SlideShare a Scribd company logo
1 of 15
1
SECURITY AND TRUST
FOR DIGITAL TRANSACTIONS
Securing Business Transactions
12 - 13 May 2014, Riyadh, Saudi Arabia
Copyright Dictao 2014
All information contained in this presentation is owned by DICTAO. DICTAO is a registered trademark in France and over 10 other countries.
Copyright Dictao 2014
2
SECURITY WORLD
THE WORLD OF CYBER SECURITY
Copyright Dictao 2014
3
Cyber Security
System protection Incident response
BEFORE AFTERATTACK
Detection
 Security solutions must answer to heterogeneous grades with:
 High level of security and trust
 Certified products
 An ‘agile approach’ to provide quick and adapted responses to
organization needs
DIVISIONS OF THE SECURITY WORLD
Copyright Dictao 2014
4
Military
grade
Trust
Service
Provider
Low
grade
Software Quality /
Certifications
Flexibility /
Integration
Copyright Dictao 2014
5
CYBER SECURITY
CYBER SECURITY
Copyright Dictao 2014
6
Cyber Security
Infrastructure Protection
Physical Security
Network Security
Availability / Durability
Infostructure protection
Secret Management &
Protection
Identity & Access Management
Encryption functions
Transaction integrity
Data loss prevention
Traceability
INFO/INFRA ATTACKS PROTECTION
Copyright Dictao 2014
7
SP SP SP SP
Trust Service Providers
IAM
Secure
Transaction
Secure Data
PKI Providers
PKI
ATTACK
ATTACK
TRUST SERVICE PROVIDER SERVICES
Copyright Dictao 2014
8
Trust
Service
Provider
G2C
G2G
B2BB2C
P2P
GOVERNMENTAL TRUST PLATFORMS
Industry SP
9
Trust Service Provider
Strong
Authentication
Secure
Transactions
Archiving &
Traceability
PKI Trust Service Platform
Ministries
Public
entities
G.C.C.
Privatesector
Gateway
Copyright Dictao 2014
Public sector Gateway
Banks & Insurance SP
Telco SP
E-Commerce SP
MAJOR TRENDS IN THE CYBER SECURITY ARENA
Copyright Dictao 2014
10
Infrastructure security
Infostructure security
Accounting for mobile
computing
Development of the
Internet of Things
Embedded security
SCADA
SCADA:
Supervisory Control & Data Acquisition
Governmental trust platforms
Copyright Dictao 2014
11
DICTAO
Products
& Services
Factors
Certifications
12
DICTAO OFFERING
Copyright Dictao 2014
Secure data
SECURE ARCHIVING &
TRACEABILITY
Secure transactions
DIGITAL SIGNATURE &
PROOF
Secure identities
VERSATILE STRONG
AUTHENTICATION
SaaS
On-premises
DICTAO – REFERENCES
Copyright BTC/Dictao
2013
Financial Institutions
Government & Social Services
Industry & Services
13
Copyright Dictao 2014
DICTAO – YOUR PARTNER FOR SECURITY & TRUST
Expertise
14 years of experience in security & trust
A team of 100 security experts
700+ organizations trust us for digital signatures
Legal & regulatory compliance
Dictao digital signature is legally binding in over 40
countries
Certifications that comply with international and national
standards
Qualification by national security agencies (ANSSI, BSI
and FIPS) and Standardization bodies (IETF, OASIS)
Long-term legally
binding archiving
Secure data
Strong authentication
Secure identities
Digital signature
& Timestamping
Secure transactions
14
Copyright Dictao 2014
www.dictao.com
152 avenue de Malakoff - 75116 Paris - France
Tel. : +33 1 73 00 27 28
Email : info@dictao.com
Copyright Dictao 2014
15
Contact us to learn more!

