Hi [[ session.user.profile.firstName ]]

New Data Breach Findings: The Year of Internal Threats & Misplaced Data

2018 has started off as an eventful year with data breaches at Saks Fifth Avenue, Lord & Taylor and Under Armour’s MyFitnessPal app. And it will continue to be a catalyst year for data security with the 25th of May deadline for the European Unions’ General Data Protection Regulation, which regards “privacy as a fundamental human right and to protect it as such.” Data exposed or breached is not only a headache for security teams, but also impacts brand reputation, customer confidence and stock prices.

Gemalto’s 2017 Breach Level Index found 2.6 billion records where compromised in 2017, a 88% increase from 2016. In this webinar our expert, Jason Hart, will walk attendees through the most shocking 2017 stats, new data breach tactics and how companies can manage risk by mapping out where your data resides. Join us to learn more about:
-Internal threats and misconfigured cloud databases
-Growing security threats like data integrity attacks
-Innovative technology that is solving some of these issues
-What we have in store for 2018
Recorded May 14 2018 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jason Hart, CTO of Data Protection at Gemalto
Presentation preview: New Data Breach Findings: The Year of Internal Threats & Misplaced Data
  • Channel
  • Channel profile
  • Customer Needs: Increasingly Cloudy - Six ways to accelerate your XaaS Revenue Nov 5 2020 11:00 am UTC 60 mins
    Gary Marsden: Cloud Services Director, Thales Cloud Protection & Licensing (CPL)
    Today’s new normal has changed the market for data consumption and accelerated the need to protect data at multiple levels. With a feature-rich and comprehensive portfolio, partnering with an industry leader like Thales will help your business flourish. Our technologies enable you to cross-sell to existing customers, retain higher revenues per partner contract and increase stickiness for customer retention. It helps open doors to new markets, obtain new customers and enables you to wrap value add services as a competitive differentiator.

    Join Gary Marsden, Cloud Services Director to learn more about how the Thales New Normal provides unrivalled growth opportunities with zero investment, through data protection on demand, that can help accelerate your client revenues
  • Increase VMware Encryption Security with Thales Key Manager Oct 28 2020 11:00 am UTC 60 mins
    Axel Debray - PreSales Consultant UKI, Thales
    The Industry leading virtualisation platform VMware vSphere® protects virtual machine files, virtual disk files, and core dump files with VMware vSphere VM Encryption introduced in vSphere 6.5. The solution leverages the Key Management Interoperability Protocol (KMIP) for encryption key management and key vaulting. vSphere can be used with the CipherTrust Manager from Thales to provide the full range of protection for key management and role separation.

    The combined solution delivers non-disruptive encryption, ensuring the security of VMs, the applications they run and the sensitive data they process. The combination provides a cost-effective and comprehensive solution that meets the most stringent security requirements. Leveraging hardware-based data encryption ensures no adverse impact to system performance.

    During this webinar you will learn

    • Why encrypting VMWare is important for your organisation
    • How to integrate Key Management with VMWare
    • What the different VMware encryption methodologies are
    • Benefits of using an external Key Manager with VMware
    • How to meet compliance and security requirements with FIPS compliant solutions
  • payShield 10K – the future of payment protection Oct 13 2020 12:00 pm UTC 60 mins
    Simon Keates, Head of Strategy, Payment Security at Thales and Cas Liddle, Sr. Solutions Architect at Thales
    You can rely on payShield 10K payment HSM to deliver the protection, performance, and operational efficiency needed to confidently secure digital payments.

    This informative webinar will cover:

    payShield 10K new product features and its benefits 
    Roadmap and what's new to come
    How to be compliant in the payment industry
    Six steps to migrate to payShield 10K
  • Trends, Technologies and Challenges of Payments Industry the Irish Market Oct 8 2020 10:00 am UTC 60 mins
    Simon Keates, Head of Payment Strategy
    The payments industry is undergoing intense transformation caused by customer demands, technology advancements, globalisation, disintermediation by new entrants, and increasing regulatory requirements. On top of this, fraud by cyber criminals continues to evolve with attacks becoming increasingly sophisticated.

