Hi [[ session.user.profile.firstName ]]

Understanding Why and How to Bring Your Own Encryption Keys to Salesforce.com

Cloud trends, including storing sensitive data in cloud and the recognition that data security mandates also apply there, drive both cloud consumers and providers to endeavor to share the challenge of keeping data secure in Salesforce.com. This webinar will discuss those trends, discuss the various challenges protecting data in Software as a Service, or SaaS, environments, and then provide a case study of the rapid evolution of Salesforce Shield Platform Encryption and its leadership in customer key management solutions.
Live online May 7 3:00 pm UTC
or after on demand 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Eric Wolff, Senior Manager Data Protection Product Marketing, Thales
Presentation preview: Understanding Why and How to Bring Your Own Encryption Keys to Salesforce.com
  • Channel
  • Channel profile
  • Bring your own Encryption to the Cloud (BYOE) May 20 2020 10:00 am UTC 45 mins
    Manoj Bhati - Pre-Sales Consultant, Thales
    IT Departments are balancing the need for optimising performance and availability along with how best to ensure heightened security when considering their Cloud adoption. Encryption is the most effective way of securing that data.

    Considerations include: Should organisations rely on cloud native encryption only? Is there any effective Key Management available? Do you have complete control of your keys and a root of trust? Are you protected against the attacks that begin from within the cloud infrastructure?

    Join Manajo Bhati as he uncovers:

    - How can you bring your own encryption in the Cloud.
    - How to have complete control of your keys.
    - The best layer to encrypt your data (application, database, file/folder, etc...)
    - How key management is the most important part in encryption.
    - How organisations can cater for cloud, multi Cloud and hybrid cloud use cases.
  • Payment Security – Impact of regulations May 13 2020 5:00 am UTC 60 mins
    Arthur Van Der Merwe at AusPayNet | Simon Keates and Andrew Younger at Thales
    In the 1st and 2nd part of this 3-part webinar series, Thales a global leader in digital identity and security together with the Australian Payments Network (AusPayNet) discussed evolving trends and technologies affecting the payments industry.
    The payments industry’s transformation to the digital economy to create new business opportunities and disrupt some of the current offerings has resulted in the explosive proliferation of sensitive data that is created, collected, exchanged and shared.
    So it’s no wonder regulators are ensuring that the regulatory agenda is at the top of the payment industry’s business priorities with particular focus on customer data protection, technical payment standards and money laundering whilst keeping cyber criminals at bay.

    This final webinar focuses on regulations impacting payments including:
    • Global regulations eg GDPR
    • Local regulations eg NDB, CPS 234
    • PCI & AusPayNet
    • TrustID

    Presenters
    • Arthur Van Der Merwe, Information Security & Compliance Manager, AusPayNet
    • Simon Keates, Strategy Manager, Payment Security, Thales
    • Andrew Younger, Manager Solution Consultants, Thales
  • Understanding Why and How to Bring Your Own Encryption Keys to Salesforce.com May 7 2020 3:00 pm UTC 45 mins
    Eric Wolff, Senior Manager Data Protection Product Marketing, Thales
    Cloud trends, including storing sensitive data in cloud and the recognition that data security mandates also apply there, drive both cloud consumers and providers to endeavor to share the challenge of keeping data secure in Salesforce.com. This webinar will discuss those trends, discuss the various challenges protecting data in Software as a Service, or SaaS, environments, and then provide a case study of the rapid evolution of Salesforce Shield Platform Encryption and its leadership in customer key management solutions.
  • Payment Security – Impact of technologies May 6 2020 5:00 am UTC 60 mins
    Arthur Van Der Merwe at AusPayNet | Simon Keates and Andrew Younger at Thales
    In the 1st part of this 3-part webinar series, Thales a global leader in digital identity and security together with the Australian Payments Network (AusPayNet) discussed evolving trends affecting the payments industry.

    Like organizations across various industry verticals, the payments industry is undergoing or have transformed their business in order to move into the digital economy and remain competitive - offering multiple digital commerce touchpoints for consumer & business customers, moving to the cloud, building new applications to connect and engage with customers and the list goes on.

    While the rush to technological solutions is attractive there are major risks because at the heart of this evolution is the explosive proliferation of sensitive data that is created, collected, exchanged and shared. Cyber criminals are looking at all this data as a gold mine for them to monetise!

