Hi [[ session.user.profile.firstName ]]

Cloud Transformation: Security in the Age of Digital Disruption

While the technological and commercial advances of the cloud have created significant opportunities for enterprises, service providers and IT vendors alike, this cloud-driven transformation has also undone conventional approaches to data security and created compliance challenges when it comes to data control and ownership.

These changes have unwittingly drawn us into a realm of increasing threat vectors, poor security practices and bad actors. From reducing cost of ownership to empowering IT decision making across the value chain, it is safe to say that the cloud means that life will never be the same for anyone.

During this webinar we will:
- Look at the challenges facing today's IT and security teams;
- See how this wave of disruption can be overcome using ever advancing automation, processing and intelligence technologies that can be used to build and deliver security an increasingly diverse IT landscape; and
- Look at how security will need to evolve in the wake of digital transformation.
Recorded Oct 16 2018 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Gary Marsden, Senior Director of Data Protection Services at Gemalto
Presentation preview: Cloud Transformation: Security in the Age of Digital Disruption
  • Channel
  • Channel profile
  • The State of Data Security in Europe Jun 13 2019 2:00 pm UTC 60 mins
    Andy Kicklighter, Director of Product Marketing, Thales
    Digital transformation and the move to the cloud are fundamentally changing business operations throughout Europe – and are putting organizations crown jewels, their sensitive data, at risk. Traditional market leaders are driven to digital transformation by the opportunity for greater efficiency, flexibility and new business models – while also fending off rivals entering their markets with an “all digital” focus. In this session we’ll address the state of data security in European enterprises today, the changing landscape of risks to data due to digital transformation, and IT security pros priorities for data security today.

    Based on the results from the 2019 Thales Data Threat Report – European Edition (now in its sixth year), expect to learn about:

    - How the adoption of digital transformation technologies, and especially cloud, is putting sensitive data at greater risk
    - The data security challenges facing European enterprises today
    - Critical analyst recommendations for how organizations can be most effective when selecting the right tools to protect their sensitive data
  • Understanding the Latest Strategies and Trends in Encryption Key Management Recorded: May 22 2019 50 mins
    Steve Kingston, Senior Manager at Gemalto
    Security and risk management professionals face ever-increasing needs to encrypt various types of sensitive data stored on-premises, in private and public clouds and in hybrid environments in order to protect their organizations in the event of a data breach. Compliance mandates, internal security audits, data residency issues and threats of hackers are driving the requirements for enterprises to develop a centralized enterprise-wide encryption strategy to prioritize sensitive data protection. In addition, regulations, such as the EU General Data Protection Regulation (GDPR), have dramatically increased pressure on security professional leaders to review and revamp their approach to encryption key management.

    To meet these needs, security professionals are using a growing number of encryption tools to protect data within a variety of data storage environments. These may be located within local and external IT environments and systems, such as file stores, databases, big data platforms or various clouds. However, encrypting data in each of these environment results in the creation of islands of encryption and diverse key management platforms which increases complexity, costs and risk of data loss.

    In this webinar, you will:
    • Gain insight into trends that are driving the digital cloud transformation and how key management plays a role
    • Understand the importance of developing a centralized approach to encryption key management
    • Examine where and when you should encrypt your organization’s data and typical key management use cases
    • Learn how to implement an enterprise-wide key management operational model that can reduce cost of ownership and minimize overall risks
  • GDPR Explained in 6 Steps Recorded: May 20 2019 60 mins
    Jan Smets, Certified Data Protection Officer, Gemalto
    The introduction of GDPR in May 2018 brought data protection to the top of businesses’ priority lists. So how can businesses and other organizations ensure they are compliant and what steps do they need to take?
    In this webinar, certified DPO Jan Smets with provide a six-step overview to help achieve compliance:

    1) Understand the GDPR legal framework
    2) Create a Data Register
    3) Classify your data
    4) Start with your top priority
    5) Assess and document additional risks and processes
    6) Revise and repeat
  • Turning PKI Smart Cards into Cloud SSO Gold Recorded: May 7 2019 51 mins
    Garrett Bekker, Senior Security Analyst at 451 Research and Stephane Vinsot, Senior Director, IAM Product Strategy at Gemalto
    Up until now, PKI hardware’s limitations meant companies could not adopt cloud and mobility projects without having to completely ‘rip and replace’ their current security framework. As a result, companies have been using smart cards and tokens to allow their employees to authenticate themselves while accessing corporate resources, but this was limited to activity within the enterprise perimeter. In addition, companies that use PKI credentials for email encryption and digital signing have also been limited to on-premises environments.

