Hi [[ session.user.profile.firstName ]]

Encryption and Payments: How Recent Breaches are Changing the Approach

We are sure you’ve heard all about the recent breaches in the news. With more than 2 billion records lost or stolen since 2013*, how can you be sure your organization’s current security scheme will stand up against malicious attacks?

Join SafeNet’s webinar, “Encryption and Payments: How Recent Breaches are Changing the Approach to Data Protection in the Payment Ecosystem” to learn how your organization can improve its current strategy. Encryption and tokenization have long been used to secure transactions that occur in the payment ecosystem. By dissecting the payment ecosystem, our experts will uncover a variety of vulnerabilities in the current process and demonstrate how to use encryption and key management more effectively.
Recorded Dec 4 2014 50 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Stephen Helm, Product Marketing - SafeNet; Paul Hampton, Product Manager- SafeNet
Presentation preview: Encryption and Payments: How Recent Breaches are Changing the Approach
  • Channel
  • Channel profile
  • GDPR – The monster under the bed or an opportunity to enhance security? Recorded: Oct 13 2016 62 mins
    James Leaton Gray, The Privacy Practice, Jason Hart, Gemalto, Adrian Davis, (ISC)²
    The new EU regulation of the Privacy world (the GDPR) is frequently portrayed as a scary and formidable piece of legislation that’s going to rock the online & off-line world. This webinar will explore what the implications really are. How much will change from the present regime? How difficult will it be to comply? Also is there an opportunity hidden in the challenge? And where will security and security professionals fit in the new picture?
  • Their Cloud. Your Data. The Global State of Cloud Data Security Recorded: Jul 28 2016 36 mins
    Dr. Larry Ponemon Chairman & Founder The Ponemon Institute, Joe Pindar Director of Strategy, CTO Office Gemalto
    This webinar will discuss the recent findings of a global cloud data security study conducted by the Ponemon Institute on behalf of Gemalto. The study surveyed 3,476 IT and IT security professionals in the United States, United Kingdom, Australia, Germany, France, Japan, Russian Federation, India and Brazil about the governance policies and security practices their organizations have in place to secure data in cloud environments. The findings will reveal adoption trends for IaaS, PaaS and SaaS; the prevalence of Shadow IT; the role of data governance; and data security practices in the cloud, including the usage of encryption and multi-factor authentication. In addition, participants will also learn new data security strategies that can help them realize the benefits of the cloud while protecting sensitive applications and information in cloud.
  • Breach Prevention is Dead - Long Live the Secure Breach Recorded: Jul 12 2016 38 mins
    Jason Hart, CTO, Data Protection - Gemalto
    Today’s changing and sophisticated threat landscape and increasing use of the cloud and mobile devices have rewritten the rules of data security. However, many companies continue to rely on breach prevention as the foundation of their security strategies. If one thing has been learned in recent years it is that data breaches are inevitable, and that is why IT organizations must shift a from mindset that is entirely focused on Breach Prevention to Breach Acceptance and finally to a Secure the Breach approach to data security. This presentation will review why IT professionals need to adopt a new data security mindset if they are to effectively protect sensitive information and users accessing it using a three step process of securing user access, encrypting sensitive data, and secure management of encryption keys.
  • Security or convenience in digital banking? We want it all! Recorded: Jul 7 2016 33 mins
    Frederique Richert, Marketing Manager, Digital Banking - Gemalto, Vincent Truffier-Blanc, Head of Market Research - Gemalto
    How closely are banks listening to their customers about their desire to embrace mobile services? Join Gemalto to understand firsthand what banking customers want and expect when it comes to mobile banking. During this session we’ll share the findings of a recent survey Gemalto conducted with more than 200 digital banking users. From the results we can get an in depth understanding of users’ attitudes to digital banking and their expectations of security, and can help banks fine tune their mobile offerings to address both security and convenience.
  • Next-Generation Security: Don’t Go Soft on Security in SDN Recorded: Jun 22 2016 50 mins
    Stan Mesceda, Sr Product Manager – Gemalto
    Technologies like software defined networking (SDN) provide flexibility and efficiency, but where does security fit in? SDN, like any network can be attacked at each network component. And as bandwidths increase to 100G and beyond, the rate of data transfer and the risks escalate, both on the physical and virtual plane. So what can you do to protect your networks and the data that travels through them?
  • SAML – The Cloud Defender You've Never Heard Of Recorded: Jun 15 2016 35 mins
    Mor Ahuvia, Product Marketing Manager, Authentication - Gemalto
    The cloud provides an easy way for companies to consume and manage colossal amounts of data, but is it secure? SAML—the Cloud Defender You never Heard Of--can make sure it stays out of the hands of hackers and fraudsters.
    What is SAML? How does it work? And how can it protect all your favorite cloud apps, while keeping citizens happy and slashing helpdesk workloads? Join the webinar on Wednesday, June 15th to learn how to extend identities to the cloud with SafeNet Authentication Service’s native identity federation, which lets IT administrators manage a single identity per user, for all cloud, virtual and on-premises applications. SafeNet Authentication Service extends strong authentication to Office 365, Salesforce.com, Dropbox, Google Apps, Amazon Workspaces, Jira, ZenDesk, and 100s of other cloud applications.
  • Security, Compliance and Hardware Security Modules in Cloud Foundry Recorded: Jun 2 2016 43 mins
    Joe Pindar, Director of Strategy, CTO Office, Gemalto; Abby Kearns, VP, Industry Strategy - Cloud Foundry Foundation
    Many companies are making big investments in Cloud Foundry with providers such as Pivotal, IBM Bluemix, and GE Predix. The Cloud Foundry platform-as-a-service makes it easier for companies to build, test, and deploy applications more quickly – allowing them to focus on adding business value. This webinar will give an overview of how developers can build enhanced security into their applications using hardware security modules as the root of trust for their encryption and cryptographic operations.
  • Alternatives to RSA Data Protection Manager for Centralized Key Management Recorded: May 25 2016 27 mins
    Steve Kingston, Product Manager - Gemalto
    RSA’s Data Protection Manager (DPM), BSAFE and tokenization products are quickly approaching EOL/EOPS, presenting RSA customers with an opportunity to reassess their encryption key management architecture and needs. With so many technologies available today that seemingly offer the same capabilities, how do you select the vendor and solution that is right for you?
    Join Stephen Kingston, Product Manager for SafeNet KeySecure, Gemalto, where you will learn how you can:

    • Benefit from proven, successful RSA to Gemalto migration use cases, including Healthcare, PII Protection and Retail PoS applications
    • Easily migrate with the same one-to-one functionality offered by SafeNet KeySecure and SafeNet Data Protection Connectors
    • Avoid encryption silos with a centralized key manager whether on-premises, virtual, or in the cloud
    • Painlessly expand your encryption solution as your future needs grow, be it files, databases, applications, or tokenization
    • Quickly get started with our 5 easy migration steps
  • GDPR Summary: Why encryption and other measures are now a must? Recorded: May 24 2016 62 mins
    Adrian Davis, MD (ISC)² EMEA; Jason Hart, CTO Gemalto; Tom De Cordier, Lawyer and Partner, CMS DeBacker
    Until recently, EU data protection laws mainly focused on data subject consent, proportionality, purpose limitation, transparency, etc. Information security, however, was very often deemed to be an area for the techies, not an area of legal compliance.
    This will change as a result of two recent and major pieces of EU legislation: the General Data Protection Regulation (GDPR) and the Network and Information Security Directive (NIS Directive).
    Under the GDPR and the NIS Directive, businesses and operators of essential services (eg. hospitals; airports; etc.) will have to implement robust information and system security measures. In addition, the new rules contain a new name-and-shame mechanism: businesses and operators will have to inform the relevant authorities of security incidents. And they will have to inform the affected data subjects, unless the affected data were rendered unintelligible (for example by means of encryption).
    Finally, the EU wants the new data protection rules to become a board-level issue and it has therefore decided to make the rules subject to hefty fines:
    •If a business fails to comply with its data security obligations under the GDPR, it may get a fine of up to 10,000,000 EUR or 2 % of its total worldwide annual turnover, whichever is higher.
    •Worse even, if a business is found to be in breach of certain other obligations under the GDPR, the fine may go up to a dazzling 4 % of its total worldwide annual turnover.
    During this webinar, you will learn from Jason Hart, CTO at Gemalto and Tom De Cordier, an expert in data protection and information security law at CMS in Brussels, what the new rules mean in practice and what businesses should do to bring themselves in line with the upcoming requirements.
  • Data, the new oil: Find out why and what it means for your organization Recorded: May 5 2016 62 mins
    Moderator: Adrian Davis, (ISC)² EMEA; Speaker: Jason Hart, IDP CTO, Gemalto
    Every day, we create 2.5 quintillion bytes of data — so much that 90% of the data in the world today has been created in the last two years alone.
    More data in more places is leading to an increasing number of data breaches with attackers intent on trying to monetize your sensitive information.
    Jason Hart, IDP CTO at Gemalto will explain why data is the new oil and how easy it is to get hacked with a live hacking demo.
    In this interactive webinar we will also discuss:
    - Why your data is wanted
    - The new data Protection paradigm
    - Live Hacking demo
    - What’s next and what to do now to remain on the safe side