More Related Content

What's hot

CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud
 
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...Mark Silverberg
 
Identity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael DowlingIdentity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael DowlingForgeRock
 
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeConsent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeForgeRock
 
Monitor8 io t quick facts and solution procurement
Monitor8 io t quick facts and solution procurementMonitor8 io t quick facts and solution procurement
Monitor8 io t quick facts and solution procurementKevin R. Curtis
 
Salesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionSalesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionCipherCloud
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesUbisecure
 
B4 the identity of things-securing the internet of everything
B4   the identity of things-securing the internet of everythingB4   the identity of things-securing the internet of everything
B4 the identity of things-securing the internet of everythingDr. Wilfred Lin (Ph.D.)
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyUbisecure
 
Securing Access to SaaS Apps with WSO2 Identity Server
Securing Access to SaaS Apps with WSO2 Identity ServerSecuring Access to SaaS Apps with WSO2 Identity Server
Securing Access to SaaS Apps with WSO2 Identity ServerWSO2
 
FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYSecureData Europe
 
(SACON) Srinivas posarala - Challenges & Approach
(SACON) Srinivas posarala - Challenges & Approach(SACON) Srinivas posarala - Challenges & Approach
(SACON) Srinivas posarala - Challenges & ApproachPriyanka Aash
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Understanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarUnderstanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarCipherCloud
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructurePing Identity
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTForgeRock
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
 

What's hot (20)

CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
 
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
 
Identity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael DowlingIdentity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael Dowling
 
Protegendo sua rede
Protegendo sua redeProtegendo sua rede
Protegendo sua rede
 
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeConsent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
 
Monitor8 io t quick facts and solution procurement
Monitor8 io t quick facts and solution procurementMonitor8 io t quick facts and solution procurement
Monitor8 io t quick facts and solution procurement
 
Salesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionSalesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data Protection
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with Smartphones
 
B4 the identity of things-securing the internet of everything
B4   the identity of things-securing the internet of everythingB4   the identity of things-securing the internet of everything
B4 the identity of things-securing the internet of everything
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategy
 
Securing Access to SaaS Apps with WSO2 Identity Server
Securing Access to SaaS Apps with WSO2 Identity ServerSecuring Access to SaaS Apps with WSO2 Identity Server
Securing Access to SaaS Apps with WSO2 Identity Server
 
SecureMAG Vol 3
SecureMAG Vol 3SecureMAG Vol 3
SecureMAG Vol 3
 
FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITY
 
(SACON) Srinivas posarala - Challenges & Approach
(SACON) Srinivas posarala - Challenges & Approach(SACON) Srinivas posarala - Challenges & Approach
(SACON) Srinivas posarala - Challenges & Approach
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Understanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarUnderstanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: Webinar
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust Infrastructure
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 

Similar to Security and Trust for Digital Transactions : Dictao presentation during the Kingdom Cyber Security Summit, May 2014

Dictao Company Presentation
Dictao Company PresentationDictao Company Presentation
Dictao Company PresentationDictao
 
IOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdfIOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdfcvrlifesciences
 
FIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - PresentationFIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - PresentationFIDO Alliance
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video DataMrsAlways RigHt
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
 
Reddy Anna is India’s Biggest Online ID Service Provider.
Reddy Anna is India’s Biggest Online ID Service Provider.Reddy Anna is India’s Biggest Online ID Service Provider.
Reddy Anna is India’s Biggest Online ID Service Provider.Reddy Anna
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014Sectricity
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewAbhishek Sood
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Securescoopnewsgroup
 
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CloudIDSummit
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Dictao Company Brochure
Dictao Company BrochureDictao Company Brochure
Dictao Company BrochureDictao
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachOmar Khawaja
 
Guide: Security and Compliance
Guide: Security and ComplianceGuide: Security and Compliance
Guide: Security and ComplianceQuestionPro
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR SessionFelipe Lamus
 

Similar to Security and Trust for Digital Transactions : Dictao presentation during the Kingdom Cyber Security Summit, May 2014 (20)

Dictao Company Presentation
Dictao Company PresentationDictao Company Presentation
Dictao Company Presentation
 
IOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdfIOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdf
 
FIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - PresentationFIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - Presentation
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
DVCOM
DVCOMDVCOM
DVCOM
 
DVCOM
DVCOMDVCOM
DVCOM
 
Reddy Anna is India’s Biggest Online ID Service Provider.
Reddy Anna is India’s Biggest Online ID Service Provider.Reddy Anna is India’s Biggest Online ID Service Provider.
Reddy Anna is India’s Biggest Online ID Service Provider.
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Embed trust in your software & data
Embed trust in your software & dataEmbed trust in your software & data
Embed trust in your software & data
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?
 