    In this webinar, you will learn about how organizations can deploy SafeNet Trusted Access and benefit from single sign on (SSO) and high assurance PKI-based authentication, making it easier and more secure to access cloud and web-based apps and resources from wherever and on any device. Using the solution, employees will no longer have to re-authenticate each time they access a resource with their smart card, enabling more efficiency across the company – while allowing enterprises to maintain high assurance security when needed.

    In this webinar you will also learn how to build on current PKI investments, and embrace digital transformation without compromising on security, including:
    •Enabling cloud transformation: Organizations can extend PKI credentials to access policies, allowing CISOs to maintain security in the cloud by triggering the use of step up PKI-based authentication to cloud and web-based apps when needed
    •Facilitating mobility: Employees can access enterprise applications within virtual environments with their PKI credentials. This means that employees and consultants will be able to access corporate apps via a VDI, from any device and carry out certificate-based transactions, even if they can’t use their smart cards
  • The State of Data Security in APAC: Are Businesses Ready for Transformation Recorded: Apr 11 2019 60 mins
    Rana Gupta, VP APAC, at Gemalto and Carl Woerndle, Principal Advisor, Cyber Security - Crisis & Incident Response, Ecosystm
    Businesses in the Asia-Pacific region and India are innovating rapidly by evolving their business models to remain competitive. At the heart of this evolution is the explosive proliferation of sensitive data that is created, collected and shared. At the same time, cybercriminals are looking at all this data as a gold mine for them to monetise! So how can businesses in APAC adapt to these changes safely?

    This webinar will:
    • Identify disruptive cybersecurity trends and the implications for the APAC region & India
    • Provide insights into opportunities to protect against data breaches
    • Share best practices on data protection IT Security governance frameworks
    • Assess the maturity of current and planned security technologies
  • The State of Data Security in APAC: Are Businesses Ready for Transformation Recorded: Apr 9 2019 60 mins
    Rana Gupta, VP APAC, at Gemalto and Carl Woerndle, Principal Advisor, Cyber Security - Crisis & Incident Response, Ecosystm
    Businesses in the Asia-Pacific region are innovating rapidly by evolving their business models to remain competitive. At the heart of this evolution is the explosive proliferation of sensitive data that is created, collected and shared. At the same time, cybercriminals are looking at all this data as a gold mine for them to monetise! So how can businesses in APAC adapt to these changes safely?

    This webinar will:
    • Identify disruptive cybersecurity trends and the implications for the APAC region
    • Provide insights into opportunities to protect against data breaches
    • Share best practices on data protection IT Security governance frameworks
    • Assess the maturity of current and planned security technologies
  • How the Cloud and IoT Are Changing the Way Healthcare is Delivered Recorded: Mar 28 2019 59 mins
    Gorav Arora, Director, Office of CTO, at Gemalto and Ted Shorter, CTO at Keyfactor
    Increased cloud adoption plus the growth of IoT-enabled devices are accelerating the transformation of how healthcare is delivered. While improving patient services these new technologies add potential vulnerabilities from the increasingly porous perimeter that IT must secure. Securing every digital touchpoint is crucial to delivering safe and connected healthcare services from medical device OEMs, HDOs, EHRs and patients across the networks, data and devices they rely on.

