trusted access

downarrow

Building a Future We Can All Trust

**Join this three-day global virtual summit on the latest trends in data encryption, key management and multi-cloud security. Register for free thought leadership and insights from security evangelists and technologists in the form of live webinars, on-demand webinars and interactive Tech Talk sessions. From IT security managers and CSOs to cloud transformation leaders, professionals from a diverse range of technical backgrounds are welcome!

Todd Moore, Vice President of Encryption Products, shares what you can expect from the Thales Crypto Summit. Learn about best practices and trends in encryption, key management and multi-cloud security so your organization can discover and protect sensitive data wherever it resides. You will also learn more about the new Thales

Watch sessions below

APAC Agenda

Day 1 - October 5, 2021

UP COMING

webinar image

9:15AM HKT

How to Enable Multiple User Authentication Journeys with Modern Authentication

Asaf Lerner, IAM Market Owner, Thales

watch now

 

watch now

How to Enable Multiple User Authentication Journeys with Modern Authentication

The new normal of remote working has led to an explosion of unforeseen authentication needs. The multitude of end devices, locations, applications and roles means that a single user will likely need more than one way of accessing the range of apps they need throughout their day. Join us in this session to hear how to effectively support multiple user authentication journeys to achieve secure remote access, without burdening your end users.

UP COMING

webinar image

10:30AM HKT

Identity Authentication: Ensuring the Integrity of Your Systems

Simon Piff, VP Security Research - APAC Region, IDC

watch now

 

watch now

Identity Authentication: Ensuring the Integrity of Your Systems

Today's businesses rely on digital technologies far more than ever before. Digital industry ecosystems are emerging as the supply chain choice of a most industries; requiring digital connectivity between all parties in the supply chain to facilitate better product planning and ability to serve the markets and customers. Governments are relying on technology to more deeply engage, inform and serve their population. Consumer in most markets have had no choice but to default to ecommerce to have even the most basic necessities delivered during these times of social distancing and lockdowns.

In spite of this, millions still rely on the most basic of security features to secure these highly critical, and yet mostly fragile, networks of commerce. Passwords are still used as the default for security.

Threat actors know this, which is why millions of passwords appear on the Deep Web markets every year. They are stolen, sold, traded and ultimately used to break into networks and systems the world over. The only way to prevent this activity, and to implement a more mature security environment is through identity authentication. This means not just trusting to a password, but actively following up with other challenges to the identity of the user, device or application, eventually being able to dispense with passwords altogether and relying on more robust identifiers for security purposes.

However, whilst IDC believes IT buyers should already have MFA solutions included within their present year security software budgets; if not, include such next year and that this is a must-do security thing, but we believe current market acceptance rates to be a disappointing 30% or less. That means 7 out of 10 users are all still making up passwords.

The IDC presentation will take a closer look into the advanced authentication market and provide guidance to technology buyers on what to look for in such an important solution.

UP COMING

webinar image

2:15PM HKT

What is Modern Authentication and Its Role in Achieving Zero Trust Security?

Danna Bethlehem, Director of IAM Product Marketing

watch now

 

watch now

What is Modern Authentication and Its Role in Achieving Zero Trust Security?

The need for secure, yet convenient ways of logging into apps is driving the quest for more effective authentication. In this session we'll do a deep dive into the innovations shaping modern authentication concepts and the role they play in achieving Zero Trust security.

UP COMING

webinar image

3:30PM HKT

Key Findings from the 2021 Thales Access Management Index: APAC Edition

Rana Gupta, VP APAC Sales, Thales

watch now

 

watch now

Key Findings from the 2021 Thales Access Management Index: APAC Edition

The changes that the last year has wrought upon organizations' technology teams have been most acute in access management. Seemingly overnight, remote access went from being an exception to the default working model for a large swath of employees. The 2021 Thales Access Management Index, based on data from a survey of more than 2,600 respondents worldwide including 750 security professionals across Asia-Pacific, looks to identify the depth of that change, as well as the current state of and plans for access management across a range of industries.

