The presentation by OpenWay, a global leader in digital payments software, will cover the use cases of a wallet-driven payment ecosystem in Asia, cloud-based payment processing for neobanks in Europe, domestic QR code and instant payments schemes and more.
RecordedOct 27 202060 mins
Your place is confirmed, we'll send you email reminders
The number 1 barrier to a successful data protection strategy is the ability to discover where sensitive data resides. Still over 60% companies are unable to analyze all the data they collect. Thales brought to the market the industry first Next Generation Solution: Data discovery, classification, and protection in a single, integrated Data Security Platform.
This webinar will discuss one of the first steps to protect your data - find and know what your sensitive data is.
Join Romi Hamplova, Pre-Sales Manager for Data Protection at Thales UKI, to learn:
- What do Data Privacy regulations demand with implications on Data Security strategy
- How can companies streamline the path to compliancy
- Can you effectively discover both structured and unstructured data?
- Gain visibility into data classification and risk analysis
- What is next in the data security life cycle?
- How can you Discover, Protect and Control with Thales CipherTrust Data Security Platform
As our critical infrastructure becomes more connected, it exposes legacy technologies to the outside world; leaving some vital systems open to exploitation. In recent years, we have seen an increasing number of attacks on critical infrastructure. Governments and industry regulators around the world are now focusing beyond physical perimeter protection to ensure the integrity of the systems used to control our critical infrastructure.
Join us to explore how encryption is a key element in ensuring the security of SCADA networks and how it needs to deliver against four criteria: Speed, Scalability, Manageability and Affordability to be most effective. We will look at traditional SCADA network provision, the evolving need to secure IoT connected devices, identify network vulnerabilities and discover the benefits of High-Assurance and Network Independent Encryption.
Fujitsu and Thales have partnered up to look at how financial organisations are expanding their cloud offerings on a global scale and how they are exploring the best security data practices to keep their organisations secure.
Join the data security team at Fujitsu and Thales as we discuss:
- The flexibility and benefits of moving to the cloud including how to improve the customer experience with value-added services
- How to find the balance between innovation and compliance in one of the most regulated industries in the world
- How to achieve cloud flexibility and data security adopting encryption and key management
You will learn:
- The Cloud Data Protection principles on the market
- The Data Encryption and Key Management options for the finance sector
- What challenges the finance sector face and what solutions they can implement
- The Best Practices of gaining control of your encryption keys
Over 80% of companies are using two and more cloud provides to store sensitive data that needs protection. While encryption is a globally recognized data security principle, how do you control it across environments? The Cloud Security Alliance and Industry Analysts state that encryption keys should be held by customers, so what does that mean in a multi-cloud environment?
- How do you achieve cloud flexibility and data security, across AWS, Azure, Google cloud, IBM cloud, Salesforce, O365 and on-prem?
- How do you gain visibility and grasp control of your keys in Multi Cloudy World?
Join Romi Hamplova, Pre-Sales Manager for Data Protection at Thales UKI, to discover:
- What happens if you do not have key visibility and control?
- What does enterprise key management truly mean?
- Learn how Thales CipherTrust increases the cloud security
- Discover how seamless BYOK, HYOK and full key lifecycle management can be
Supply chain attacks can have catastrophic impacts and are some of the most difficult to prevent. These attacks can cause serious financial, and even national security, consequences and are typically carried out by well-resourced attackers, such as nation-states. In this webinar, we will discuss the anatomy of a supply chain attack and what you can do to prevent your enterprise from falling victim. While some of the ground we will cover is aimed at technology companies, it is relevant to any company that consumes software from a third-party vendor or produces software for internal or external purposes.
Paul Hampton, Snr Product Manager & Claire Pitman-Massie, Director of EMEA Field Marketing, Thales CPL
When it comes to encryption keys, security best practice is all about control and separation between encrypted data at rest and the keys. Google Cloud encrypts customer data at rest by default and offers organisations multiple options to control and manage their encryption keys. For many organisations hosting sensitive data or looking to migrate workloads to the cloud, they require additional control and ownership over their encryption keys in order to meet compliance or internal security requirements.
