downarrow

Building a Future We Can All Trust

The past year has presented significant data security challenges when it comes to compliance, control and operational complexity. It’s become more clear that encryption is the most effective means to protect and remain in control of sensitive data. Crypto is now being applied to protect an ever increasing number of services, and this virtual event is designed to help you understand how it is being used to build trusted multicloud environments, address complex compliance challenges, and prevent future threats of Post Quantum Computing.

In this video, Todd Moore, Vice President of Encryption Products at Thales, shares what you can expect from these live and on-demand webinars and interactive Tech Talk sessions.

Register below to join in

APAC Agenda

UP COMING

webinar image

June 16, 2021

9:30AM–11:00AM (HKT/SGT)

Key Findings from the 2021 Thales Data Threat Report

Eric Hanselman, Principal Analyst at 451 Research, part of S&P Global Market Intelligence
Rana Gupta, Vice President APAC, Thales

register

 

register

Key Findings from the 2021 Thales Data Threat Report

Based on the findings from 2021 Thales Data Threat Report, the global pandemic has had a significant impact on data security with accelerated cloud migration and increased remote working. Many organizations were unprepared for these security challenges. In fact, according to the report only 20% of IT professionals said their security infrastructure was very prepared for the effects of the pandemic. Even with the challenges over the past year, security professionals were already adapting to better secure and protect access to data in the cloud. According to the report, 82% of IT security professionals are concerned about the security risks of employees working remotely and nearly half reported an increase in cyberattacks over the past 12 months.

The 2021 Thales Data Threat Report is based on a survey of more than 2,600 security professionals and executive leaders worldwide conducted by 451 Research, part of S&P Global Market Intelligence. Discover what your industry peers have reported, what they are doing, and what 451 Research recommends to better protect your organization.

This webinar will review the changing landscape of data security risks and threats, especially those due to the acceleration of cloud migration and remote working due to the pandemic. Specifically, you can expect to learn about:

  • Leading sources of data threats
  • Trends in the adoption of Zero Trust strategies across organizations
  • Top security investments to secure sensitive data in cloud and remote working
  • Cloud migration trends and most effective security controls
  • Future security threats, including quantum computing

UP COMING

webinar image

June 16, 2021

11:00AM–12:15PM (HKT/SGT)

IDC Spotlight - How to Protect Organisation's Future Revenues?

Simon Piff, Vice President, IDC Asia Pacific

register

 

register

IDC Spotlight - How to Protect Organisation's Future Revenues?

The essence of Digital Transformation is to create new business models leveraging technology. Many of these business models will leverage data, either as an enabler or as the product itself. Data management, however, has in the past focused on ensuring uptime availability of the data for the business, whilst the IT security function has focused on protecting systems, networks and devices. Data security has, until recently, fallen through the gaps of siloed organizations, but it needs to change and there are three driving forces int eh region that make this an imperative for all organizations, public and private.

  • Cloud computing brings with it a new wave of opportunity to have an incredibly agile IT infrastructure, but it brings with it a new set of data security risks.
  • Legislation around data privacy and data management is emerging across the geographies of Asia-Pacific and with it comes the potential for organizations to experience financial loss should data not be managed and secured correctly.
  • Business partners are beginning to embed data privacy and security clauses in B2B contracts, putting business revenue at risk should a data breach occur.

During this webinar IDC will highlight some of ways in which data creates value, and identify the reasons why data security, whilst not a new imperative, needs to be addressed in a manner that is more effective and efficient than it has been to date. Data security today is not just about protection against a breach, it's about avoiding losses and incurring costs, but more importantly about securing future revenue streams.

UP COMING

webinar image

June 16, 2021

12:15PM–1:15PM (HKT/SGT)

Native vs Bringing Your Data Protection to the Cloud

Prasun Srivastava, Senior Sales Engineer - India & SAARC, Thales

register

 

register

Native vs Bringing Your Data Protection to the Cloud

Are all Data Protection options available in today's cloudy world created equal ?As a corporate IT Security Manager what are some of the features that you should evaluate while deciding to adopt Data Data Protection choices available on the Public Cloud.

UP COMING

webinar image

June 16, 2021

1:15PM–2:15PM (HKT/SGT)

Best Practice for multi-cloud key management

Wood Lam, Senior Security Consultant, Greater China & Korea, Thales

register

 

register

Best Practice for multi-cloud key management

Multi-cloud strategy always a headache for the managements, security and operators but it is the most common practice for most enterprises. In this session, Wood will show you how to perform the best practice on multi-cloud key management to secure the valuable assets inside the clouds.

UP COMING

webinar image

June 16, 2021

2:15PM–2:45PM (HKT/SGT)

How to improve security posture with lowest cost in digital transformation?

Shaun Chen, Director of Sales Engineer - APAC, Thales

register

 

register

How to improve security posture with lowest cost in digital transformation?

As a corporate IT security manager, on one hand you are facing growing security risks and compliance regulations, on the other hand you need to support the fast paced digital transformation on Cloud and DevOps, which introduces additional security challenges. How to prioritize your data security implementation?

Is there any fast track and cost effective approach for you to address compliance and cloud transformation risk?

In this session, we will discuss about different data encryption techniques, the associated cost and assurance returns.

UP COMING

webinar image

June 16, 2021

3:45PM–4:30PM (JST)

Japanese Track: 大手製造業様のGDPR対応 GDPR compliance case study: Japanese manufacturer

キヤノンITソリューションズ株式会社, ITインフラ営業部 西原 正和
Masakazu Nishihara, Manager of IT infrastructure sales, Canon IT Solutions

register

 

register

Japanese Track: 大手製造業様のGDPR対応 GDPR compliance case study: Japanese manufacturer

「CipherTrust」導入の決め手となったのはマルチDB対応・LDTによる無停止暗号化機能ですが、最終的にはタレスとキヤノンITソリューションズとの連携力と、キヤノンITソリューションズの実績を含む信頼性が高く評価されました。

Japanese large manufacturer selected CipherTrust solution due to multi DB support and non-stop encryption by LDT. Moreover, the collaboration between Thales and Canon IT solutions was highly evaluated with many performance.

