Hi [[ session.user.profile.firstName ]]

What you need to know about the EU Safe Harbour

The Safe Harbor agreement allowed American and European countries to share personal data. This agreement is now invalid and a new one has taken its place. This not only impacts the ways companies conduct business and make their IT decisions, but also how they set up their data protection infrastructures.
This webinar will present:
• New proposed regulations
• Business implications
• A solution to stay compliant and avoid penalties
Join (ISC)² and Gemalto in this webinar to find out what you should know about the Safe Harbour agreement, how its invalidation impacts you and how to be compliant with the new EU regulation framework.
Recorded Mar 24 2016 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Adrian Davis, Managing Director (ISC)² EMEA; Joe Pindar, Director of Strategy in CTO Office, Gemalto
Presentation preview: What you need to know about the EU Safe Harbour

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Are you Ready for DFARS? Sep 27 2017 3:00 pm UTC 60 mins
    Eric Avigdor, Director of Product Management at Gemalto
    With the deadline for DFARS (Defense Federal Acquisition Regulation Supplement) quickly approaching, many business are scrambling to meeting compliance requirements. An important part of DFARS addresses the need for strong, two-factor authentication, as well as physical access controls to organizational information systems, equipment, and the respective operating environments to authorized individuals.
    Are you prepared? If you’re like many other government contractors and subcontractors, a little advice may be needed to navigate the waters of physical and user access controls.
    Gemalto’s Identity and Protection expert, Eric Avigdor, will be present and informative look at DFARS and what options are available to ensure compliance. What Eric will discuss:
    •Overview of DFARS mandate
    •Use cases – our experience from the field
    •Comprehensive solutions that meet the multi-factor authentication and physical access controls required by the DFARS mandate
    •Mapping solutions to the needs of your department
  • The Blockchain Bubble: Identifying viable opportunities for blockchain Sep 26 2017 3:00 pm UTC 60 mins
    Joe Pindar, CTO Office Director of Strategy
    Blockchain technology is popping up everywhere from the currency market to smart contracts. The growth in the technology is evident from the investments being made, for example, PwC estimated that in the last nine last nine months of 2016, $1.4 billion had been invested globally in blockchain startups. This stems from its potential to enable efficiencies and cost-saving opportunities based on moving to a decentralized approach and away from the current centralized systems. With all the hype around blockchain, companies need to cut through the hype and ask the question - when does blockchain actually make business sense?

    Blockchain is not a silver bullet and cannot solve every problem. There is also the added complexity of managing the security of many distributed nodes can only be justified by gaining business benefits from using blockchain. In this webinar, we will look at a business qualifying approach to blockchain to help you evaluate valid blockchain use cases and identify the security needs surrounding blockchain operations. Join us to learn more on:
    •Securing blockchain from the edge to the core
    •The operational benefits and pitfalls of blockchain technology
    •Our 4 step qualification process for blockchain business opportunities:
    1.Is there an established business process?
    2.Are there more 3 parties involved – i.e. is it a distributed problem?
    3.Is it important that the data being exchanged is trusted and considered to be factually accurate?
    4.Would automation improve the performance of the process?
  • What is an Identity Provider (IdP) and Do You Need One? Recorded: Aug 23 2017 47 mins
    Stephen Allen, Authentication Expert at Gemalto
    The explosion of cloud-based applications in the enterprise is making IT and security professionals rethink their cloud identity management strategy. By default, every cloud user creates an average of 17 cloud identities. But catering to 17 different user stores per employee or partner is simply not scalable from an administration perspective. And as if IT’s time is not precious enough, password resets account for 20% of helpdesk tickets. This adds to the compliance and security risks associated with cloud-based applications, which by default require only weak static passwords and offer no central point of management across disparate cloud-based services.

    Join Stephen Allen, Gemalto Product Manager for Authentication and Access Management, and learn how deploying an Identity Provider enables:

    •Cloud Single Sign-On for easy access to cloud apps
    •Regulatory compliance with standards such as PCI DSS
    •Reduced identity lifecycle overheads
    •Centralized management of cloud access policies
    •Increased security with step-up authentication
  • Securing India's Aadhaar Numbers as per UIDAI's Mandates Recorded: Aug 11 2017 60 mins
    Nanda Mohan Shenoy, CAIIB, CISA - Bestfit Business Solutions and Prasun Srivastava - Solution Expert, IDP, Enterprise & Cyber
    The India's Unique Identification numbers (UIDs), also named "Aadhaar numbers" contain Personally Identifiable Information (PII), the Unique Identification Authority of India (UIDAI) has mandated that the private cryptographic keys used to digitally sign and authenticate the UIDs must be stored in a Hardware Security Module (HSM).

