Hi [[ session.user.profile.firstName ]]

PCI Compliance: Why Risk Losing Customers When Payment Card Data Is Stolen?

Amazon, eBay, Alibaba, Black Friday, Cyber Monday amongst others are all fuelled by online credit card payments. Even traditional bricks and mortar businesses accept card payments through point-of-sale devices, online or via applications on mobile devices. This trend is only going to grow as the world move towards a cashless society.

With the same motivation as criminals stealing cash, in the digital age cyber criminals are now stealing personal financial information from payment card transactions and payment processing systems.

The PCI Security Standards Council (PCI SSC) offers a set of standards and supporting materials to enhance credit card security. For retailers, financial institutions, payment processors, and a range of other organizations that store, process and/or transmit credit card data, and the service providers that enable their businesses, compliance with the relevant the PCI standards (e.g. PCI PTS, PCI DSS, PCI PIN, PCI P2PE, PCI 3DS) is critical to ensure the safe handling of credit card information at every step.

This webinar will discuss and provide helpful and practical information on:

•The overview of PCI standards and how they apply to businesses
•Encryption and key management requirements in PCI and how to comply with focus on PCI DSS, PCI PIN, PCI P2PE and PCI 3DS
•How to secure sensitive cardholder data & meet the critical challenges of complying with PCI standards
Recorded Nov 28 2018 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Graeme Pyper, Regional Director A/NZ at Gemalto and Vaqar Khan, Senior Security Consultant, UL Identity Management & Security
Presentation preview: PCI Compliance: Why Risk Losing Customers When Payment Card Data Is Stolen?
  • Channel
  • Channel profile
  • Global Trends in Cloud Security: Gaps in Security Persist in a Multi-Cloud World Nov 7 2019 7:00 pm UTC 45 mins
    Dr. Larry Ponemon, Ponemon Institute, and Eric Wolff, Senior Manager of Product Marketing at Thales
    Nearly half (48%) of all corporate data is stored in the cloud according the 2019 Thales Global Cloud Security Study conducted by the Ponemon Institute. However, despite the growth in cloud adoption, the study also found that there is a wide gap in the level of security precautions being applied by organizations and in different countries. Organizations admitted that on average, only about half (49%) of the data stored in the cloud is secured with encryption and only one-third (32%) believe protecting data in the cloud is their responsibility.

    The reality is the cloud has created challenges in knowing where data is stored, who has access to it, and how to best secure it. In 2019, breaches like Capital One occurred because of improperly configured security or web and cloud applications. A major catalyst to address the challenges of cloud security are new government regulations and compliance mandates that will make securing multi-cloud strategies more complex. As a result, companies will be faced with more complicated and intricate auditing to demonstrate security and privacy best efforts in the cloud.

    During this webinar, Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Eric Wolff, Senior Manager of Product Marketing at Thales, will discuss the key findings in the global report and how cloud adoption and cloud security have progressed over the past several years. Join us to learn more about:
    - Which cloud services are being commonly used
    - What types of security technologies organizations are applying to protect data in the cloud
    - What types of data are companies putting in the cloud and which are most at risk
    - Which countries are more advanced than others when it comes to cloud security
    - Strategies for how organizations can best secure data in multi-cloud environments
    - The best security approaches to comply with regulations
  • Encrypt Everything in the Cloud. OK, But What About All the Keys? Oct 30 2019 6:00 pm UTC 60 mins
    Adrian Lane, Securosis CTO, and Charles Goldberg, VP of Data Protection Product Marketing at Thales
    With cloud data security, the new mantra is “Encrypt Everything”. And why not. Encryption delivers proven security, automatically addresses existing and upcoming compliance requirements — like California Consumer Privacy Act (CCPA) and General Data Protection Regulation (GDPR) — and is fully integrated into the fabric of the cloud service. But the “just turn it on” mentality abdicates control over data and custodial responsibilities. The reality is that to control and protect your data, you need to own your cloud encryption keys.

    In this webinar Adrian Lane, Securosis CTO, co-author of the Cloud Security Alliance (CSA) Security Guidance and cloud security instructor, and Charles Goldberg, Vice President of Data Protection Product Marketing will review best practices for life cycle management of AWS, Azure, GCP, Salesforce, and other cloud provider encryption with Bring Your Own Key (BYOK).
  • Global Trends in Cloud Access Management, Single Sign On & Authentication Oct 30 2019 4:00 am UTC 45 mins
    Danna Bethlehem, Director of Product Marketing, Thales
    The explosion of cloud applications and identities have set IT decision makers on a quest for reconciling the benefits of the cloud with the security and compliance requirements needs of the enterprise. Much like the user experience offered by mainstream consumer applications, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud applications now a crucial part of day-to-day business operations, the 2019 Thales Access Management Index found that almost half (49%) of IT security professionals believe cloud applications make them a target for cyber-attacks. Cloud applications are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices (54%) and web portals (50%).