UP COMING

webinar image

June 16, 2021

3:45PM–4:30PM (KST)

Korean Track: 데이터 보안을 위한 효과적인 방안 Effective way of protecting sensitive data

구병춘 ByoungChoon Koo, Senior Solution Engineer, Thales

register

 

register

Korean Track: 데이터 보안을 위한 효과적인 방안
Effective way of protecting sensitive data

민감 데이터 보안을 위해 암호화가 널리 적용되고 있습니다. 하지만 단순히 암호화만으로는 법적 규제와 보안성을 모두 확보하기는 쉽지 않습니다. 탈레스는 CipherTrust Data Security Platform 을 통해 민감데이터의 검출, 보호, 접근 관리를 하나의 플랫폼에서 구현함으로써 보다 손쉽고 효과적으로 법적 규제 충족 및 보안 요구 사항을 동시에 만족시킬 수 있습니다.

Data encryption is widely adopted on many enterprise and organization. But just encrypting data is not that to meet the compliance and security best practice. Thales provides CipherTrust Data Security Platform to discover, protect and control the sensitive data on the single pane of glass so that the enterprise and organization can resolve data matter easily and efectively. (presented in Korean)

UP COMING

webinar image

June 16, 2021

2:45PM–3:30PM (CST)

Mandarin Track: 多雲世界的資料保護策略 Data protection strategy for a multi-cloud world

陳昶旭 - 大中華區暨韓國資深技術顧問
Jeff Chen, Manager of Sales Engineer - Greater China & Korea, Thales

register

 

register

Mandarin Track: 多雲世界的資料保護策略 Data protection strategy for a multi-cloud world

企業越來越依賴於多雲或混合雲架構來滿足特定的業務需求。儘管這些是基於可用性和工作量分攤的選擇,但是這些多方面及複雜的環境也同時帶來了更多的安全漏洞威脅,於開發系統,個人和組織,並給管理加密密鑰帶來困難。 在此網絡研討會中,我們將探討確保外包環境中數據安全的選項,以及如何保持對加密策略的控制,並確保安全使用敏捷環境。

Companies are becoming increasingly reliant upon multi-cloud or hybrid cloud options to meet specific business needs.Despite their options on availability and workload offsetting, these multi-faceted environments come with advanced threats in the form of security gaps which can be used to exploit systems, individuals and organizations, as well as presenting difficulties in managing encryption keys.

In this webinar, we will look at the options to ensure data security in an outsourced environment and how you can maintain control of encryption policies, and be able to ensure secure use of agile environments.

UP COMING

webinar image

June 16, 2021

3:30PM–4:30PM (HKT/SGT)

Back to the Future – Why Quantum Threatens Encryption Security Now

Julian Fay, CTO, Senetas

register

 

register

Back to the Future – Why Quantum Threatens Encryption Security Now

Large scale quantum computers do not yet exist but even today they pose a clear and present danger to our information security. As quantum computing looks set to render many of today's security methods obsolete, from the algorithms we have trusted for so long to cybercriminals data harvesting today for decryption later, you need to prepare for long-term data protection in a quantum world. Join us to find out more about the practical strategies you can adopt today to defeat this threat, to learn how to become crypto-agile, by combining conventional and quantum-resistant encryption in a single network security platform. And assess where your organization ranks in a new global research report of IT and cybersecurity decision-makers that highlights serious concerns about the security of data in motion. Find out here what you can do to make sure your data is secure as it crosses the network by taking a crypto-agile approach to network encryption today and into a Post-Quantum world.

UP COMING

webinar image

June 17, 2021

9:30AM–11:00AM (HKT/SGT)

OPENING PANEL: Hey, someone forgot to invite Sec(urity) to the DevOps party?!

Shane Boulden, Solution Architect, Red Hat
Piyush Ranjan, Team Lead, Engineering, CyberArk
Erick Reyes, Regional Sales Manager, Thales
Andrew Younger, ANZ Manager Security Consultants, Thales

register

 

register

OPENING PANEL: Hey, someone forgot to invite Sec(urity) to the DevOps party?!

Industry leaders from CyberArk, Red Hat, and Thales will discuss how the strength of our portfolios come together to protect credentials, data, and secrets in modern containerized DevOps environments. Learn how the combination of Red Hat OpenShift Container Platform, CyberArk Conjur, CyberArk Privileged Access Manager, Thales CipherTrust Data Security Platform, and Thales Luna HSMs provide end-to-end encryption, secrets & key management for the DevOps community to build secure cloud-native applications.

UP COMING

webinar image

June 17, 2021

11:00AM–12:15PM (HKT/SGT)

Double Key Encryption for Enterprises to Achieve Convenience and Security

Harry Pun, Cybersecurity Executive, Cybersecurity Solutions Group, Microsoft
Welland Chu, Business Development Director, Asia Pacific, Thales

register

 

register

Double Key Encryption for Enterprises to Achieve Convenience and Security

"Convenience", and "Security" are the holy grail to run any businesses in a digital economy. In the past, attaining both criteria has never been easy. In this seminar, Harry Pun, Cyber Security Executive of Microsoft, and Welland Chu, Business Development Director of Thales, will share their insights and use cases of how this holy grail can finally be achieved, thanks to the "Double Key Encryption" from Microsoft 365 which leverages certified security solution from Thales.

At the end of attending the session, our audience will see the security and compliance challenges facing enterprises, and how these enterprises can now operate and grow their business with the support of the world's top cloud & security providers.

UP COMING

webinar image

June 17, 2021

12:15PM–1:15PM (HKT/SGT)

Accenture 5G security solutions powered by Thales Data Security Solutions

Ganesh Narayanan, South East Asia Lead – 5G/Next-Gen Telco/SW Security, Accenture Security

register

 

register

Accenture 5G security solutions powered by Thales Data Security Solutions

5G brings together various new cutting-edge technologies like Cloud, NB IoT, Edge computing, Virtualization and Network slicing, increasing the unknown vulnerabilities and hence expanding the attack surface posing many risks to the service provider and to users. The security threats in 5GT include networks, infrastructure, application and databases, including identity and access breach resulting in service disruption, network degradation and eventually loss of trust in the services offered to the market. Specific 5G differentiators like MEC, Edge services, low latency applications and critical infrastructure applications, need highest levels of data/application/network identity, access, authentication and authorization management supported by encryption and digital certificate life cycle management.