    In addition to HSMs, the UIDAI has also mandated the use of tokenization – replacing sensitive data with a token that can be securely stored, processed and transmitted as of August 2017.

    Join this live webinar to know more about how to easily conform to the mandate:
    •What is UIDAI's requirements?
    •Why HSM and tokenization?
    •How to ensure Aadhaar numbers are protected?
    •What makes Gemalto's SafeNet Luna HSM and KeySecure unique?
    •How to meet UIDAI's compliance mandates?
  • 6 steps to GDPR compliance Recorded: Aug 1 2017 61 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, Jan Smets, Certified Data Protection Officer, Gemalto
    The introduction of GDPR is set to bring data protection to the top of businesses’ priority lists. So how can businesses ensure they are compliant and what steps do they need to take?
    In this webinar, certified DPO Jan Smets with provide a six-step overview to help achieve compliance:

    1) Understand the GDPR legal framework
    2) Create a Data Register
    3) Classify your data
    4) Start with your top priority
    5) Assess and document additional risks and processes
    6) Revise and repeat
  • Getting Ready for Australia’s Privacy Act Amendment (Notifiable Data Breaches) Recorded: Jun 29 2017 58 mins
    Helaine Leggat, an legal expert in data protection regulations and Graeme Pyper, Regional Director at Gemalto
    The Gemalto’s Breach Level Index reported 1.4 billion data records compromised worldwide in 2016, up 86% from 2015. Closer to home, there were 44 & 16 voluntarily reported breaches in Australia and New Zealand respectively. With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 in Australia, these numbers are expected to increase dramatically as organisations are required to declare any “eligible data breaches”.

    Navigating these regulations such as the Australian Privacy Act and European General Data Protection Regulation (GDPR) and the impact they will have can be daunting. Organisations must start planning ahead to mitigate the potential risks of being non-compliant. The implications of a data breach can go beyond compliance. In 2014, the Target breach had a massive impact on the company’s brand reputation, while last year’s announcement of the Yahoo! data breach cost the company nearly $1.7 billion in stock market value.

    During this webinar, Helaine Leggat, an legal expert in data protection regulations will discuss the Australian Privacy Act Amendment in detail, what it means for businesses in Australia and internationally. Graeme Pyper, Regional Director at Gemalto will provide recommendations to help prepare for the 2018 deadline. We will share industry best practices and methodologies companies can evaluate to simplify a government audit process. Join our experts to ask questions and learn more about:

    •The local and global government data privacy regulations (Australia and Europe)
    •Gauging the true cost of a data breach and how to reduce the scope of risk
    •Understanding privacy by design throughout business
    •Strategies for simplifying operations for regulation and internal audits
    •Determining current industry compliance, which may be applicable to the APA and GDPR
  • Getting Rid of Risky Business: How contextual info is securing cloud app access Recorded: Jun 28 2017 56 mins
    Ella Segura, Identity and Access Management Expert at Gemalto
    Organizations are working across more cloud environments from CSPs to on premise. Just this year, enterprises are expected to utilize an average of 17 cloud applications to support IT, operations and business strategies. The cloud’s benefits are well-known, but for security teams managing multi-cloud ecosystems has its challenges, especially when it comes to access management.

    Behavioral and contextual analytics are helping companies mitigate risk and better secure access to cloud applications and data. Using data-driven insights to develop internal security policies takes a more preventative identity and access management strategy.

    During this webinar, we will discuss what security professionals need to assess and understand when moving towards or updating a risk-based authentication model for IAM. The presentation will outline access management policies can be identified, templated, updated and monitored to improve security around data in the cloud.

