Welcome Video
The past year has presented significant data security challenges when it comes to compliance, control and operational complexity. It’s become more clear that encryption is the most effective means to protect and remain in control of sensitive data. Crypto is now being applied to protect an ever increasing number of services, and this virtual event is designed to help you understand how it is being used to build trusted multicloud environments, address complex compliance challenges, and prevent future threats of Post Quantum Computing.
In this video, Todd Moore, Vice President of Encryption Products at Thales, shares what you can expect from these live and on-demand webinars and interactive Tech Talk sessions.
Agendas
UP COMING
9:30AM–11:00AM (HKT/SGT)
Key Findings from the 2021 Thales Data Threat Report
Eric Hanselman, Principal Analyst at 451 Research, part of S&P Global Market Intelligence
Rana Gupta, Vice President APAC, Thales
Based on the findings from 2021 Thales Data Threat Report, the global pandemic has had a significant impact on data security with accelerated cloud migration and increased remote working. Many organizations were unprepared for these security challenges. In fact, according to the report only 20% of IT professionals said their security infrastructure was very prepared for the effects of the pandemic. Even with the challenges over the past year, security professionals were already adapting to better secure and protect access to data in the cloud. According to the report, 82% of IT security professionals are concerned about the security risks of employees working remotely and nearly half reported an increase in cyberattacks over the past 12 months.
The 2021 Thales Data Threat Report is based on a survey of more than 2,600 security professionals and executive leaders worldwide conducted by 451 Research, part of S&P Global Market Intelligence. Discover what your industry peers have reported, what they are doing, and what 451 Research recommends to better protect your organization.
This webinar will review the changing landscape of data security risks and threats, especially those due to the acceleration of cloud migration and remote working due to the pandemic. Specifically, you can expect to learn about:
UP COMING
11:00AM–12:15PM (HKT/SGT)
IDC Spotlight - How to Protect Organisation's Future Revenues?
Simon Piff, Vice President, IDC Asia Pacific
The essence of Digital Transformation is to create new business models leveraging technology. Many of these business models will leverage data, either as an enabler or as the product itself. Data management, however, has in the past focused on ensuring uptime availability of the data for the business, whilst the IT security function has focused on protecting systems, networks and devices. Data security has, until recently, fallen through the gaps of siloed organizations, but it needs to change and there are three driving forces int eh region that make this an imperative for all organizations, public and private.
During this webinar IDC will highlight some of ways in which data creates value, and identify the reasons why data security, whilst not a new imperative, needs to be addressed in a manner that is more effective and efficient than it has been to date. Data security today is not just about protection against a breach, it's about avoiding losses and incurring costs, but more importantly about securing future revenue streams.
UP COMING
12:15PM–1:15PM (HKT/SGT)
Native vs Bringing Your Data Protection to the Cloud
Prasun Srivastava, Senior Sales Engineer - India & SAARC, Thales
Are all Data Protection options available in today's cloudy world created equal ?As a corporate IT Security Manager what are some of the features that you should evaluate while deciding to adopt Data Data Protection choices available on the Public Cloud.
UP COMING
1:15PM–2:15PM (HKT/SGT)
Best Practice for multi-cloud key management
Wood Lam, Senior Security Consultant, Greater China & Korea, Thales
Multi-cloud strategy always a headache for the managements, security and operators but it is the most common practice for most enterprises. In this session, Wood will show you how to perform the best practice on multi-cloud key management to secure the valuable assets inside the clouds.
UP COMING
2:15PM–2:45PM (HKT/SGT)
How to improve security posture with lowest cost in digital transformation?
Shaun Chen, Director of Sales Engineer - APAC, Thales
As a corporate IT security manager, on one hand you are facing growing security risks and compliance regulations, on the other hand you need to support the fast paced digital transformation on Cloud and DevOps, which introduces additional security challenges. How to prioritize your data security implementation?
Is there any fast track and cost effective approach for you to address compliance and cloud transformation risk?
In this session, we will discuss about different data encryption techniques, the associated cost and assurance returns.
UP COMING
3:45PM–4:30PM (JST)
Japanese Track: 大手製造業様のGDPR対応 GDPR compliance case study: Japanese manufacturer
キヤノンITソリューションズ株式会社, ITインフラ営業部 西原 正和
Masakazu Nishihara, Manager of IT infrastructure sales, Canon IT Solutions
「CipherTrust」導入の決め手となったのはマルチDB対応・LDTによる無停止暗号化機能ですが、最終的にはタレスとキヤノンITソリューションズとの連携力と、キヤノンITソリューションズの実績を含む信頼性が高く評価されました。
Japanese large manufacturer selected CipherTrust solution due to multi DB support and non-stop encryption by LDT. Moreover, the collaboration between Thales and Canon IT solutions was highly evaluated with many performance.
