Hi [[ session.user.profile.firstName ]]

New Data Breach Findings: The Year of Internal Threats & Misplaced Data

2018 has started off as an eventful year with data breaches at Saks Fifth Avenue, Lord & Taylor and Under Armour’s MyFitnessPal app. And it will continue to be a catalyst year for data security with the 25th of May deadline for the European Unions’ General Data Protection Regulation, which regards “privacy as a fundamental human right and to protect it as such.” Data exposed or breached is not only a headache for security teams, but also impacts brand reputation, customer confidence and stock prices.

Gemalto’s 2017 Breach Level Index found 2.6 billion records where compromised in 2017, a 88% increase from 2016. In this webinar our expert, Jason Hart, will walk attendees through the most shocking 2017 stats, new data breach tactics and how companies can manage risk by mapping out where your data resides. Join us to learn more about:
-Internal threats and misconfigured cloud databases
-Growing security threats like data integrity attacks
-Innovative technology that is solving some of these issues
-What we have in store for 2018
Recorded May 14 2018 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jason Hart, CTO of Data Protection at Gemalto
Presentation preview: New Data Breach Findings: The Year of Internal Threats & Misplaced Data
  • Channel
  • Channel profile
  • Where is my Data? Let’s find out... Mar 23 2021 11:00 am UTC 60 mins
    Romi Hamplova - Pre-Sales Consultant, Thales
    The number 1 barrier to a successful data protection strategy is the ability to discover where sensitive data resides. Still over 60% companies are unable to analyze all the data they collect. Thales brought to the market the industry first Next Generation Solution: Data discovery, classification, and protection in a single, integrated Data Security Platform.

    This webinar will discuss one of the first steps to protect your data - find and know what your sensitive data is.

    Join Romi Hamplova, Pre-Sales Manager for Data Protection at Thales UKI, to learn:
    - What do Data Privacy regulations demand with implications on Data Security strategy
    - How can companies streamline the path to compliancy
    - Can you effectively discover both structured and unstructured data?
    - Gain visibility into data classification and risk analysis
    - What is next in the data security life cycle?
    - How can you Discover, Protect and Control with Thales CipherTrust Data Security Platform
  • Beyond Zero Trust: The Future of Continuous and Granular Access Mar 18 2021 6:00 pm UTC 60 mins
    Asad Ali, Senior Technologist, CTO Office, Thales
    The concept of Zero Trust security is not new. The term itself was coined more than a decade ago at Forrester with a general premise that all network traffic should be considered untrusted. Over the years we have seen refinements to this idea by Google in their BeyondCorp publication, Gartner in their definition of CARTA framework, and to complete the circle by Forrester again in Zero Trust eXtended report that explained Zero Trust in the light of current cybersecurity challenges. One of these challenges is fine grained and continuous access to resources and data.

    This Talk will review the history of Zero Trust and then explore how Zero Trust applies to continuous authentication and access. We will discuss the historical trends that have shaped our authentication evolution, and then look at Continuous Access Evaluation Protocol (CAEP) a nascent but promising technology that can fundamentally change how we define and implement Zero Trust in web applications. The role of major players in this effort, such as Thales and Google will be explained.
  • Finding and Securing Data without Traditional Borders Mar 11 2021 11:00 am UTC 60 mins
    Axel Debray - PreSales Consultant UKI, Thales
    What are the threats and risks from operating online and storing sensitive data, whether that is on-premises or in the cloud and what are the challenges of Internet Governance considering the erosion of traditional borders between Nations?

    Join Robert Carolina, Technology & Cyber Security Lawyer as he explores these considerations, how organisations can retain full ownership of their sensitive data by leveraging strong encryption and key management. Axel Debray from Thales will explore how to discover and classify sensitive data across data stores to give full visibility over your hybrid multi cloud environments and significantly reduce the risk of data leaks using the Thales CipherTrust Data Security Platform.

    • The Benefits of an External Key Manager
    • How to control Encryption Key Lifecycle’s
    • When and How to use Data Encryption
    • How to achieving Data Sovereignty across multiple Public Clouds

    - Robert Carolina, Technology & Cyber Security Lawyer
    - Elton Jones, Director at ID-3
    - Axel Debray, Pre-Sales Consultant at Thales
  • The Business Case for a Cloud-First PKI Strategy Mar 10 2021 6:00 pm UTC 60 mins
    Chris Hickman - Chief Security Officer, Ryan Yackel - VP of Product Management, Blake Wood - Director of Business Development
    The explosion of machine identities, keys, and certificates across multi-cloud and DevOps environments have stretched your on-premise PKI to its limits.