    Join us for a deep dive into:
    -Current implications of multi-cloud environments on IAM
    -Proactively using analytics to define access policies
    -Avoiding security fatigue through scenario-based authentication
    -Preparing for audits using policy implementations
    -A live demonstration of how this all fits together in a multi-cloud environment
  • Part II – How to get started with GDPR & Applying Appropriate Security Controls Recorded: Apr 25 2017 62 mins
    Jason Hart, Gemalto, Lisa Bentall, DQM GRC, Adrian Davis, (ISC)² EMEA, Nathaniel Ford, (ISC)² EMEA
    As a follow-up to our previous webinar, this panel discussion will dive into further detail about the GDPR. Presented by compliance experts Lisa Bentall (DQM GRC) and Jason Hart (Gemalto) we will answer some of the big questions raised in the previous webinar and open up to the live audience for an interactive Q&A.
  • Getting started with GDPR, Privacy and Applying Appropriate Security Controls Recorded: Mar 23 2017 56 mins
    Jason Hart, Gemalto, Christine Andrews, DQM GRC, Adrian Davis, (ISC)² EMEA
    In this webinar, presented by compliance experts Christine Andrews (DQM GRC) and Jason Hart (Gemalto) you will learn:

    a. The background to the new General Data Protection Regulation
    b. An overview of the key areas of change from the existing Data Protection Act – and the penalties for getting it wrong
    c. A focus on the information security implications and considerations for meeting compliance
    d. An approach for understand the “Gaps” in your current compliance and, importantly, how best to move forwards
  • GDPR Blueprint; Tackling Confidentially, Integrity and Availability of Data Recorded: Nov 24 2016 63 mins
    Jason Hart, CTO, Identity and Data Protection, Gemalto, Adrian Davis, Managing Director, (ISC)² EMEA
    The new EU regulation of the Privacy world (the GDPR) is rapidly approaching. This webinar will reveal a back to basics approach in relation to GDPR. Specifically, Jason Hart - Gemalto CTO will identify a GDPR blueprint that tackles the privacy concerns around confidentiality, integrity and availability of sensitive data.
  • GDPR – The monster under the bed or an opportunity to enhance security? Recorded: Oct 13 2016 62 mins
    James Leaton Gray, The Privacy Practice, Jason Hart, Gemalto, Adrian Davis, (ISC)²
    The new EU regulation of the Privacy world (the GDPR) is frequently portrayed as a scary and formidable piece of legislation that’s going to rock the online & off-line world. This webinar will explore what the implications really are. How much will change from the present regime? How difficult will it be to comply? Also is there an opportunity hidden in the challenge? And where will security and security professionals fit in the new picture?
  • GDPR: La violazione dei dati nel nuovo Regolamento Europeo sulla Privacy Recorded: Jun 15 2016 64 mins
    Gloria Marcoccio, Senior Advisor IT and International Privacy & Security Compliance, Simone Mola Sr Sales Engineer at Gemalto
    Fino a poco tempo fa, le leggi europee riguardanti la protezione dei dati erano principalmente focalizzate sul consenso della persona, limitazione delle finalità e trasparenza nei trattamenti, etc. mentre gli aspetti inerenti la sicurezza delle informazioni erano considerati, in linea generale, questioni squisitamente tecniche più che di conformità legale.

    Questo quadro ora cambia profondamente con l'entrata in vigore il 25 maggio 2016 del nuovo Regolamento Privacy Europeo (GDPR), e con la prossima direttiva europea sulla sicurezza delle reti e dei sistemi informativi (NIS Directive). Tra le nuove e importanti prescrizioni in tema di sicurezza del GDPR spicca in modo particolare quella della violazione dei dati personali, che richiede alle aziende di tutti i settori di effettuare in tali casi la comunicazione al Garante privacy entro 72 ore e, in particolari condizioni, anche la comunicazione senza indebito ritardo a tutte le persone interessate dalla violazione a meno che i dati non siano stati resi inintellegibili (per esempio per mezzo di crittografia). Inoltre la direttiva NIS, una volta recepita nei Paesi Membri della UE, richiederà tra l'altro agli Operatori dei Servizi Essenziali (Energia, Trasporti, Sanità, etc.) e agli Operatori di Servizi Digitali (e-commerce, motori di ricerca on line, Cloud Computing) di comunicare alle autorità competenti nazionali i casi di incidenti di sicurezza.

    L’Unione Europea vuole che la conformità alle nuove normative in materia di protezione dei dati diventi una questione prioritaria e ha così prescritto che queste regole siano soggette a pesanti multe (sono previste sanzioni fino a 20 milioni di euro, e per le imprese fino a 4% del fatturato mondiale, se superiore).

