SlideShare a Scribd company logo
1 of 17
www.thalesesecurity.com
KEYNOTE: When Two Become One:
A New leader in Data Protection
By Rami Dawoodi (Regional Sales Manager, Thales)
2 Thales © 2019 All rights reserved
…Since 2nd April 2019 we’re part of the Thales group
20 December 2019Introducing Gemalto2
3 Thales © 2019 All rights reserved
Bringing Digital Identity & Security expertise to Thales
Introducing Gemalto3
From
the bottom
of the oceans to
the depths
of space &
cyberspace
Space
Ground
Transportation
Aerospace
Defence &
Security
Digital Identity
& Security
4 Thales © 2019 All rights reserved
Combining existing digital assets in a dedicated global business unit
Digital Identity & Security
20 December 2019Introducing Gemalto4
5 Thales © 2019 All rights reserved
We focus on six main markets – but serve many others
20 December 2019Introducing Gemalto5
BANKING &
PAYMENT
ENTERPRISE
SECURITY
GOVERNMENT
MOBILE
IoT
SOFTWARE
MONETIZATION
6 Thales © 2019 All rights reserved
New Cloud Protection & Licensing (CPL) Organization
Thales
Business
Groups
New Digital Identity & Security
Global Business Unit
New Cloud Protection & Licensing
Business Line
7 Thales © 2019 All rights reserved
Giving Thales a new profile
20 December 2019Introducing Gemalto7
Does not include externally
financed R&D.
80,000employees
*Based on Thales and Gemalto reported 2017 consolidated income statements.
68Countries
global presence
€1bn+self-funded
R&D* 2017
Our team Around the world
Innovation
€19bn
A balanced
revenue structure
Revenue*
around
60%
Civil
40%
Defence
8 Thales © 2019 All rights reserved
Bringing trust to the world’s digital transformation
Cloud Protection & Licensing
Next generation digital security
9 Thales © 2019 All rights reserved
Enterprises and their
customers must be able to
trust their digitalinteractions
More
individual digital
interactions in 2025 than
in 201050x
Data volumes are booming, exchanges ever more valuable.
Source: IDC’s Data Age 2025 study, April 2017
The big picture
10 Thales © 2019 All rights reserved
…and enforced
Respect of privacy is valued
Sharing? Yes, but not everything
People want to share information at scale while respecting privacy
Personal and corporate data should
be kept private and only shared under
clear rules.
Privacy and the right to be forgotten will be
top of mind for consumers when selecting a
merchant or service provider.
Policy makers and regulators are
increasingly vigilant about private
data management.
Expectations are rising
11 Thales © 2019 All rights reserved
Breaches are growing year-on-year across all sectors
DATARECORDS LOST OR STOLEN SINCE2013
6 million per day
on average
Technology
32%
Government
10%
Retail
9%
Financial
4%
Entertainment
3%
Healthcare
2%
Education
1%
Other
39%
Source: breachlevelindex, Q1 2018
Every type of organization is exposed
Traditional security is no longer sufficient
12 Thales © 2019 All rights reserved
IDENTITY THEFT UNENCRYPTED DATA
Main cause of attacks Main cause of damages
69%
of breach
incidents
came from
identity theft
95%
of breaches involved
unencrypted data
Organizations face two types of cyber threats
Source: breachlevelindex, Q1 2018
13 Thales © 2019 All rights reserved
A unique combination of digital identity and data protection
Digital
Identity
Data
Protection
Powering
Next Generation Digital Security
How we solve the challenge
14 Thales © 2019 All rights reserved
SIGN
UP
LOG
IN
USE
LEAVE
Data
encryption
Authentication
Identity
verification
Cryptographic
accountdeletion
Protecting the entire digital service cycle
15 Thales © 2019 All rights reserved
Thales CPL Comprehensive Data Security Products and
Solutions
Multicloud Key
Management
PKI
Big Data
Security
Application
Crypto
Payment
Security
WAN
Encryption
Hardware
Security
Modules
(HSM)
Transparent
Encryption
Access
Management
Key
Management
Cloud
Security
Data
Security
USE CASES
PRODUCTS
16 Thales © 2019 All rights reserved
For the world’s governments & biggest brands
20 December 201916Introducing Gemalto
200+
GOVERNMENT
PROGRAMS
30,000+
ENTERPRISES
3,000+FINANCIAL
INSTITUTIONS
450
MOBILE
OPERATORS
17 Thales © 2019 All rights reserved
ROME1 Region-CPL :
17
Tier 1 (77%)
Pakistan
Tier 2 (18 %)Tier 3 ( 5%)
Libya
Palestine
Afghanistan