    This webinar will review the findings of the Thales global report and how organizations around the world are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn:
    - What are the major attack vectors for cyber attacks
    - Which access management technologies organizations are deploying to secure access to the cloud
    - Which access management technologies IT professionals deem the most effective in securing access to the cloud
    - The criteria IT professionals use to determine access policies for users
    - Who are the internal stakeholders involved in Access Management deployments
  • Global Trends in Cloud Access Management, Single Sign On and Authentication Recorded: Oct 17 2019 47 mins
    Danna Bethlehem, Director of Product Marketing, Thales
    The explosion of cloud applications and identities have set IT decision makers on a quest for reconciling the benefits of the cloud with the security and compliance requirements needs of the enterprise. Much like the user experience offered by mainstream consumer applications, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud applications now a crucial part of day-to-day business operations, the 2019 Thales Access Management Index found that almost half (49%) of IT security professionals believe cloud applications make them a target for cyber-attacks. Cloud applications are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices (54%) and web portals (50%).

    This webinar will review the findings of the Thales global report and how organizations around the world are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn:
    - What are the major attack vectors for cyber attacks
    - Which access management technologies organizations are deploying to secure access to the cloud
    - Which access management technologies IT professionals deem the most effective in securing access to the cloud
    - The criteria IT professionals use to determine access policies for users
    - Who are the internal stakeholders involved in Access Management deployments
  • The State of Data Security in Retail Recorded: Oct 10 2019 35 mins
    Andy Kicklighter, Director of Product Marketing, Thales
    Digital transformation is fundamentally impacting all industries, and nowhere is this truer than in retail. The internet and mobile technologies have fundamentally changed retailers’ business models, not only by opening new channels to reach customers, but also how they communicate with, serve, and support them.

    While digital transformation is touching every industry, U.S. retailers are leaders are on the leading edge of implementations,
    with 42% of retailers saying they are either aggressively disrupting the markets in which they participate or embedding digital capabilities that enable greater organizational agility. While Digital Transformation is allowing retailers to introduce new business models and reach more customers in new and innovative ways, it is introducing added difficulties for information security professionals and raises the potential to put sensitive customer data at risk.

    Based on the results from the 2019 Thales Data Threat Report – Retail Edition, participants in this webinar can expect to learn about:
    •How the adoption of digital transformation technologies, and especially cloud, is putting sensitive data at greater risk
    •The data security challenges facing retail companies today
    •Critical analyst recommendations for how organizations can be most effective when selecting the right tools that will enable them to manage greater amounts of complexity, that span legacy on-premises needs as well as modern, cloud-based, edge-oriented technologies.
  • Identities Are the New Security Perimeter in a Zero Trust World Recorded: Sep 26 2019 32 mins
    Ashley Adams, Product Marketing Manager for Authentication & Access Management, Thales
    In a recent Thales survey, two thirds of CISOs cited the increase in cloud service adoption, combined with a lack of strong security solutions, as the main reasons cloud services are the prime targets of attack. As organizations undergo digital and cloud transformation, CISOs and security officers are operating in a high stress environment caused by security, compliance and manageability challenges.

    In this presentation we’ll discuss how identities are becoming the new security perimeter in a zero trust world and present best practices for implementing an access management framework that can help organizations remain secure – and scale – in distributed networking environments.
  • The State of Data Security in Healthcare Recorded: Sep 12 2019 42 mins
    Andy Kicklighter, Director of Product Marketing, Thales
    Driven by government mandates, the need for greater efficiency, and the desire to enable better patient care U.S. healthcare organizations are universally adopting cloud and other digital transformation technologies. But this transition can put patients’ sensitive healthcare and financial information fundamentally at risk. In this session, we’ll address the state of data security in healthcare companies today, the changing landscape of risks to data due to digital transformation, and IT security pros priorities for data security today.