This webinar will review the findings of the 2021 Thales Access Management Index APAC Edition and how organizations in APAC are responding to the new challenges for authentication and access management created by increased remote work and cloud adoption. Specifically, in this webinar attendees will learn:
- How prepared were organizations in APAC for the changes of remote work and cloud adoption
- Which access management technologies APAC organizations are deploying to secure access to the cloud and remote work
- Where APAC organizations are in their adoption of Zero Trust
- What technologies are APAC organizations investing in to modern their IAM strategy

UP COMING

webinar image

4:45PM HKT

Identity Proofing: The New Foundation for Every Digital Identity

Hsin Hau Hanna, Identity & Biometrics Solutions, Thales

watch now

 

watch now

Identity Proofing: The New Foundation for Every Digital Identity

Know Your Customer (KYC) has become one of the most prevalent terms in the post-pandemic digital identity world. And for every enterprise's digital initiatives, Identity Proofing must become the foundation of KYC be they on-boarding new customers, partners or employees. This session looks at how advances in identity proofing such as biometrics and smartphone technologies is enabling organisations to deliver KYC effectively grow by offering a quick, frictionless and secure identity proofing environment.

Day 2 - October 6, 2021

UP COMING

webinar image

11:45AM HKT

Security in Your Hands: The Force is with You

Ellen Thorén, Program Manager, Versasec
John Asan, Technical Leader, Versasec

watch now

 

watch now

Security in Your Hands: The Force is with You

In the cybersecurity space there are myths that Public Key Infrastructure (PKI) is an old technology and a high-priced solution. Some companies are still assured that hardware based PKI multi-factor authentication is only for large entities and the companies might even think that their information is not important and will never be hacked.

Enterprises have access to a big range of advantages and methods when using hardware-based PKI. Together, Versasec vSEC:CMS and Thales products bring world-class PKI security solutions required for strong authentication, with physical or virtual smart cards for enterprises of any size.
In this Tech Talk you will learn more about:

  • Busting myths about Public Key Infrastructure (PKI)
  • Capabilities and advantages of multi-factor authentication using hardware based PKI
  • Versasec vSEC:CMS and its role in device management.

Join us here and we will help you make the very justified case for PKI-based multi factor authentication at your organisation and show that security is in your hands.

UP COMING

webinar image

2:00PM HKT

新遠端辦公年代資安全新思維 : 零信任 、無密碼認證邁向主動防禦 (The Challenge of Remote Work to Trust Access – Zero Trust, Passwordless Authentication and Move Towards Active Defense)

Jeff Chen Sales Engineering Manager, Thales

watch now

 

watch now

新遠端辦公年代資安全新思維 : 零信任 、無密碼認證邁向主動防禦 (The Challenge of Remote Work to Trust Access – Zero Trust, Passwordless Authentication and Move Towards Active Defense)

網路犯罪者利用疫情和遠端辦公轉移趨勢,不斷發動各種攻擊,其中勒索軟體攻擊激增150%,而台灣更是排名前五大的受害區。為了強化資安戰略,政府除了推動「資安即國安2.0」戰略,也成立資通安全署以期建立並提升國內關鍵基礎設施及核心資料庫的防護韌性。當今遠端辦公成為新常態,企業要做好資安防護,而身份認證與存取就是第一道防線。

疫情將人們快速帶入遠端辦公年代,伴隨而來的新風險促使IT專業人員努力運用既有的安全工具進行安全管控。遠端存取從原本屬於例外的使用例,轉變成許多員工預設的工作模式。

當企業踏入了一個多變且複雜的世界,該如何在不確定性之間繼續安全的營運,並在鎖住存取和不中斷工作流程之間取得平衡,執行工作和協同合作將需要存取機敏資料,而企業主管如何確保不會出現衝擊生產力的副作用。