Accenture with its global expertise in 5G networks and security, in partnership with THALES global 5G security products and solutions, provides you a holistic end-end visibility of 5G security across end user terminals, access networks, RAN, back-haul/mid-haul/front haul transport networks, Core networks all the way to internet client facing applications. In this webinar we explain to you how, the security services provided by Accenture include pre & post 5G network/ data security assessments, target 5G security architecture & controls, deployment of Thales data security solutions and a next generation 5G Security Operations Centre that monitors and detects alerts, events and incidents based on 3GPP/NIST/GSMA best practices for 5GT security.

UP COMING

webinar image

June 17, 2021

1:15PM–2:15PM (HKT/SGT)

Accelerating IOT deployment and addressing latest regulatory compliance

Brian Trzupek, SVP, Emerging Markets Product Management, DigiCert
Welland Chu, Business Development Director, Asia Pacific, Thales

register

 

register

Accelerating IOT deployment and addressing latest regulatory compliance

IOT is the building block in Smart Devices, Connected vehicles, Digital Cities, etc. Its prevalence and expected market growth at 25% CAGR in the next 6 years is attracting more hardware products, software applications and services to come into the market. How to ensure the "efficiency", "scalability", "security & compliance" aspects during the manufacturing, implementation and operation phases are of paramount importance to the industry. In this webinar, Brian Trzupek, Senior VP of Product from DigiCert, will share his insights of the market, technology and regulatory landscape, including the latest Cybersecurity Labelling Scheme (CLS) that is launched by the Cyber Security Agency of Singapore recently.

UP COMING

webinar image

June 17, 2021

2:15PM–3:15PM (HKT/SGT)

What is high trust remote signing & how can it benefit your business?

Geoff Bartlett, Customer Success Manager, Ascertia

register

 

register

What is high trust remote signing & how can it benefit your business?

Topics covered in this session include:

  • What is remote signing?
  • Learn more about interoperability, standardization and compliance
  • Ultimate high trust solution – Ascertia ADSS Server & SigningHub
  • Short demo

UP COMING

webinar image

June 17, 2021

3:15PM–3:45PM (HKT/SGT)

Flexible Crypto with Uncompromised Security to Meet Your Dynamic Business Needs

Paul Hampton, Cloud Security Expert, Thales

register

 

register

Flexible Crypto with Uncompromised Security to Meet Your Dynamic Business Needs

Maintaining digital security best practices and ensuring business continuity in challenging times does not mean compromising on confidentiality and integrity. Next generation Thales Luna Hardware Security Modules (HSMs) can provide an uncompromised foundation of digital trust across cloud, on-premises and hybrid environments.

Join us to discover how Thales Luna HSMs give you the flexibility to run your business the way you want, and to manage your business continuity seamlessly and securely.

We'll focus on different use cases that will help you understand how your organization can:

  • safeguard digital identities, applications and sensitive key materials with flexible deployment and billing models
  • move freely between on-premises, cloud, hybrid and multi-cloud environments
  • securely migrate, scale and backup HSMs regardless of your environment
  • meet compliance needs with an HSM root of trust

UP COMING

webinar image

June 17, 2021

3:45PM–4:30PM (HKT/SGT)

CLOSING PANEL: Data Security & Privacy measures in Cloud

Sankarson Banerjee, CIO, RBL Bank
Lakshmi Narayanan Kaliyaperumal, Vice President & Head, Cyber Security Technology & Operations, Infosys Limited
Sameer Singh Jaini, CEO, The Digital Fifth
Rana Gupta, APAC Regional VP, Data Protection, Thales - Moderator

register

 

register

CLOSING PANEL: Data Security & Privacy measures in Cloud

Digital Transformation is leading in growing trend in adoption of cloud journey and multi-cloud strategy for the organizations. With workloads moving in cloud, the concerns regarding data security and privacy has been the major focus areas for the organizations today. Joining us are leaders from the industry who will be discussing security & privacy measures to consider during the cloud adoption journey.

EMEA Agenda

UP COMING

webinar image

June 16, 2021

8:50AM–9:45AM BST

Welcome & Key Note Session: From Zero Trust to Confidential Computing Encryption Technologies in the Age of COVID and Cloud

Claire Pitman-Massie, Snr Director of Field Marketing, EMEA, Thales
Mike Small, Senior Analyst, Kuppingercole

register

 

register

From Zero Trust to Confidential Computing Encryption Technologies in the Age of COVID and Cloud

Working from home driven by the pandemic has dramatically accelerated digital transformation and cloud adoption. This has massively increased the amount of data outside of direct organisational control and hence the risks of data breaches and compliance failures. On top of this the recent European Court of Justice Schrems II judgement has raised the bar on the protection needed for personal data in the cloud. The European Data Protection Board recommendations on this judgment mean that organisations cannot rely solely on legal controls over how data is processed, and that they must implement supplementary technical controls. The term "Confidential Computing" is being promoted as the solution to these challenges. So, what is Confidential Computing and how can this practically help your organisation?

This presentation will cover:

  • How the pandemic has changed the way in which data is processed.
  • What the Schrems II judgement / European Data Protection Board technical recommendations are.
  • What Confidential Computing covers and how it can help to satisfy these requirements.
  • The longer-term challenges of data confidentiality.

Attend this session to learn how your organisation can be better prepared for the next phase on your data protection journey.

UP COMING

webinar image

June 16, 2021

10:15AM–11:00AM BST

The Latest Insights into the State of Data Security in Europe

Chris Harris, EMEA Technical Director, Thales

register

 

register

The Latest Insights into the State of Data Security in Europe

Based on the findings from 2021 Thales Data Threat Report, the global pandemic has had a significant impact on data security with accelerated cloud migration and increased remote working. Many organisations were unprepared for these security challenges. In fact, according to the report only 20% of IT professionals said their security infrastructure was very prepared for the effects of the pandemic. Even with the challenges over the past year, security professionals were already adapting to better secure and protect access to data in the cloud. According to the report, 82% of IT security professionals are concerned about the security risks of employees working remotely and nearly half reported an increase in cyberattacks over the past 12 months.

