Hi [[ session.user.profile.firstName ]]

The Datacenter Deconstructed

Today security is consuming an ever larger share of total IT spending, but security effectiveness against the data-breach epidemic is not improving. Virtualization and cloud computing have introduced an age where data is distributed across and beyond the enterprise, the edge is diffuse, hackers are skilled criminals, and insiders (both malicious and otherwise) are a constant threat to data compromise.

This session will discuss:
• The security changes that virtualization and cloud computing introduced
• Who is responsible for security in the SaaS, PaaS and IaaS environments
• The new reality that security needs to be attached to the data
Recorded Apr 25 2013 37 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Leonor Martins, Principal Solutions Specialist, Virtualization & Cloud at SafeNet
Presentation preview: The Datacenter Deconstructed
  • Channel
  • Channel profile
  • Law Enforcement Data On the Move: Don’t make CJI a Crime Recorded: Jul 20 2017 57 mins
    Stan Mesceda, Encryption Expert at Gemalto
    Law enforcement and defense organizations need secure access to sensitive data, and to provide services and to collaborate with others, while protecting the public, and any confidential information. Faced with these challenges, meeting compliance regulations such as Criminal Justice Information Services Security Policy (CJIS-SP) , is a priority for most organizations, especially as audits draw near.
    Did you know that the Criminal Justice Information Services Security Policy (CJIS-SP) requires that data be encrypted when it is transmitted outside a secure facility, even within the same agency
    “When CJI is transmitted outside the boundary of the physically secure location, the data shall be immediately protected via cryptographic mechanisms (encryption)”

    Join us for an informative webinar where you will learn how to secure your data in transit as it moves across your internal and external network, to help ensure compliance with the FBI mandate.
    Attendee takeaways:
    •Overview of CJIS-SP mandate
    Network vulnerabilities and how Ethernet encryption can help secure data in motion
    •Use cases – hear how various agencies have successfully deployed network encryption to secure their data and meet audit requirements
    •Mapping solutions to the needs of your organization

    For more information on dealing with multi-factor authentication in the CJIS audit, check our part one in the series: https://www.brighttalk.com/webcast/2037/258091
  • Turning the Table on Hackers and Breaches Recorded: Jul 11 2017 45 mins
    Jason Hart, CTO of Data Protection at Gemalto
    Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations and identity theft. According to Gemalto’s Breach Level Index, the number of stolen, compromised or lost records increase by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.

    Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a pulse on what is going on. It seems too simple to be true, but it goes back to the age-old principle of information is power. Getting the information comes from being aware of one’s surroundings. To become situationally aware, companies need to change their mindset- building a walled garden isn’t an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness. Join us as we cover topics like:

    -What we can learn from Jason Bourne about knowing one’s surroundings
    -What we can learn from hackers to better protect valuable data
    -What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability and confidentiality
    -How to change our mindset in a new era of a hacker driven gold rush
  • Getting Ready for Australia’s Privacy Act Amendment (Notifiable Data Breaches) Recorded: Jun 29 2017 58 mins
    Helaine Leggat, an legal expert in data protection regulations and Graeme Pyper, Regional Director at Gemalto
    The Gemalto’s Breach Level Index reported 1.4 billion data records compromised worldwide in 2016, up 86% from 2015. Closer to home, there were 44 & 16 voluntarily reported breaches in Australia and New Zealand respectively. With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 in Australia, these numbers are expected to increase dramatically as organisations are required to declare any “eligible data breaches”.

    Navigating these regulations such as the Australian Privacy Act and European General Data Protection Regulation (GDPR) and the impact they will have can be daunting. Organisations must start planning ahead to mitigate the potential risks of being non-compliant. The implications of a data breach can go beyond compliance. In 2014, the Target breach had a massive impact on the company’s brand reputation, while last year’s announcement of the Yahoo! data breach cost the company nearly $1.7 billion in stock market value.