    Based on the results from the 2019 Thales Data Threat Report – Healthcare Edition, expect to learn about:
    - How the adoption of digital transformation technologies, and especially cloud, is putting sensitive data at greater risk
    - The data security challenges facing healthcare companies today
    - Critical analyst recommendations for how organizations can be most effective when selecting the right tools to protect their sensitive data
  • Implications of the Australian Prudential Standard CPS 234 Recorded: Sep 5 2019 61 mins
    Graeme Pyper, Regional Director, Australia & New Zealand at Thales
    Since Australia’s Notifiable Data Breaches (NDB) scheme launched on the 22nd February 2018, the Office of the Australian Information Commissioner (OAIC) noted that there were 964 data breaches reported between 1 Apr 2018 and 31 March 2019. This equates to just over 700% increase in data breaches reported compared to the 114 data breaches voluntarily reported in the previous year … a mind blowing statistic.

    With cyber-attacks unwaning, it is not surprising to see that the Australian Prudential Regulation Authority (APRA) released its Prudential Standard CPS 234 for Information Security on 1st July 2019. The objective of CPS 234 is to ensure all APRA regulated entities in the banking, insurance and superannuation industries are prepared to protect against any information security incidents (including cyber-attacks) and are able to respond swiftly and effectively in the event of a data breach.

    This webinar will:
    •Discuss the key requirements of CPS 234
    •Identify disruptive cybersecurity trends and the implications
    •Share best practices to protect against data breaches

    Featuring:
    Graeme Pyper, Regional Director Australia & New Zealand at Thales
  • Global Trends in Cloud Access Management, Single Sign On and Authentication Recorded: Jul 25 2019 45 mins
    Danna Bethlehem, Director of Product Marketing, Thales
    The explosion of cloud applications and identities have set IT decision makers on a quest for reconciling the benefits of the cloud with the security and compliance requirements needs of the enterprise. Much like the user experience offered by mainstream consumer applications, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud applications now a crucial part of day-to-day business operations, the 2019 Thales Access Management Index found that almost half (49%) of IT security professionals believe cloud applications make them a target for cyber-attacks. Cloud applications are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices (54%) and web portals (50%).

    This webinar will review the findings of the Thales global report and how organizations around the world are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn:
    - What are the major attack vectors for cyber attacks
    - Which access management technologies organizations are deploying to secure access to the cloud
    - Which access management technologies IT professionals deem the most effective in securing access to the cloud
    - The criteria IT professionals use to determine access policies for users
    - Who are the internal stakeholders involved in Access Management deployments
  • Choosing the Right Cloud HSM Recorded: Jul 18 2019 44 mins
    Gary Marsden, Senior Director of Data Protection Services at Thales
    Although most major cloud providers now offer native cloud Hardware Security Module (HSM) services, how do you choose the right cloud HSM? According to 451 Research, 69% of enterprises now have a hybrid, multi-cloud strategy. With hybrid, multi-cloud environments likely to be the norm as we move into 2020, managing multiple cloud HSMs will increase complexity, cost of ownership and operational overhead.

    Join us as we discuss the complexities of managing native cloud HSMs separately, leading to islands of security with different features and rules for each. We’ll show you how the smarter and simpler route is to use a cloud HSM provider that can centrally manage and secure your entire cryptographic operations across all cloud environments.

    This informative webinar will cover:
    • A current view of the cloud’s impact on IT business models
    • Why HSMs are critical to data security on premise or in the cloud
    • How creating centralized key management and security strategy will make your cloud life a whole lot easier
    • Building blocks for an HSM strategy for security across all cloud and hybrid IT environments
  • How to Secure Code Signing at the Speed of DevOps Recorded: Jul 9 2019 46 mins
    Gary Marsden, Senior Director of Data Protection Services at Thales and Mark Thompson, VP of Product Management at Keyfactor
    When you sign a piece of code, you make a statement that it comes from your trusted brand and that you stand behind it. But what happens when that trust is broken? Recent attacks, such as the ASUS Live Update hack, underscore the importance of managing reputational risk.

    As attackers become increasingly skilled in the art of signing and spreading malware, all business leaders must invest in the trust associated with their digital brand – and expect the same of their vendors. The challenge is how to secure code signing keys and certificates in today’s distributed and fast-paced DevOps environments.