Thales Trusted Access Summit 線上會議-公佈《Thales 2021存取管理指標》 將在 2021 年 10 月 6 日14:00 舉行,邀請您一同參加。Thales大中華區資深技術顧問陳昶旭,將與您分享報告中其他存取安全現況與趨勢,也將透過現代化身份驗證和存取管理的應用實例,協助掌握新的調適性或脈絡存取與無密碼認證等方法,強化資安防禦新戰略。

在會議中您將可以進一步了解:

  1. 透析COVID 影響下的存取管理技術新趨勢
  2. 新世代零信任資安防禦的模型
  3. 打破傳統防護思維,無密碼認證縱深防禦
  4. 實際案例分享如何透過Thales 雲端存取合規防護,順應動態工作空間

 

UP COMING

webinar image

3:15PM HKT

Panel Discussion: IAM Essentials to Securing the Future of Work

Burgess Cooper, Ernst & Young; Yogesh Kumar, Tata Power; Bijender Mishra, Alkem Laboratories; CK Prasad, RailTel

watch now

 

watch now

Panel Discussion: IAM Essentials to Securing the Future of Work

In this panel, experts from Thales, Ernst & Young, Tata Power, Alkem Laboratories, and RailTel Corporation will discuss strategies and technologies organizations should deploy to be ready to secure the changes in how users are accessing data - from the cloud to enterprise applications.

UP COMING

webinar image

4:45PM HKT

ยืนยันตัวตนอย่างรวดเร็วและมั่นคงปลอดภัยด้วย (Optimize Security & Convenience with Passwordless Authentication)

Montri Trainaphakul, Regional Sales Manager - IAM, Thales

watch now

 

watch now

ยืนยันตัวตนอย่างรวดเร็วและมั่นคงปลอดภัยด้วย (Optimize Security & Convenience with Passwordless Authentication)

ภายในงานสัมมนานี้ ท่านจะได้รู้จักการพิสูจน์ตัวตนแบบ Passwordless ประเภทต่างๆ ประโยชน์ที่ธุรกิจองค์กรจะได้รับ ข้อดีข้อเสียเมื่อเทียบกับการใช้ Password แบบดั้งเดิม การวางกลยุทธ์เพื่อให้การพิสูจน์ตัวตนแบบ Passwordless สัมฤทธิ์ผล และแนะนำโซลูชัน Passwordless จาก Thales

หัวข้อการบรรยายประกอบด้วย
- ปัญหาของการพิสูจน์ตัวตนแบบ Password
- Passwordless คืออะไร สำคัญอย่างไร
- ความมั่นคงปลอดภัย VS ความสะดวกในการยืนยันตัวตน
- Passwordless แบบ Zero Factor, Single Factor, Multi-factor และ SSO
- แนะนำโซลูชัน SafeNet Trusted Access จาก Thales
- วางกลยุทธ์ Passwordless ให้สัมฤทธิ์ผล

EMEA Agenda

Day 1 - October 5, 2021

UP COMING

webinar image

9:30AM CET

Change for the Better: Latest Trends and Future of Identity & Access Management

Martin Kuppinger, Founder and Principal Analyst, KuppingerCole Analysts

watch now

 

watch now

Change for the Better: Latest Trends and Future of Identity & Access Management

Throughout the last year, organisations have ridden a tidal wave of change. Not all change was good. With the rise of ransomware and identity based breaches perpetrating organisations because of the sudden rise in remote working, the hackers grasped the opportunity to make the most of the vulnerabilities it caused.

However, it’s not all doom and gloom. There has been positive change, and change is driving trends that will take IAM into the future. Join Martin Kuppinger, as he discusses the latest IAM trends that are driving positive organisational direction and what this means for future growth, security and IAM modernisation.

UP COMING

webinar image

10:45AM CET

Identity Proofing: The New Foundation for Every Digital Identity

Hsin Hau Hanna, Identity & Biometrics Solutions, Thales

watch now

 

watch now

Identity Proofing: The New Foundation for Every Digital Identity

Know Your Customer (KYC) has become one of the most prevalent terms in the post-pandemic digital identity world. And for every enterprise's digital initiatives, Identity Proofing must become the foundation of KYC be they on-boarding new customers, partners or employees. This session looks at how advances in identity proofing such as biometrics and smartphone technologies is enabling organisations to deliver KYC effectively grow by offering a quick, frictionless and secure identity proofing environment.