UP COMING
3:45PM–4:30PM (KST)
Korean Track: 데이터 보안을 위한 효과적인 방안 Effective way of protecting sensitive data
구병춘 ByoungChoon Koo, Senior Solution Engineer, Thales
민감 데이터 보안을 위해 암호화가 널리 적용되고 있습니다. 하지만 단순히 암호화만으로는 법적 규제와 보안성을 모두 확보하기는 쉽지 않습니다. 탈레스는 CipherTrust Data Security Platform 을 통해 민감데이터의 검출, 보호, 접근 관리를 하나의 플랫폼에서 구현함으로써 보다 손쉽고 효과적으로 법적 규제 충족 및 보안 요구 사항을 동시에 만족시킬 수 있습니다.
Data encryption is widely adopted on many enterprise and organization. But just encrypting data is not that to meet the compliance and security best practice. Thales provides CipherTrust Data Security Platform to discover, protect and control the sensitive data on the single pane of glass so that the enterprise and organization can resolve data matter easily and efectively. (presented in Korean)
UP COMING
2:45PM–3:30PM (CST)
Mandarin Track: 多雲世界的資料保護策略 Data protection strategy for a multi-cloud world
陳昶旭 - 大中華區暨韓國資深技術顧問
Jeff Chen, Manager of Sales Engineer - Greater China & Korea, Thales
企業越來越依賴於多雲或混合雲架構來滿足特定的業務需求。儘管這些是基於可用性和工作量分攤的選擇,但是這些多方面及複雜的環境也同時帶來了更多的安全漏洞威脅,於開發系統,個人和組織,並給管理加密密鑰帶來困難。 在此網絡研討會中,我們將探討確保外包環境中數據安全的選項,以及如何保持對加密策略的控制,並確保安全使用敏捷環境。
Companies are becoming increasingly reliant upon multi-cloud or hybrid cloud options to meet specific business needs.Despite their options on availability and workload offsetting, these multi-faceted environments come with advanced threats in the form of security gaps which can be used to exploit systems, individuals and organizations, as well as presenting difficulties in managing encryption keys.
In this webinar, we will look at the options to ensure data security in an outsourced environment and how you can maintain control of encryption policies, and be able to ensure secure use of agile environments.
UP COMING
3:30PM–4:30PM (HKT/SGT)
Back to the Future – Why Quantum Threatens Encryption Security Now
Julian Fay, CTO, Senetas
Large scale quantum computers do not yet exist but even today they pose a clear and present danger to our information security. As quantum computing looks set to render many of today's security methods obsolete, from the algorithms we have trusted for so long to cybercriminals data harvesting today for decryption later, you need to prepare for long-term data protection in a quantum world. Join us to find out more about the practical strategies you can adopt today to defeat this threat, to learn how to become crypto-agile, by combining conventional and quantum-resistant encryption in a single network security platform. And assess where your organization ranks in a new global research report of IT and cybersecurity decision-makers that highlights serious concerns about the security of data in motion. Find out here what you can do to make sure your data is secure as it crosses the network by taking a crypto-agile approach to network encryption today and into a Post-Quantum world.
UP COMING
9:30AM–11:00AM (HKT/SGT)
OPENING PANEL: Hey, someone forgot to invite Sec(urity) to the DevOps party?!
Shane Boulden, Solution Architect, Red Hat
Piyush Ranjan, Team Lead, Engineering, CyberArk
Erick Reyes, Regional Sales Manager, Thales
Andrew Younger, ANZ Manager Security Consultants, Thales
Industry leaders from CyberArk, Red Hat, and Thales will discuss how the strength of our portfolios come together to protect credentials, data, and secrets in modern containerized DevOps environments. Learn how the combination of Red Hat OpenShift Container Platform, CyberArk Conjur, CyberArk Privileged Access Manager, Thales CipherTrust Data Security Platform, and Thales Luna HSMs provide end-to-end encryption, secrets & key management for the DevOps community to build secure cloud-native applications.
UP COMING
11:00AM–12:15PM (HKT/SGT)
Double Key Encryption for Enterprises to Achieve Convenience and Security
Harry Pun, Cybersecurity Executive, Cybersecurity Solutions Group, Microsoft
Welland Chu, Business Development Director, Asia Pacific, Thales
"Convenience", and "Security" are the holy grail to run any businesses in a digital economy. In the past, attaining both criteria has never been easy. In this seminar, Harry Pun, Cyber Security Executive of Microsoft, and Welland Chu, Business Development Director of Thales, will share their insights and use cases of how this holy grail can finally be achieved, thanks to the "Double Key Encryption" from Microsoft 365 which leverages certified security solution from Thales.
