, Cloud Services Director to learn more about how the Thales New Normal provides unrivalled growth opportunities with zero investment, through data protection on demand, that can help accelerate your client revenues
  • Leaky Buckets: Effective Encryption Techniques to Secure AWS S3 Buckets Aug 18 2020 3:00 pm UTC 60 mins
    Jermaine Ashman, Senior Sales Engineer, Thales
    Several of the most well-known data breaches have involved unsecured Amazon Simple Storage (S3) buckets that resulted in millions of customer data records be exposed. In most cases the main culprit was human error: Administrators who improperly configured the security settings.

    While cloud native encryption and key management can be used, these options are mostly “just good enough security” and do not follow best practices for encryption and key management. Using third party encryption and key management solutions give users total control over the security of sensitive data in the cloud.

    For cloud and security teams, understanding the most effective encryption technology available for securing data AWS can help them make them make the right choices. In this webinar, you will learn about a more secure approach for protecting sensitive data in AWS S3 buckets using Vormetric Transparent Encryption (VTE).

    Key topics in this webinar will be:
    • Causes of misconfigured permissions to AWS S3 buckets
    • What happens if an S3 bucket is intentionally or unintentionally exposed
    • Why Bring Your Own Encryption is better than cloud native encryption
    • The specific techniques VTE offers to provide a more effective encryption mechanism to secure sensitive data in AWS S3 buckets
  • How to Achieve Zero Trust in Your Access Management Strategy Recorded: Aug 7 2020 94 mins
    Sol Cates Principal Technologist, CTO Office Thales, Bryan Green BISO Salesforce, John Kindervag Field CTO Palo Alto Networks
    Zero Trust approaches to security are at the core of key strategic IT initiatives, including cloud and digital transformation. Underlying Zero Trust assumptions rely on a "trust no one, verify everyone" approach, whereby the network, devices, and identities—whether internal or external—should always be assumed to be at risk. A key tenet in this approach is that every device, user, and network flow is authenticated and authorized.
  • What is the new data protection paradigm in a borderless world? Recorded: Aug 5 2020 57 mins
    Brian Grant, A/NZ Regional Director & Andrew Younger, Manager, Solution Consultants, Cloud Protection & Licensing, Thales
    In days gone by, the pinnacle of data protection was the encryption of your database so that any unauthorised access or copying of data never exposed sensitive information. In a borderless information technology environment where data is captured, created and shared across platforms that could be running almost anywhere, simply performing traditional static data protection is always going to leave you exposed to creative or advanced cyberattacks.

    Join us on this webinar where:
    • Key data protection findings from Thales’ 2020 Report on Data Security in Australia and New Zealand will be discussed
    • You will learn how the best of the best are turning the traditional data protection approach upside down
    • You will see how to align your data protection strategy with a borderless world that leverages automation and orchestration to build in minutes what used to take months
    • You can gain business advantage through securing sensitive data in real time, as it is captured or created
  • It’s True…SAP HANA Customers Can Securely Adopt the CloudUsing VTE Recorded: Jul 30 2020 62 mins
    Alex Hanway, Business Development Director at THALES, and Robert Holland, VP Research and Publishing at SAPinsider
    Organizations are finding it difficult to securely deploy software on someone else’s infrastructure where the cloud vendor is responsible for neither application security nor controlling system access. Any effective enterprise IaaS security strategy needs to address immediate needs while also heading off future security concerns and challenges as cloud deployments grow. Thales’ Vormetric Transparent Encryption offers organizations a proven approach to securing SAP HANA data and log volumes that meets rigorous security, data governance, and compliance requirements both on-premises and in the cloud. As the only third-party encryption vendor with a validated solution for SAP HANA, hear how Thales is uniquely positioned to help SAP customers securely adopt the cloud.
  • 5 Practical Thales Solutions to Complement Microsoft Azure Data Protection Recorded: Jul 29 2020 61 mins
    Graham Wallace Managing Director at Senetas Europe and Erol Dogan, Pre-Sales Consultant at Thales
    Every day many organizations are shifting their data to Microsoft Azure. In this webinar Graham Wallace and Erol Dogan, Cloud Protection experts, will discuss about data protection challenges and how to use Thales solutions in order to address them both in a cloud only and hybrid-cloud environments.
  • Telecom operators: Implementing data security in modern mobile networks. Recorded: Jul 28 2020 61 mins
    Didier Wylomanski, Business Development Director for EMEA at Thales  and Neil Cosser, Country Sales Manager at Thales
    Mobile Network Operators, who deploy new communication services face the complexity of mixing the modern mobile networks with the latest virtualization technology.
    While opening flexibility in the deployment of the subsystems like Core Network, or MEC, the MNO’s see a high risk to lose control on their cybersecurity strategy when applied to data protection.
    The webinar will show how MNO’s can take back control, and ensure an adequate data protection strategy by deploying a “encrypt everywhere” approach associated with best-in-class key life cycle and rights management.
  • Factoring Security Transformation in a Digital Transformation Strategy Recorded: Jul 23 2020 33 mins
    Tzach Kaufmann, Director of Product Management, Data Discovery & Classification, Thales
    A successful digital transformation hinges on the foundation of trust. Companies must safeguard their sensitive data because it forms the basis of their digital business strategy. But, with the increased use of the cloud, big data, and IoT, data can be copied, moved, shared, or stored anywhere, almost at no cost, leaving organizations vulnerable to data breaches.