    Join the webinar to find out what you should know about Data Protection, how Cloud, IOT and big data impact your information security solutions and to how to keep your data safe.
  • The Hybrid-Cloud Cocktail – What Mix is Right For You? Recorded: Apr 21 2016 53 mins
    Falco Christow, Product Manager, Crypto Management - Gemalto
    Organizations today need to employ cloud services in their day-to-day operations, but determining where to start and what works best is not an easy task. To build a hybrid-cloud platform, one must take into consideration a variety of factors including security, location, application requirements, and costs. Join us on April 21st to gain expert advice to help determine what mix of private and public clouds is right for you.
  • Can This Code Be Trusted?: Why Code Signing is Essential for IoT Recorded: Apr 20 2016 40 mins
    Stephen Helm, Sr Product Marketing Manager - Gemalto
    Code signing protects the Devices we use every day; in devices you expect as well as ones you may not have thought about. Code signing is used heavily in transportation; cars, planes, busses, tractors, etc all leverage code signing on various parts to ensure from the manufacturer that they are all up to spec, safe and have a valid origin.
    As the Internet of Things expands so does the need for trust that the code comes from the correct source. From Fridges to Bridges, Satellites to street lights, code signing is everywhere. Unfortunately, our adversaries have started to recognize value of stealing the sensitive cryptographic keys that underpin the code signing process.
    Join Gemalto on this webinar to learn:
    •The value of code signing in IoT
    •How hackers are increasingly trying to steal signing keys
    •Methods for high-assurance code signing
    •And more!
  • Network Security: What Happens When It Goes Dark Recorded: Apr 12 2016 46 mins
    Stan Mesceda, Gemalto
    The breach is going to happen and when it does, you better make sure you are prepared. When your mission-critical applications such as industrial control systems are hacked, it’s not only about data being exposed. By injecting data into the system, the hacker can override the entire system and even shut it down. Join us on April 12th at 10am EST to learn how to prevent this happening through a layered security approach that includes encrypting your data in motion and at rest, and the cryptographic keys that secure it, while ensuring only authorized personnel can access the systems.
  • What you need to know about the EU Safe Harbour Recorded: Mar 24 2016 62 mins
    Adrian Davis, Managing Director (ISC)² EMEA; Joe Pindar, Director of Strategy in CTO Office, Gemalto
    The Safe Harbor agreement allowed American and European countries to share personal data. This agreement is now invalid and a new one has taken its place. This not only impacts the ways companies conduct business and make their IT decisions, but also how they set up their data protection infrastructures.
    This webinar will present:
    • New proposed regulations
    • Business implications
    • A solution to stay compliant and avoid penalties
    Join (ISC)² and Gemalto in this webinar to find out what you should know about the Safe Harbour agreement, how its invalidation impacts you and how to be compliant with the new EU regulation framework.
  • Are You the Keymaster? Encryption, Key Management and Data Control in the Cloud Recorded: Mar 23 2016 55 mins
    David Etue, Vice President, Business Development, Data Protection - Gemalto Garrett Bekker, Sr Analyst - 451 Research
    Join us in collaboration with 451 Research on March 23rd for "Are You the Keymaster? Encryption, Key Management and Data Control in the Cloud".
  • Innovation in Payments: Experts answer 10 burning questions Recorded: Mar 16 2016 44 mins
    Konstantin Rabin (Kontomatik), Paul Hampton (Gemalto), Rashee Pandey (Bankable), Anders La Cour (Saxo Payments)
    Moderator Konstantin Rabin will provide general numbers on the payment industry, will take a look into start-up fundings and some examples of innovative companies in the payments industry.