    Join this webinar where will discuss evolving trends, technologies and regulations affecting the payments industry and how Thales can help meet these challenges.
  • 金融業界のDXを取り巻くデータ脅威の動向、各組織の取り組みを解説 Oct 1 2020 3:00 am UTC 45 mins
    タレスジャパン株式会社、クラウドプロテクション&ライセンシング、シニアテクニカル スペシャリスト 畑瀬 宏一

    第1回のウェビナーは、「2019年タレス データ脅威レポート 金融サービス版」から、100の米国金融サービス組織の回答者からの調査結果をまとめた具体的なデータ結果に基づき解説してまいります。金融業界におけるDXが、金融サービスの機密データにどのような影響を与え、各組織はその保護にどう取り組んでいるのか、マルチクラウド利用が増加する中で、法規制に対応しながら効果的に機密データを保護することの重要性について考察していきます。

  • Empower Users with Secure Remote Access to Maintain Business Continuity Sep 29 2020 7:00 am UTC 60 mins
    Leo Ng, Technical Director, Amidas Hong Kong
    In a competitive environment empowering users with secure access to corporate applications wherever they are is crucial to gaining and maintaining competitive advantage. Thales SafeNet Trusted Access, a strong authentication and access management service, enables employees to access corporate networks and log onto enterprise applications easily and securely.
  • アクセス管理でOffice 365を保護するベストプラクティス Sep 29 2020 5:00 am UTC 60 mins
    タレスDIS CPLジャパン株式会社、IAM事業本部 担当部長、 芳賀 悟
    タレスのSafeNet Trusted Accessを利用すると、この質問に「はい」と答えることができます。
  • Securing Cloud Apps with Next Gen Access Management Solutions (Live Demo) Recorded: Sep 25 2020 60 mins
    Umesh Arya, Regional Sales Engineer, Identity & Access Management, Thales
    Simplifying and securing access to the cloud is becoming more complex for IT security teams. Today's enterprises use, on average, 29 different cloud applications and services. In fact, 10% of organizations use more than 100 cloud services. In addition, cloud services are seen as one of the leading source of data breaches.

    This session will discuss how IT security teams can simplify secure access to the cloud while providing a more simple and seamless way for employees to access cloud services without having to worry about password fatigue. This session will also include a live demonstration of SafeNet Trusted Access, Thales' cloud-based access management solution.
  • How to Think Ahead of the Attacker: Taking Control of Security in the Cloud Recorded: Sep 25 2020 55 mins
    Welland Chu, Director of Business Development for APAC Region at Thales; Harry Pun, Cybersecurity Executive, Microsoft
    There is an old Chinse saying, where there is opportunity there is also risk. This applies to the digital transformation journey many businesses are undertaking today. Businesses are driving significant digital transformation initiatives in order to accelerate performance and create new opportunities. Much of this transformation is being powered by the cloud. This means that more data and information is being stored in the cloud, creating significant risk especially for cyberattacks and data breaches. This interactive Tech Talk will discuss the challenges of maintaining a strong security posture in the cloud and how to think ahead of attacks before placing sensitive data in the cloud. This session will also present a playbook of practical steps organizations should follow for cloud security.
  • Putting Continuous Security First in Your Cloud-first Strategy Recorded: Sep 24 2020 48 mins
    Sundaram Lakshmanan, CTO, CipherCloud; Danna Bethlehem, Dir. of IAM Prod. Mktg., Thales; Haider Iqbal, Dir. Bus Dev., Thales
    Cloud adoption is the stepping stone for any organization’s digital transformation initiative. As digital-native businesses emerge, and incumbent businesses embark on their journey to transform their internal and external processes; IaaS and SaaS become the very fabric of the business. But as the adoption of cloud services evolves, so does the threat landscape. Often, IT teams find themselves scrambling to keep pace with business needs because their age-old perimeter-based security controls were not built to scale in today’s digital world.

