An increasingly mobile workforce, the move to the cloud, and the proliferation of mobile devices used by employees are blurring the boundaries of the traditional network security perimeter. Organizations are having difficulty affording, implementing and managing consistent, unified access policies to corporate resources.
Join your fellow professionals for insights into the changing market forces and the move to SaaS, and then understand how Authentication as a Service can enable companies to pursue a consistent authentication policy across the organization with speed, ease and a significantly reduced spend.
RecordedMay 10 201246 mins
Your place is confirmed, we'll send you email reminders
Danna Bethlehem, Director of Product Marketing, Thales
The explosion of cloud applications and identities have set IT decision makers on a quest for reconciling the benefits of the cloud with the security and compliance requirements needs of the enterprise. Much like the user experience offered by mainstream consumer applications, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud applications now a crucial part of day-to-day business operations, the 2019 Thales Access Management Index found that almost half (49%) of IT security professionals believe cloud applications make them a target for cyber-attacks. Cloud applications are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices (54%) and web portals (50%).
This webinar will review the findings of the Thales global report and how organizations around the world are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn:
- What are the major attack vectors for cyber attacks
- Which access management technologies organizations are deploying to secure access to the cloud
- Which access management technologies IT professionals deem the most effective in securing access to the cloud
- The criteria IT professionals use to determine access policies for users
- Who are the internal stakeholders involved in Access Management deployments
Gary Marsden, Senior Director of Data Protection Services at Thales
Although most major cloud providers now offer native cloud Hardware Security Module (HSM) services, how do you choose the right cloud HSM? According to 451 Research, 69% of enterprises now have a hybrid, multi-cloud strategy. With hybrid, multi-cloud environments likely to be the norm as we move into 2020, managing multiple cloud HSMs will increase complexity, cost of ownership and operational overhead.
Join us as we discuss the complexities of managing native cloud HSMs separately, leading to islands of security with different features and rules for each. We’ll show you how the smarter and simpler route is to use a cloud HSM provider that can centrally manage and secure your entire cryptographic operations across all cloud environments.
This informative webinar will cover:
• A current view of the cloud’s impact on IT business models
• Why HSMs are critical to data security on premise or in the cloud
• How creating centralized key management and security strategy will make your cloud life a whole lot easier
• Building blocks for an HSM strategy for security across all cloud and hybrid IT environments
Gary Marsden, Senior Director of Data Protection Services at Thales and Mark Thompson, VP of Product Management at Keyfactor
When you sign a piece of code, you make a statement that it comes from your trusted brand and that you stand behind it. But what happens when that trust is broken? Recent attacks, such as the ASUS Live Update hack, underscore the importance of managing reputational risk.
As attackers become increasingly skilled in the art of signing and spreading malware, all business leaders must invest in the trust associated with their digital brand – and expect the same of their vendors. The challenge is how to secure code signing keys and certificates in today’s distributed and fast-paced DevOps environments.
Join our experts as they discuss:
- Code Signing: What is it? Why does it matter?
- Recent Attacks: The Risks and Challenges of Code Signing
- How to Secure Code Signing at the Speed of DevOps
- How Thales and Keyfactor Make It Possible
Andy Kicklighter, Director of Product Marketing, Thales and Dale Wilson, Business Development Director at Kite Distribution
Digital transformation and the move to the cloud are fundamentally changing business operations throughout Europe – and are putting organizations crown jewels, their sensitive data, at risk. Traditional market leaders are driven to digital transformation by the opportunity for greater efficiency, flexibility and new business models – while also fending off rivals entering their markets with an “all digital” focus. In this session we’ll address the state of data security in European enterprises today, the changing landscape of risks to data due to digital transformation, and IT security pros priorities for data security today.