The 2021 Thales Data Threat Report is based on a survey of more than 2,600 security professionals and executive leaders worldwide conducted by 451 Research, part of S&P Global Market Intelligence. Discover what your industry peers have reported, what they are doing, and what 451 Research recommends to better protect your organisation.

This webinar will review the changing landscape of data security risks and threats, especially those due to the acceleration of cloud migration and remote working due to the pandemic. Specifically, you can expect to learn about:

  • Leading sources of data threats
  • Trends in the adoption of Zero Trust strategies across organisations
  • Top security investments to secure sensitive data in cloud and remote working
  • Cloud migration trends and most effective security controls
  • Future security threats, including quantum computing

UP COMING

webinar image

June 16, 2021

11:30AM–12:00PM BST

Deciphering the Data Security Implications of Schrems II

Todd Moore, VP, Encryption Products, Thales

register

 

register

Deciphering the Data Security Implications of Schrems II (REPLAY)

The Schrems II ruling has created serious implications for data privacy around the globe, forcing organisations to understand its ramifications for their data security strategies. With many opinions surfacing as to what is right and what is wrong, the recent recommendations from the European Data Protection Board provides guidance on measures organisations can take to be compliant with GDPR when sending EU citizen data outside the region.

Drawing on real-life examples, and his own experiences, Todd Moore, Vice President of Data Protection Products at Thales, looks at how organisations can decipher the data security implications of Schrems II and create a data protection framework that:

  • Drives action and removes the ambiguity through an organisation's choice for data protection strategies
  • Enables the creation of a best practice continuum to be carried across all areas of the data protection lifecycle from discovery, through the many nuances of encryption and key management to controlling access
  • Ensures that discover, protect, control is now at the core of every Board level business continuity plan

UP COMING

webinar image

June 16, 2021

12:45PM–1:30PM BST

Back to the Future – Why Quantum Threatens Encryption Security Now

Julian Fay, CTO, Senetas

register

 

register

Back to the Future – Why Quantum Threatens Encryption Security Now

Large scale quantum computers do not yet exist but even today they pose a clear and present danger to our information security. As quantum computing looks set to render many of today's security methods obsolete, from the algorithms we have trusted for so long to cybercriminals data harvesting today for decryption later, you need to prepare for long-term data protection in a quantum world. Join us to find out more about the practical strategies you can adopt today to defeat this threat, to learn how to become crypto-agile, by combining conventional and quantum-resistant encryption in a single network security platform. And assess where your organisation ranks in a new global research report of IT and cybersecurity decision-makers that highlights serious concerns about the security of data in motion. Find out here what you can do to make sure your data is secure as it crosses the network by taking a crypto-agile approach to network encryption today and into a Post-Quantum world.

UP COMING

webinar image

June 16, 2021

3:00PM–3:30PM BST

Retaining Control of Your Encryption Keys and Data in Google Cloud (Replay)

Paul Hampton, Cloud Security Expert, Thales

register

 

register

Retaining Control of Your Encryption Keys and Data in Google Cloud (Replay)

When it comes to encryption keys, security best practice is all about control and separation between encrypted data at rest and the keys. Google Cloud encrypts customer data at rest by default and offers organisations multiple options to control and manage their encryption keys. For many organisations hosting sensitive data or looking to migrate workloads to the cloud, they require additional control and ownership over their encryption keys in order to meet compliance or internal security requirements.

In the first of our Data Protection Coffee Break Series for 2021, we will discuss how Google and Thales are helping organisations address this challenge by giving customer's enhanced control over how and when their encryption keys are used to protect and access encrypted data in the cloud.

UP COMING

webinar image

June 16, 2021

4:00PM–4:45PM BST

How to Tackle Ransomware Head-on with PowerProtect Cyber

Dell Technologies and Thales

register

 

register

How to Tackle Ransomware Head-on with PowerProtect Cyber

How does PowerProtect Cyber Recovery protect your most critical data across your infrastructure, clouds, applications and devices? Experts will be on hand to advise on some of the essential steps needed to ensure you can recover from a cyber-attack. The panel will demonstrate how to isolate your recovery vault, ensure the integrity of your vault and will discuss how AI can help ensure you recover. Dell Technologies and Thales discuss how by working together, organisations can benefit from extended security to the data itself.

UP COMING

webinar image

June 17, 2021

8:45AM–9:30AM BST

Day 2 Opening Remarks & Any Time, Any Way, Anywhere: Trends Accelerating the Payments Market

Claire Pitman-Massie, Sr. Director of Field Marketing, EMEA, Thales
Simon Keates, Head of Payment Security Strategy, Thales

register

 

register

Any Time, Any Way, Anywhere: Trends Accelerating the Payments Market

Rapid adoption of contactless and alternative payment methods, increase use of cloud technologies, and significant changes to consumer spending habits have required organisations to rethink their strategies to address changes to internal and external requirements. In this session Simon and Claire will discuss the significant trends that emerged in 2020, trends for 2021 and beyond, and the security implications that need to be considered by organisations to ensure that they remain compliant and maintain the security of their customers' data.

UP COMING

webinar image

June 17, 2021

10:00AM–10:45AM BST

The CipherTrust Data Security Platform for Developers: Offerings and Vision

Eric Wolff, Senior Manager, Product Marketing, Cloud Data Protection, Thales
Marc Seguin, Director of Product Management, CipherTrust Data Security Platform, Thales

register

 

register

The CipherTrust Data Security Platform for Developers: Offerings and Vision

Software developers don't need to be crypto experts, or source, use, and store in dangerous places poor-quality keys. With CipherTrust Application Data Protection, devops gets a solution for integrating data protection into applications with a secure key source and repository, and then sending those applications into production. In this session, Eric Wolff will provide a quick introduction to the application-level data protection tools in the CipherTrust Data Security Platform, followed by a live conversation about the Thales vision for app-layer data protection.