At the end of attending the session, our audience will see the security and compliance challenges facing enterprises, and how these enterprises can now operate and grow their business with the support of the world's top cloud & security providers.
UP COMING
12:15PM–1:15PM (HKT/SGT)
Accenture 5G security solutions powered by Thales Data Security Solutions
Ganesh Narayanan, South East Asia Lead – 5G/Next-Gen Telco/SW Security, Accenture Security
5G brings together various new cutting-edge technologies like Cloud, NB IoT, Edge computing, Virtualization and Network slicing, increasing the unknown vulnerabilities and hence expanding the attack surface posing many risks to the service provider and to users. The security threats in 5GT include networks, infrastructure, application and databases, including identity and access breach resulting in service disruption, network degradation and eventually loss of trust in the services offered to the market. Specific 5G differentiators like MEC, Edge services, low latency applications and critical infrastructure applications, need highest levels of data/application/network identity, access, authentication and authorization management supported by encryption and digital certificate life cycle management.
Accenture with its global expertise in 5G networks and security, in partnership with THALES global 5G security products and solutions, provides you a holistic end-end visibility of 5G security across end user terminals, access networks, RAN, back-haul/mid-haul/front haul transport networks, Core networks all the way to internet client facing applications. In this webinar we explain to you how, the security services provided by Accenture include pre & post 5G network/ data security assessments, target 5G security architecture & controls, deployment of Thales data security solutions and a next generation 5G Security Operations Centre that monitors and detects alerts, events and incidents based on 3GPP/NIST/GSMA best practices for 5GT security.
UP COMING
1:15PM–2:15PM (HKT/SGT)
Accelerating IOT deployment and addressing latest regulatory compliance
Brian Trzupek, SVP, Emerging Markets Product Management, DigiCert
Welland Chu, Business Development Director, Asia Pacific, Thales
IOT is the building block in Smart Devices, Connected vehicles, Digital Cities, etc. Its prevalence and expected market growth at 25% CAGR in the next 6 years is attracting more hardware products, software applications and services to come into the market. How to ensure the "efficiency", "scalability", "security & compliance" aspects during the manufacturing, implementation and operation phases are of paramount importance to the industry. In this webinar, Brian Trzupek, Senior VP of Product from DigiCert, will share his insights of the market, technology and regulatory landscape, including the latest Cybersecurity Labelling Scheme (CLS) that is launched by the Cyber Security Agency of Singapore recently.
UP COMING
2:15PM–3:15PM (HKT/SGT)
What is high trust remote signing & how can it benefit your business?
Geoff Bartlett, Customer Success Manager, Ascertia
Topics covered in this session include:
UP COMING
3:15PM–3:45PM (HKT/SGT)
Flexible Crypto with Uncompromised Security to Meet Your Dynamic Business Needs
Paul Hampton, Cloud Security Expert, Thales
Maintaining digital security best practices and ensuring business continuity in challenging times does not mean compromising on confidentiality and integrity. Next generation Thales Luna Hardware Security Modules (HSMs) can provide an uncompromised foundation of digital trust across cloud, on-premises and hybrid environments.
Join us to discover how Thales Luna HSMs give you the flexibility to run your business the way you want, and to manage your business continuity seamlessly and securely.
We'll focus on different use cases that will help you understand how your organization can:
UP COMING
3:45PM–4:30PM (HKT/SGT)
CLOSING PANEL: Data Security & Privacy measures in Cloud
Sankarson Banerjee, CIO, RBL Bank
Lakshmi Narayanan Kaliyaperumal, Vice President & Head, Cyber Security Technology & Operations, Infosys Limited
Sameer Singh Jaini, CEO, The Digital Fifth
Rana Gupta, APAC Regional VP, Data Protection, Thales - Moderator
Digital Transformation is leading in growing trend in adoption of cloud journey and multi-cloud strategy for the organizations. With workloads moving in cloud, the concerns regarding data security and privacy has been the major focus areas for the organizations today. Joining us are leaders from the industry who will be discussing security & privacy measures to consider during the cloud adoption journey.
UP COMING
8:50AM–9:45AM BST
Welcome & Key Note Session: From Zero Trust to Confidential Computing Encryption Technologies in the Age of COVID and Cloud
Claire Pitman-Massie, Snr Director of Field Marketing, EMEA, Thales
Mike Small, Senior Analyst, Kuppingercole
Working from home driven by the pandemic has dramatically accelerated digital transformation and cloud adoption. This has massively increased the amount of data outside of direct organisational control and hence the risks of data breaches and compliance failures. On top of this the recent European Court of Justice Schrems II judgement has raised the bar on the protection needed for personal data in the cloud. The European Data Protection Board recommendations on this judgment mean that organisations cannot rely solely on legal controls over how data is processed, and that they must implement supplementary technical controls. The term "Confidential Computing" is being promoted as the solution to these challenges. So, what is Confidential Computing and how can this practically help your organisation?