    In this webinar, you will learn more about:
    • A real-life use case on how a leading provider partnered to successfully secure devices with IoT and the Cloud
    • Current and proposed cyber security regulations for healthcare
    • How effective key management is a vital component to ensure device security throughout their lifecycle
    • Code signing with Cloud or on-premise HSMs prevents software update tampering
    • Protecting data in use, at rest and in motion from the device to the cloud and back with advanced encryption
    • How MFA ensures the right people have access to sensitive data stored on-premises or in the cloud
  • Navigating Access Security in Cloud & Hybrid Enterprise Environments Recorded: Feb 22 2019 46 mins
    Asaf Lerner, Director IAM Solutions at Gemalto
    As mid-sized and large organizations move to cloud based delivery for software, infrastructure and storage, hybrid environments are the de-facto reality. Perimeter security schemes no longer meet the security challenges of distributed software and application delivery, leading CISOs to try and mesh disparate solutions, or worse knowingly compromise on protection. Join Gemalto to hear best practices for applying consistent and effective access security and strong authentication to both on-prem and cloud apps.
  • Global Trends in IoT Security: 2019 and Beyond Recorded: Feb 7 2019 53 mins
    Gorav Arora, Director, Office of CTO, at Gemalto
    New data tells us that companies are making progress when it comes to securing the Internet of Things and the data it produces, but there is still a long way to go in order to secure the projected 20 billion connected devices by 2023. In order to assess the current state of affairs, Gemalto recently surveyed 950 IT and business decision makers around the world with awareness of IoT in their organization. Some of the results were encouraging, while others were less so.

    According to the global survey, security is clearly an emerging priority. Companies are now devoting 13 percent of their IoT budgets to security, up from 11 percent last year. Ninety percent said they believe security is a major consideration for their customers and 97 percent believe that a strong approach to IoT security is a key competitive differentiator.

    In addition to these data findings from the global study, this webinar will discuss:
    •The top technologies companies are utilizing to secure IoT infrastructure and data
    •Which countries are most advanced when it comes to the security of IoT
    •What companies think about the role of government regulation on IoT security
    •Which companies in the IoT ecosystem are most responsible for the security of data
    •Are companies adopting Security by Design when it comes to IoT products and services
    •What role will technologies like Blockchain play in IoT Security

    Following the webinar, attendees will receive a free copy of the global IoT Security report as well as other research and white papers on IoT security.
  • Understanding the Latest Strategies and Trends in Encryption Key Management Recorded: Nov 29 2018 51 mins
    Steve Kingston, Senior Manager at Gemalto
    Security and risk management professionals face ever-increasing needs to encrypt various types of sensitive data stored on-premises, in private and public clouds and in hybrid environments in order to protect their organizations in the event of a data breach. Compliance mandates, internal security audits, data residency issues and threats of hackers are driving the requirements for enterprises to develop a centralized enterprise-wide encryption strategy to prioritize sensitive data protection. In addition, regulations, such as the EU General Data Protection Regulation (GDPR), have dramatically increased pressure on security professional leaders to review and revamp their approach to encryption key management.

    To meet these needs, security professionals are using a growing number of encryption tools to protect data within a variety of data storage environments. These may be located within local and external IT environments and systems, such as file stores, databases, big data platforms or various clouds. However, encrypting data in each of these environment results in the creation of islands of encryption and diverse key management platforms which increases complexity, costs and risk of data loss.

    In this webinar, you will:
    • Gain insight into trends that are driving the digital cloud transformation and how key management plays a role
    • Understand the importance of developing a centralized approach to encryption key management
    • Examine where and when you should encrypt your organization’s data and typical key management use cases
    • Learn how to implement an enterprise-wide key management operational model that can reduce cost of ownership and minimize overall risks
  • PCI Compliance: Why Risk Losing Customers When Payment Card Data Is Stolen? Recorded: Nov 28 2018 60 mins
    Graeme Pyper, Regional Director A/NZ at Gemalto and Vaqar Khan, Senior Security Consultant, UL Identity Management & Security
    Amazon, eBay, Alibaba, Black Friday, Cyber Monday amongst others are all fuelled by online credit card payments. Even traditional bricks and mortar businesses accept card payments through point-of-sale devices, online or via applications on mobile devices. This trend is only going to grow as the world move towards a cashless society.

    With the same motivation as criminals stealing cash, in the digital age cyber criminals are now stealing personal financial information from payment card transactions and payment processing systems.

    The PCI Security Standards Council (PCI SSC) offers a set of standards and supporting materials to enhance credit card security. For retailers, financial institutions, payment processors, and a range of other organizations that store, process and/or transmit credit card data, and the service providers that enable their businesses, compliance with the relevant the PCI standards (e.g. PCI PTS, PCI DSS, PCI PIN, PCI P2PE, PCI 3DS) is critical to ensure the safe handling of credit card information at every step.