Based on the results from the 2019 Thales Data Threat Report – European Edition (now in its sixth year), expect to learn about:
- How the adoption of digital transformation technologies, and especially cloud, is putting sensitive data at greater risk
- The data security challenges facing European enterprises today
- Critical analyst recommendations for how organizations can be most effective when selecting the right tools to protect their sensitive data
Gorav Arora, Director, Office of CTO, at Thales and Tom Klein, VP of IoT Solutions at Keyfactor
The proliferation of IoT and cloud computing are transforming our lives daily – from watches alerting on severe heart conditions to voice-enabled assistants automating daily tasks. Builders and operators of such systems must tackle the myriad of challenges across the complex IT stack – including security. Securing every digital touchpoint is crucial to delivering safe and connected services between devices, networks, machines, and users.
Join us to hear about:
• The unique challenges of IoT Security
• Current and proposed cybersecurity regulations across various industries
• Blueprint of IoT Security that can be used in any IoT system
• A real-life use case on how leading healthcare provider successfully secured devices within the IoT and Cloud
Gorav Arora, Director, Office of CTO, at Gemalto and Ted Shorter, CTO at Keyfactor
Increased cloud adoption plus the growth of IoT-enabled devices are accelerating the transformation of how healthcare is delivered. While improving patient services these new technologies add potential vulnerabilities from the increasingly porous perimeter that IT must secure. Securing every digital touchpoint is crucial to delivering safe and connected healthcare services from medical device OEMs, HDOs, EHRs and patients across the networks, data and devices they rely on.
In this webinar, you will learn more about:
• A real-life use case on how a leading provider partnered to successfully secure devices with IoT and the Cloud
• Current and proposed cyber security regulations for healthcare
• How effective key management is a vital component to ensure device security throughout their lifecycle
• Code signing with Cloud or on-premise HSMs prevents software update tampering
• Protecting data in use, at rest and in motion from the device to the cloud and back with advanced encryption
• How MFA ensures the right people have access to sensitive data stored on-premises or in the cloud
As mid-sized and large organizations move to cloud based delivery for software, infrastructure and storage, hybrid environments are the de-facto reality. Perimeter security schemes no longer meet the security challenges of distributed software and application delivery, leading CISOs to try and mesh disparate solutions, or worse knowingly compromise on protection. Join Gemalto to hear best practices for applying consistent and effective access security and strong authentication to both on-prem and cloud apps.
New data tells us that companies are making progress when it comes to securing the Internet of Things and the data it produces, but there is still a long way to go in order to secure the projected 20 billion connected devices by 2023. In order to assess the current state of affairs, Gemalto recently surveyed 950 IT and business decision makers around the world with awareness of IoT in their organization. Some of the results were encouraging, while others were less so.
According to the global survey, security is clearly an emerging priority. Companies are now devoting 13 percent of their IoT budgets to security, up from 11 percent last year. Ninety percent said they believe security is a major consideration for their customers and 97 percent believe that a strong approach to IoT security is a key competitive differentiator.
In addition to these data findings from the global study, this webinar will discuss:
•The top technologies companies are utilizing to secure IoT infrastructure and data
•Which countries are most advanced when it comes to the security of IoT
•What companies think about the role of government regulation on IoT security
•Which companies in the IoT ecosystem are most responsible for the security of data
•Are companies adopting Security by Design when it comes to IoT products and services
•What role will technologies like Blockchain play in IoT Security
Following the webinar, attendees will receive a free copy of the global IoT Security report as well as other research and white papers on IoT security.
Security and risk management professionals face ever-increasing needs to encrypt various types of sensitive data stored on-premises, in private and public clouds and in hybrid environments in order to protect their organizations in the event of a data breach. Compliance mandates, internal security audits, data residency issues and threats of hackers are driving the requirements for enterprises to develop a centralized enterprise-wide encryption strategy to prioritize sensitive data protection. In addition, regulations, such as the EU General Data Protection Regulation (GDPR), have dramatically increased pressure on security professional leaders to review and revamp their approach to encryption key management.
To meet these needs, security professionals are using a growing number of encryption tools to protect data within a variety of data storage environments. These may be located within local and external IT environments and systems, such as file stores, databases, big data platforms or various clouds. However, encrypting data in each of these environment results in the creation of islands of encryption and diverse key management platforms which increases complexity, costs and risk of data loss.