UP COMING

webinar image

June 17, 2021

11:15AM–12:00PM BST

Network Data Security Vulnerabilities: Cybersecurity Survey Reveals Weaknesses

Julian Fay, CTO, Senetas
Stan Mesceda, Senior Product Manager, High Speed Encryption Products, Thales

register

 

register

Network Data Security Vulnerabilities: Cybersecurity Survey Reveals Weaknesses

More data is in motion than ever before—a trend that will continue in line with the steep cloud adoption and digital transformation curves, as well as the significant impact of the COVID-19 pandemic on remote working. A number of important factors have significantly increased demand for, and dependency on, high-speed wide-area networks. These include workloads migrating to and from the cloud, real-time global collaboration, big data and cloud data storage, 5G and the expectation of higher bandwidth out to the edge and need for larger and faster aggregation points.

However, only 54% of enterprises feel confident their network security will protect them against cyber threats. As organisations of all sizes continue to adopt connected technologies in support of Cloud Services, Mobility, CCTV, BYOD and Business Continuity; their increased network traffic expose them to increased data in motion security risks. A global research report of IT and cybersecurity decision-makers highlights serious concerns about the security of data in motion across networks. Assess where your organisation ranks amongst these findings. Find out here what you can do to make sure your data is secure as it crosses the network by taking a crypto-agile approach to network encryption.

UP COMING

webinar image

June 17, 2021

12:30PM–1:15PM BST

DKE: Protecting Sensitive Data with Luna Key Broker for Microsoft Double Key Encryption

John Ray, Director, Product Management, Hardware Security Modules, Thales

register

 

register

DKE: Protecting Sensitive Data with Luna Key Broker for Microsoft Double Key Encryption

Today's remote working environment relies heavily on the collaborative sharing of information, challenging organisations to maintain the security of confidential data and regulatory compliance while driving employee productivity. For organisations in highly-regulated industries such as financial services, government and healthcare, they can now leverage Thales Luna HSMs and Luna Cloud HSMs with Double Key Encryption (DKE) for Microsoft 365 and comply with regulations such as HIPAA, PCI DSS, GDPR and Schrems II.

Learn more about:

  • What is Microsoft Double Key Encryption (DKE)?
  • How you can enhance control and security over sensitive data in Microsoft Azure with Luna HSMs

UP COMING

webinar image

June 17, 2021

1:45PM–2:30PM BST

Hybrid Luna HSM: Flexible Crypto with Uncompromised Trust: Security to Meet Your Dynamic Business Needs

Paul Hampton, Cloud Security Expert, Thales

register

 

register

Hybrid Luna HSM: Flexible Crypto with Uncompromised Trust: Security to Meet Your Dynamic Business Needs

Maintaining digital security best practices and ensuring business continuity in challenging times does not mean compromising on confidentiality and integrity. Next generation Thales Luna Hardware Security Modules (HSMs) can provide an uncompromised foundation of digital trust across cloud, on-premises and hybrid environments.

Join us to discover how Thales Luna HSMs give you the flexibility to run your business the way you want, and to manage your business continuity seamlessly and securely.

We'll focus on different use cases that will help you understand how your organisation can:

  • Safeguard digital identities, applications and sensitive key materials with flexible deployment and billing models
  • Move freely between on-premises, cloud, hybrid and multi-cloud environments
  • Securely migrate, scale and backup HSMs regardless of your environment
  • Meet compliance needs with an HSM root of trust

UP COMING

webinar image

June 17, 2021

3:00PM–3:45PM BST

Protecting credentials, data, and secrets in a containerized DevOps environments

Dave Meurer, Partner Solutions Architect, Red Hat
Evan Litwak, Sr. Director, DevSecOps Strategy, CyberArk
Rohini Deepak, Senior Manager, Strategy, Thales

register

 

register

Protecting credentials, data, and secrets in a containerized DevOps environments

Industry leaders from CyberArk, Red Hat, and Thales will discuss how the strength of our portfolios come together to protect credentials, data, and secrets in modern containerized DevOps environments. Learn how the combination of Red Hat OpenShift Container Platform, CyberArk Conjur, CyberArk Privileged Access Manager, Thales CipherTrust Data Security Platform, and Thales Luna HSMs provide end-to-end encryption, secrets & key management for the DevOps community to build secure cloud-native applications.

UP COMING

webinar image

June 17, 2021

4:15PM–5:00PM BST

The end-end solutions needed for holistic 5G security

Niraj Rathod, Mobile Security Architect, BT
Rohini Deepak, Senior Manager, Strategy, Thales
Dilip Patel, Global Alliance Manager, Thales - Moderator

register

 

register

The end-end solutions needed for holistic 5G security

The impacts of 5G on our daily life will be massive, with promises of high-speed connections, ultra-low latency, and long battery life for low-power IoT devices. This fifth-generation telecom standard shifts the underlying networks to software-centric open architectures. This openness speeds innovation but also introduces security risks.

In this session, hear from industry-leading experts in the 5G field, as they discuss the security challenges facing modern Telco, and how Thales is uniquely positioned to help address these challenges to enable continued innovation.

Americas Agenda

UP COMING

webinar image

June 16, 2021

8:15AM–9:30AM ET

Welcome Remarks / Key Findings from the 2021 Thales Data Threat Report

Kevin Williams, Vice President Americas, Thales
Eric Hanselman, Chief Analyst, 451 Research

register

 

register

Key Findings from the 2021 Thales Data Threat Report

Based on the findings from 2021 Thales Data Threat Report, the global pandemic has had a significant impact on data security with accelerated cloud migration and increased remote working. Many organizations were unprepared for these security challenges. In fact, according to the report only 20% of IT professionals said their security infrastructure was very prepared for the effects of the pandemic. Even with the challenges over the past year, security professionals were already adapting to better secure and protect access to data in the cloud. According to the report, 82% of IT security professionals are concerned about the security risks of employees working remotely and nearly half reported an increase in cyberattacks over the past 12 months.

The 2021 Thales Data Threat Report is based on a survey of more than 2,600 security professionals and executive leaders worldwide conducted by 451 Research, part of S&P Global Market Intelligence. Discover what your industry peers have reported, what they are doing, and what 451 Research recommends to better protect your organization.