    This webinar will discuss and provide helpful and practical information on:

    •The overview of PCI standards and how they apply to businesses
    •Encryption and key management requirements in PCI and how to comply with focus on PCI DSS, PCI PIN, PCI P2PE and PCI 3DS
    •How to secure sensitive cardholder data & meet the critical challenges of complying with PCI standards
  • Turning PKI Smart Cards into Cloud SSO Gold Recorded: Nov 8 2018 52 mins
    Garrett Bekker, Senior Security Analyst at 451 Research and Stephane Vinsot, Senior Director, IAM Product Strategy at Gemalto
    Up until now, PKI hardware’s limitations meant companies could not adopt cloud and mobility projects without having to completely ‘rip and replace’ their current security framework. As a result, companies have been using smart cards and tokens to allow their employees to authenticate themselves while accessing corporate resources, but this was limited to activity within the enterprise perimeter. In addition, companies that use PKI credentials for email encryption and digital signing have also been limited to on-premises environments.

    In this webinar, you will learn about how organizations can deploy SafeNet Trusted Access and benefit from single sign on (SSO) and high assurance PKI-based authentication, making it easier and more secure to access cloud and web-based apps and resources from wherever and on any device. Using the solution, employees will no longer have to re-authenticate each time they access a resource with their smart card, enabling more efficiency across the company – while allowing enterprises to maintain high assurance security when needed.

    In this webinar you will also learn how to build on current PKI investments, and embrace digital transformation without compromising on security, including:
    •Enabling cloud transformation: Organizations can extend PKI credentials to access policies, allowing CISOs to maintain security in the cloud by triggering the use of step up PKI-based authentication to cloud and web-based apps when needed
    •Facilitating mobility: Employees can access enterprise applications within virtual environments with their PKI credentials. This means that employees and consultants will be able to access corporate apps via a VDI, from any device and carry out certificate-based transactions, even if they can’t use their smart cards
  • New Mandatory Breach Reporting in Canada: Be Prepared for PIPEDA Changes Recorded: Oct 25 2018 47 mins
    MNP: Danny Timmins, Cyber Security; Miller Thomson LLP: Imran Ahmad, Business Law Partner; Gemalto: Todd More, SVP Encryption
    We live in an environment of ever-increasing cybersecurity risks. As new mandatory breach reporting regulations come into effect on November 1, 2018 – the stakes will soon be even higher.

    Canadian organizations must also be prepared to communicate with federal regulators and all affected parties the details of any cyber attack that could potentially lead to “real risk of significant harm.” – or experience costly financial, legal and reputational damages well-above the loss of data and proprietary information.

    During this insightful webinar, MNP, Miller Thomson LLP and Gemalto will provide all the information you need to understand the new rules, ready your organization and better protect yourself from the growing criminal and regulatory threats all around you.
  • Cloud Transformation: Security in the Age of Digital Disruption Recorded: Oct 16 2018 54 mins
    Gary Marsden, Senior Director of Data Protection Services at Gemalto
    While the technological and commercial advances of the cloud have created significant opportunities for enterprises, service providers and IT vendors alike, this cloud-driven transformation has also undone conventional approaches to data security and created compliance challenges when it comes to data control and ownership.

    These changes have unwittingly drawn us into a realm of increasing threat vectors, poor security practices and bad actors. From reducing cost of ownership to empowering IT decision making across the value chain, it is safe to say that the cloud means that life will never be the same for anyone.

    During this webinar we will:
    - Look at the challenges facing today's IT and security teams;
    - See how this wave of disruption can be overcome using ever advancing automation, processing and intelligence technologies that can be used to build and deliver security an increasingly diverse IT landscape; and
    - Look at how security will need to evolve in the wake of digital transformation.
  • Gemalto Part 3: Preparing for Quantum Recorded: Sep 18 2018 43 mins
    Michael Gardinar, Principal Architect, Enterprise & Cybersecurity CTO Office, Gemalto; Brandon Dunlap (Moderator)
    We’ve all heard that quantum computers are coming; beyond being a boon for materials science they’re going to wreak havoc for cybersecurity. Part 3 of this series from Gemlato will outline the scope of the problem (it’s more than just algorithms) as well as the work required and being done to protect data through the upcoming transition.
  • SafeNet Authentication Service - Product Demo Webinar Recorded: Aug 29 2018 24 mins
    Mor Ahuvia - Product Marketing Manager
    Watch the 30-minute demo webinar to see how easy and simple it is to:

    • Set up an admin account
    • Onboard new users
    • Automate token provisioning
    • Leverage user self-service
    • Generate reports
  • SafeNet Trusted Access - Product Demo Webinar Recorded: Aug 29 2018 29 mins
    Mor Ahuvia - Product Marketing Manager
    SafeNet Trusted Access (STA) is a cloud-based access management service that makes it easy to manage cloud and web access with single sign-on, access policies and strong multi-factor authentication.