In the first of our Data Protection Coffee Break Series for 2021, we will discuss how Google and Thales are helping organisations address this challenge by giving customer’s enhanced control over how and when their encryption keys are used to protect and access encrypted data in the cloud.
Marcus Almeida, Sales Manager, McAfee; Bryan Rivera, Sales Engineer e Abilio Branco, GM Data Protection Brasil, Thales
A McAfee e a Thales convidam para o Talk Show | Desafios de Segurança com a LGPD, para o processo de retomada do Brasil, que acontecerá no dia 9 de dezembro, às 17:00 horas.
Nesta oportunidade nossos experts discutirão tópicos relevantes que vão impactar na exigência e no nível de maturidade de segurança, que as empresas que tem processos orientados a dados terão que enfrentar em 2021, como:
• Proteção e monitoramento completo de todas as camadas do banco de dados;
• Proteção de dados, privacidade e anonimização dos dados;
• Gerenciamento e controle de todos os eventos de segurança, entre outros.
Marcus Almeida, Sales Manager, McAfee
Abilio Branco, GM Data Protection Brasil, Thales
Bryan Rivera, Sr. Sales Engineer LATAM, Thales
Cameron Skidmore, Global Partner Solutions Architect, Red Hat; Sol Cates, CTO Office, Thales; Rohini Deepak, Thales
Join Thales and Red Hat for a series of interactive Tech Talks, where we’ll explore the blueprint for implementing trust in the cloud native development lifecycle across Development, Build/Test & Operator phases. In this first session, we’ll discuss the application development phase of the DevOps lifecycle, with its specific challenges and needs, highlighting application level encryption & tokenization. Key takeaways for the first session will be:
• Thales and Red Hat solutions available for container-based application development
• Use cases enabled by Thales and Red Hat solutions
• Specifics around Thales solutions and OpenShift integration
Todd Moore, VP, Encryption Product at Thales; Stephen Cavey, Chief Evangelist at Ground Labs
It starts with data, it’s no longer an outcome of what we do. When we look back, we amass loads of “history” of things, now we leverage that history to define how and what we do. Hence the adoption of data lakes, IoT, and the commonly held view of data is more valuable than oil. Embracing data helps us make better decisions, delights our customers, delivers growth, and safeguards our business. Safeguarding your business is no longer about just placing firewalls, VPNs, and endpoint protection. You need to know what you’re protecting, otherwise, you’re at risk.
The payments industry is undergoing intense transformation caused by customer demands, technology advancements, globalisation, disintermediation by new entrants, and increasing regulatory requirements. On top of this, fraud by cyber criminals continues to evolve with attacks becoming increasingly sophisticated.
Join this webinar where will discuss evolving trends, technologies and regulations affecting the payments industry and how Thales can help meet these challenges.
Any organisation involved in card payment transactions, from issuance to processing, must be compliant with standards. These are increasingly becoming more robust, detailed and payment-specific to protect customer sensitive data. To meet these standards, HSMs are a mandatory requirement to both protect and support the cryptographic keys and operations throughout the payment transaction.
As such, HSMs are a critical part of an organisation’s infrastructure and are expected to handle transactions seamlessly, 24/7. Performance, reliability and operating costs are all factors to consider during a procurement selection stage, while the operations team must have the available tools and knowledge to be able to remotely manage the HSMs for configuration, audit and key management, following industry best practise.
Join Radovan Bruncak Pre-Sales Consultant at Thales:
1) Learn how international standards are driving the payments industry
2) Explore the best practice guidance to protect payment data and transactions
3) Discover how HSMs are helping to meet compliance
Garrett Bekker - Sr Research Analyst 451 Research, Il-Sung Lee Sr Product Mgr Google, Sol Cates Principal Technologist Thales
The question of whether cloud security is better obtained via native tools from cloud providers or from neutral third-party vendors – or both - continues to be a source of debate. This panel discussion will consider the compliance, security and operational tradeoffs related to migrating workloads to public clouds, utilizing hybrid environments and managing multicloud deployments. Join your peers in discussing their considerations and criteria for architecting a cloud data security strategy that encompasses native cloud security features, cloud provider premium services and independent third-party solutions. Please arrive with questions and be prepared to share your experiences.