In this webinar, you will:
• Gain insight into trends that are driving the digital cloud transformation and how key management plays a role
• Understand the importance of developing a centralized approach to encryption key management
• Examine where and when you should encrypt your organization’s data and typical key management use cases
• Learn how to implement an enterprise-wide key management operational model that can reduce cost of ownership and minimize overall risks
Garrett Bekker, Senior Security Analyst at 451 Research and Stephane Vinsot, Senior Director, IAM Product Strategy at Gemalto
Up until now, PKI hardware’s limitations meant companies could not adopt cloud and mobility projects without having to completely ‘rip and replace’ their current security framework. As a result, companies have been using smart cards and tokens to allow their employees to authenticate themselves while accessing corporate resources, but this was limited to activity within the enterprise perimeter. In addition, companies that use PKI credentials for email encryption and digital signing have also been limited to on-premises environments.
In this webinar, you will learn about how organizations can deploy SafeNet Trusted Access and benefit from single sign on (SSO) and high assurance PKI-based authentication, making it easier and more secure to access cloud and web-based apps and resources from wherever and on any device. Using the solution, employees will no longer have to re-authenticate each time they access a resource with their smart card, enabling more efficiency across the company – while allowing enterprises to maintain high assurance security when needed.
In this webinar you will also learn how to build on current PKI investments, and embrace digital transformation without compromising on security, including:
•Enabling cloud transformation: Organizations can extend PKI credentials to access policies, allowing CISOs to maintain security in the cloud by triggering the use of step up PKI-based authentication to cloud and web-based apps when needed
•Facilitating mobility: Employees can access enterprise applications within virtual environments with their PKI credentials. This means that employees and consultants will be able to access corporate apps via a VDI, from any device and carry out certificate-based transactions, even if they can’t use their smart cards
Gary Marsden, Senior Director of Data Protection Services at Gemalto
While the technological and commercial advances of the cloud have created significant opportunities for enterprises, service providers and IT vendors alike, this cloud-driven transformation has also undone conventional approaches to data security and created compliance challenges when it comes to data control and ownership.
These changes have unwittingly drawn us into a realm of increasing threat vectors, poor security practices and bad actors. From reducing cost of ownership to empowering IT decision making across the value chain, it is safe to say that the cloud means that life will never be the same for anyone.
During this webinar we will:
- Look at the challenges facing today's IT and security teams;
- See how this wave of disruption can be overcome using ever advancing automation, processing and intelligence technologies that can be used to build and deliver security an increasingly diverse IT landscape; and
- Look at how security will need to evolve in the wake of digital transformation.
Ferry de Koning, Director Business Development, Gemalto and Gary Marsden, Senior Director, Encryption Products
Fintech startup companies are disrupting the financial services industry, raising more than $120 billion over the last three years. Although these new entrants are changing how money and markets operate, they must still do business within the realities of regulations like GDPR and Australia's Notifiable Data Breaches scheme that the rest of the financial industry must operate. This means that data security and trust are just as important to Fintech companies as it is to traditional banks.
Fintech companies are unique because of their agility, lean operations and that most are built using the cloud and digital technologies that banks are just now adopting. While this makes Fintech companies more nimble and they can enter new markets faster, it also presents more complexities for how Fintech companies need to manage security and meet compliance mandates.
In this webinar you will learn about:
•Fintech compliance and regulation from a data protection perspective.
•How to build a secure the breach strategy using a case study from the physical world
•Understand key elements for building cloud-based data security strategy that fits the needs of Fintech companies
Stan Mesceda, Senior Product Manager at Gemalto and Julian Fay, CTO at Senetas
Today enterprises and service providers are increasingly using network functions virtualization (NFV) and software-defined networking (SDN) technologies to design, deploy and manage their networks and cloud-based services. These software-based technologies give organizations cost and operational benefits because they move network functions from dedicated hardware appliances to virtual servers. These same technologies can be now be applied to how encryption is deployed and managed to protect sensitive data and communications the flow across SD-WANs.
