Like many other industries in this digital era, the payments industry is undergoing intense transformation caused by customer demands, technology advancements, globalisation, disintermediation by new entrants and increasing regulatory requirements. On top of this, fraud by cyber criminals is unwaning with attacks getting increasingly sophisticated.
So what should the payments industry do to try to keep up or even stay ahead of all these changes?
In a 3-part webinar series, Thales a global leader in digital identity and security together with the Australian Payments Network (AusPayNet) will discuss evolving trends, technologies and regulations affecting the payments industry.
This 1st webinar focuses on trends including:
• Open Banking
• The move from hardware to the cloud
• The shift from physical to mobile
• Arthur Van Der Merwe, Information Security & Compliance Manager, AusPayNet
• Simon Keates, Strategy Manager, Payment Security, Thales
• Andrew Younger, Manager Solution Consultants, Thales
RecordedApr 29 202060 mins
Your place is confirmed, we'll send you email reminders
The payments industry is undergoing intense transformation caused by customer demands, technology advancements, globalisation, disintermediation by new entrants, and increasing regulatory requirements. On top of this, fraud by cyber criminals continues to evolve with attacks becoming increasingly sophisticated.
Join this webinar where will discuss evolving trends, technologies and regulations affecting the payments industry and how Thales can help meet these challenges.
Any organisation involved in card payment transactions, from issuance to processing, must be compliant with standards. These are increasingly becoming more robust, detailed and payment-specific to protect customer sensitive data. To meet these standards, HSMs are a mandatory requirement to both protect and support the cryptographic keys and operations throughout the payment transaction.
As such, HSMs are a critical part of an organisation’s infrastructure and are expected to handle transactions seamlessly, 24/7. Performance, reliability and operating costs are all factors to consider during a procurement selection stage, while the operations team must have the available tools and knowledge to be able to remotely manage the HSMs for configuration, audit and key management, following industry best practise.
Join Darren Burkey, Pre-Sales Consultant at Thales:
1) Learn how international standards are driving the payments industry
2) Explore the best practice guidance to protect payment data and transactions
3) Discover how HSMs are helping to meet compliance
Organisations are electing to move more of their applications to the cloud each year. As they make this transition, they are considering how they port their existing on-premise security solutions to the Cloud.
Can organisations achieve the same level of security and trust as they enjoy on-premise? Are they able to use the same HSM or should they adopt an HSM service in a multi-cloud environment or hybrid infrastructure?
Please join Manoj as he explores:
- The different options for adopting HSMs in the cloud.
- Using On-premise HSMs and an HSM service in: the Cloud, Multi-Cloud and Hybrid Cloud environments
- The different use cases that can be addressed
- How to achieve separation of roles/duties
- Are the keys under your control?
Today’s new normal has changed the market for data consumption and accelerated the need to protect data at multiple levels. With a feature-rich and comprehensive portfolio, partnering with an industry leader like Thales will help your business flourish. Our technologies enable you to cross-sell to existing customers, retain higher revenues per partner contract and increase stickiness for customer retention. It helps open doors to new markets, obtain new customers and enables you to wrap value add services as a competitive differentiator.
Join Gary Marsden, Cloud Services Director to learn more about how the Thales New Normal provides unrivalled growth opportunities with zero investment, through data protection on demand, that can help accelerate your client revenues
The Industry leading virtualisation platform VMware vSphere® protects virtual machine files, virtual disk files, and core dump files with VMware vSphere VM Encryption introduced in vSphere 6.5. The solution leverages the Key Management Interoperability Protocol (KMIP) for encryption key management and key vaulting. vSphere can be used with the CipherTrust Manager from Thales to provide the full range of protection for key management and role separation.
The combined solution delivers non-disruptive encryption, ensuring the security of VMs, the applications they run and the sensitive data they process. The combination provides a cost-effective and comprehensive solution that meets the most stringent security requirements. Leveraging hardware-based data encryption ensures no adverse impact to system performance.
During this webinar you will learn
• Why encrypting VMWare is important for your organisation
• How to integrate Key Management with VMWare
• What the different VMware encryption methodologies are
• Benefits of using an external Key Manager with VMware
• How to meet compliance and security requirements with FIPS compliant solutions
Still using yesteryear’s technology to secure today’s modern High Speed Networks?
Networks have developed incredibly quickly over the last 25 years, from low speed public and private network access to the high speed fibre and Software Defined Networks seen today. However, most of the sensitive data being transferred across modern networks still rely on the performance sapping, bandwidth hungry security technologies introduced decades ago.
Join Thales on 15th October to learn how ultra-efficient certified network independent encryption can be deployed to secure today’s networks whether private layer 2 or public layer 3 networks with end points located on premise and in the Cloud.
Simplifying and securing access to the cloud is becoming more complex for IT security teams. Today's enterprises use, on average, 29 different cloud applications and services. In fact, 10% of organizations use more than 100 cloud services. In addition, cloud services are seen as one of the leading source of data breaches.
This session will discuss how IT security teams can simplify secure access to the cloud while providing a more simple and seamless way for employees to access cloud services without having to worry about password fatigue. This session will also include a live demonstration of SafeNet Trusted Access, Thales' cloud-based access management solution.
Welland Chu, Director of Business Development for APAC Region at Thales; Harry Pun, Cybersecurity Executive, Microsoft
There is an old Chinse saying, where there is opportunity there is also risk. This applies to the digital transformation journey many businesses are undertaking today. Businesses are driving significant digital transformation initiatives in order to accelerate performance and create new opportunities. Much of this transformation is being powered by the cloud. This means that more data and information is being stored in the cloud, creating significant risk especially for cyberattacks and data breaches. This interactive Tech Talk will discuss the challenges of maintaining a strong security posture in the cloud and how to think ahead of attacks before placing sensitive data in the cloud. This session will also present a playbook of practical steps organizations should follow for cloud security.