More Related Content

What's hot

NIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric SecurityNIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric SecuritySeclore
 
State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pa...
State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pa...State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pa...
State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pa...TRPC Pte Ltd
 
Legal issues of the Internet of Things
Legal issues of the Internet of ThingsLegal issues of the Internet of Things
Legal issues of the Internet of ThingsGiulio Coraggio
 
IBM Security - Successful digital transformation
IBM Security - Successful digital transformationIBM Security - Successful digital transformation
IBM Security - Successful digital transformationSebastien JARDIN
 
TrendMicro DeepSecurity CASE - Testimonal
TrendMicro DeepSecurity CASE - TestimonalTrendMicro DeepSecurity CASE - Testimonal
TrendMicro DeepSecurity CASE - TestimonalEduardo Alves
 
Hces invite rotterdam
Hces invite rotterdamHces invite rotterdam
Hces invite rotterdamCor Ranzijn
 
BCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationBCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationGareth Niblett
 
Wilson Consulting Group: A Cybersecurity Company
Wilson Consulting Group: A Cybersecurity CompanyWilson Consulting Group: A Cybersecurity Company
Wilson Consulting Group: A Cybersecurity Companywilsonconsulting1
 
Find the best cyebersecurity services
Find the best cyebersecurity servicesFind the best cyebersecurity services
Find the best cyebersecurity serviceswilsonconsulting1
 
Arc Sight Info Documents 10 21 2009
Arc Sight Info Documents 10 21 2009Arc Sight Info Documents 10 21 2009
Arc Sight Info Documents 10 21 2009mattdriscoll
 
Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020Eyal Estrin
 
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response ConferenceLindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response ConferenceStarttech Ventures
 
Intellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industryIntellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industryGiulio Coraggio
 
Blockchain 101 for Financial Services
Blockchain 101 for Financial ServicesBlockchain 101 for Financial Services
Blockchain 101 for Financial ServicesAppian
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report Netskope
 
Security analytics @ 5 g Speed - Ecomotion 2019
Security analytics @ 5 g Speed - Ecomotion 2019Security analytics @ 5 g Speed - Ecomotion 2019
Security analytics @ 5 g Speed - Ecomotion 2019HARMAN Connected Services
 
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceDavid Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceStarttech Ventures
 
Cade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf onlineCade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf onlineCade Zvavanjanja
 

What's hot (20)

NIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric SecurityNIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric Security
 
State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pa...
State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pa...State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pa...
State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pa...
 
Legal issues of the Internet of Things
Legal issues of the Internet of ThingsLegal issues of the Internet of Things
Legal issues of the Internet of Things
 
IBM Security - Successful digital transformation
IBM Security - Successful digital transformationIBM Security - Successful digital transformation
IBM Security - Successful digital transformation
 
TrendMicro DeepSecurity CASE - Testimonal
TrendMicro DeepSecurity CASE - TestimonalTrendMicro DeepSecurity CASE - Testimonal
TrendMicro DeepSecurity CASE - Testimonal
 
Cyber risk
Cyber riskCyber risk
Cyber risk
 
Hces invite rotterdam
Hces invite rotterdamHces invite rotterdam
Hces invite rotterdam
 
BCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationBCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber Innovation
 
Wilson Consulting Group: A Cybersecurity Company
Wilson Consulting Group: A Cybersecurity CompanyWilson Consulting Group: A Cybersecurity Company
Wilson Consulting Group: A Cybersecurity Company
 
Find the best cyebersecurity services
Find the best cyebersecurity servicesFind the best cyebersecurity services
Find the best cyebersecurity services
 
Cyber Security For Businesses
Cyber Security For BusinessesCyber Security For Businesses
Cyber Security For Businesses
 
Arc Sight Info Documents 10 21 2009
Arc Sight Info Documents 10 21 2009Arc Sight Info Documents 10 21 2009
Arc Sight Info Documents 10 21 2009
 
Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020
 
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response ConferenceLindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
 
Intellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industryIntellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industry
 
Blockchain 101 for Financial Services
Blockchain 101 for Financial ServicesBlockchain 101 for Financial Services
Blockchain 101 for Financial Services
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report
 
Security analytics @ 5 g Speed - Ecomotion 2019
Security analytics @ 5 g Speed - Ecomotion 2019Security analytics @ 5 g Speed - Ecomotion 2019
Security analytics @ 5 g Speed - Ecomotion 2019
 
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceDavid Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
 
Cade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf onlineCade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf online
 

Similar to When Two Become One: A New Leader in Data Protection

Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions OverviewJohn D. Haden
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroPrime Infoserv
 
At&t cybersecurity introduction with alien vault
At&t cybersecurity introduction with alien vaultAt&t cybersecurity introduction with alien vault
At&t cybersecurity introduction with alien vaultMohamed Abdelhakim
 
Dutch Cyber Security Investment Landscape 2020
Dutch Cyber Security Investment Landscape 2020Dutch Cyber Security Investment Landscape 2020
Dutch Cyber Security Investment Landscape 2020Robbert Kloosterman
 
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020Bernard Marr
 
The Top 4 Telecom Trends In 2023
The Top 4 Telecom Trends In 2023The Top 4 Telecom Trends In 2023
The Top 4 Telecom Trends In 2023Bernard Marr
 
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...apidays
 
Data Security Trends - Q4 2018 M&A Report
Data Security Trends - Q4 2018 M&A ReportData Security Trends - Q4 2018 M&A Report
Data Security Trends - Q4 2018 M&A ReportEvelyn Yannan Chen
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_servicesG. Subramanian
 
IT 833 INFORMATION GOVERNANCEDr. Omar MohamedChapter 1.docx
IT 833 INFORMATION GOVERNANCEDr. Omar MohamedChapter 1.docxIT 833 INFORMATION GOVERNANCEDr. Omar MohamedChapter 1.docx
IT 833 INFORMATION GOVERNANCEDr. Omar MohamedChapter 1.docxvrickens
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudAmazon Web Services
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 
The ticking time bomb of shadow IT - and what to do about it
The ticking time bomb of shadow IT - and what to do about itThe ticking time bomb of shadow IT - and what to do about it
The ticking time bomb of shadow IT - and what to do about itRasmus Holst
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM
 
Establishment of Threat Intel into Incident Response
Establishment of Threat Intel into Incident ResponseEstablishment of Threat Intel into Incident Response
Establishment of Threat Intel into Incident ResponseAPNIC
 
NTT DATA FinTech meetup - AI and Experience design
NTT DATA FinTech meetup - AI and Experience designNTT DATA FinTech meetup - AI and Experience design
NTT DATA FinTech meetup - AI and Experience designTom Winstanley
 
Top insurance industry trends 2020
Top insurance industry trends 2020Top insurance industry trends 2020
Top insurance industry trends 2020KristineSheppard
 