UP COMING

webinar image

12:00PM CET

Key Findings from the 2021 Thales Access Management Index: European Edition

Dirk Geeraerts, VP IAM Sales - EMEA, Thales

watch now

 

watch now

Key Findings from the 2021 Thales Access Management Index: European Edition

A new era of remote working and accelerated cloud transformation calls for a modern security mindset for European organisations when it comes secure access to cloud services and enterprise apps. Find out what lies ahead for identity and access management and the latest findings in the results of the 2021 Thales Access Management Index Report for Europe and the UK.

UP COMING

webinar image

1:15PM CET

Taking Control of Your Access Security in a Multi-Cloud Environment

Danna Bethlehem, Director of IAM Product Marketing, Thales
Claire Pitman-Massie, Sr. Director EMEA Field Marketing, Thales

watch now

 

watch now

Taking Control of Your Access Security in a Multi-Cloud Environment

By trusting identity protection and authentication to your cloud provider, you may be exposing your organizations to a higher threat of data breach. Join us in this session to learn more about the Shared Security model, how it allows you to control your own access security and reduce the risks of inherited threats, lateral breaches in your IT environment and vendor lock-in.

UP COMING

webinar image

2:45PM CET

Key Findings from the 2021 Thales Access Management Index: Global Edition

Eric Hanselman, Principal Research Analyst, 451 Research, a part of S&P Global Market Intelligence

watch now

 

watch now

Key Findings from the 2021 Thales Access Management Index: Global Edition

The changes that the last year has wrought upon organizations' technology teams have been most acute in access management. Seemingly overnight, remote access went from being an exception to the default working model for a large swath of employees. The 2021 Thales Access Management Index, based on data from a survey of more than 2,600 respondents in more than 10 countries across the globe, looks to identify the depth of that change, as well as the current state of and plans for access management across a range of industries.

This webinar will review the findings of the 2021 Thales Access Management Index and how organizations around the world are responding to the new challenges for authentication and access management created by increased remote work and cloud adoption. Specifically, in this webinar attendees will learn: - How prepared were organizations for the changes of remote work and cloud adoption - Which access management technologies organizations are deploying to secure access to the cloud and remote work - Where are organizations in their adoption of Zero Trust - What IAM technologies are organizations investing in to modern their IAM strategy

UP COMING

webinar image

4:00PM CET

Kick Off Your Passwordless FIDO Journey with Thales and Microsoft

Natee Pretikul, Program Manager, Microsoft Identity
Danna Bethlehem, Director of IAM Product Marketing, Thales

watch now

 

watch now

Kick Off Your Passwordless FIDO Journey with Thales and Microsoft

Thales and Microsoft have partnered to help our customers go passwordless with our FIDO2 technologies. Join us to hear how to get started on your Passwordless journey, what it means to go Passwordless from a security and usability perspective, and the broad range of use cases that that Thales FIDO 2 device can help you address.

UP COMING

webinar image

5:15PM CET

Meeting the US Executive Order IAM Requirements with SailPoint and Thales

Frank Briguglio, Global Public Sector Strategist, Sailpoint
Danna Bethlehem, Director of IAM Product Marketing, Thales

watch now

 

watch now

Meeting the US Executive Order IAM Requirements with SailPoint and Thales

The US Presidential Executive Order identifies IAM as a key component of securing organizations with Zero Trust. Join us in this panel discussion to hear how Identity Management solutions from SailPoint and Access Management solutions from Thales can help organizations achieve Zero Trust security.