    During this webinar, Helaine Leggat, an legal expert in data protection regulations will discuss the Australian Privacy Act Amendment in detail, what it means for businesses in Australia and internationally. Graeme Pyper, Regional Director at Gemalto will provide recommendations to help prepare for the 2018 deadline. We will share industry best practices and methodologies companies can evaluate to simplify a government audit process. Join our experts to ask questions and learn more about:

    •The local and global government data privacy regulations (Australia and Europe)
    •Gauging the true cost of a data breach and how to reduce the scope of risk
    •Understanding privacy by design throughout business
    •Strategies for simplifying operations for regulation and internal audits
    •Determining current industry compliance, which may be applicable to the APA and GDPR
  • Getting Rid of Risky Business: How contextual info is securing cloud app access Recorded: Jun 28 2017 56 mins
    Ella Segura, Identity and Access Management Expert at Gemalto
    Organizations are working across more cloud environments from CSPs to on premise. Just this year, enterprises are expected to utilize an average of 17 cloud applications to support IT, operations and business strategies. The cloud’s benefits are well-known, but for security teams managing multi-cloud ecosystems has its challenges, especially when it comes to access management.

    Behavioral and contextual analytics are helping companies mitigate risk and better secure access to cloud applications and data. Using data-driven insights to develop internal security policies takes a more preventative identity and access management strategy.

    During this webinar, we will discuss what security professionals need to assess and understand when moving towards or updating a risk-based authentication model for IAM. The presentation will outline access management policies can be identified, templated, updated and monitored to improve security around data in the cloud.

    Join us for a deep dive into:
    -Current implications of multi-cloud environments on IAM
    -Proactively using analytics to define access policies
    -Avoiding security fatigue through scenario-based authentication
    -Preparing for audits using policy implementations
    -A live demonstration of how this all fits together in a multi-cloud environment
  • IoT Security over Tea: Brewing in the Business Recorded: Jun 20 2017 61 mins
    Gorav Arora, CTO Office's Director of Strategy
    For businesses and consumers the Internet of Things (IoT) is about the value of data, whether it’s for better decision making, for navigation to future goals or immediate maneuvering. The value of the data will vary based on numerous factors like its perceived value, intrinsic value, monetary value, etc. and may change over time. Being able to identify the value of data will help businesses better understand the associated risks and thereby the necessary security.

    According to Gartner, worldwide spending on IoT security will reach $348 million in 2016, a 23.7% increase from 2015 spending of $281.5 million. Companies need to understand and evaluate the business impact of data to determine its value and consequently the appropriate security. Following our introductory webinar “Steeping out the Hype,” the next in our series on IoT security will focus on the building an IoT security blueprint based on the estimated value of the data. The calculation will not always be linked to a monetary value but also the data’s impact if breached on brand recognition and stock price or data used to make strategic decisions, competitive information and/or intellectual property.

    Join us for a webinar to learn more about evaluating the value of your data and building an IoT security strategy to match the eight point business journey. Attendees will have a better understanding of the:
    -Eight point business journey and its connection to securing the data
    -Factors impacting the value of the data, the IoT personas outlook on each type of data and using them to calculate estimates and risk assessment to understand the cost of a breach
    -Messages to educate management and business leaders on the investment needed to support a secure IoT
    -A blueprint for building an IoT security strategy
  • Quantum Threat Conundrum: How to Create a Quantum-Safe Security Strategy Today Recorded: Jun 19 2017 61 mins
    Stan Mesceda from Gemalto -Bruno Huttner & Gilles Trachsel from ID Quantique
    With the advent of massively powerful quantum computers, much of today's encryption will be vulnerable. Preparing for the inevitability of quantum should be an integral part of current risk management strategy. Gemalto is teaming up with ID Quantique, a leader in quantum security, to help security professionals understand quantum-safe cryptography and the impact it will have on enterprise security. Find out how you can create a quantum-safe environment for voice, video, virtualization and mass data today, securing these assets from even the most advanced cybercriminals and their super-computers.

    Join Gemalto and ID Quantique for a joint webinar to learn more about:
    •What is quantum computing and how it affects security
    •Quantum cryptography in action
    •Examples of quantum cryptography in the enterprise and government space
    •Quantum-safe solutions at a glance
    •Future developments of quantum cryptography
  • Briefings On Demand: Getting it Right - Security & the Internet of Things Recorded: May 24 2017 58 mins
    Dave Madden – Sr Director of Business Development & Brandon Dunlap
    The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. However, securing it can be difficult. Join Gemalto and (ISC)2 for a discussion on the Internet of Things and how it will play a role in your future and what changes will be happening in security.
  • Don’t let Smartphones Kill your PKI Security Strategy Recorded: May 23 2017 51 mins
    Gregory Vigroux, Enterprise Mobility Expert at Gemalto
    Half of businesses admit security is their biggest concern to increasing user mobility. Securing enterprise mobility has been an ongoing and arduous topic for IT security professionals. Maintaining high-assurance security, while offering access to company resources to an on-the-go workforce has become a balancing act. So much so, a third of businesses actually prevent employee access to company resources via mobile. This is likely not a long term or sustainable solution to the problem.