    Join our experts as they discuss:
    - Code Signing: What is it? Why does it matter?
    - Recent Attacks: The Risks and Challenges of Code Signing
    - How to Secure Code Signing at the Speed of DevOps
    - How Thales and Keyfactor Make It Possible
  • Safeguarding Sensitive and Compliance Data in VMware with Thales Recorded: Jun 27 2019 36 mins
    Brent Hansen at Federal CTO at Thales and Greg Wassenberg, Director of Sales at FedTek
    Many government customers have now realized file-level access control, encryption, and key management are substantial gaps in their cybersecurity architecture and are actively searching for solutions to mitigate this risk.

    Join this webinar to learn how Thales and VMware can help you secure your hyper-converged data. VMware has partnered with the industry leader in access control encryption and key management solutions to allow its customers to secure data and centralize keys on their hyper-converged platform.

    Thales’ Vormetric Data Security Manager provides FIPS-certified, robust key management and role separation to meet most security requirements. The non-disruptive encryption solution provides comprehensive, cost-effective data security for companies that have stringent data protection regulations covering the management of personally identifiable information (PII) and other sensitive information.
  • Skating to the Puck: Preparing to Secure Global Payment Technologies Recorded: Jun 26 2019 58 mins
    Ian Hermon, Thales and Jordan McKee, 451 Research
    There is perhaps no more important security priority than protecting financial transactions. At the rate that FinTech is moving, how will security keep up? How will merchants and financial intuitions find new ways to reduce costs, increase their value proposition and simplify the payment experience for their consumers? The answer is to understand the trends that will be affecting your business and design your security to be ahead of it.

    In this webinar 451 Research and Thales discuss some of the most significant trends emerging in payments today and the technology developments seeking to address a broader range of security threats while supporting a diverse range of new payment approaches.
  • The State of Data Security in Europe Recorded: Jun 13 2019 49 mins
    Andy Kicklighter, Director of Product Marketing, Thales and Dale Wilson, Business Development Director at Kite Distribution
    Digital transformation and the move to the cloud are fundamentally changing business operations throughout Europe – and are putting organizations crown jewels, their sensitive data, at risk. Traditional market leaders are driven to digital transformation by the opportunity for greater efficiency, flexibility and new business models – while also fending off rivals entering their markets with an “all digital” focus. In this session we’ll address the state of data security in European enterprises today, the changing landscape of risks to data due to digital transformation, and IT security pros priorities for data security today.

    Based on the results from the 2019 Thales Data Threat Report – European Edition (now in its sixth year), expect to learn about:

    - How the adoption of digital transformation technologies, and especially cloud, is putting sensitive data at greater risk
    - The data security challenges facing European enterprises today
    - Critical analyst recommendations for how organizations can be most effective when selecting the right tools to protect their sensitive data
  • The Principles of IoT Security Recorded: Jun 10 2019 59 mins
    Gorav Arora, Director, Office of CTO, at Thales and Tom Klein, VP of IoT Solutions at Keyfactor
    The proliferation of IoT and cloud computing are transforming our lives daily – from watches alerting on severe heart conditions to voice-enabled assistants automating daily tasks. Builders and operators of such systems must tackle the myriad of challenges across the complex IT stack – including security. Securing every digital touchpoint is crucial to delivering safe and connected services between devices, networks, machines, and users.

    Join us to hear about:
    • The unique challenges of IoT Security
    • Current and proposed cybersecurity regulations across various industries
    • Blueprint of IoT Security that can be used in any IoT system
    • A real-life use case on how leading healthcare provider successfully secured devices within the IoT and Cloud
  • The Changing Landscape of Data Security for U.S. Federal Agencies Recorded: May 30 2019 45 mins
    Andy Kicklighter, Director of Product Marketing, Thales
    With digital government initiatives underway throughout U.S. Federal agencies, new attacks occurring daily, and traditional threats, many agencies are struggling to protect critical citizen data, financial information and government secrets. In this session we’ll address the state of data security in U.S. Federal agencies today, the changing landscape of risks to data, and agency IT security pros priorities for data security today.

    Based on the results from the 2019 Thales Data Threat Report – Federal Edition (now in its seventh year), expect to learn about:

    • How the adoption of digital transformation technologies, and especially cloud, are putting sensitive data at greater risk
    • The data security challenges facing agencies today
    • Critical analyst recommendations for how agencies can be most effective when investing in protecting their crown jewels – their sensitive data
  • Understanding the Latest Strategies and Trends in Encryption Key Management Recorded: May 22 2019 50 mins
    Steve Kingston, Senior Manager at Gemalto
    Security and risk management professionals face ever-increasing needs to encrypt various types of sensitive data stored on-premises, in private and public clouds and in hybrid environments in order to protect their organizations in the event of a data breach. Compliance mandates, internal security audits, data residency issues and threats of hackers are driving the requirements for enterprises to develop a centralized enterprise-wide encryption strategy to prioritize sensitive data protection. In addition, regulations, such as the EU General Data Protection Regulation (GDPR), have dramatically increased pressure on security professional leaders to review and revamp their approach to encryption key management.