    This 2nd webinar focuses on evolving technologies impacting payments including:
    • Alternative payment methods
    • Growth of e-Commerce
    • Growth of mobile payments

    Presenters
    • Arthur Van Der Merwe, Information Security & Compliance Manager, AusPayNet
    • Simon Keates, Strategy Manager, Payment Security, Thales
    • Andrew Younger, Manager Solution Consultants, Thales
  • Data Security Trends & Threats US Federal Government Agencies Need to Know Apr 29 2020 5:00 pm UTC 45 mins
    Brent Hansen, Federal CTO at Thales Trusted Cyber Technologies
    With digital government initiatives underway throughout U.S. Federal agencies, new attacks occurring daily, and traditional threats, many agencies are struggling to protect critical citizen data, financial information and government secrets. This is especially true as more agencies move applications and sensitive data to the cloud. In this session we’ll address the state of data security in U.S. Federal agencies today, the changing landscape of risks to data, and agency IT security pros priorities for data security today.

    Based on the results from the 2020 Thales Data Threat Report – Federal Edition (now in its eighth year), expect to learn about:

    • How the adoption of digital transformation technologies, and especially cloud, are putting sensitive data at greater risk
    • The data security challenges facing agencies today
    • Critical analyst recommendations for how agencies can be most effective when investing in protecting their crown jewels – their sensitive data
  • Adopting HSMs in the cloud - Multi-Cloud approaches Apr 29 2020 10:00 am UTC 45 mins
    Manoj Bhati - Pre-Sales Consultant, Thales
    Organisations are electing to move more of their applications to the cloud each year. As they make this transition, they are considering how they port their existing on-premise security solutions to the Cloud.

    Can organisations achieve the same level of security and trust as they enjoy on-premise?
    Are they able to use the same HSM or should they adopt an HSM service in a multi-cloud environment or hybrid infrastructure?

    Please join Manoj as he explores:
    - The different options for adopting HSMs in the cloud.
    - Using On-premise HSMs and an HSM service in: the Cloud, Multi-Cloud and Hybrid Cloud environments
    - The different use cases that can be addressed
    - How to achieve separation of roles/duties
    - Are the keys under your control?
  • Payment Security – Trends Apr 29 2020 5:00 am UTC 60 mins
    Arthur Van Der Merwe at AusPayNet | Simon Keates and Andrew Younger at Thales
    Like many other industries in this digital era, the payments industry is undergoing intense transformation caused by customer demands, technology advancements, globalisation, disintermediation by new entrants and increasing regulatory requirements. On top of this, fraud by cyber criminals is unwaning with attacks getting increasingly sophisticated.

    So what should the payments industry do to try to keep up or even stay ahead of all these changes?

    In a 3-part webinar series, Thales a global leader in digital identity and security together with the Australian Payments Network (AusPayNet) will discuss evolving trends, technologies and regulations affecting the payments industry.

    This 1st webinar focuses on trends including:
    • Open Banking
    • The move from hardware to the cloud
    • The shift from physical to mobile

    Presenters
    • Arthur Van Der Merwe, Information Security & Compliance Manager, AusPayNet
    • Simon Keates, Strategy Manager, Payment Security, Thales
    • Andrew Younger, Manager Solution Consultants, Thales
  • Trends in Cloud Access Management, Single Sign On & Authentication: EMEA Apr 22 2020 1:00 pm UTC 45 mins
    Danna Bethlehem, Director of Product Marketing, Thales
    The increasing use of cloud applications and services has set IT decision makers on a quest for reconciling the benefits of the cloud with the needs of security and compliance requirements. Much like the user experience of consumer cloud services, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud services applications now a crucial part of day-to-day business operations, the 2020 Thales Access Management Index EMEA Edition found that more than half (57%) of IT security professionals believe unprotected infrastructure, such as new IoT devices, make them a target for cyber-attacks. Cloud applications and web portals are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices.

    This webinar will review the findings of the 2020 Thales global report and how organizations in Europe, Middle East and Africa are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn:
    - Which access management technologies organizations are deploying to secure access to the cloud
    - Which access management technologies do IT professionals deem the most effective in securing access to services
    - Who are the internal stakeholders involved in Access Management deployments
  • Trends, Technologies and Challenges of Payments Industry in the Middle East Apr 20 2020 10:00 am UTC 60 mins
    Simon Keates, Head of Payment Strategy and Erol Dogan, Pre-Sales Consultant for Middle East
    The payments industry is undergoing intense transformation caused by customer demands, technology advancements, globalisation, disintermediation by new entrants, and increasing regulatory requirements. On top of this, fraud by cyber criminals continues to evolve with attacks becoming increasingly sophisticated.
    Join this webinar where will discuss evolving trends, technologies and regulations affecting the payments industry, and how Thales can help meet these challenges.