    Then, he will ask the esteemed panel of experts the following questions:

    1) What are the main drawbacks of the current payment options?
    2) What should be the primary focus of the innovation in payments and why? (speed, cost reduction, transparency or anything else)
    3) Name a greatest innovation in payments happened till date
    4) Importance of cryptocurrencies in the realm of payments
    5) How do millennials change the way payments are going to develop?
    6) What are the main obstacles that prevent innovation in payments? (regulation, lack of funding, absence of common technology or anything else )
    7) What is more important to innovate, online or offline payment systems?
    8) What is the most crucial part of the Payment Service Directive 2? (or perhaps any other local directive)
    9) How large will be a share of businesses using alternative payments in 3 years from now?
    10) How would just a regular payment look in 2026?
  • Insights and Guidelines into Recent Changes in EU Security Banking Regulations Recorded: Mar 15 2016 31 mins
    Peter Gullberg, eBanking CTO - Gemalto
    The evolution of banking systems has led to a surge in digital banking and has drastically changed the security regulatory landscape. Banks are now required to understand and comply with a slew of new regulations which are affecting all areas of banking but specifically security, risk management, how to authenticate users and protect data and services. During this webinar, we’ll review the latest trends in EU regulations, the implications they have for banks and discuss best practices on how banks can effectively and efficiently comply with evolving requirements.
  • Securing Office 365, AWS Workspaces and SFDC with SafeNet Authentication Service Recorded: Mar 9 2016 52 mins
    Mor Ahuvia – Product Marketing Manager, DP Product Marketing – Gemalto
    As the switch to the cloud blurs the boundaries of the traditional enterprise security perimeter, organizations are challenged with maintaining visibility into access events and enforcing consistent access controls across their data estate, which spans on-premises, virtualized and cloud-based applications. Applying uniform authentication policies on different types of applications may often require diverse integration methods, such as the RADIUS and SAML 2.0 industry standards, as well as custom agents or APIs. In this webinar, you will learn how Office 365, AWS Workspaces and SFDC—as well as other SaaS applications—can be easily secured using SafeNet Authentication Service.
  • Building the Trusted Smart Grid: Threats, Challenges, and Compliance Recorded: Feb 16 2016 55 mins
    Stephen Helm, Product Manager - Gemalto
    Growing concern over climate change, increasing utility prices and the availability of sustainable energy like solar are driving increased demand for conservation, pricing transparency and cost savings. Smart energy solutions provide real time visibility into consumption and billing data helping consumers to conserve resources, while energy and utility companies are better able to balance production to meet actual demand reducing brown outs and other potential issues. At a time when energy utilities play an increasingly important part of our everyday lives, smart grid technologies introduce new security challenges that must be addressed.
    In this webinar we will discuss:
    •The threat landscape
    •Addressing security challenges in critical infrastructure with cryptography and strong authentication
    •Compliance with NERC CIP Version 5
    •The road ahead
  • Takeaways for 2016 from Gemalto’s Survey on Authentication and IAM Trends Recorded: Jan 20 2016 48 mins
    Danna Bethlehem. Product Marketing Director, Authentication DP Product Marketing - Gemalto
    Gemalto surveyed 900 IT decision makers from around the globe on the subject of securing user mobility. Our findings reveal that although most organizations (97%) recognize the importance of mobility in their work practices, 92% still restrict access to resources from mobile devices. Not only were mobile access challenges uncovered, but with 20% of support tickets resulting from lost or forgotten passwords, identity management hurdles were uncovered, as well. Based on the Gemalto 2015 Authentication and Identity Management Index survey results, this webinar covers obstacles encountered by IT leaders in their quest for greater mobility, and four takeaways on how they are overcome.
SafeNet APAC Data Security Solutions Webinars
SafeNet APAC Data Security Solutions webinars designed for enterprise and users, distributors and resellers.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Encryption and Payments: How Recent Breaches are Changing the Approach
  • Live at: Dec 4 2014 2:00 am
  • Presented by: Stephen Helm, Product Marketing - SafeNet; Paul Hampton, Product Manager- SafeNet
  • From:
Your email has been sent.
or close