The Cloud Landscape of Thailand: Policies, Challenges and Opportunities
The Cloud Landscape of Thailand: Policies, Challenges and OpportunitiesThe Cloud Landscape of Thailand: Policies, Challenges and Opportunities
The Cloud Landscape of Thailand: Policies, Challenges and OpportunitiesSoftware Park Thailand
 
5 Important Artificial Intelligence Predictions (For 2019) Everyone Should Read
5 Important Artificial Intelligence Predictions (For 2019) Everyone Should Read5 Important Artificial Intelligence Predictions (For 2019) Everyone Should Read
5 Important Artificial Intelligence Predictions (For 2019) Everyone Should ReadBernard Marr
 

Similar to When Two Become One: A New Leader in Data Protection (20)

Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
At&t cybersecurity introduction with alien vault
At&t cybersecurity introduction with alien vaultAt&t cybersecurity introduction with alien vault
At&t cybersecurity introduction with alien vault
 
Dutch Cyber Security Investment Landscape 2020
Dutch Cyber Security Investment Landscape 2020Dutch Cyber Security Investment Landscape 2020
Dutch Cyber Security Investment Landscape 2020
 
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
 
The Top 4 Telecom Trends In 2023
The Top 4 Telecom Trends In 2023The Top 4 Telecom Trends In 2023
The Top 4 Telecom Trends In 2023
 
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
 
Data Security Trends - Q4 2018 M&A Report
Data Security Trends - Q4 2018 M&A ReportData Security Trends - Q4 2018 M&A Report
Data Security Trends - Q4 2018 M&A Report
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
IT 833 INFORMATION GOVERNANCEDr. Omar MohamedChapter 1.docx
IT 833 INFORMATION GOVERNANCEDr. Omar MohamedChapter 1.docxIT 833 INFORMATION GOVERNANCEDr. Omar MohamedChapter 1.docx
IT 833 INFORMATION GOVERNANCEDr. Omar MohamedChapter 1.docx
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
The ticking time bomb of shadow IT - and what to do about it
The ticking time bomb of shadow IT - and what to do about itThe ticking time bomb of shadow IT - and what to do about it
The ticking time bomb of shadow IT - and what to do about it
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary Miglicco
 
Establishment of Threat Intel into Incident Response
Establishment of Threat Intel into Incident ResponseEstablishment of Threat Intel into Incident Response
Establishment of Threat Intel into Incident Response
 
NTT DATA FinTech meetup - AI and Experience design
NTT DATA FinTech meetup - AI and Experience designNTT DATA FinTech meetup - AI and Experience design
NTT DATA FinTech meetup - AI and Experience design
 
Top insurance industry trends 2020
Top insurance industry trends 2020Top insurance industry trends 2020
Top insurance industry trends 2020
 
The Cloud Landscape of Thailand: Policies, Challenges and Opportunities
The Cloud Landscape of Thailand: Policies, Challenges and OpportunitiesThe Cloud Landscape of Thailand: Policies, Challenges and Opportunities
The Cloud Landscape of Thailand: Policies, Challenges and Opportunities
 
5 Important Artificial Intelligence Predictions (For 2019) Everyone Should Read
5 Important Artificial Intelligence Predictions (For 2019) Everyone Should Read5 Important Artificial Intelligence Predictions (For 2019) Everyone Should Read
5 Important Artificial Intelligence Predictions (For 2019) Everyone Should Read
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