    This webinar will discuss how organizations can take a strategic approach to data protection by first discovering and understanding their sensitive data and its risks, and then automating the process of remediation from a single pane of glass.
  • Shared responsibility for cloud security, what does it mean for your data? Recorded: Jul 22 2020 60 mins
    Brian Grant, A/NZ Regional Director & Andrew Younger, Manager, Solution Consultants, Cloud Protection & Licensing, Thales
    The shared responsibility model that almost every cloud provider refers to requires both the cloud service provider and the customer to take ownership of specific aspects of cloud security. In this model the customer has the responsibility for securing their information and data.

    So what does this mean for you and your organization’s sensitive data when moving to the cloud?

    Join us on this webinar where:

    • Key cloud security findings from Thales’ 2020 Report on Data Security in Australia and New Zealand will be discussed
    • You will learn how leading enterprises are securing information and data when they no longer own the infrastructure on which they run
    • You will see a demonstration of what this can look like in the real world and why emerging trends in digital transformation, DevSecOps and automation should not be handcuffed by old data protection practices and thinking
  • Rapid Protection for Teradata Database with Vormetric Transparent Encryption Recorded: Jul 21 2020 49 mins
    Blake Wood, Director of Business Development at Thales, Jay Irwin, Director for the Center of Enterprise Security, Teradata
    Teradata data warehouse environments typically use application-level tokenization or encryption solutions to protect sensitive data for privacy and other compliance requirements. This is excellent data security but requires integration within database or application code which can take a lot of time and impact overall database performance. Vormetric Transparent Encryption provides a rapid deployment option to secure all data at rest and provides excellent performance for very large database environments.

    This webinar will discuss the current security options for Teradata database, provide a deep dive into application-layer database encryption, and discuss the advantages of the industry first transparent encryption database protection for Teradata.

    The agenda for this webinar is:
    • Overview of Teradata and Thales
    • Database Security Fundamentals and Options
    • Vormetric Protection for Teradata Database
    • Vormetric Transparent Encryption for Teradata Database
    • Q&A
  • Estudo sobre Gerenciamento de Acesso Seguro no Brasil em 2020 Recorded: Jul 16 2020 71 mins
    Sergio Muniz, VP, LATAM Sales, Identity and Access Management, Rodrigo Eimar, Sr. Sales Engineer
    Examinando 300 tomadores de decisão de TI no Brasil e Estados Unidos, a nova pesquisa da Thales descobriu que 61% dos entrevistados brasileiros acreditam que o acesso desprotegido à rede local representa o maior alvo dos ataques cibernéticos. Mas, ao mesmo, tempo 46% ainda acreditam que senhas são uma das ferramentas mais eficazes do gerenciamento de acesso. Na verdade, 76% dos entrevistados planejam expandir o uso de senhas e 68% o de login social, apesar dos riscos e reconhecidas vulnerabilidades destas opções.

    Participe do nosso webinar para entender:

    - As tendências do mercado e os resultados do Estudo de Gerenciamento de Acesso Brasil-EUA de 2020.
    - O conflito entre Segurança x Conveniência em tempos de crise.
    - Como a adoção acelerada na nuvem agrega maior complexidade.
    - Como melhorar a experiência do usuário, utilizando políticas de acesso e o SSO.
    - Duplo fator de autenticação: Modelos para cada tipo de caso.

    A Thales provém soluções líderes mundiais para gerenciamento de acesso seguro. O SafeNet Trusted Access é uma solução oferecida por meio de um serviço que permite que os funcionários acessem aplicações corporativas com segurança, combinando seu SSO inteligente com políticas de acesso granular, e uma ampla variedade de formatos de autenticação proprietários, todos centralizados em um único console de administração.