    Watch the 30-minute demo webinar to learn how you can:

    - Simplify user access with cloud single sign-on
    - Quickly set up access policies - Start global & go granular
    - Enable trust elevation and step-up authentication
    - Seamlessly integrate apps with a catalog of ready to use templates
    - Optimize security with contextual information
  • Fintech, Compliance & Data Protection – Steps to Secure the Breach Recorded: Aug 14 2018 43 mins
    Ferry de Koning, Director Business Development, Gemalto and Gary Marsden, Senior Director, Encryption Products
    Fintech startup companies are disrupting the financial services industry, raising more than $120 billion over the last three years. Although these new entrants are changing how money and markets operate, they must still do business within the realities of regulations like GDPR and Australia's Notifiable Data Breaches scheme that the rest of the financial industry must operate. This means that data security and trust are just as important to Fintech companies as it is to traditional banks.

    Fintech companies are unique because of their agility, lean operations and that most are built using the cloud and digital technologies that banks are just now adopting. While this makes Fintech companies more nimble and they can enter new markets faster, it also presents more complexities for how Fintech companies need to manage security and meet compliance mandates.

    In this webinar you will learn about:

    •Fintech compliance and regulation from a data protection perspective.
    •How to build a secure the breach strategy using a case study from the physical world
    •Understand key elements for building cloud-based data security strategy that fits the needs of Fintech companies
  • ISSA Thought Leadership Series: The Definitive Need for Crypto-Agility Recorded: Aug 8 2018 64 mins
    ISSA International
    On the eve of quantum computing, the definitive need for crypto-agility is greater than ever. The ability to locate, manage, and securely update digital certificates on a network or on a device seems like a simple task, yet with the advent of new Enterprise use cases and flourishing IoT device introductions, management at massive scale becomes a challenge. Facing mounting pressures, IT security personnel and product managers are tasked with implementing solutions fit for today’s environment plus tomorrow’s post-quantum world. Join renowned Public Key Infrastructure (PKI) expert and Certified Security Solutions (CSS) CTO, Ted Shorter, as he outlines the defense against quantum computing and the IoT device invasion, crypto-agility:

    · How can crypto-agility lend itself to a truly future-proof Enterprise and IoT device security strategy?
    · Cryptographic kryptonite: demystifying quantum computing
    · Challenges with digital certificate/device management at scale

    Moderator:

    Dr. Shawn Murray, Principal Scientist, US Missile Defense Agency & Director, ISSA International

    Presenters:

    Ted Shorter, CTO, Certified Security Solutions (CSS)
    Michael Gardiner, Principal Architect, Gemalto
    Michele Mosca, Founder, Institute for Quantum Computing
    Mike Brown, CTO & Co-Founder, ISARA Corporation
  • Gemalto 2 - The EU’s General Data Protection Regulation (GDPR) - Myth to Action Recorded: Aug 7 2018 56 mins
    Alexander Hanway, Sr. Product Mrky Mgr, Data Protection, Gemalto; Andrea Middleton, Sen Sec. Prod Mgr. NetApp; Brandon Dunlap
    The General Data Protection Regulation (GDPR) is the biggest overhaul of EU data protection law in more than 20 years. It’s not simply another regulation. It’s about accountability and it’s reshaping how organizations view and interpret privacy. Join us as we uncover the regulation, define a new lens and perspective to address not only the GDPR, but other regulations which are sure to follow. Understand the ecosystem and seamless integrated security solutions necessary to address these key privacy challenges. Whether you are looking for insight, guidance, or solutions to privacy, join in on this journey with GDPR as a guide to understanding and addressing privacy in today’s organizations.
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cloud Transformation: Security in the Age of Digital Disruption
  • Live at: Oct 16 2018 3:00 pm
  • Presented by: Gary Marsden, Senior Director of Data Protection Services at Gemalto
  • From:
Your email has been sent.
or close