    And with over 62% of organizations currently or planning on outsourcing their PKI, now might be time to evaluate a new approach to PKI for the future.

    In this webinar, we explore the evolving complexity and costs of PKI, how to balance potential risks against those costs, and ways your organization can build the business case for a cloud-first PKI strategy.

    Join Chris Hickman, Chief Security Officer at Keyfactor, and Blake Wood, Director of Business Development at Thales, as they talk:

    - How PKI has evolved and continues to grow in complexity
    - Options for PKI deployment
    - The costs of on-premise PKI
    - The Future of PKI in the cloud
  • Secure Cloud Adoption – Come affrontare in sicurezza le nuove sfide Mar 10 2021 9:00 am UTC 60 mins
    Luigi Vezzoso, Thales Pre-Sales Consultant
    L’adozione del Cloud é un processo che non puó essere procastinato ed impatta tutte le societá indifferentemente dalla loro dimensione e/o organizzazione. Il nuovo paradigma pone sfide importanti ai team di Sicurezza e Compliance. Non é possibile adottare soluzioni cloud native senza introdurre security by-design nella progettazione delle soluzioni.

    Scopriamo insieme come le soluzioni di Data Protection Thales possono agire come element di semplificazione dei processi di adozione del cloud.
  • The Cloud Trust Paradox: Keeping Control of Data & Encryption Keys in the Cloud Mar 9 2021 7:30 pm UTC 60 mins
    Paul Hampton, Senior Product Manager, Thales; Anton Chuvakin, Security Solution Strategy, Google
    When it comes to encryption keys, security best practice is all about control and separation between encrypted data at rest and the keys. Google Cloud encrypts customer data at rest by default and offers organisations multiple options to control and manage their encryption keys. For many organisations hosting sensitive data or looking to migrate workloads to the cloud, they require additional control and ownership over their encryption keys in order to meet compliance or internal security requirements.
    In this webinar Anton Chuvakin (Google) and Paul Hampton, Senior Product Manager (Thales), will discuss how Google and Thales are helping organisations address this challenge by exploring use cases where keeping the encryption keys off the cloud may in fact be truly necessary or outweigh the benefits of cloud provider based key management.
  • Keeping our Critical National Infrastructure Secure Mar 4 2021 11:00 am UTC 60 mins
    Peter Smith, Senior Sales Engineer, Thales
    As our critical infrastructure becomes more connected, it exposes legacy technologies to the outside world; leaving some vital systems open to exploitation. In recent years, we have seen an increasing number of attacks on critical infrastructure. Governments and industry regulators around the world are now focusing beyond physical perimeter protection to ensure the integrity of the systems used to control our critical infrastructure.

    Join us to explore how encryption is a key element in ensuring the security of SCADA networks and how it needs to deliver against four criteria: Speed, Scalability, Manageability and Affordability to be most effective. We will look at traditional SCADA network provision, the evolving need to secure IoT connected devices, identify network vulnerabilities and discover the benefits of High-Assurance and Network Independent Encryption.
  • Multi-Cloud options for the Finance Sector from Thales and Fujitsu Recorded: Feb 24 2021 48 mins
    Iain Kothari Johnson, Fujitsu Security Sales Lead (Financial Sector)| Romi Hamplova, Thales Pre-Sales Manager Data Protection
    Fujitsu and Thales have partnered up to look at how financial organisations are expanding their cloud offerings on a global scale and how they are exploring the best security data practices to keep their organisations secure.

    Join the data security team at Fujitsu and Thales as we discuss:
    - The flexibility and benefits of moving to the cloud including how to improve the customer experience with value-added services
    - How to find the balance between innovation and compliance in one of the most regulated industries in the world
    - How to achieve cloud flexibility and data security adopting encryption and key management

    You will learn:
    - The Cloud Data Protection principles on the market
    - The Data Encryption and Key Management options for the finance sector
    - What challenges the finance sector face and what solutions they can implement
    - The Best Practices of gaining control of your encryption keys
  • Grasp Control of your keys in a Multi Cloudy World Recorded: Feb 23 2021 37 mins
    Axel Debray - PreSales Consultant UKI, Thales
    Over 80% of companies are using two and more cloud providers to store sensitive data that needs protection. While encryption is a globally recognized data security principle, how do you control it across environments? The Cloud Security Alliance and Industry Analysts state that encryption keys should be held by customers, so what does that mean in a multi-cloud environment?
    - How do you achieve cloud flexibility and data security, across AWS, Azure, Google cloud, IBM cloud, Salesforce, O365 and on-prem?
    - How do you gain visibility and grasp control of your keys in Multi Cloudy World?