In this webinar you will learn about:
•What is the best network fit for virtualized encryption
•How to implement a virtual network encryption appliance in software-defined network
•What are the cost, operational and performance benefits of virtual encryption
•What it means to be transport layer independent and how you can protect network traffic simultaneously across Layers 2, 3 and 4
Gemalto SafeNet Trusted Access: non solo strong authentication , ma un'unica piattaforma intuitiva per la gestione degli accessi
Con un numero crescente di applicazioni cloud in uso e sempre più utenti che lavorano da remoto, la necessità di un'autenticazione forte e gestione degli accessi è in aumento. I responsabili IT sono ora in una fase cruciale dove devono trovare l'approccio migliore per proteggere i propri accessi al cloud e non solo. Le tendenze mostrano che il mercato italiano si sta approcciando alle applicazioni basate nel cloud e l'adozione inizierà presto, per cui è bene farsi trovare preparati al momento giusto.
Questo webinar ha l'obiettivo di comprendere meglio la gestione degli accessi e di introdurre la nostra nuova soluzione SafeNet Trusted Access in risposta a questa nuova sfida. Il nostro Sales Engineer Simone Mola introdurrà questo nuovo servizio che combina la strong authentication, il single sign-on e la capacità di gestire centralmente l'accesso a numerose applicazioni cloud con policy di accesso granulari. Inoltre, al fine di fornire un'idea efficace di questa soluzione, Simone Mola si concentrerà sulla presentazione di alcuni casi d’uso e terminerà il webinar con una demo live.
La necessità per le aziende di avere una soluzione che vada oltre la strong authentication e al momento stesso facilmente utilizzabile, ha dato a Gemalto la fantastica idea di creare una piattaforma unica e semplice per gestire tutti gli accessi in un SOLO strumento. Presentando tutte le caratteristiche e le funzioni della soluzione, ti consentiremo di avere una visione completa di come gestire tutte le tue identità con l'approccio più semplice e intuitivo.
Durante il webinar i partecipanti avranno l’occasione di approfondire argomenti quali:
• Sfide IAM in un ambiente IT in evoluzione e in un mondo cloud
• Funzionalità di SafeNet Trusted Access e il valore aggiunto della nostra soluzione cloud
• Come migrare senza problemi dalla soluzione SAS alla soluzione STA
Gary Marsden, Senior Director of Data Protection Solutions at Gemalto and William Fellows, Research VP 451 Research
Digital transformation is a critical part of an enterprise business strategy. However, for many organizations, having more digital assets introduces major headaches due to the complexity of technologies, the lack of available and affordable skills and the ever-changing security threat landscape. The ability to use cloud based solutions to service digital strategies is helping reduce costs but is also increasing risks, isolating data and reducing controls.
Many MSPs have recognized this as an opportunity and are building business plans and service strategies to help their customers. Being the one-stop shop for applications, cloud services and related security aspects is a path that is actively being trodden by MSP’s, MSSP’s and traditional resellers alike. According to 451 Research, it is about a “sell with” approach by addressing business requirements with security “built-in”. In this joint webinar, our guest William Fellows, 451 Research analyst will provide new research results this related data points and discuss how the cloud is creating opportunities as well as challenges. The interactive Q&A style webinar will cover:
• A current view of the cloud’s impact on digital transformation
• Opportunities for MSPs to expand service portfolios and generate new revenue streams
• What a true “sell with” partnership looks like
• Technology enabling this new sales and marketing strategy for MSPs
William Fellows is a co-founder of The 451 Group. As VP of Research, he is responsible for the Cloud Transformation Channel at 451 Research.
Gary Marsden: Senior Director of Partnerships at Gemalto
2018 has started off as an eventful year with data breaches at Saks Fifth Avenue, Lord & Taylor and Under Armour’s MyFitnessPal app. And it will continue to be a catalyst year for data security with the 25th of May deadline for the European Unions’ General Data Protection Regulation, which regards “privacy as a fundamental human right and to protect it as such.” Data exposed or breached is not only a headache for security teams, but also impacts brand reputation, customer confidence and stock prices.