    HORARIO: 11:00 horas Brasilia
  • 5G Security Challenges and the Keys for a Trustworthy Security Framework Recorded: Jul 15 2020 64 mins
    Chen Arbel, VP, Business Development, 5G & Cloud Security, Ranjeet Khanna | Global Practice Head, Security Engineering, Wipro
    The 5G networks will require evolution of the design, build and operating model of communication infrastructure and services built on it. Decoupling of hardware/software, virtualization technologies and the breadth of foreseen 5G use-cases implies high scalability, ultra-low latency, ability to support a massive number of concurrent sessions and ultra-high reliability.

    With the advent of the 5G networks, security threat vectors will expand, in particular with the exposure of new connected solutions and services use-cases. Such security risk will exploit vulnerabilities at both 5G network and enterprise infrastructure layer.

    Join Wipro and Thales as they explore ways to build a trustworthy security model that protects both the integrity and confidentiality of the operator and enterprise environments.
  • そのアプリやデータ、クラウドに移動させても大丈夫です!! Recorded: Jul 15 2020 47 mins
    タレスDIS CPLジャパン株式会社、IAM事業本部 担当部長 芳賀 悟
    【日本時間 7月15日(水)11:00~ライブWebセミナー開催!】クラウドプロテクションを標榜するタレスDIS CPLジャパン、その扱い製品とサービスを紹介する入門編、クラウド利用を検討する上でのセキュリティ対策の入り口です。
  • Navigating the Future of Network Security Recorded: Jul 14 2020 30 mins
    Stan Mesceda, Senior Product Manager for High-Speed Encryption, Thales Graham Wallace, Managing Director at Senetas Europe
    The continuing pandemic has changed the way we work. Increased data in motion from video conferencing, email, make-shift work environments, and remote applications have shifted the way we utilize our network and think about security. In addition, the dynamics of network architectures are changing, and security professionals and individuals are struggling to adapt. Modern organizations must rely on a complex mix of connectivity over both public Internet and private WANs, leaving security administrators challenged to balance requirements for network performance and strong security as more data traverses networks out of their control.

    Network Independent Encryption, is one of the innovative technologies developed to meet the demands of modern network architectures. Using Transport Independent Mode (TIM), security professionals can encrypt data concurrently at network Layers 2, 3, or 4. Our experts for this session will discuss current and future network architectures, including TIM, and give advice on how to secure your network without compromising performance.
  • Planning your migration from on-premise IAM to cloud-based access management Recorded: Jul 9 2020 36 mins
    Danna Bethlehem, Director of Product Marketing & Claire Pitman-Massie, Snr Director of Field Marketing
    Compelling events have the power to transform and accelerate key enterprise IT initiatives. This has been all too evident in the Covid-19 emergency where the need to rapidly enable remote employees revealed gaps in legacy systems and their ability to support a mass move to remote working and cloud service adoption. In our latest "Coffee Break" webcast series, Danna Bethlehem discusses how IT teams can start mapping out the move from legacy on-prem IAM solutions to cloud-based access management in order to enable their cloud and digital transformation journey.
  • Un accesso remoto sicuro consente un vantaggio competitivo Recorded: Jul 8 2020 48 mins
    Luigi Vezzoso, Thales Pre-Sales Consultant
    Smartworking non è più considerato il "semplice" accesso VPN alle risorse aziendali bensì, l'utilizzo in modo agile, di applicazioni tradizionali e cloud-based per ottenere la massima produttività ovunque ci si trovi a lavorare. In questo scenario è necessario garantire un elevato livello di sicurezza, la massima interoperabilità e flessibilità. Scopriamo insieme come la soluzione Thales - Safenet Trusted Access - possa supportare tutte le esigenze per un’adozione completa dello smartworking.
  • Thales Suredrop ile güvenli ve kolay dosya paylaşımı. Recorded: Jul 8 2020 50 mins
    Sercan Koc, Pre-Sales Consultant for Turkey at Thales
    Bu ayki webinarımızın konusu Thales çözüm ailesinin en yeni üyelerinden birisi olan Suredrop. Thales’in yeni çözümü Suredrop ile şirket çalışanları veya üçüncü parti şahıs ve kurumlarla nasıl kolayca ve güvenli bir şekilde dosya paylaşabileceğinizi anlatacağımız webinarımıza davetlisiniz.
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Turning the Table on Hackers and Breaches
  • Live at: Jul 11 2017 3:00 pm
  • Presented by: Jason Hart, CTO of Data Protection at Gemalto
  • From:
Your email has been sent.
or close