This presentation will cover:
Attend this session to learn how your organisation can be better prepared for the next phase on your data protection journey.
UP COMING
10:15AM–11:00AM BST
The Latest Insights into the State of Data Security in Europe
Chris Harris, EMEA Technical Director, Thales
Based on the findings from 2021 Thales Data Threat Report, the global pandemic has had a significant impact on data security with accelerated cloud migration and increased remote working. Many organisations were unprepared for these security challenges. In fact, according to the report only 20% of IT professionals said their security infrastructure was very prepared for the effects of the pandemic. Even with the challenges over the past year, security professionals were already adapting to better secure and protect access to data in the cloud. According to the report, 82% of IT security professionals are concerned about the security risks of employees working remotely and nearly half reported an increase in cyberattacks over the past 12 months.
The 2021 Thales Data Threat Report is based on a survey of more than 2,600 security professionals and executive leaders worldwide conducted by 451 Research, part of S&P Global Market Intelligence. Discover what your industry peers have reported, what they are doing, and what 451 Research recommends to better protect your organisation.
This webinar will review the changing landscape of data security risks and threats, especially those due to the acceleration of cloud migration and remote working due to the pandemic. Specifically, you can expect to learn about:
UP COMING
11:30AM–12:00PM BST
Deciphering the Data Security Implications of Schrems II
Todd Moore, VP, Encryption Products, Thales
The Schrems II ruling has created serious implications for data privacy around the globe, forcing organisations to understand its ramifications for their data security strategies. With many opinions surfacing as to what is right and what is wrong, the recent recommendations from the European Data Protection Board provides guidance on measures organisations can take to be compliant with GDPR when sending EU citizen data outside the region.
Drawing on real-life examples, and his own experiences, Todd Moore, Vice President of Data Protection Products at Thales, looks at how organisations can decipher the data security implications of Schrems II and create a data protection framework that:
UP COMING
12:45PM–1:30PM BST
Back to the Future – Why Quantum Threatens Encryption Security Now
Julian Fay, CTO, Senetas
Large scale quantum computers do not yet exist but even today they pose a clear and present danger to our information security. As quantum computing looks set to render many of today's security methods obsolete, from the algorithms we have trusted for so long to cybercriminals data harvesting today for decryption later, you need to prepare for long-term data protection in a quantum world. Join us to find out more about the practical strategies you can adopt today to defeat this threat, to learn how to become crypto-agile, by combining conventional and quantum-resistant encryption in a single network security platform. And assess where your organisation ranks in a new global research report of IT and cybersecurity decision-makers that highlights serious concerns about the security of data in motion. Find out here what you can do to make sure your data is secure as it crosses the network by taking a crypto-agile approach to network encryption today and into a Post-Quantum world.
UP COMING
3:00PM–3:30PM BST
Retaining Control of Your Encryption Keys and Data in Google Cloud (Replay)
Paul Hampton, Cloud Security Expert, Thales
When it comes to encryption keys, security best practice is all about control and separation between encrypted data at rest and the keys. Google Cloud encrypts customer data at rest by default and offers organisations multiple options to control and manage their encryption keys. For many organisations hosting sensitive data or looking to migrate workloads to the cloud, they require additional control and ownership over their encryption keys in order to meet compliance or internal security requirements.
In the first of our Data Protection Coffee Break Series for 2021, we will discuss how Google and Thales are helping organisations address this challenge by giving customer's enhanced control over how and when their encryption keys are used to protect and access encrypted data in the cloud.
UP COMING
4:00PM–4:45PM BST
How to Tackle Ransomware Head-on with PowerProtect Cyber
Jason Proctor, Systems Engineer, Dell Technologies
Speaker TBD, Thales
How does PowerProtect Cyber Recovery protect your most critical data across your infrastructure, clouds, applications and devices? Experts will be on hand to advise on some of the essential steps needed to ensure you can recover from a cyber-attack. The panel will demonstrate how to isolate your recovery vault, ensure the integrity of your vault and will discuss how AI can help ensure you recover. Dell Technologies and Thales discuss how by working together, organisations can benefit from extended security to the data itself.
UP COMING
8:45AM–9:30AM BST
Day 2 Opening Remarks & Any Time, Any Way, Anywhere: Trends Accelerating the Payments Market
Claire Pitman-Massie, Sr. Director of Field Marketing, EMEA, Thales
Simon Keates, Head of Payment Security Strategy, Thales
Rapid adoption of contactless and alternative payment methods, increase use of cloud technologies, and significant changes to consumer spending habits have required organisations to rethink their strategies to address changes to internal and external requirements. In this session Simon and Claire will discuss the significant trends that emerged in 2020, trends for 2021 and beyond, and the security implications that need to be considered by organisations to ensure that they remain compliant and maintain the security of their customers' data.