Gemalto’s 2017 Breach Level Index found 2.6 billion records where compromised in 2017, a 88% increase from 2016. In this webinar our expert, Jason Hart, will walk attendees through the most shocking 2017 stats, new data breach tactics and how companies can manage risk by mapping out where your data resides. Join us to learn more about:
-Internal threats and misconfigured cloud databases
-Growing security threats like data integrity attacks
-Innovative technology that is solving some of these issues
-What we have in store for 2018
John Ray, Product Management and Danna Bethlehem, Product Marketing Gemalto and Josh Chambers, Product Management at F5
Securing and monitoring your network and cloud environments has changed over the past few years and compliance and government regulations will add to it. Network traffic monitoring tools have been presented as a solution to meeting compliance and performance on a network. But monitoring alone is not enough. In terms of security, companies need to holistically secure their network, cloud and data, no matter where their users are accessing from.
This joint webinar between F5 and Gemalto will help attendees prepare for the next-generation of secure network access as more data resides in more places with more people accessing it. It will also walk them through the integration between F5 and Gemalto and what options this partnership offers.
In this webinar, you will earn how to:
•Reduce the risk of breaches by ensuring that only authorized users are accessing network, using the F5 environment as an example
•Protect & encrypt your customer data
•Manage secure cloud access
•Comply with regulations
Paul Lockley, VP of Partnerships at Device Authority and Gorav Arora, CTO Office Director of Products
One of the biggest obstacles to IoT adoption is security. Our recent survey found 65% of consumers are concerned about hackers controlling IoT devices and 60% worry about their data being stolen. Recent widespread attacks using IoT device vulnerabilities has also highlighted how interconnected the system is and one weak link creates a ripple effect Securing the identities of both humans and machines, access to the devices and protecting the integrity of the data and device opens the door to more opportunities. For example, the ability to manage blockchain identities and data security policies across any IoT deployment.
In our joint webinar with Device Authority, our experts will outline how security by design methodology helps future proof IoT deployments. They will have an open conversation and a question and answer session on topics that customers are dealing with, related news topics, compliance and government regulations, business opportunities and technologies that are changing the game. Join us to hear more about how using the security by design approach can help:
•Identify and manage risks and challenges in the short and long term
•Prepare for legislation and compliance
•Create new opportunities for a secure blockchain-based IoT
•Leverage new technology like machine learning and analytics
The security challenges of companies large and small is changing. This is especially pronounced in the access management space as IT admins and CISOs are faced with more identities and devices across a growing number of cloud applications. In our recent survey, we found 72% of respondents found cloud access management tools as a solution to reducing the threat of large scale data breaches, while 62% highlighted the tools ability to help simplify the login process for their enterprise users.
In an organization, individuals dealing with security have different goals and objectives. Aligning them can be a challenge. We will look at the priorities of the user, IT teams and CISOs – where they are linked and where they diverge. To build effective risk-based access policies, you need to start with a living IAM strategy that takes into account geolocation, threats, unusual behavior and scenario based data. Using policy-based access management, internally and externally for example in the cloud, is helping enables aligning the different security teams in an organization and automate and simplify the log-in process for users as well. During the webinar attendees will walk away with an understanding of:
-Analyzing personas within your organizations security team to improve IAM solution implementations
-Things to consider when building your access management strategy
-Building risk-based access management policies across multiple applications or cloud environments
With a growing number of cloud apps in use, more employees working remotely increasing the need for stronger authentication. This is driving IT decision makers to find ways to ‘consumerize’ the login process. To get a better understanding of access management challenges and views on the industry Gemalto surveyed 1,000 IT decision makers to compile the 2018 Identity and Access Management Index. During this webinar, we will share some of the fascinating key findings that will shape cybersecurity and the way enterprise IT professionals evaluate and implement access management technology. Join us to learn more about:
•2018 key findings and trends
•How consumerization of IAM can be achieve in the enterprise security space
•How organizations can maintain security while lowering barriers to authentication
•Evolution of IAM Trends: A look at the historical numbers compared to the new findings
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.
We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.