    Join this webinar where will discuss:
    - Evolving trends,
    - Technologies and
    - Regulations affecting the payments industry and
    - How Thales can help meet these challenges.
  • Trends, Technologies and Challenges of Payments Industry in Africa   Apr 15 2020 12:00 pm UTC 60 mins
    Simon Keates, Head of Payment Strategy and Cas Liddle, Pre-Sales Consultant for Africa 
    The payments industry is undergoing intense transformation caused by customer demands, technology advancements, globalisation, disintermediation by new entrants, and increasing regulatory requirements. On top of this, fraud by cyber criminals continues to evolve with attacks becoming increasingly sophisticated.
    Join this webinar where will discuss evolving trends, technologies and regulations affecting the payments industry, and how Thales can help meet these challenges.

    Join this webinar where will discuss:
    - Evolving trends,
    - Technologies and
    - Regulations affecting the payments industry and 
    - How Thales can help meet these challenges.
  • Trends, Technologies and Challenges of Payments Industry in Turkey Apr 15 2020 11:00 am UTC 60 mins
    Simon Keates, Head of Payment Strategy and Sercan Koc, Pre-Sales Consultant for Turkey
    The payments industry is undergoing intense transformation caused by customer demands, technology advancements, globalisation, disintermediation by new entrants, and increasing regulatory requirements. On top of this, fraud by cyber criminals continues to evolve with attacks becoming increasingly sophisticated.
    Join this webinar where will discuss evolving trends, technologies and regulations affecting the payments industry, and how Thales can help meet these challenges.

    Join this webinar where will discuss:
    - Evolving trends,
    - Technologies and
    - Regulations affecting the payments industry and
    - How Thales can help meet these challenges.
  • Understanding Why and How to Bring Your Own Encryption Keys to Microsoft Azure Apr 9 2020 3:00 pm UTC 45 mins
    Eric Wolff, Senior Manager Data Protection Product Marketing, Thales
    Cloud trends, including storing sensitive data in cloud and the recognition that data security mandates also apply there, drive both cloud consumers and providers to endeavor to share the challenge of keeping data secure in Microsoft Azure. This webinar will discuss those trends, introduce a cloud data security toolkit, including a solution that fulfills best practices for managing cloud data encryption keys.
  • Empower Users with Secure Remote Access Recorded: Apr 2 2020 41 mins
    Danna Bethlehem, Director of Product Marketing, Thales
    In a competitive environment empowering users with secure access to corporate applications wherever they are is crucial to gaining and maintaining competitive advantage. Thales SafeNet Trusted Access, a strong authentication and access management service, enables employees to access corporate networks and log onto enterprise applications easily and securely.

    Join Thales for the latest in our coffee break webcast series to discuss:
    • Market trends in working dynamics are demand for remote working
    • How the adoption of cloud applications is driving the need for centrally managed access
    • Best practices for securing remote access to enterprise applications
    • Guidelines for assessing an IDaaS solution that fits your needs
  • Understanding Why and How to Bring Your Own Encryption Keys to AWS Recorded: Mar 19 2020 33 mins
    Eric Wolff, Senior Manager Data Protection Product Marketing, Thales
    Cloud trends, including storing sensitive data in cloud and the recognition that data security mandates also apply there, drive both cloud consumers and providers to endeavor to share the challenge of keeping data secure in Amazon Web Services. This webinar will discuss those trends, introduce a cloud data security toolkit, including a solution that fulfills best practices for managing cloud data encryption keys.
  • 2020 Security Technology for the Multi-Cloud Recorded: Mar 9 2020 56 mins
    Jeremy Snyder, DivvyCloud | Chris Romano, Mandiant | Sol Cates, Thales | Nathan Howe, ZScaler
    Multi-cloud adoption is on the rise, but the challenge of securing organizations against cyber attacks remains.

    Discover the cost of data breaches in 2020, as well as the technologies CISOs are using for keeping track of their assets, assessing and managing cyber risk and mitigating threats against the enterprise.

    Join this Q&A panel of experts as they discuss:
    - CISO priorities in a multi-cloud environment
    - Biggest threats to the enterprise
    - How to assess and mitigate cyber risk
    - Technologies powering security
    - Best practices and recommendations for a more secure organization

    Speakers:
    Jeremy Snyder, VP of Business Development & Corporate Development, DivvyCloud (moderator)
    Christopher Romano, Senior Consultant, Mandiant
    Sol Cates, VP of Technical Strategy, Thales
    Nathan Howe, Director of Transformation Strategy, ZScaler
  • Should You Trust Cloud Providers with Your Encryption Keys? Recorded: Mar 9 2020 47 mins
    Eric Wolff, Senior Manager Data Protection Product Marketing, Thales
    A sound cloud key management strategy puts security professionals in the driver’s seat. However, today only about half of organizations have complete control the keys of the keys to their encrypted data in the cloud. This webinar will review best practices and the different approaches for maintaining access and control over your keys, so your organization will continue to benefit from the scale and cost effectiveness that the cloud provides, while ensuring shareholders that data is secure and financial risks are minimized.
  • The Global State of Data Security: Zero Trust in a Multi-Cloud World Recorded: Mar 5 2020 45 mins
    Charles Goldberg, VP of Data Protection Product Marketing, Thales
    Based on the findings from 2020 Thales Data Threat Report – Global Edition, digital transformation and the move to the cloud are fundamentally changing business operations across the globe and are putting organizations sensitive data at risk. According to the report, 50% of all corporate data is now stored in the cloud, and 42% of all data stored in the cloud is sensitive. However, only 57% of that sensitive data is protected by encryption.