This webinar will review the changing landscape of data security risks and threats, especially those due to the acceleration of cloud migration and remote working due to the pandemic. Specifically, you can expect to learn about:

  • Leading sources of data threats
  • Trends in the adoption of Zero Trust strategies across organizations
  • Top security investments to secure sensitive data in cloud and remote working
  • Cloud migration trends and most effective security controls
  • Future security threats, including quantum computing

UP COMING

webinar image

June 16, 2021

10:00AM–10:45AM ET

How to Tackle Ransomware Head-on with PowerProtect Cyber

Dell Technologies and Thales

register

 

register

How to Tackle Ransomware Head-on with PowerProtect Cyber

How does PowerProtect Cyber Recovery protect your most critical data across your infrastructure, clouds, applications and devices? Experts will be on hand to advise on some of the essential steps needed to ensure you can recover from a cyber-attack. The panel will demonstrate how to isolate your recovery vault, ensure the integrity of your vault and will discuss how AI can help ensure you recover. Dell Technologies and Thales discuss how by working together, organisations can benefit from extended security to the data itself.

UP COMING

webinar image

June 16, 2021

11:15AM–12:00PM ET

Luna HSMs: Not Just the Foundation, But the Future of Digital Trust

John Ray, Director, HSM Product Management, Thales

register

 

register

Luna HSMs: Not Just the Foundation, But the Future of Digital Trust

Learn about the current Hardware Security Module market and where it is heading. You'll find out how Thales Luna HSMs are the foundation of digital trust for existing solutions, and how they continue to evolve to meet the challenges of new use cases, new technologies and deployment scenarios. Lastly, you will learn how to build a root of trust for your digital transformation using a modern HSM infrastructure.

UP COMING

webinar image

June 16, 2021

12:30PM–1:45PM ET

The White House Executive Order on Cybersecurity: The Blueprint for How Companies Secure Their Infrastructure

Stephen O'Connor, Security Architect, Thales
Cina Shaykhian, Principal Solution Architect, Thales

Ron Stamboly, Sr. Security Engineer, Thales

register

 

register

The White House Executive Order on Cybersecurity: The Blueprint for How Companies Secure Their Infrastructure

On May 12, 2021, President Biden signed an Executive Order to improve the nation's cybersecurity and protect federal government networks. In the order it stated "Recent cybersecurity incidents such as SolarWinds, Microsoft Exchange, and the Colonial Pipeline incident are a sobering reminder that U.S. public and private sector entities increasingly face sophisticated malicious cyber activity from both nation-state actors and cyber criminals. These incidents share commonalities, including insufficient cybersecurity defenses that leave public and private sector entities more vulnerable to incidents." Two key areas of focus from the Executive Order mandate Federal agencies to implement multi-factor authentication and encryption for data at rest and in motion. This session will provide the specifics on this mandate and how Thales can help you achieve this required security posture.

UP COMING

webinar image

June 16, 2021

2:15PM–3:00PM ET

Back to the Future – Why Quantum Threatens Encryption Security Now

Julian Fay, CTO, Senetas

register

 

register

Back to the Future – Why Quantum Threatens Encryption Security Now

Large scale quantum computers do not yet exist but even today they pose a clear and present danger to our information security. As quantum computing looks set to render many of today's security methods obsolete, from the algorithms we have trusted for so long to cybercriminals data harvesting today for decryption later, you need to prepare for long-term data protection in a quantum world. Join us to find out more about the practical strategies you can adopt today to defeat this threat, to learn how to become crypto-agile, by combining conventional and quantum-resistant encryption in a single network security platform.

UP COMING

webinar image

June 16, 2021

3:30PM–4:15PM ET

Google Cloud & Thales: Building Trusted Cloud Environments

Eric Wolff, Sr. Manager, Product Marketing, Cloud Data Protection, Thales
Leonor Jones, Director, Product Management, Encryption, Thales

register

 

register

Google Cloud & Thales: Building Trusted Cloud Environments

Join this webinar and listen to the latest updates on how Google Cloud and Thales are working together to secure sensitive data and workloads in the cloud. Last year, Google Cloud and Thales announced new external key management capabilities that allow organizations to be in full control of the keys to their encrypted data in Google Cloud. This webinar will share a new solution available with Google Workspace and Thales.

UP COMING

webinar image

June 16, 2021

4:45PM–5:30PM ET

Dell Intrinsic Security

Josh Jaffe, Vice President, Cyber Security, Dell Technologies

register

 

register

Dell Intrinsic Security

Dell Technologies is leveraging the depth and breadth of its portfolio to change the entire culture of cyber security. Intrinsic security is not a product, but an end-to-end modern security strategy designed entirely around achieving trust. Learn how security is being designed into Dell Technologies solutions from the start, and how the approach can help better protect your IT assets, data, and business.

UP COMING

webinar image

June 16, 2021

6:00PM–6:45PM ET

PKI for IoT: How to Secure Connected Devices from Design to End-of-Life

Ellen Boehm, VP of IoT Strategy & Operations, Keyfactor
Ryan Sanders, Sr. Product Marketing Manager, Keyfactor

register

 

register

PKI for IoT: How to Secure Connected Devices from Design to End-of-Life

Companies are now deploying billions of network-connected devices into mission-critical environments, such as medical devices, industrial, and manufacturing control systems.

However, as more stringent customer requirements and regulations emerge, manufacturers must address security concerns, such as authentication, data encryption, and integrity of software and firmware on their devices.

With the emergence of IoT, PKI has become an instrumental tool in securing the next generation of industrial and consumer-connected devices. In this session, Keyfactor's VP of IoT Strategy and Operations, Ellen Boehm, and Senior Product Marketing Manager, Ryan Sanders, will discuss:

  • Security challenges that IoT developers and device manufacturers face
  • How PKI can address challenges with complex supply chains and product lifecycles
  • Considerations for design, deployment and management of PKI for IoT devices

UP COMING

webinar image

June 17, 2021

8:00AM–8:15AM ET

Crypto Summit: Day 2 Opening Remarks

Kevin Williams, Vice President Americas, Thales
Lanesa Sherfey, Director of Field Marketing Americas, Thales

register

 

register

Crypto Summit: Day 2 Opening Remarks

UP COMING

webinar image

June 17, 2021

8:45AM–9:30AM ET

Hybrid Luna HSM: Flexible Crypto with Uncompromised Trust: Security to Meet Your Dynamic Business Needs

Paul Hampton, Cloud Security Expert, Thales

register

 

register

Hybrid Luna HSM: Flexible Crypto with Uncompromised Trust: Security to Meet Your Dynamic Business Needs

Maintaining digital security best practices and ensuring business continuity in challenging times does not mean compromising on confidentiality and integrity. Next generation Thales Luna Hardware Security Modules (HSMs) can provide an uncompromised foundation of digital trust across cloud, on-premises and hybrid environments.