    Partecipa al webinar organizzato da Symbolic e Gemalto che si terrà il prossimo 15 giugno alle ore 11:00 per conoscere il quadro normativo applicabile e le misure da predisporre per una corretta gestione dei casi di violazioni dati.
  • GDPR Summary: Why encryption and other measures are now a must? Recorded: May 24 2016 62 mins
    Adrian Davis, MD (ISC)² EMEA; Jason Hart, CTO Gemalto; Tom De Cordier, Lawyer and Partner, CMS DeBacker
    Until recently, EU data protection laws mainly focused on data subject consent, proportionality, purpose limitation, transparency, etc. Information security, however, was very often deemed to be an area for the techies, not an area of legal compliance.
    This will change as a result of two recent and major pieces of EU legislation: the General Data Protection Regulation (GDPR) and the Network and Information Security Directive (NIS Directive).
    Under the GDPR and the NIS Directive, businesses and operators of essential services (eg. hospitals; airports; etc.) will have to implement robust information and system security measures. In addition, the new rules contain a new name-and-shame mechanism: businesses and operators will have to inform the relevant authorities of security incidents. And they will have to inform the affected data subjects, unless the affected data were rendered unintelligible (for example by means of encryption).
    Finally, the EU wants the new data protection rules to become a board-level issue and it has therefore decided to make the rules subject to hefty fines:
    •If a business fails to comply with its data security obligations under the GDPR, it may get a fine of up to 10,000,000 EUR or 2 % of its total worldwide annual turnover, whichever is higher.
    •Worse even, if a business is found to be in breach of certain other obligations under the GDPR, the fine may go up to a dazzling 4 % of its total worldwide annual turnover.
    During this webinar, you will learn from Jason Hart, CTO at Gemalto and Tom De Cordier, an expert in data protection and information security law at CMS in Brussels, what the new rules mean in practice and what businesses should do to bring themselves in line with the upcoming requirements.
  • Data, the new oil: Find out why and what it means for your organization Recorded: May 5 2016 62 mins
    Moderator: Adrian Davis, (ISC)² EMEA; Speaker: Jason Hart, IDP CTO, Gemalto
    Every day, we create 2.5 quintillion bytes of data — so much that 90% of the data in the world today has been created in the last two years alone.
    More data in more places is leading to an increasing number of data breaches with attackers intent on trying to monetize your sensitive information.
    Jason Hart, IDP CTO at Gemalto will explain why data is the new oil and how easy it is to get hacked with a live hacking demo.
    In this interactive webinar we will also discuss:
    - Why your data is wanted
    - The new data Protection paradigm
    - Live Hacking demo
    - What’s next and what to do now to remain on the safe side

    Join the webinar to find out what you should know about Data Protection, how Cloud, IOT and big data impact your information security solutions and to how to keep your data safe.
  • What you need to know about the EU Safe Harbour Recorded: Mar 24 2016 62 mins
    Adrian Davis, Managing Director (ISC)² EMEA; Joe Pindar, Director of Strategy in CTO Office, Gemalto
    The Safe Harbor agreement allowed American and European countries to share personal data. This agreement is now invalid and a new one has taken its place. This not only impacts the ways companies conduct business and make their IT decisions, but also how they set up their data protection infrastructures.
    This webinar will present:
    • New proposed regulations
    • Business implications
    • A solution to stay compliant and avoid penalties
    Join (ISC)² and Gemalto in this webinar to find out what you should know about the Safe Harbour agreement, how its invalidation impacts you and how to be compliant with the new EU regulation framework.
  • Innovation in Payments: Experts answer 10 burning questions Recorded: Mar 16 2016 44 mins
    Konstantin Rabin (Kontomatik), Paul Hampton (Gemalto), Rashee Pandey (Bankable), Anders La Cour (Saxo Payments)
    Moderator Konstantin Rabin will provide general numbers on the payment industry, will take a look into start-up fundings and some examples of innovative companies in the payments industry.