    In this webinar we’ll address the state of data security for enterprises today, the changing landscape of risks to data due to cloud adoption and digital transformation, and IT security pros priorities for data security. Specifically, you can expect to learn about:
    - How the adoption of digital transformation technologies, and especially cloud, is putting sensitive data at greater risk
    - The data security challenges facing enterprises today, including emerging threats like quantum computing
    - Critical analyst recommendations for how organizations can be most effective when selecting the right tools to protect their sensitive data
  • How to Future-Proof Long-Lived IoT Devices with Quantum-Safe Signatures Recorded: Feb 20 2020 49 mins
    John Ray, Thales and Alexander Truskovsky, Isara
    The number of IoT devices increases every day, including durable “things” that hadn’t been connected in the past such as cars, smart meters and implanted medical devices. These devices represent a unique security challenge as they must remain in use and secure for several years to come. However, with the onset of large-scale quantum computing – which will render modern security measures obsolete – IoT device manufacturers need to begin looking at different options to secure their devices or they risk being overtaken by spoofed software updates in the future.

    In this talk, Thales and ISARA will explore securing connected cars using the next-generation of digital signatures: Stateful hash-based signatures.

    Join us as we cover the following topics:
    •A brief overview of quantum computing and its effect on current public key cryptography – no PhD required!
    •Understanding the unique challenge quantum presents to durable IoT devices
    •Exploring new, quantum-safe options for signatures and roots of trust such as stateful hash-based signatures
    •Learn how quantum-safe options are different, what makes them challenging to work with and what steps needs to be taken to use them today
    •Discover Thales’ Luna HSM Post-Quantum Functionality Module (FM) - the first commercially available HSM to offer stateful hash-based signatures ready for implementation and how you can get started today
    •Learn how crypto agility can help you quickly react to cryptographic threats by implementing alternative methods of encryption
  • Unlocking DevOps Security with PKI Automation Recorded: Jan 28 2020 45 mins
    Keyfactor's Senior Solution Engineer, Shian Sung and Thales Senior Solutions Architect, Matthew Armstrong
    Today, DevOps teams are focused on getting new features out faster, yet they need digital certificates for critical tasks in the build and release process - things like signing code, spinning up containers, and using SSL/TLS certificates for load balancers and web servers.

    Maintaining an optimized development and release cycle requires frictionless, automatic PKI processes to provide timely, valid certificates while maintaining the visibility and control security teams need to ensure compliance and prevent delays.

    How do you unlock DevOps security with PKI Automation?

    Join Keyfactor and Thales to discuss how enterprises can automate and securely integrate PKI into continuous integration and continuous deployment (CI/CD) pipeline and the DevOps toolchain – including Jenkins, Kubernetes, and HashiCorp Vault.
  • The State of Data Security in Financial Services Recorded: Dec 12 2019 35 mins
    Charles Goldberg, VP of Data Protection Product Marketing, Thales
    Digital transformation is fundamentally impacting all industries, and nowhere is this truer than in the financial services industry. The internet and mobile technologies have fundamentally changed financial services companies’ business models, not only by opening new channels to reach customers, but also how they communicate with, serve, and support them.

    While digital transformation is touching every industry, financial services companies are leaders are on the leading edge of implementations, with 49% of financial services firms saying they are either aggressively disrupting the markets in which they participate or embedding digital capabilities that enable greater organizational agility. While Digital Transformation is allowing financial services companies to introduce new business models and reach more customers in new and innovative ways, it is introducing added difficulties for information security professionals and raises the potential to put sensitive customer data at risk.

    Based on the results from the 2019 Thales Data Threat Report – Financial Services Edition, participants in this webinar can expect to learn about:
    • How the adoption of digital transformation technologies, and especially cloud, is putting sensitive data at greater risk
    • The data security challenges facing financial services companies today
    • Critical analyst recommendations for how organizations can be most effective when selecting the right tools that will enable them to manage greater amounts of complexity, that span legacy on-premises needs as well as modern, cloud-based, edge-oriented technologies.
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Understanding Why and How to Bring Your Own Encryption Keys to Salesforce.com
  • Live at: May 7 2020 3:00 pm
  • Presented by: Eric Wolff, Senior Manager Data Protection Product Marketing, Thales
  • From:
Your email has been sent.
or close