Organisations are electing to move more of their applications to the cloud each year. As they make this transition, they are considering how they port their existing on-premise security solutions to the Cloud.
Can organisations achieve the same level of security and trust as they enjoy on-premise? Are they able to use the same HSM or should they adopt an HSM service in a multi-cloud environment or hybrid infrastructure?
Please join Manoj as he explores:
- The different options for adopting HSMs in the cloud.
- Using On-premise HSMs and an HSM service in: the Cloud, Multi-Cloud and Hybrid Cloud environments
- The different use cases that can be addressed
- How to achieve separation of roles/duties
- Are the keys under your control?
Enrique Gutierrez, Public Sector Data Security Sales Leader, IBM; Larry Metaxotos, Senior Sales Engineer, Thales
In the era of COVID-19 with more employees working remotely and cloud adoption increasing, data security has become more complex. This is especially challenging as data breaches, especially those in Federal and Public sectors, continue to make headlines. There are solutions available to help protect your organization from external as well as internal threats as more organizations move to the cloud in the era of COVID-19. This panel discussion will look explore the fundamentals of encryption and key management and, more importantly, how to protect data in the cloud. The explosive growth of cloud services adoption and the amount of sensitive data stored in the cloud creates risks and threats that organizations have never had to face before.
Panelists in the session will discuss:
• How data security in the cloud is different than protecting data on-premise
• How quickly can your organization react when a breach is detected in the cloud
• What is key management and why is key rotation important
Rami Dawoodi, Country Sales Manager, Lakhwinder Singh and Neil Cosser, Country Sales Manager Africa at Thales
Thales provides solutions that help government agencies and their organisations to secure their data and comply with the current regulations.
Register to this webinar to find out how to protect critical data from the cloud to on premises. From our core solutions developed specifically for the government Thales Cloud Protection & Licensing offerings address the most stringent federal requirements. Our extensive data security experience allows us to provide one of the most broad data protection portfolios specifically focused on government requirements for protecting mission critical data in data centers, cloud environments, and field deployments.
Danna Bethlehem Coronel, Director, Product Marketing, Identity and Access Management, Thales
Thales research conducted this year captured the opinions from risk management and cloud security professionals just as the Covid-19 emergency erupted. Three months on, we have a unique vantage point to assess how this data lines up with the way remote access has played out in reality. Join us in this session to hear the latest trends and future directions in access management and remote working as we discuss the findings of Thales’s annual Access Management Index for the Asia-Pacific region.
Networks have developed incredibly quickly over the last 25 years, from low speed public and private network access to the high speed fibre and Software Defined Networks seen today. However, most of the sensitive data being transferred across modern networks still rely on the performance sapping, bandwidth hungry security technologies introduced decades ago.
Join Thales on 12th November to learn how ultra-efficient certified network independent encryption can be deployed to secure today’s networks whether private layer 2 or public layer 3 networks with end points located on premise and in the Cloud.
John Ray (Director of HSM Product Management, Thales), Mike Brown (CTO, ISARA), Chris Hickman (CSO, Keyfactor)
We can agree 2020 was anything but ordinary – but what can we expect in the year ahead? From sleeping dragons to expected crypto-compromises, this panel discussion will cover some of the ways that cryptographic keys and digital certificates will be used (and misused) in 2021 and beyond.
In this webinar, you’ll hear directly from those at the forefront of cryptography as they share insights on:
-How IoT & DevOps are testing the limits of PKI
-The impact of shorter SSL/TLS certificate lifecycles
-Emerging code-signing and SSH-based attacks
-The threat of Impending root CA expirations
Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.
We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.