    Then, he will ask the esteemed panel of experts the following questions:

    1) What are the main drawbacks of the current payment options?
    2) What should be the primary focus of the innovation in payments and why? (speed, cost reduction, transparency or anything else)
    3) Name a greatest innovation in payments happened till date
    4) Importance of cryptocurrencies in the realm of payments
    5) How do millennials change the way payments are going to develop?
    6) What are the main obstacles that prevent innovation in payments? (regulation, lack of funding, absence of common technology or anything else )
    7) What is more important to innovate, online or offline payment systems?
    8) What is the most crucial part of the Payment Service Directive 2? (or perhaps any other local directive)
    9) How large will be a share of businesses using alternative payments in 3 years from now?
    10) How would just a regular payment look in 2026?
  • Dossier Sanitario, quali sono le misure di sicurezza richieste dalla normativa Recorded: Nov 18 2015 72 mins
    Simone Mola, Snr Pre-sales Engineer - Gemalto; Gloria Marcoccio - Cloud Security Alliance
    Il Garante per la protezione dati personali ha adottato a Luglio 2015 le nuove Linee Guida sul Dossier Sanitario, che includono anche nuove prescrizioni subito attuative, indirizzate a tutte le strutture sanitarie in materia di protezione dei dati

    Che cos’è il dossier Sanitario? È l’inevitabile strumento di gestione elettronica utilizzato da ospedali, aziende sanitarie, case di cura sia pubbliche che private, riguardo le informazioni sulla salute di un paziente per documentarne la storia clinica ed offrirgli un migliore processo di cura presso una singola struttura sanitaria, da non confondere con il Fascicolo Sanitario Elettronico, la cui gestione è obbligo di legge per le Regioni e le Province Autonome, per gli scopi istituzionalmente definiti in ambito Servizio Sanitario nazionale/regionale

    Il webinar organizzato da Gemalto fa il punto della situazione sulle misure di sicurezza previste per il Dossier Sanitario, le nuove prescrizioni in materia di Data Breach e di diritto del paziente di conoscere gli accessi che sono stati eseguiti sul proprio dossier e relativi impatti in termini di misure tecniche/organizzative, il tutto in ottica di confronto con quanto previsto dalla legge vigente per il Fascicolo Sanitario Elettronico
  • Starke Authentifizierung – modern und unkompliziert Recorded: Nov 17 2015 57 mins
    Armin Simon, Northern EMEA Channel Manager
    Sichere Anmeldung ist elementarer Bestandteil der IT-Sicherheit, gleichzeitig sind Passwörter unsicher und aufwändig zu managen. Security-Verantwortliche sind daher auf der Suche nach moderner starker Authentifizierung, welche sich kostengünstig, unkompliziert und ohne großen Aufwand in die bestehende IT-Landschaft integriert.
    Armin Simon zeigt Ihnen in diesem Webinar, wie Sie als Security-Verantwortlicher starke Authentifizierung mit Certificate Based Authentication (CBA) oder One Time Passwörtern (OTP) in Ihrem Unternehmen auf ein solides Fundament stellen.
  • Security and The Internet of Things Recorded: Nov 3 2015 60 mins
    Adrian Davis, Managing Director, (ISC)² EMEA; Joseph Pindar, Senior Product Manager, Gemalto
    The Internet of Things (IoT) promises to deliver better user experiences and increased efficiencies for business. But get the security wrong, and you will have a global recall on your hands with a large fine attached. Join (ISC)² and Gemalto-Safenet on November 3rd to learn how the Internet of Things will play a role in your future and what changes will be happening in security.
  • Identity Protection: Getting an Edge in the Quest for Secure Enterprise Mobility Recorded: Oct 15 2015 59 mins
    Adrian Davis, Managing Director, (ISC)² EMEA; Doron Cohen, CISSP, VP Technology, Gemalto
    Employees are increasingly working out of the office. More and more of them are using mobile devices and logging in to cloud applications to perform business tasks. All this is creating a shift in habits termed ‘Enterprise Mobility’. Industry advancements in authentication and access management present new opportunities for organisations to increase their mobility posture.
    Join (ISC)² and Gemalto in this webinar to find out how you can take advantage of a few guidelines to provide your employees with convenient, secure and compliant mobility.
EMEA Data Protection Solution Webinars
EMEA data protection solution webinars designed for enterprise end users, distributors and resellers.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: What you need to know about the EU Safe Harbour
  • Live at: Mar 24 2016 12:00 pm
  • Presented by: Adrian Davis, Managing Director (ISC)² EMEA; Joe Pindar, Director of Strategy in CTO Office, Gemalto
  • From:
Your email has been sent.
or close