    So how do you find a compromise that won’t kill your security strategy? There are currently many technologies from derived credentials to mobile PKI. IT professionals are feeling the pressure to find a viable, user friendly, easy-to-deploy and secure options. In this webinar, we will discuss the current solutions in-depth and how they impact your current IT security policies. Attendees will learn more about:
    -Software-based security versus hardware-based security
    -How this impacts your back-end systems
    -Technology such as derived credentials and mobile PKI
    -Implementing a mobile PKI solution
  • Passing the Audit: What you need to know to be CJIS compliant Recorded: May 15 2017 50 mins
    Eric Avigdor, Director of Product Management at Gemalto
    Did you know if your organization receives criminal history information as part of licensing or a background checks, you are required to comply with the FBI CJIS Security Policy (CSP)? State agencies are also authorized to conduct formal audits to make sure compliance is met.
    Compliance is just one benefit. Advanced authentication is also required when remotely accessing the FBI’s CJIS repository. Putting in place this technology helps law enforcement in the field have secure and timely access to important information when they need it.

    Join us for an informative webinar where you will learn the basics to secure your devices, networks and users and become compliant with the FBI mandate.
    Key attendee takeaways:
    •Overview of CJIS mandate and Advanced Authentication
    •Use case – our experience from the field
    •Comprehensive solutions that meet the stringent requirements of the CJIS mandate
    •Mapping solutions to the needs of your department
  • Beyond 2FA: The Smart Way to Manage Cloud Access Recorded: May 9 2017 44 mins
    Mor Ahuvia, Authentication Product Marketing at Gemalto
    Cloud apps are being pulled into the enterprise hand-over-fist, with 93% of organizations using cloud-based IT services. But the efficiencies and convenience offered by cloud apps come at a price. While organizations have long been applying two-factor authentication to their network, VPN and email portals, they have failed to extend that same level of security to cloud-based applications, such as Office 365, AWS and Salesforce.

    But the need for stronger cloud access security is only part of the story. Businesses looking to scale and increase their cloud adoption find there are other issues to contend with. Visibility into cloud access events and regulatory compliance become challenging to maintain. Helpdesk staff are burdened with password resets, and the most important link in the chain—users—are plagued with password fatigue.

    This webinar explains:
    •Challenges to greater cloud adoption in the fintech space
    •How strong authentication complements access management
    •Why cloud access management is critical to an organization’s cloud adoption strategy
  • Part II – How to get started with GDPR & Applying Appropriate Security Controls Recorded: Apr 25 2017 62 mins
    Jason Hart, Gemalto, Lisa Bentall, DQM GRC, Adrian Davis, (ISC)² EMEA, Nathaniel Ford, (ISC)² EMEA
    As a follow-up to our previous webinar, this panel discussion will dive into further detail about the GDPR. Presented by compliance experts Lisa Bentall (DQM GRC) and Jason Hart (Gemalto) we will answer some of the big questions raised in the previous webinar and open up to the live audience for an interactive Q&A.
  • DIY PKI Recorded: Apr 17 2017 56 mins
    Rae Barton, PKI expert at Gemalto
    Public Key Infrastructure (PKI) is a well-known security protocol used by some of the world’s largest governments and top enterprises, but it’s a technology that also affords many possibilities in new and growing industries. Even small to medium sized businesses can greatly benefit from PKI. However, PKI is also often mistakenly perceived as being difficult to deploy. Gemalto is addressing this common misconception. The next webinar in our PKI series, DIY PKI, will walk attendees through the entire process of setting up a PKI environment and how to manage it. We have developed a five step process to make it easy for security professionals to get their PKI system up and running with minimal time spent. The five step implementation method will give you an idea of how to set up a two tier Microsoft PKI infrastructure with Gemalto SafeNet Authentication Manager and SafeNet Luna HSM to perform smart card log on for small to medium sized enterprises.