Sundaram Lakshmanan, CTO, CipherCloud; Danna Bethlehem, Dir. of IAM Prod. Mktg., Thales; Haider Iqbal, Dir. Bus Dev., Thales
Cloud adoption is the stepping stone for any organization’s digital transformation initiative. As digital-native businesses emerge, and incumbent businesses embark on their journey to transform their internal and external processes; IaaS and SaaS become the very fabric of the business. But as the adoption of cloud services evolves, so does the threat landscape. Often, IT teams find themselves scrambling to keep pace with business needs because their age-old perimeter-based security controls were not built to scale in today’s digital world.
Join Thales and CipherCloud experts to learn how to navigate this very fluid threat landscape with solutions that scale up with your business needs, and help you achieve the true potential of your digital transformation objectives.
David Zendzian Exec. Tech Advisor, VMware Tanzu; Steve White, Exec. Tech Advisor, VMware Tanzu; Rohini Deepak, Thales
Organizations making the digital transformation have a lot of considerations to make with compliance being one of the most important. In navigating security for digital transformation, it is easy for organizations to fall into the trap of addressing just the most basic compliance obligations first before fully grasping more complex issues that have implications in the software development lifecycle.
In this session, Thales and VMware Tanzu will discuss how they work together so security serves as a tool that facilitates the transition to the ‘cloud-native’, DevOps world. Attendees will also learn how the collaboration between VMware Tanzu and Thales eases the friction business leaders face in digitally transforming their organizations.
Asad Ali, Senior Technologist, Thales; Atul Tulshibagwale, Software Eng., Google; Haider Iqbal, Dir. of Biz Dev, Thales
Seamless authentication and continuous access to online resources has been an elusive target. While many have tried, few have been able to achieve it. The ones who claim success have built it on proprietary protocols and niche implementations that only address a small spectrum of digital security industry. In this talk we describe Continuous Access and Evaluation Protocol (CAEP), a new approach to cybersecurity using a user’s complete online footprint collected through a collaborative exchange of events and signals between multiple parties. CAEP was started by Google, and now has support of many key players in identity and security industry including Microsoft, Cisco, SailPoint, Amazon, Ping and Thales. We will explain how CAEP can help deliver Zero Trust by providing signals and events as input to machine learning capabilities, and thereby address current challenges around continuous access to online resources.
Ensuring secure access into cloud infrastructure is the best defence for cloud computing. Modern cloud services must accommodate any-any connectivity amongst a wide range of devices, applications and third parties across the Internet and other communication channels.
Network encryption provides essential intrinsic protection for cloud services and is mandated in many laws and regulations.
Today’s network encryption devices must handle intensive encryption algorithms, operate across a diverse range of cloud architectures and connectivity and be future proof against emerging threats.
In this session Stan Mesceda and Julian Fay will discuss the importance of providing encrypted network access into cloud environments and give strategies for managing the security of cloud environments today and into the future using the Thales HSE product family.
Tarik Faouzi, VP Cloud Solutions at CloudBlue; Gary Marsden, Senior Director, Cloud Services, Thales
There is no shortage of cloud services. While most organizations think of AWS, Azure and Google as the go-to destinations for software, infrastructure and platform as a services offerings, there are also other emerging marketplaces for cloud services. These marketplaces aggregate cloud services from multiple other providers and so give end users the same ability to consume services on-demand with simple pricing and billing but across multiple vendor offerings. In this session you learn more about these types of marketplaces, how they deliver and deploy services and how we are right at the tip of the iceberg in terms of changes in the cloud marketplace world. Tarik Faouzi from CloudBlue and Gary Marsden from Thales will provide an overview of the market changes, how to best leverage cloud based marketplaces and the associated processes to maximum benefit for your organization.
Organisations are receive hundreds if not thousands of alerts and reports every single day. Not only that, but organisations are using a many different security solutions from multiple vendors. All of these solutions are creating and sending alerts. This is their window to know if they are under attack. The resulting data means it is difficult for organisations to look into and respond, not to mention the false positives and the red herrings. Companies are becoming Cyber Fatigued.
Thales provide solutions that allow customers to encrypt data at a given layer. With encryption in place any alert below this layer can be handled at a lower priority. We help organisations in prioritising the logs they are receiving and reducing the noise in the network by using encryption.
Eric Avigdor, Director of Product Management, IAM, Thales; Asaf Lerner, Business Development Manager, Thales
Strategic IT initiatives such as O365 adoption, MFA consolidation, SSO for All alongside compelling events such as COVID 19 – often drive enterprise IT modernization. At no time is this more relevant than the present, when cloud adoption, accelerated by the need to support work from home, has exposed many weaknesses in existing on-premises legacy schemes.
This session will discuss why Access Management and Authentication is at the heart of enterprise security and how drives a Zero Trust architecture and creates synergies across IT modernization programs and present a technical demonstration of how a cloud-based access management can simplify user access to cloud services and enterprise apps.
Danna Bethlehem, Director of Product Marketing, Thales
The need to enable mass work from home has exposed weaknesses in existing on-premises security solutions. As traditional security perimeters disintegrate, the login point becomes the front line of enterprise security.
Now is the time to rethink how identity-centric Zero Trust models can offer an effective strategic framework for transforming security schemes in order to accommodate our users’ need for anywhere, anytime access to cloud applications and services.
During this session we’ll discuss:
• The Benefits of ID-centric Zero Trust
• How ID-centric zero trust concepts can address the fast moving needs related to COVID-19
• The advantages of identity-centric zero trust for modernizing IAM schemes
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.
We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.