UP COMING
10:00AM–10:45AM BST
The CipherTrust Data Security Platform for Developers: Offerings and Vision
Eric Wolff, Senior Manager, Product Marketing, Cloud Data Protection, Thales
Marc Seguin, Director of Product Management, CipherTrust Data Security Platform, Thales
Software developers don't need to be crypto experts, or source, use, and store in dangerous places poor-quality keys. With CipherTrust Application Data Protection, devops gets a solution for integrating data protection into applications with a secure key source and repository, and then sending those applications into production. In this session, Eric Wolff will provide a quick introduction to the application-level data protection tools in the CipherTrust Data Security Platform, followed by a live conversation about the Thales vision for app-layer data protection.
UP COMING
11:15AM–12:00PM BST
Network Data Security Vulnerabilities: Cybersecurity Survey Reveals Weaknesses
Julian Fay, CTO, Senetas
Stan Mesceda, Senior Product Manager, High Speed Encryption Products, Thales
More data is in motion than ever before—a trend that will continue in line with the steep cloud adoption and digital transformation curves, as well as the significant impact of the COVID-19 pandemic on remote working. A number of important factors have significantly increased demand for, and dependency on, high-speed wide-area networks. These include workloads migrating to and from the cloud, real-time global collaboration, big data and cloud data storage, 5G and the expectation of higher bandwidth out to the edge and need for larger and faster aggregation points.
However, only 54% of enterprises feel confident their network security will protect them against cyber threats. As organisations of all sizes continue to adopt connected technologies in support of Cloud Services, Mobility, CCTV, BYOD and Business Continuity; their increased network traffic expose them to increased data in motion security risks. A global research report of IT and cybersecurity decision-makers highlights serious concerns about the security of data in motion across networks. Assess where your organisation ranks amongst these findings. Find out here what you can do to make sure your data is secure as it crosses the network by taking a crypto-agile approach to network encryption.
UP COMING
12:30PM–1:15PM BST
DKE: Protecting Sensitive Data with Luna Key Broker for Microsoft Double Key Encryption
John Ray, Director, Product Management, Hardware Security Modules, Thales
Today's remote working environment relies heavily on the collaborative sharing of information, challenging organisations to maintain the security of confidential data and regulatory compliance while driving employee productivity. For organisations in highly-regulated industries such as financial services, government and healthcare, they can now leverage Thales Luna HSMs and Luna Cloud HSMs with Double Key Encryption (DKE) for Microsoft 365 and comply with regulations such as HIPAA, PCI DSS, GDPR and Schrems II.
Learn more about:
UP COMING
1:45PM–2:30PM BST
Hybrid Luna HSM: Flexible Crypto with Uncompromised Trust: Security to Meet Your Dynamic Business Needs
Paul Hampton, Cloud Security Expert, Thales
Maintaining digital security best practices and ensuring business continuity in challenging times does not mean compromising on confidentiality and integrity. Next generation Thales Luna Hardware Security Modules (HSMs) can provide an uncompromised foundation of digital trust across cloud, on-premises and hybrid environments.
Join us to discover how Thales Luna HSMs give you the flexibility to run your business the way you want, and to manage your business continuity seamlessly and securely.
We'll focus on different use cases that will help you understand how your organisation can:
UP COMING
3:00PM–3:45PM BST
Protecting credentials, data, and secrets in a containerized DevOps environments
Dave Meurer, Partner Solutions Architect, Red Hat
Evan Litwak, Sr. Director, DevSecOps Strategy, CyberArk
Rohini Deepak, Senior Manager, Strategy, Thales
Industry leaders from CyberArk, Red Hat, and Thales will discuss how the strength of our portfolios come together to protect credentials, data, and secrets in modern containerized DevOps environments. Learn how the combination of Red Hat OpenShift Container Platform, CyberArk Conjur, CyberArk Privileged Access Manager, Thales CipherTrust Data Security Platform, and Thales Luna HSMs provide end-to-end encryption, secrets & key management for the DevOps community to build secure cloud-native applications.
UP COMING
4:15PM–5:00PM BST
The end-end solutions needed for holistic 5G security
Niraj Rathod, Mobile Security Architect, BT
Rohini Deepak, Senior Manager, Strategy, Thales
Dilip Patel, Global Alliance Manager, Thales - Moderator
The impacts of 5G on our daily life will be massive, with promises of high-speed connections, ultra-low latency, and long battery life for low-power IoT devices. This fifth-generation telecom standard shifts the underlying networks to software-centric open architectures. This openness speeds innovation but also introduces security risks.