Join us to discover how Thales Luna HSMs give you the flexibility to run your business the way you want, and to manage your business continuity seamlessly and securely.

We'll focus on different use cases that will help you understand how your organization can:

  • safeguard digital identities, applications and sensitive key materials with flexible deployment and billing models
  • move freely between on-premises, cloud, hybrid and multi-cloud environments
  • securely migrate, scale and backup HSMs regardless of your environment
  • meet compliance needs with an HSM root of trust

UP COMING

webinar image

June 17, 2021

10:00AM–10:45AM ET

Protecting credentials, data, and secrets in a containerized DevOps environments

Dave Meurer, Partner Solutions Architect, Red Hat
Evan Litwak, Sr. Director, DevSecOps Strategy, CyberArk
Rohini Deepak, Sr. Manager, Strategy, Thales

register

 

register

Protecting credentials, data, and secrets in a containerized DevOps environments

Industry leaders from CyberArk, Red Hat, and Thales will discuss how the strength of our portfolios come together to protect credentials, data, and secrets in modern containerized DevOps environments. Learn how the combination of Red Hat OpenShift Container Platform, CyberArk Conjur, CyberArk Privileged Access Manager, Thales CipherTrust Data Security Platform, and Thales Luna HSMs provide end-to-end encryption, secrets & key management for the DevOps community to build secure cloud-native applications.

UP COMING

webinar image

June 17, 2021

11:15AM–12:00PM ET

Recent Advances in Cloud Key Management

Eric Wolff, Sr. Manager, Product Marketing, Cloud Data Protection, Thales
Leonor Jones, Director, Product Management, Encryption, Thales

register

 

register

Recent Advances in Cloud Key Management

Cloud key management began with bring your own key (BYOK) and hold your own key (HYOK) offerings from cloud providers are multiplying. In this session, Eric Wolff will provide a quick introduction to cloud key life cycle management followed by a live conversation between Leonor Jones and Eric about the lastest advances in cloud key management.

UP COMING

webinar image

June 17, 2021

12:30PM–1:15PM ET

Protecting Sensitive Data with Luna Key Broker for Microsoft Double Key Encryption

John Ray, Director, Product Management, Hardware Security Modules, Thales

register

 

register

Protecting Sensitive Data with Luna Key Broker for Microsoft Double Key Encryption

Today's remote working environment relies heavily on the collaborative sharing of information, challenging organizations to maintain the security of confidential data and regulatory compliance while driving employee productivity. For organizations in highly-regulated industries such as financial services, government and healthcare, they can now leverage Thales Luna HSMs and Luna Cloud HSMs with Double Key Encryption (DKE) for Microsoft 365 and comply with regulations such as HIPAA, PCI DSS, GDPR and Schrems II.

Learn more about:

  • What is Microsoft Double Key Encryption (DKE)?
  • How you can enhance control and security over sensitive data in Microsoft Azure with Luna HSMs

UP COMING

webinar image

June 17, 2021

1:45PM–2:30PM ET

The end-end solutions needed for holistic 5G security

Thomas Mueller, ER&D CTO, Global Practice Head Connectivity, Wipro
Chen Arbel, VP, Business Development, 5G & Cloud Security, Thales

register

 

register

The end-end solutions needed for holistic 5G security

The impacts of 5G on our daily life will be massive, with promises of high-speed connections, ultra-low latency, and long battery life for low-power IoT devices. This fifth-generation telecom standard shifts the underlying networks to software-centric open architectures. This openness speeds innovation but also introduces security risks.

In this session, hear from industry-leading experts in the 5G field, as they discuss the security challenges facing modern Telco, and how Thales is uniquely positioned to help address these challenges to enable continued innovation.

UP COMING

webinar image

June 17, 2021

3:00PM–3:45PM ET

Protecting Teradata Workloads in the Cloud with Data Encryption

Jay Irwin, Director, Teradata Center for Enterprise Security, Teradata
Blake Wood, Director, Business Development, Thales

register

 

register

Protecting Teradata Workloads in the Cloud with Data Encryption

Teradata is a great example of a large software company that has successfully shifted their core business to the public Cloud with Teradata Vantage. As part of this shift to the Cloud, security considerations change and the protection of data against breach becomes a top priority. In this webinar, we will learn how to satisfy data security requirements for Teradata databases in the Cloud using data encryption methods and centralized key management. We will also learn about other services in the Teradata Vantage product suite and how a data encryption strategy can be leveraged to protect data for those services as well.

Key Takeaways:

  • Learn about working with Teradata Vantage in the public Cloud
  • Why centralized key management is the foundation for enterprise data encryption
  • What are the available data encryption methods for protecting Teradata Database
  • Other Teradata Vantage platform services that can be protect in the Cloud

UP COMING

webinar image

June 17, 2021

4:15PM–5:00PM ET

Network Data Security Vulnerabilities: Cybersecurity Survey Reveals Weaknesses

Julian Fay, CTO, Senetas
Stan Mesceda, Sr. Product Manager, High Speed Encryption Products, Thales

register

 

register

Network Data Security Vulnerabilities: Cybersecurity Survey Reveals Weaknesses

More data is in motion than ever before—a trend that will continue in line with the steep cloud adoption and digital transformation curves, as well as the significant impact of the COVID-19 pandemic on remote working. A number of important factors have significantly increased demand for, and dependency on, high-speed wide-area networks. These include workloads migrating to and from the cloud, real-time global collaboration, big data and cloud data storage, 5G and the expectation of higher bandwidth out to the edge and need for larger and faster aggregation points.