When Two Become One: A New Leader in Data Protection

  • 1. www.thalesesecurity.com KEYNOTE: When Two Become One: A New leader in Data Protection By Rami Dawoodi (Regional Sales Manager, Thales)
  • 2. 2 Thales © 2019 All rights reserved …Since 2nd April 2019 we’re part of the Thales group 20 December 2019Introducing Gemalto2
  • 3. 3 Thales © 2019 All rights reserved Bringing Digital Identity & Security expertise to Thales Introducing Gemalto3 From the bottom of the oceans to the depths of space & cyberspace Space Ground Transportation Aerospace Defence & Security Digital Identity & Security
  • 4. 4 Thales © 2019 All rights reserved Combining existing digital assets in a dedicated global business unit Digital Identity & Security 20 December 2019Introducing Gemalto4
  • 5. 5 Thales © 2019 All rights reserved We focus on six main markets – but serve many others 20 December 2019Introducing Gemalto5 BANKING & PAYMENT ENTERPRISE SECURITY GOVERNMENT MOBILE IoT SOFTWARE MONETIZATION
  • 6. 6 Thales © 2019 All rights reserved New Cloud Protection & Licensing (CPL) Organization Thales Business Groups New Digital Identity & Security Global Business Unit New Cloud Protection & Licensing Business Line
  • 7. 7 Thales © 2019 All rights reserved Giving Thales a new profile 20 December 2019Introducing Gemalto7 Does not include externally financed R&D. 80,000employees *Based on Thales and Gemalto reported 2017 consolidated income statements. 68Countries global presence €1bn+self-funded R&D* 2017 Our team Around the world Innovation €19bn A balanced revenue structure Revenue* around 60% Civil 40% Defence
  • 8. 8 Thales © 2019 All rights reserved Bringing trust to the world’s digital transformation Cloud Protection & Licensing Next generation digital security
  • 9. 9 Thales © 2019 All rights reserved Enterprises and their customers must be able to trust their digitalinteractions More individual digital interactions in 2025 than in 201050x Data volumes are booming, exchanges ever more valuable. Source: IDC’s Data Age 2025 study, April 2017 The big picture
  • 10. 10 Thales © 2019 All rights reserved …and enforced Respect of privacy is valued Sharing? Yes, but not everything People want to share information at scale while respecting privacy Personal and corporate data should be kept private and only shared under clear rules. Privacy and the right to be forgotten will be top of mind for consumers when selecting a merchant or service provider. Policy makers and regulators are increasingly vigilant about private data management. Expectations are rising
  • 11. 11 Thales © 2019 All rights reserved Breaches are growing year-on-year across all sectors DATARECORDS LOST OR STOLEN SINCE2013 6 million per day on average Technology 32% Government 10% Retail 9% Financial 4% Entertainment 3% Healthcare 2% Education 1% Other 39% Source: breachlevelindex, Q1 2018 Every type of organization is exposed Traditional security is no longer sufficient
  • 12. 12 Thales © 2019 All rights reserved IDENTITY THEFT UNENCRYPTED DATA Main cause of attacks Main cause of damages 69% of breach incidents came from identity theft 95% of breaches involved unencrypted data Organizations face two types of cyber threats Source: breachlevelindex, Q1 2018
  • 13. 13 Thales © 2019 All rights reserved A unique combination of digital identity and data protection Digital Identity Data Protection Powering Next Generation Digital Security How we solve the challenge
  • 14. 14 Thales © 2019 All rights reserved SIGN UP LOG IN USE LEAVE Data encryption Authentication Identity verification Cryptographic accountdeletion Protecting the entire digital service cycle
  • 15. 15 Thales © 2019 All rights reserved Thales CPL Comprehensive Data Security Products and Solutions Multicloud Key Management PKI Big Data Security Application Crypto Payment Security WAN Encryption Hardware Security Modules (HSM) Transparent Encryption Access Management Key Management Cloud Security Data Security USE CASES PRODUCTS
  • 16. 16 Thales © 2019 All rights reserved For the world’s governments & biggest brands 20 December 201916Introducing Gemalto 200+ GOVERNMENT PROGRAMS 30,000+ ENTERPRISES 3,000+FINANCIAL INSTITUTIONS 450 MOBILE OPERATORS
  • 17. 17 Thales © 2019 All rights reserved ROME1 Region-CPL : 17 Tier 1 (77%) Pakistan Tier 2 (18 %)Tier 3 ( 5%) Libya Palestine Afghanistan