    Join Axel Debray, Pre-Sales Manager for Data Protection at Thales UKI, to discover:
    - What happens if you do not have key visibility and control?
    - What does enterprise key management truly mean?
    - Learn how Thales CipherTrust increases the cloud security
    - Discover how seamless BYOK, HYOK and full key lifecycle management can be
  • Securing the Software Supply Chain Recorded: Feb 16 2021 39 mins
    Paul Hampton, Senior Product Manager, Thales; Kieran Miller, Chief Architect, Garantir
    Supply chain attacks can have catastrophic impacts and are some of the most difficult to prevent. These attacks can cause serious financial, and even national security, consequences and are typically carried out by well-resourced attackers, such as nation-states. In this webinar, we will discuss the anatomy of a supply chain attack and what you can do to prevent your enterprise from falling victim. While some of the ground we will cover is aimed at technology companies, it is relevant to any company that consumes software from a third-party vendor or produces software for internal or external purposes.
  • TalkingTrust with Thales and CyberArk - Privileged Access Management Recorded: Feb 1 2021 20 mins
    Andrew Silberman, Sr Product Marketing Manager at CyberArk, and Blair Canavan, Director of Business Development at Thales
    In this discussion, join experts from CyberArk and Thales to discuss why Identity Security and Privileged Access Management have converged to be a top priority for any organization looking to tangibly reduce risk. You’ll learn how CyberArk and Thales work together to secure the keys to the kingdom using the integrated solution to secure privileged access for all types of users and identities.
  • TalkingTrust with Thales and Red Hat: Securing Containers and DevOps Recorded: Jan 28 2021 19 mins
    Cameron Skidmore, Associate Solutions Architect at Red Hat, and David Madden, Director Business Development at Thales
    Containers and DevOps are being embraced as critical elements of enterprise digital transformation strategies, as this new paradigm provides development teams with an efficient way to build and deploy applications across hybrid cloud environments at scale. Red Hat and Thales have partnered to enable the benefits of DevSecOps to ensure code runs securely and data can be protected effectively. Thales and Red Hat discuss in this video how to enable a secure and scalable DevOps platform to deploy new services efficiently.
  • Retaining control of your encryption keys and data in Google Cloud Recorded: Jan 28 2021 32 mins
    Paul Hampton, Snr Product Manager & Claire Pitman-Massie, Director of EMEA Field Marketing, Thales CPL
    When it comes to encryption keys, security best practice is all about control and separation between encrypted data at rest and the keys. Google Cloud encrypts customer data at rest by default and offers organisations multiple options to control and manage their encryption keys. For many organisations hosting sensitive data or looking to migrate workloads to the cloud, they require additional control and ownership over their encryption keys in order to meet compliance or internal security requirements.
    In the first of our Data Protection Coffee Break Series for 2021, we will discuss how Google and Thales are helping organisations address this challenge by giving customer’s enhanced control over how and when their encryption keys are used to protect and access encrypted data in the cloud.
  • TalkingTrust with Thales and Keyfactor - IoT Security Recorded: Jan 27 2021 21 mins
    Ellen Boehm, VP of IoT Strategy at Keyfactor, and Dave Madden, Director of Business Development at Thales
    In this brief video, you’ll hear from Ellen Boehm, VP of IoT Strategy at Keyfactor, and Dave Madden, Sr. Director of Business Development at Thales, as they discuss the current state of IoT security and share their joint solution for securing the entire IoT ecosystem using Keyfactor Control and Thales Luna HSMs.
  • TalkingTrust with HashiCorp and Thales - DevSecOps Recorded: Jan 21 2021 16 mins
    Chintan Gosalia, Sr. Solutions Engineer at HashiCorp, and Dave Madden, Director of Business Development at Thales
    As organizations adopt DevSecOps principles for rapid application delivery, they are heavily leveraging HashiCorp vault to centrally manage and deliver appropriate secrets to the applications. Vault stores thousands or even millions of highly sensitive secrets in such environments and encrypts them in storage to prevent any unauthorized access. Thales HSM solutions encrypt the Vault master key in a hardware root of trust to provide maximum security and comply with regulatory requirements. In this video, we discuss how organizations can enhance Vault’s security controls by leveraging Thales Luna HSM to meet the most stringent compliance regulations and automate their DevOps processes.
  • TalkingTrust with Thales and Isara - Quantum Recorded: Jan 13 2021 19 mins
    Angelo Fafulo, Isara and Dave Madden, Thales
    The Quantum era is quickly approaching, threatening to impact security, as we know it. But how will it really impact you and how can you prepare?