However, only 54% of enterprises feel confident their network security will protect them against cyber threats. As organizations of all sizes continue to adopt connected technologies in support of Cloud Services, Mobility, CCTV, BYOD and Business Continuity; their increased network traffic expose them to increased data in motion security risks. A global research report of IT and cybersecurity decision-makers highlights serious concerns about the security of data in motion across networks. Assess where your organization ranks amongst these findings. Find out here what you can do to make sure your data is secure as it crosses the network by taking a crypto-agile approach to network encryption.

UP COMING

webinar image

June 17, 2021

5:30PM–6:15PM ET

The CipherTrust Data Security Platform for Developers: Offerings and Vision

Eric Wolff, Sr. Manager, Product Marketing, Cloud Data Protection, Thales
Marc Seguin, Director of Product Management, CipherTrust Data Security Platform, Thales

register

 

register

The CipherTrust Data Security Platform for Developers: Offerings and Vision

Software developers don't need to be crypto experts, or source, use, and store in dangerous places poor-quality keys. With CipherTrust Application Data Protection, devops gets a solution for integrating data protection into applications with a secure key source and repository, and then sending those applications into production. In this session, Eric Wolff will provide a quick introduction to the application-level data protection tools in the CipherTrust Data Security Platform, followed by a live conversation about the Thales vision for app-layer data protection.

What Attendees Said About Last Year’s Summit

Featured speakers

Speakers

+

Rows

+

Todd Moore

Todd Moore

VP, Encryption Products
Thales

Rana Gupta

Rana Gupta

APAC Regional VP, Data Protection
Thales

Rob Elliss

Rob Elliss

VP, EMEA Sales
Thales

Kevin Williams

Kevin Williams

Vice President Americas
Thales

Chen Arbel

Chen Arbel

VP, Business Development, 5G & Cloud Security, Thales

Alex Basin

Alex Basin

Security Engineer Manager
Thales

Jeff Chen

Jeff Chen

Manager of Sales Engineer - Greater China & Korea, Thales

Shaun Chen

Shaun Chen

Director of Sales Engineer - APAC
Thales

Welland Chu

Welland Chu

Director, Business Development
Thales

Rohini Deepak

Rohini Deepak

Senior Manager, Strategy
Thales

Paul Hampton

Paul Hampton

Senior Manager, Cloud HSM Services, Thales

Chris Harris

Chris Harris

EMEA Technical Director
Thales

Leonor Jones

Leonor Jones

Director, Product Management, Encryption, Thales

Tzach Kaufmann

Tzach Kaufmann

Director, Product Management,
Data Discovery & Classification
Thales

Simon Keates

Simon Keates

Head of Strategy, Payments Security
Thales

Byoungchoon Koo

Byoungchoon Koo

Senior Sales Engineer
Thales

Wood Lam

Wood Lam

Sales Engineer
Thales

Stan Mesceda

Stan Mesceda

Senior Product Manager, High Speed Encryption Products, Thales

Stephen O'Connor

Stephen O'Connor

Security Architect
Thales

Dilip Patel

Dilip Patel

Global Alliance Manager
Thales

Claire Pitman-Massie

Claire Pitman-Massie

Sr. Director of Field Marketing, EMEA, Thales

John Ray

John Ray

Director, Product Management, Hardware Security Modules, Thales

Erick Reyes

Erick Reyes

Regional Sales Manager
Thales

Marc Seguin

Marc Seguin

Director of Product Management, CipherTrust Data Security Platform, Thales

Lanesa Sherfey

Lanesa Sherfey

Director of Field Marketing Americas
Thales

Prasun Srivastava

Prasun Srivastava

Solution Architect
Thales

Ron Stamboly

Ron Stamboly

Sr. Security Engineer
Thales

Eric Wolff

Eric Wolff

Senior Manager, Product Marketing, 
Cloud Data Protection, Thales

Blake Wood

Blake Wood

Director, Business Development
Thales

Andrew Younger

Andrew Younger

ANZ Manager Security Consultants
Thales

Featured Guest Speakers

Eric Hanselman - 451 Research

Eric Hanselman

Chief Analyst
451 Research, part of S&P Global Marketing Intelligence

Ganesh Narayan - ccenture

Ganesh Narayan

Senior Principal, Security Innovation
Accenture

Niraj Rathod BT

Niraj Rathod

Mobile Security Architect, BT

Evan Litwak - CyberArk

Evan Litwak

Sr. Director, DevSecOps Strategy, CyberArk

Piyush Ranjan - CyberArk

Piyush Ranjan

Team Lead, Engineering, CyberArk

Josh Jaffe - Dell Technologies

Josh Jaffe

Vice President, Cyber Security
Dell Technologies

Jason Proctor

Jason Proctor

Systems Engineer
Dell Technologies

Sameer Singh Jaini - CEO The Digital Fifth

Sameer Singh Jaini

CEO, The Digital Fifth

Simon Piff - IDC

Simon Piff

VP, Security Practice, Asia-Pacific
IDC

Lakshmi Narayanan Kaliyaperumal - Infosys Limited

Lakshmi Narayanan Kaliyaperumal

Vice President & Head, Cyber Security Technology & Operations, Infosys Limited

Ellen Boehm - Keyfactor

Ellen Boehm

VP of IoT Strategy & Operations, Keyfactor

Ryan Sanders - Keyfactor

Ryan Sanders

Sr. Product Marketing Manager, Keyfactor

Mike Small - KuppingerCole

Mike Small

Senior Analyst
KuppingerCole

Harry Pun - Microsoft

Harry Pun

Cybersecurity Executive
Microsoft

Sankarson Banerjee - RBL Bank

Sankarson Banerjee

CIO, RBL Bank

Shane Boulden - Red Hat

Shane Boulden

Solution Architect, Red Hat

Dave Meurer - Red Hat

Dave Meurer

Partner Solutions Architect
Red Hat

Julian Fay Senetas

Julian Fay

CTO
Senetas

Jay Irwin Teradata

Jay Irwin

Director, Teradata Center for Enterprise Security, Teradata

Thomas Mueller WiPro

Thomas Mueller

ER&D CTO, Global Practice Head Connectivity, Wipro

Thanks to our partners

IBM logo  OCD logo  google logo