In this session, hear from industry-leading experts in the 5G field, as they discuss the security challenges facing modern Telco, and how Thales is uniquely positioned to help address these challenges to enable continued innovation.
UP COMING
8:15AM–9:30AM ET
Welcome Remarks / Key Findings from the 2021 Thales Data Threat Report
Kevin Williams, Vice President Americas, Thales
Eric Hanselman, Chief Analyst, 451 Research
Based on the findings from 2021 Thales Data Threat Report, the global pandemic has had a significant impact on data security with accelerated cloud migration and increased remote working. Many organizations were unprepared for these security challenges. In fact, according to the report only 20% of IT professionals said their security infrastructure was very prepared for the effects of the pandemic. Even with the challenges over the past year, security professionals were already adapting to better secure and protect access to data in the cloud. According to the report, 82% of IT security professionals are concerned about the security risks of employees working remotely and nearly half reported an increase in cyberattacks over the past 12 months.
The 2021 Thales Data Threat Report is based on a survey of more than 2,600 security professionals and executive leaders worldwide conducted by 451 Research, part of S&P Global Market Intelligence. Discover what your industry peers have reported, what they are doing, and what 451 Research recommends to better protect your organization.
This webinar will review the changing landscape of data security risks and threats, especially those due to the acceleration of cloud migration and remote working due to the pandemic. Specifically, you can expect to learn about:
UP COMING
10:00AM–10:45AM ET
How to Tackle Ransomware Head-on with PowerProtect Cyber
Jason Proctor, Systems Engineer, Dell Technologies
How does PowerProtect Cyber Recovery protect your most critical data across your infrastructure, clouds, applications and devices? Experts will be on hand to advise on some of the essential steps needed to ensure you can recover from a cyber-attack. The panel will demonstrate how to isolate your recovery vault, ensure the integrity of your vault and will discuss how AI can help ensure you recover. Dell Technologies and Thales discuss how by working together, organisations can benefit from extended security to the data itself.
UP COMING
11:15AM–12:00PM ET
Luna HSMs: Not Just the Foundation, But the Future of Digital Trust
John Ray, Director, HSM Product Management, Thales
Learn about the current Hardware Security Module market and where it is heading. You'll find out how Thales Luna HSMs are the foundation of digital trust for existing solutions, and how they continue to evolve to meet the challenges of new use cases, new technologies and deployment scenarios. Lastly, you will learn how to build a root of trust for your digital transformation using a modern HSM infrastructure.
UP COMING
12:30PM–1:45PM ET
The White House Executive Order on Cybersecurity: The Blueprint for How Companies Secure Their Infrastructure
Stephen O'Connor, Security Architect, Thales
Cina Shaykhian, Principal Solution Architect, Thales
Ron Stamboly, Sr. Security Engineer, Thales
Robert Bigman, Security Consultant & former CIA CISO
On May 12, 2021, President Biden signed an Executive Order to improve the nation's cybersecurity and protect federal government networks. In the order it stated "Recent cybersecurity incidents such as SolarWinds, Microsoft Exchange, and the Colonial Pipeline incident are a sobering reminder that U.S. public and private sector entities increasingly face sophisticated malicious cyber activity from both nation-state actors and cyber criminals. These incidents share commonalities, including insufficient cybersecurity defenses that leave public and private sector entities more vulnerable to incidents." Two key areas of focus from the Executive Order mandate Federal agencies to implement multi-factor authentication and encryption for data at rest and in motion. This session will provide the specifics on this mandate and how Thales can help you achieve this required security posture.
UP COMING
2:15PM–3:00PM ET
Back to the Future – Why Quantum Threatens Encryption Security Now
Julian Fay, CTO, Senetas
Large scale quantum computers do not yet exist but even today they pose a clear and present danger to our information security. As quantum computing looks set to render many of today's security methods obsolete, from the algorithms we have trusted for so long to cybercriminals data harvesting today for decryption later, you need to prepare for long-term data protection in a quantum world. Join us to find out more about the practical strategies you can adopt today to defeat this threat, to learn how to become crypto-agile, by combining conventional and quantum-resistant encryption in a single network security platform.
UP COMING
3:30PM–4:15PM ET
Google Cloud & Thales: Building Trusted Cloud Environments
Eric Wolff, Sr. Manager, Product Marketing, Cloud Data Protection, Thales
Leonor Jones, Director, Product Management, Encryption, Thales
Join this webinar and listen to the latest updates on how Google Cloud and Thales are working together to secure sensitive data and workloads in the cloud. Last year, Google Cloud and Thales announced new external key management capabilities that allow organizations to be in full control of the keys to their encrypted data in Google Cloud. This webinar will share a new solution available with Google Workspace and Thales.