    In this TalkingTrust video you will learn about:
    - The quantum landscape and where we’re at
    - The quantum threat to use cases and industries and how it impacts internet security
    - How crypto agility enables you to quickly react to cryptographic threats
    - How to ensure your IoT devices can remain in use and secure from spoofed software updates
    - Why it’s important to start preparing today with solutions that are readily available
  • Desafios de Segurança com a LGPD para o Processo de Retomada do Brasil Recorded: Dec 9 2020 58 mins
    Marcus Almeida, Sales Manager, McAfee; Bryan Rivera, Sales Engineer e Abilio Branco, GM Data Protection Brasil, Thales
    A McAfee e a Thales convidam para o Talk Show | Desafios de Segurança com a LGPD, para o processo de retomada do Brasil, que acontecerá no dia 9 de dezembro, às 17:00 horas.
    Nesta oportunidade nossos experts discutirão tópicos relevantes que vão impactar na exigência e no nível de maturidade de segurança, que as empresas que tem processos orientados a dados terão que enfrentar em 2021, como:

    • Proteção e monitoramento completo de todas as camadas do banco de dados;
    • Proteção de dados, privacidade e anonimização dos dados;
    • Criptografia;
    • Gerenciamento e controle de todos os eventos de segurança, entre outros.

    Marcus Almeida, Sales Manager, McAfee
    Abilio Branco, GM Data Protection Brasil, Thales
    Bryan Rivera, Sr. Sales Engineer LATAM, Thales
  • Securing OpenShift Container-Based Application Development Recorded: Dec 9 2020 47 mins
    Cameron Skidmore, Global Partner Solutions Architect, Red Hat; Sol Cates, CTO Office, Thales; Rohini Deepak, Thales
    Join Thales and Red Hat for a series of interactive Tech Talks, where we’ll explore the blueprint for implementing trust in the cloud native development lifecycle across Development, Build/Test & Operator phases. In this first session, we’ll discuss the application development phase of the DevOps lifecycle, with its specific challenges and needs, highlighting application level encryption & tokenization. Key takeaways for the first session will be:
    • Thales and Red Hat solutions available for container-based application development
    • Use cases enabled by Thales and Red Hat solutions
    • Specifics around Thales solutions and OpenShift integration
  • Data Is Your Competitive Advantage & Your Biggest Risk. Do You Know Where It Is? Recorded: Dec 7 2020 44 mins
    Todd Moore, VP, Encryption Product at Thales; Stephen Cavey, Chief Evangelist at Ground Labs
    It starts with data, it’s no longer an outcome of what we do. When we look back, we amass loads of “history” of things, now we leverage that history to define how and what we do. Hence the adoption of data lakes, IoT, and the commonly held view of data is more valuable than oil. Embracing data helps us make better decisions, delights our customers, delivers growth, and safeguards our business. Safeguarding your business is no longer about just placing firewalls, VPNs, and endpoint protection. You need to know what you’re protecting, otherwise, you’re at risk.
  • Trends, Technologies and Challenges of Payments Industry the Irish Market Recorded: Dec 3 2020 47 mins
    Simon Keates, Head of Payment Strategy
    The payments industry is undergoing intense transformation caused by customer demands, technology advancements, globalisation, disintermediation by new entrants, and increasing regulatory requirements. On top of this, fraud by cyber criminals continues to evolve with attacks becoming increasingly sophisticated.

    Join this webinar where will discuss evolving trends, technologies and regulations affecting the payments industry and how Thales can help meet these challenges.
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: New Data Breach Findings: The Year of Internal Threats & Misplaced Data
  • Live at: May 14 2018 3:00 pm
  • Presented by: Jason Hart, CTO of Data Protection at Gemalto
  • From:
Your email has been sent.
or close