    Attendees of the DIY PKI webinar will learn:

    -Challenges of PKI deployment
    -Overall PKI integration ecosystem
    -Common use cases deployed in enterprises: Smart card logon – What happens in the backgrounnd, email encryption/signing

    Step by step implementation steps
    oInstall and configure a Hardware Security Module (HSM)
    oInstall the root CA and configure it with the HSM
    oInstall and configure the issuing CA
    oConfigure the permissions of users and create certificate templates
    oInstall and configure an authentication manager



    For the purpose of this webinar and using Gemalto’s five step propriety approach, we will use our SafeNet line of technologies to demonstrate the implementation of the PKI solution.
  • IoT Security Over Tea: Steeping Out the Hype Recorded: Apr 11 2017 63 mins
    Gorav Arora, CTO Office Director of Technology at Gemalto
    A familiar buzz word over the past few years has been the Internet of Things (IoT). We have all heard the talk about it being the next big thing, its massive growth potential and the benefits to everyone. The IoT will generate more data, connect more devices and enable more users, and somehow these interactions will be safe and secure.

    We take a pragmatic view of IoT, cutting through the hype to uncover the core objective. Furthermore, we take a persona based approach to IoT security, and have identified four main ones: cloud service providers, consumers, device makers and third-party service providers. Each persona faces the obstacle of securing different parts of the ecosystem whether its access, the device, data and/or the user. However, it is necessary that security is provided holistically, as the weakest security link in the chain could compromise it all. In addition to security, the personas are used to demonstrate the ‘Stages of IoT’ from the digital identity of physical products to actualization of new business opportunities. No matter what persona in the IoT ecosystem you are (or are not), the webinar cuts through the hype to understand the real business opportunities and share with attendees the technology tool box (predictive analytics, security, connectivity, data collection and business intelligence) to create and improve services and leverage the generated data internally and externally.

    Join us for the webinar, “IoT Security Over Tea: Steeping out the Hype”, to learn more about:
    •A grounded perspective on IoT
    •Why IoT security matters for everyone
    •The persona analysis of IoT security
    •Key considerations as it begins to take off
    •How to protect what matters most to you
  • Getting started with GDPR, Privacy and Applying Appropriate Security Controls Recorded: Mar 23 2017 56 mins
    Jason Hart, Gemalto, Christine Andrews, DQM GRC, Adrian Davis, (ISC)² EMEA
    In this webinar, presented by compliance experts Christine Andrews (DQM GRC) and Jason Hart (Gemalto) you will learn:

    a. The background to the new General Data Protection Regulation
    b. An overview of the key areas of change from the existing Data Protection Act – and the penalties for getting it wrong
    c. A focus on the information security implications and considerations for meeting compliance
    d. An approach for understand the “Gaps” in your current compliance and, importantly, how best to move forwards
  • Digital Identities: The Changing Face of Consumer and Enterprise Security Recorded: Mar 15 2017 47 mins
    Mor Ahuvia, Product Marketing at Gemalto
    IT decision makers today realize that the enterprise and consumer worlds are merging closer together in how they secure our digital identities. As the consumer world tightens its security around online identities, the corporate world is embracing intuitive, user-friendly identity architectures.

    Enterprises are moving from traditional two-factor solutions, which are based on a binary yes/no validation, to more fluid methods of identity verification, such as context-based, risk-based and continuous authentication. They are also embracing architectures that allow users to import their social, government-issued or commercial identities into the enterprise space. Join this webinar to learn more about:

    •Key concepts impacting the enterprise security space
    •The consumerization of enterprise security
    •Designing enterprise security with UX in mind
    •The impact standards have on the future of strong authentication
  • Digital Identity and IoT on the Blockchain Recorded: Mar 14 2017 63 mins
    Ina Yulo, John Erik Setsaas (Signicat), Jacob Boersma (Deloitte), Joseph Pindar (Gemalto), Kaspar Korjus (e-Residency)
    Digital identity has been a popular blockchain use case because of all the obvious benefits the technology can provide. On the flip side, the emergence of the IoT and all the data that we now have available has opened up many doors for improving the way we are able to authenticate who people say they are, wherever, whenever.

    Join this panel where we will discuss:

    -The difference between blockchain and shared ledgers and why this is important
    -Is data from the IoT a benefit to digital identity, or does it propose an added challenge?
    -How will blockchain technology help with authentication for e-commerce and foreign payments, especially for digital nomads?
    -Who gets to manage your identity?
    -Can blockchain help secure data collected from the IoT?
    -What would be the impacts of a decentralised system to IoT and digital identity?
  • Swimming in the Sea of Compliance: Become NCUA Compliant with Gemalto Recorded: Feb 28 2017 42 mins
    Alex Hanway, Encryption Marketing at Gemalto
    The National Credit Union Administration (NCUA) requires every credit union to protect their members’ personal, private data. But with a host of mandates and a range of technology options, where should credit union IT administrators begin? Encryption and key management can address a number of the requirements set out in these guidelines. Together they can help credit unions become compliant and can keep customer data safe.
    Join our live webinar "Navigating the National Credit Union Administration (NCUA) Privacy Guidelines:
    Securing Customer Records with Encryption and Key Management" on February 7th to learn about:
    •Which specific guidelines concern customer information at rest and in transit
    •How encryption and key management addresses these requirements
    •The benefits of a centralized encryption management
  • PKI - Your Ally in the War Against Security Threats Recorded: Feb 23 2017 58 mins
    Rae Barton, Enterprise PKI Expert at Gemalto
    PKI used to be difficult to implement, and was seen as complex, labor intensive and expensive. The development of powerful credential management software has brought considerable improvements. It now does much of the manual work that used to be left up to the administrators saving them valuable time in the war against security threats. In our last webinar, we found almost 50% of those you voted cited the Internet of Things as the main driver for PKI. More connected devices and users will create a need for higher levels of security in all organizations as the number of possible threats and attacks increase.

    For security professionals, implementing and modernizing their PKI systems will be crucial, keeping in mind not all PKI implementations are created equal. Some are inherently more complex, depending on the level and layers of security needed for within your organization. Following our previous PKI foundational webinar, this one will cover the elements you need to consider when designing a PKI environment.

    Join us for the “PKI – Your Ally in the War Against Security Threats” to learn how you can maximize your organization’s security and the things you need to know to get started including:

    •PKI use cases in an enterprise environment to secure access and protect data
    •Budgeting for your PKI deployment of modernization
    •Outlining the deployment size, scope and timeline
    •Analyzing and reviewing current and/or future security policies
    •Maintenance and administration of the PKI system
    •Configuring and understanding certificate authorities
    •Developing a scalable approach to prepare for future needs
    •Addressing the protection of sensitive keys and the ecosystem integration
  • The Foundations and Future of PKI: Yes, it’s Alive and Kicking Recorded: Feb 6 2017 59 mins
    Asaf Lerner, PKI product development at Gemalto
    According to a report from the Ponemon Institute, 62% of businesses surveyed regard cloud-based services as the most important trend driving the deployment of applications using PKI, an increase from 50% in 2015. While 28% say IoT will drive PKI deployment. PKI is once again in the spotlight, thanks to the growing number of use cases.

    The foundations of PKI technology and it’s future potential will help professionals determine the best security strategy for the long term. This session will go over the building blocks of a PKI ecosystem and discusses the functionality and use cases of the technology. Whether you’re a security professional looking for a PKI refresher or you are starting from scratch, you will find this webinar useful.

    During our webinar, The Foundations and Future of PKI: Yes, it’s Alive and Kicking, we will cover:

    •Brief overview of PKI technology and it’s components
    •PKI for identity and data protection
    •Advanced security functions of PKI
    •Basic PKI practices
    •PKI vertical use cases
    •The brave new world of PKI – a look at emerging trends and technology
  • What’s Next In Securing Identities? Key Identity & Access Management Trends Recorded: Jan 18 2017 43 mins
    Danna Bethlehem
    Over the past year, we have seen data breaches shift towards identity-based breaches, targeting personal information of either employees or consumers. The access to the information is used to craft and construct highly organized attacks on enterprises and is a growing contributor to identity theft. The problem is compounded by the convergence of personal and work place identities, ultimately creating major security challenges for companies.

    Our 2016 Authentication and Access Management survey found 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. During the webinar, we’ll be discussing this and other trends in the strong authentication and access management market, including:

    -The status of the two-factor authentication market and what we can expect in the years to come
    -The enterprise risk issues of using social media credentials to access to corporate resources
    -The role the cloud is playing in the enterprise especially as it relates to single sign on and application management and access
    -The ongoing challenges enterprises cite as barriers to mass adoption of a mobile workforce
Protecting Data, Identities, Transactions & Communications
SafeNet is the only company trusted to protect the world’s most sensitive commercial and government assets. We do this through solutions that persistently protect throughout the information lifecycle and evolve to support changing business and market requirements without disruption.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Datacenter Deconstructed
  • Live at: Apr 25 2013 3:00 pm
  • Presented by: Leonor Martins, Principal Solutions Specialist, Virtualization & Cloud at SafeNet
  • From:
Your email has been sent.
or close