UP COMING
4:45PM–5:30PM ET
Dell Intrinsic Security
Josh Jaffe, Vice President, Cyber Security, Dell Technologies
David Schwarzbach, Senior Consultant and Global Security Marketing Lead, Dell Technologies
Dell Technologies is leveraging the depth and breadth of its portfolio to change the entire culture of cyber security. Intrinsic security is not a product, but an end-to-end modern security strategy designed entirely around achieving trust. Learn how security is being designed into Dell Technologies solutions from the start, and how the approach can help better protect your IT assets, data, and business.
UP COMING
6:00PM–6:45PM ET
PKI for IoT: How to Secure Connected Devices from Design to End-of-Life
Ellen Boehm, VP of IoT Strategy & Operations, Keyfactor
Ryan Sanders, Sr. Product Marketing Manager, Keyfactor
Companies are now deploying billions of network-connected devices into mission-critical environments, such as medical devices, industrial, and manufacturing control systems.
However, as more stringent customer requirements and regulations emerge, manufacturers must address security concerns, such as authentication, data encryption, and integrity of software and firmware on their devices.
With the emergence of IoT, PKI has become an instrumental tool in securing the next generation of industrial and consumer-connected devices. In this session, Keyfactor's VP of IoT Strategy and Operations, Ellen Boehm, and Senior Product Marketing Manager, Ryan Sanders, will discuss:
UP COMING
8:45AM–9:30AM ET
Hybrid Luna HSM: Flexible Crypto with Uncompromised Trust: Security to Meet Your Dynamic Business Needs
Paul Hampton, Cloud Security Expert, Thales
Maintaining digital security best practices and ensuring business continuity in challenging times does not mean compromising on confidentiality and integrity. Next generation Thales Luna Hardware Security Modules (HSMs) can provide an uncompromised foundation of digital trust across cloud, on-premises and hybrid environments.
Join us to discover how Thales Luna HSMs give you the flexibility to run your business the way you want, and to manage your business continuity seamlessly and securely.
We'll focus on different use cases that will help you understand how your organization can:
UP COMING
10:00AM–10:45AM ET
Protecting credentials, data, and secrets in a containerized DevOps environments
Dave Meurer, Partner Solutions Architect, Red Hat
Evan Litwak, Sr. Director, DevSecOps Strategy, CyberArk
Rohini Deepak, Sr. Manager, Strategy, Thales
Industry leaders from CyberArk, Red Hat, and Thales will discuss how the strength of our portfolios come together to protect credentials, data, and secrets in modern containerized DevOps environments. Learn how the combination of Red Hat OpenShift Container Platform, CyberArk Conjur, CyberArk Privileged Access Manager, Thales CipherTrust Data Security Platform, and Thales Luna HSMs provide end-to-end encryption, secrets & key management for the DevOps community to build secure cloud-native applications.
UP COMING
11:15AM–12:00PM ET
Recent Advances in Cloud Key Management
Eric Wolff, Sr. Manager, Product Marketing, Cloud Data Protection, Thales
Leonor Jones, Director, Product Management, Encryption, Thales
Cloud key management began with bring your own key (BYOK) and hold your own key (HYOK) offerings from cloud providers are multiplying. In this session, Eric Wolff will provide a quick introduction to cloud key life cycle management followed by a live conversation between Leonor Jones and Eric about the lastest advances in cloud key management.
UP COMING
12:30PM–1:15PM ET
Protecting Sensitive Data with Luna Key Broker for Microsoft Double Key Encryption
John Ray, Director, Product Management, Hardware Security Modules, Thales
Today's remote working environment relies heavily on the collaborative sharing of information, challenging organizations to maintain the security of confidential data and regulatory compliance while driving employee productivity. For organizations in highly-regulated industries such as financial services, government and healthcare, they can now leverage Thales Luna HSMs and Luna Cloud HSMs with Double Key Encryption (DKE) for Microsoft 365 and comply with regulations such as HIPAA, PCI DSS, GDPR and Schrems II.
Learn more about:
UP COMING
1:45PM–2:30PM ET
The end-end solutions needed for holistic 5G security
Chen Arbel, VP, Business Development, 5G & Cloud Security, Thales
The impacts of 5G on our daily life will be massive, with promises of high-speed connections, ultra-low latency, and long battery life for low-power IoT devices. This fifth-generation telecom standard shifts the underlying networks to software-centric open architectures. This openness speeds innovation but also introduces security risks.
In this session, hear from industry-leading experts in the 5G field, as they discuss the security challenges facing modern Telco, and how Thales is uniquely positioned to help address these challenges to enable continued innovation.