    To meet these needs, security professionals are using a growing number of encryption tools to protect data within a variety of data storage environments. These may be located within local and external IT environments and systems, such as file stores, databases, big data platforms or various clouds. However, encrypting data in each of these environment results in the creation of islands of encryption and diverse key management platforms which increases complexity, costs and risk of data loss.

    In this webinar, you will:
    • Gain insight into trends that are driving the digital cloud transformation and how key management plays a role
    • Understand the importance of developing a centralized approach to encryption key management
    • Examine where and when you should encrypt your organization’s data and typical key management use cases
    • Learn how to implement an enterprise-wide key management operational model that can reduce cost of ownership and minimize overall risks
  • GDPR Explained in 6 Steps Recorded: May 20 2019 60 mins
    Jan Smets, Certified Data Protection Officer, Gemalto
    The introduction of GDPR in May 2018 brought data protection to the top of businesses’ priority lists. So how can businesses and other organizations ensure they are compliant and what steps do they need to take?
    In this webinar, certified DPO Jan Smets with provide a six-step overview to help achieve compliance:

    1) Understand the GDPR legal framework
    2) Create a Data Register
    3) Classify your data
    4) Start with your top priority
    5) Assess and document additional risks and processes
    6) Revise and repeat
  • Turning PKI Smart Cards into Cloud SSO Gold Recorded: May 7 2019 51 mins
    Garrett Bekker, Senior Security Analyst at 451 Research and Stephane Vinsot, Senior Director, IAM Product Strategy at Gemalto
    Up until now, PKI hardware’s limitations meant companies could not adopt cloud and mobility projects without having to completely ‘rip and replace’ their current security framework. As a result, companies have been using smart cards and tokens to allow their employees to authenticate themselves while accessing corporate resources, but this was limited to activity within the enterprise perimeter. In addition, companies that use PKI credentials for email encryption and digital signing have also been limited to on-premises environments.

    In this webinar, you will learn about how organizations can deploy SafeNet Trusted Access and benefit from single sign on (SSO) and high assurance PKI-based authentication, making it easier and more secure to access cloud and web-based apps and resources from wherever and on any device. Using the solution, employees will no longer have to re-authenticate each time they access a resource with their smart card, enabling more efficiency across the company – while allowing enterprises to maintain high assurance security when needed.

    In this webinar you will also learn how to build on current PKI investments, and embrace digital transformation without compromising on security, including:
    •Enabling cloud transformation: Organizations can extend PKI credentials to access policies, allowing CISOs to maintain security in the cloud by triggering the use of step up PKI-based authentication to cloud and web-based apps when needed
    •Facilitating mobility: Employees can access enterprise applications within virtual environments with their PKI credentials. This means that employees and consultants will be able to access corporate apps via a VDI, from any device and carry out certificate-based transactions, even if they can’t use their smart cards
  • The State of Data Security in APAC: Are Businesses Ready for Transformation Recorded: Apr 11 2019 60 mins
    Rana Gupta, VP APAC, at Gemalto and Carl Woerndle, Principal Advisor, Cyber Security - Crisis & Incident Response, Ecosystm
    Businesses in the Asia-Pacific region and India are innovating rapidly by evolving their business models to remain competitive. At the heart of this evolution is the explosive proliferation of sensitive data that is created, collected and shared. At the same time, cybercriminals are looking at all this data as a gold mine for them to monetise! So how can businesses in APAC adapt to these changes safely?

    This webinar will:
    • Identify disruptive cybersecurity trends and the implications for the APAC region & India
    • Provide insights into opportunities to protect against data breaches
    • Share best practices on data protection IT Security governance frameworks
    • Assess the maturity of current and planned security technologies
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: PCI Compliance: Why Risk Losing Customers When Payment Card Data Is Stolen?
  • Live at: Nov 28 2018 11:00 pm
  • Presented by: Graeme Pyper, Regional Director A/NZ at Gemalto and Vaqar Khan, Senior Security Consultant, UL Identity Management & Security
  • From:
Your email has been sent.
or close