Day 2 - October 6, 2021

UP COMING

webinar image

9:30AM CET

How MFA and IAM Enable Schrems II Compliance

Danna Bethlehem, Director of IAM Product Marketing, Thales
Claire Pittman-Massie, Sr. Director EMEA Field Marketing, Thales

watch now

 

watch now

How MFA and IAM Enable Schrems II Compliance

The Schrems II ruling has succeeded in shuffling the compliance and regulatory deck completely, and has forced organizations to re-think their compliance frameworks. In this session, we'll discuss how a strong and effective access security solution can help you ensure lawful data transfers in accordance with the Schrems II ruling.

UP COMING

webinar image

10:45AM CET

Case Study: RedCentric and Thales Partner to Deliver IAM Solutions

Ben Willis, Channel Account Manager, Thales

watch now

 

watch now

Case Study: RedCentric and Thales Partner to Deliver IAM Solutions

Managed security service providers are playing an increasingly critical role in helping organizations and enterprises carry out extensive digital transformation initiatives. Join us for this session where RedCentric, a leading UK MSSP, will discuss how their partnership with Thales allows them to deliver cloud-based remote access services ensuring that users can securely access data and applications. During this session we will hear from RedCentric how they have successfully utilized key Thales platform capabilities including user-based pricing models, multi-tier - multi-tenancy architecture and easily customizable interfaces to deliver cloud-based access management and authentication services to hundreds of organizations.

UP COMING

webinar image

12:00PM CET

Security in Your Hands: The Force is with You

Ellen Thorén, Program Manager, Versasec
John Asan, Technical Leader, Versasec

watch now

 

watch now

Security in Your Hands: The Force is with You

In the cybersecurity space there are myths that Public Key Infrastructure (PKI) is an old technology and a high-priced solution. Some companies are still assured that hardware based PKI multi-factor authentication is only for large entities and the companies might even think that their information is not important and will never be hacked.

Enterprises have access to a big range of advantages and methods when using hardware-based PKI. Together, Versasec vSEC:CMS and Thales products bring world-class PKI security solutions required for strong authentication, with physical or virtual smart cards for enterprises of any size.
In this Tech Talk you will learn more about:

  • Busting myths about Public Key Infrastructure (PKI)
  • Capabilities and advantages of multi-factor authentication using hardware based PKI
  • Versasec vSEC:CMS and its role in device management.

Join us here and we will help you make the very justified case for PKI-based multi factor authentication at your organisation and show that security is in your hands.

UP COMING

webinar image

1:15PM CET

How to Enable Multiple User Authentication Journeys with Modern Authentication

Asaf Lerner, IAM Market Owner, Thales

watch now

 

watch now

How to Enable Multiple User Authentication Journeys with Modern Authentication

The new normal of remote working has led to an explosion of unforeseen authentication needs. The multitude of end devices, locations, applications and roles means that a single user will likely need more than one way of accessing the range of apps they need throughout their day. Join us in this session to hear how to effectively support multiple user authentication journeys to achieve secure remote access, without burdening your end users.

UP COMING

webinar image

2:30PM CET

What is Modern Authentication and Its Role in Achieving Zero Trust Security?

Danna Bethlehem, Director of IAM Product Marketing

watch now

 

watch now

What is Modern Authentication and Its Role in Achieving Zero Trust Security?

The need for secure, yet convenient ways of logging into apps is driving the quest for more effective authentication. In this session we'll do a deep dive into the innovations shaping modern authentication concepts and the role they play in achieving Zero Trust security.

UP COMING

webinar image

3:45PM CET

Power of Identity-Centric Zero Trust Network Access

Eitan Bremler, VP Product Strategy, Marketing & BD, Safe-T
Danna Bethlehem, Director of IAM Product Marketing, Thales

watch now

 

watch now

Power of Identity-Centric Zero Trust Network Access

ZTNA has seen tremendous growth in the past 2 years, due primarily to the surge in remote work. Organizations quickly realized the scaling and security limitations of conventional VPN solutions. With the never trust, always verify mantra, ZTNA + Access Management solutions have emerged to make remote access safe and straightforward. Discover how these complementary solutions converge to enable a scalable and more secure mechanism that can address the spectrum of remote work use cases.