    Join Thales and CipherCloud experts to learn how to navigate this very fluid threat landscape with solutions that scale up with your business needs, and help you achieve the true potential of your digital transformation objectives.
  • Securing the Application Development Lifecycle at the Speed of DevOps Recorded: Sep 24 2020 57 mins
    David Zendzian Exec. Tech Advisor, VMware Tanzu; Steve White, Exec. Tech Advisor, VMware Tanzu; Rohini Deepak, Thales
    Organizations making the digital transformation have a lot of considerations to make with compliance being one of the most important. In navigating security for digital transformation, it is easy for organizations to fall into the trap of addressing just the most basic compliance obligations first before fully grasping more complex issues that have implications in the software development lifecycle.

    In this session, Thales and VMware Tanzu will discuss how they work together so security serves as a tool that facilitates the transition to the ‘cloud-native’, DevOps world. Attendees will also learn how the collaboration between VMware Tanzu and Thales eases the friction business leaders face in digitally transforming their organizations.
  • Securing Cloud Access with Continuous Access Evaluation Protocol (CAEP) Recorded: Sep 24 2020 51 mins
    Asad Ali, Senior Technologist, Thales; Atul Tulshibagwale, Software Eng., Google; Haider Iqbal, Dir. of Biz Dev, Thales
    Seamless authentication and continuous access to online resources has been an elusive target. While many have tried, few have been able to achieve it. The ones who claim success have built it on proprietary protocols and niche implementations that only address a small spectrum of digital security industry. In this talk we describe Continuous Access and Evaluation Protocol (CAEP), a new approach to cybersecurity using a user’s complete online footprint collected through a collaborative exchange of events and signals between multiple parties. CAEP was started by Google, and now has support of many key players in identity and security industry including Microsoft, Cisco, SailPoint, Amazon, Ping and Thales. We will explain how CAEP can help deliver Zero Trust by providing signals and events as input to machine learning capabilities, and thereby address current challenges around continuous access to online resources.
  • Managing Keys in the Google Cloud Platform Recorded: Sep 24 2020 57 mins
    Sol Cates, Principal Technologist, CTO Office at Thales and Il-Sung Lee, Senior Product Manager at Google
    In this Tech Talk, you will hear about approaches and be able to ask questions about how to manage and secure the keys to encrypted data in the Google Cloud.
  • Network Data Encryption: The Key to Cloud Security Recorded: Sep 24 2020 70 mins
    Julian Fay, CTO, Senetas; Stan Mesceda, Senior Product Manager, Network Encryption, Thales
    Ensuring secure access into cloud infrastructure is the best defence for cloud computing. Modern cloud services must accommodate any-any connectivity amongst a wide range of devices, applications and third parties across the Internet and other communication channels.

    Network encryption provides essential intrinsic protection for cloud services and is mandated in many laws and regulations.

    Today’s network encryption devices must handle intensive encryption algorithms, operate across a diverse range of cloud architectures and connectivity and be future proof against emerging threats.

    In this session Stan Mesceda and Julian Fay will discuss the importance of providing encrypted network access into cloud environments and give strategies for managing the security of cloud environments today and into the future using the Thales HSE product family.
  • Rethinking Cloud Marketplaces Recorded: Sep 24 2020 39 mins
    Tarik Faouzi, VP Cloud Solutions at CloudBlue; Gary Marsden, Senior Director, Cloud Services, Thales
    There is no shortage of cloud services. While most organizations think of AWS, Azure and Google as the go-to destinations for software, infrastructure and platform as a services offerings, there are also other emerging marketplaces for cloud services. These marketplaces aggregate cloud services from multiple other providers and so give end users the same ability to consume services on-demand with simple pricing and billing but across multiple vendor offerings. In this session you learn more about these types of marketplaces, how they deliver and deploy services and how we are right at the tip of the iceberg in terms of changes in the cloud marketplace world. Tarik Faouzi from CloudBlue and Gary Marsden from Thales will provide an overview of the market changes, how to best leverage cloud based marketplaces and the associated processes to maximum benefit for your organization.
  • Smart Data Security - Reducing noise on your network Recorded: Sep 24 2020 39 mins
    Manoj Bhati - Pre-Sales Consultant, Thales
    Organisations are receive hundreds if not thousands of alerts and reports every single day. Not only that, but organisations are using a many different security solutions from multiple vendors. All of these solutions are creating and sending alerts. This is their window to know if they are under attack. The resulting data means it is difficult for organisations to look into and respond, not to mention the false positives and the red herrings. Companies are becoming Cyber Fatigued.