Acronis for SAP
Acronis for SAPAcronis for SAP
Acronis for SAP
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Dictao Company Brochure
Dictao Company BrochureDictao Company Brochure
Dictao Company Brochure
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
Guide: Security and Compliance
Guide: Security and ComplianceGuide: Security and Compliance
Guide: Security and Compliance
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Security and Trust for Digital Transactions : Dictao presentation during the Kingdom Cyber Security Summit, May 2014

  • 1. 1 SECURITY AND TRUST FOR DIGITAL TRANSACTIONS Securing Business Transactions 12 - 13 May 2014, Riyadh, Saudi Arabia Copyright Dictao 2014 All information contained in this presentation is owned by DICTAO. DICTAO is a registered trademark in France and over 10 other countries.
  • 3. THE WORLD OF CYBER SECURITY Copyright Dictao 2014 3 Cyber Security System protection Incident response BEFORE AFTERATTACK Detection
  • 4.  Security solutions must answer to heterogeneous grades with:  High level of security and trust  Certified products  An ‘agile approach’ to provide quick and adapted responses to organization needs DIVISIONS OF THE SECURITY WORLD Copyright Dictao 2014 4 Military grade Trust Service Provider Low grade Software Quality / Certifications Flexibility / Integration
  • 6. CYBER SECURITY Copyright Dictao 2014 6 Cyber Security Infrastructure Protection Physical Security Network Security Availability / Durability Infostructure protection Secret Management & Protection Identity & Access Management Encryption functions Transaction integrity Data loss prevention Traceability
  • 7. INFO/INFRA ATTACKS PROTECTION Copyright Dictao 2014 7 SP SP SP SP Trust Service Providers IAM Secure Transaction Secure Data PKI Providers PKI ATTACK ATTACK
  • 8. TRUST SERVICE PROVIDER SERVICES Copyright Dictao 2014 8 Trust Service Provider G2C G2G B2BB2C P2P
  • 9. GOVERNMENTAL TRUST PLATFORMS Industry SP 9 Trust Service Provider Strong Authentication Secure Transactions Archiving & Traceability PKI Trust Service Platform Ministries Public entities G.C.C. Privatesector Gateway Copyright Dictao 2014 Public sector Gateway Banks & Insurance SP Telco SP E-Commerce SP
  • 10. MAJOR TRENDS IN THE CYBER SECURITY ARENA Copyright Dictao 2014 10 Infrastructure security Infostructure security Accounting for mobile computing Development of the Internet of Things Embedded security SCADA SCADA: Supervisory Control & Data Acquisition Governmental trust platforms
  • 12. Products & Services Factors Certifications 12 DICTAO OFFERING Copyright Dictao 2014 Secure data SECURE ARCHIVING & TRACEABILITY Secure transactions DIGITAL SIGNATURE & PROOF Secure identities VERSATILE STRONG AUTHENTICATION SaaS On-premises
  • 13. DICTAO – REFERENCES Copyright BTC/Dictao 2013 Financial Institutions Government & Social Services Industry & Services 13 Copyright Dictao 2014
  • 14. DICTAO – YOUR PARTNER FOR SECURITY & TRUST Expertise 14 years of experience in security & trust A team of 100 security experts 700+ organizations trust us for digital signatures Legal & regulatory compliance Dictao digital signature is legally binding in over 40 countries Certifications that comply with international and national standards Qualification by national security agencies (ANSSI, BSI and FIPS) and Standardization bodies (IETF, OASIS) Long-term legally binding archiving Secure data Strong authentication Secure identities Digital signature & Timestamping Secure transactions 14 Copyright Dictao 2014
  • 15. www.dictao.com 152 avenue de Malakoff - 75116 Paris - France Tel. : +33 1 73 00 27 28 Email : info@dictao.com Copyright Dictao 2014 15 Contact us to learn more!