UP COMING
3:00PM–3:45PM ET
Protecting Teradata Workloads in the Cloud with Data Encryption
Jay Irwin, Director, Teradata Center for Enterprise Security, Teradata
Blake Wood, Director, Business Development, Thales
Teradata is a great example of a large software company that has successfully shifted their core business to the public Cloud with Teradata Vantage. As part of this shift to the Cloud, security considerations change and the protection of data against breach becomes a top priority. In this webinar, we will learn how to satisfy data security requirements for Teradata databases in the Cloud using data encryption methods and centralized key management. We will also learn about other services in the Teradata Vantage product suite and how a data encryption strategy can be leveraged to protect data for those services as well.
Key Takeaways:
UP COMING
4:15PM–5:00PM ET
Network Data Security Vulnerabilities: Cybersecurity Survey Reveals Weaknesses
Julian Fay, CTO, Senetas
Stan Mesceda, Sr. Product Manager, High Speed Encryption Products, Thales
More data is in motion than ever before—a trend that will continue in line with the steep cloud adoption and digital transformation curves, as well as the significant impact of the COVID-19 pandemic on remote working. A number of important factors have significantly increased demand for, and dependency on, high-speed wide-area networks. These include workloads migrating to and from the cloud, real-time global collaboration, big data and cloud data storage, 5G and the expectation of higher bandwidth out to the edge and need for larger and faster aggregation points.
However, only 54% of enterprises feel confident their network security will protect them against cyber threats. As organizations of all sizes continue to adopt connected technologies in support of Cloud Services, Mobility, CCTV, BYOD and Business Continuity; their increased network traffic expose them to increased data in motion security risks. A global research report of IT and cybersecurity decision-makers highlights serious concerns about the security of data in motion across networks. Assess where your organization ranks amongst these findings. Find out here what you can do to make sure your data is secure as it crosses the network by taking a crypto-agile approach to network encryption.
UP COMING
5:30PM–6:15PM ET
The CipherTrust Data Security Platform for Developers: Offerings and Vision
Eric Wolff, Sr. Manager, Product Marketing, Cloud Data Protection, Thales
Marc Seguin, Director of Product Management, CipherTrust Data Security Platform, Thales
Software developers don't need to be crypto experts, or source, use, and store in dangerous places poor-quality keys. With CipherTrust Application Data Protection, devops gets a solution for integrating data protection into applications with a secure key source and repository, and then sending those applications into production. In this session, Eric Wolff will provide a quick introduction to the application-level data protection tools in the CipherTrust Data Security Platform, followed by a live conversation about the Thales vision for app-layer data protection.
Testimonials
Speakers
Speakers
Rows
VP, Encryption Products
Thales
APAC Regional VP, Data Protection
Thales
VP, EMEA Sales
Thales
Vice President Americas
Thales
VP, Business Development, 5G & Cloud Security, Thales
Security Engineer Manager
Thales
Manager of Sales Engineer - Greater China & Korea, Thales
Director of Sales Engineer - APAC
Thales
Director, Business Development
Thales
Senior Manager, Strategy
Thales
Senior Manager, Cloud HSM Services, Thales
EMEA Technical Director
Thales
Director, Product Management, Encryption, Thales
Director, Product Management,
Data Discovery & Classification
Thales
Head of Strategy, Payments Security
Thales
Senior Sales Engineer
Thales
Sales Engineer
Thales
Senior Product Manager, High Speed Encryption Products, Thales
Security Architect
Thales
Global Alliance Manager
Thales
Sr. Director of Field Marketing, EMEA, Thales
Director, Product Management, Hardware Security Modules, Thales
Regional Sales Manager
Thales
Director of Product Management, CipherTrust Data Security Platform, Thales
Director of Field Marketing Americas
Thales
Solution Architect
Thales
Sr. Security Engineer
Thales
Senior Manager, Product Marketing,
Cloud Data Protection, Thales
Director, Business Development
Thales
ANZ Manager Security Consultants
Thales
Chief Analyst
451 Research, part of S&P Global Marketing Intelligence
Senior Principal, Security Innovation
Accenture
Mobile Security Architect, BT
Sr. Director, DevSecOps Strategy, CyberArk
Team Lead, Engineering, CyberArk
Vice President, Cyber Security
Dell Technologies
Systems Engineer
Dell Technologies
Senior Consultant and Global Security Marketing Lead
Dell Technologies
CEO, The Digital Fifth
VP, Security Practice, Asia-Pacific
IDC
Vice President & Head, Cyber Security Technology & Operations, Infosys Limited
VP of IoT Strategy & Operations, Keyfactor
Sr. Product Marketing Manager, Keyfactor
Senior Analyst
KuppingerCole
Cybersecurity Executive
Microsoft
CIO, RBL Bank
Solution Architect, Red Hat
Partner Solutions Architect
Red Hat
CTO
Senetas
Director, Teradata Center for Enterprise Security, Teradata
Partners