    Thales provide solutions that allow customers to encrypt data at a given layer. With encryption in place any alert below this layer can be handled at a lower priority. We help organisations in prioritising the logs they are receiving and reducing the noise in the network by using encryption.
  • Driving Access Management Adoption in Large Enterprises - APAC Edition Recorded: Sep 24 2020 58 mins
    Eric Avigdor, Director of Product Management, IAM, Thales; Asaf Lerner, Business Development Manager, Thales
    Strategic IT initiatives such as O365 adoption, MFA consolidation, SSO for All alongside compelling events such as COVID 19 – often drive enterprise IT modernization. At no time is this more relevant than the present, when cloud adoption, accelerated by the need to support work from home, has exposed many weaknesses in existing on-premises legacy schemes.

    This session will discuss why Access Management and Authentication is at the heart of enterprise security and how drives a Zero Trust architecture and creates synergies across IT modernization programs and present a technical demonstration of how a cloud-based access management can simplify user access to cloud services and enterprise apps.
  • Identity-Centric Zero Trust Models for a Multi-Cloud World - APAC Edition Recorded: Sep 24 2020 40 mins
    Danna Bethlehem, Director of Product Marketing, Thales
    The need to enable mass work from home has exposed weaknesses in existing on-premises security solutions. As traditional security perimeters disintegrate, the login point becomes the front line of enterprise security.

    Now is the time to rethink how identity-centric Zero Trust models can offer an effective strategic framework for transforming security schemes in order to accommodate our users’ need for anywhere, anytime access to cloud applications and services.

    During this session we’ll discuss:
    • The Benefits of ID-centric Zero Trust
    • How ID-centric zero trust concepts can address the fast moving needs related to COVID-19
    • The advantages of identity-centric zero trust for modernizing IAM schemes
  • How to Leverage Cloud Transformation to Improve Security Profile and Compliance Recorded: Sep 24 2020 57 mins
    Shaun Chen, Director of Sales Engineering, APAC Region at Thales
    While numerous business transformation and technology modernization initiatives are focused on moving significant workloads to cloud infrastructures and platforms, most organizations will continue to operate a combination of data centers, private-cloud and public-cloud resources for the foreseeable future.
    During this session we will discuss the strategic shifts in the threat landscape, how access security can help mitigate those risks by securing cloud apps at the access point, and how access management solutions can help you comply in an agile way with ever evolving regulations.
  • Understanding How to Bring Your Own Key to Salesforce Recorded: Sep 23 2020 30 mins
    Eric Wolff, Senior Manager Data Protection Product Marketing, Thales
    Cloud trends, including storing sensitive data in cloud and the recognition that data security mandates also apply there, drive both cloud consumers and providers to endeavor to share the challenge of keeping data secure in Salesforce.com. This webinar will discuss those trends, discuss the various challenges protecting data in Software as a Service, or SaaS, environments, and then provide a case study of the rapid evolution of Salesforce Shield Platform Encryption and its leadership in customer key management solutions.
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: New Data Breach Findings: The Year of Internal Threats & Misplaced Data
  • Live at: May 14 2018 3:00 pm
  • Presented by: Jason Hart, CTO of Data Protection at Gemalto
  • From:
Your email has been sent.
or close