JDPA Conference Resources

June.11.2024

Share Your Insights: Take Our Survey Today!

Experience It Firsthand: Request a Consultation Today!

Presentation Slide Decks

Presentation By: Thales
Presentation By: CyberArk
Presentation By: CrowdStrike
Presentation By: Foga Daley

Brochures

Blue Chip Strategies Data Sheets

Tools and Strategies for Data Protection
Ensure your compliance with Jamaica’s Data Protection Act (DPA) with Blue Chip Strategies. Our comprehensive suite of products and services is designed to help you safeguard personal data and meet regulatory requirements. 
Blue Chip Strategies’ Security Operations Center
Blue Chip Strategies’ Security Operations Center (SOC) offers a comprehensive, award-winning platform designed to safeguard your business around the clock. Our SOC solution combines advanced analytics, real-time threat intelligence, and one-touch compliance reporting to ensure your organization remains secure and compliant.

CyberArk Data Sheets

Privileged Access Management (PAM)
Strengthen your cybersecurity posture with CyberArk’s Privileged Access Management (PAM) capabilities, designed to secure high-risk access across all IT environments. By isolating sessions and directly managing credentials, CyberArk minimizes the risk of lateral movement and malware spread.
Endpoint Privilege Manager (EPM)
In today’s digital world, organizations face increasing cyber threats that compromise endpoints, identities, and credentials. CyberArk Endpoint Privilege Manager (EPM) provides a powerful solution by enforcing least privilege access, removing local admin rights, and protecting credentials.

 

Identity Security Platform

 

Organizations migrating to the cloud face numerous security challenges, from managing legacy systems to ensuring new cloud-native workloads are secure. The CyberArk Identity Security Platform offers a robust solution, delivering comprehensive protection for high-risk access operations necessary for migrating, scaling, and managing infrastructure.

CrowdStrike Data Sheets

2024 Global  Threat Report
Discover the critical events and trends that defined 2023 in the CrowdStrike 2024 Global Threat Report, one of the most trusted analyses of the modern cybersecurity landscape. With 34 new adversaries tracked, bringing the total to 232, the report highlights how today’s cyber threats operate with unprecedented speed and stealth.
CrowdStrike Falcon®
CrowdStrike Falcon® Endpoint Protection Enterprise redefines endpoint security with its innovative cloud-native platform, engineered to stop breaches effectively. By seamlessly integrating next-gen antivirus (NGAV), endpoint detection and response (EDR), managed threat hunting, and threat intelligence, Falcon delivers robust protection through a single, lightweight agent. 

Thales Data Sheets

CipherTrust Transparent  Encryption
In an era of evolving cyber threats and stringent compliance regulations, safeguarding sensitive data is paramount. CipherTrust Transparent Encryption by Thales delivers unparalleled data-at-rest protection with centralized key management, granular access controls, and detailed audit logging.
CipherTrust Data Discovery and Classification
Understanding and protecting sensitive data is critical for regulatory compliance and security. Thales CipherTrust Data Discovery and Classification streamlines this process, allowing you to efficiently locate and classify regulated data across your enterprise’s cloud, big data, and traditional storage environments.
CipherTrust Secrets Management (CSM)
CipherTrust Secrets Management (CSM), powered by the Akeyless Vault Platform, offers a cutting- edge solution for safeguarding mission-critical secrets, such as credentials, API keys, and tokens, across DevOps tools and cloud workloads.

 

 

 

 

CipherTrust Cloud Key Management (CCKM)
CipherTrust Cloud Key Management (CCKM) simplifies and secures your cloud encryption key lifecycle, adhering to industry best practices as defined by the Cloud Security Alliance. With CCKM, you gain centralized management and lifecycle control over your encryption keys, whether using Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK) services.

Office of the Information Commissioner

Public Notice
Registration Steps