UP COMING

webinar image

5:00PM CET

SOAR + IAM: The Perfect Recipe for Threat Management and Response

Rishi Bhargava, VP of Product Strategy, Palo Alto Networks
Manav Khanna, Sr. Director IAM Product Management, Thales

watch now

 

watch now

SOAR + IAM: The Perfect Recipe for Threat Management and Response

Incident detection and response are crucial for effective security operations. SOAR (security orchestration, automation & response) systems empower security operation teams to identify threats sooner, and automate many of the playbook actions that would otherwise be subject to manual processing glitches. In this session, we discuss how security teams can leverage SOAR (Cortex XSOAR) and IAM (SafeNet Trusted Access) to build a much stronger security posture for the enterprise.

Americas Agenda

Day 1 - October 5, 2021

UP COMING

webinar image

8:45AM EDT

Key Findings from the 2021 Thales Access Management Index: Global Edition

Eric Hanselman, Principal Research Analyst, 451 Research, a part of S&P Global Market Intelligence

watch now

 

watch now

Key Findings from the 2021 Thales Access Management Index: Global Edition

The changes that the last year has wrought upon organizations' technology teams have been most acute in access management. Seemingly overnight, remote access went from being an exception to the default working model for a large swath of employees. The 2021 Thales Access Management Index, based on data from a survey of more than 2,600 respondents in more than 10 countries across the globe, looks to identify the depth of that change, as well as the current state of and plans for access management across a range of industries.

This webinar will review the findings of the 2021 Thales Access Management Index and how organizations around the world are responding to the new challenges for authentication and access management created by increased remote work and cloud adoption. Specifically, in this webinar attendees will learn:
- How prepared were organizations for the changes of remote work and cloud adoption
- Which access management technologies organizations are deploying to secure access to the cloud and remote work
- Where are organizations in their adoption of Zero Trust
- What IAM technologies are organizations investing in to modern their IAM strategy

UP COMING

webinar image

10:00AM EDT

Kick Off Your Passwordless FIDO Journey with Thales and Microsoft

Natee Pretikul, Program Manager, Microsoft Identity
Danna Bethlehem, Director of IAM Product Marketing, Thales
Gregory Vigroux, Director of IAM Product Management, Thales

watch now

 

watch now

Kick Off Your Passwordless FIDO Journey with Thales and Microsoft

Thales and Microsoft have partnered to help our customers go passwordless with our FIDO2 technologies. Join us to hear how to get started on your Passwordless journey, what it means to go Passwordless from a security and usability perspective, and the broad range of use cases that that Thales FIDO 2 device can help you address.

UP COMING

webinar image

11:15AM EDT

Meeting the US Executive Order IAM Requirements with SailPoint and Thales

Frank Briguglio, Global Public Sector Strategist, SailPoint
Danna Bethlehem, Director of IAM Product Marketing, Thales

watch now

 

watch now

Meeting the US Executive Order IAM Requirements with SailPoint and Thales

The US Presidential Executive Order identifies IAM as a key component of securing organizations with Zero Trust. Join us in this panel discussion to hear how Identity Management solutions from SailPoint and Access Management solutions from Thales can help organizations achieve Zero Trust security.

UP COMING

webinar image

12:15PM EDT

Security in Your Hands: The Force is with You

Ellen Thorén, Program Manager, Versasec
John Asan, Technical Leader, Versasec

watch now

 

watch now

Security in Your Hands: The Force is with You

In the cybersecurity space there are myths that Public Key Infrastructure (PKI) is an old technology and a high-priced solution. Some companies are still assured that hardware based PKI multi-factor authentication is only for large entities and the companies might even think that their information is not important and will never be hacked.

Enterprises have access to a big range of advantages and methods when using hardware-based PKI. Together, Versasec vSEC:CMS and Thales products bring world-class PKI security solutions required for strong authentication, with physical or virtual smart cards for enterprises of any size.
In this Tech Talk you will learn more about:

  • Busting myths about Public Key Infrastructure (PKI)
  • Capabilities and advantages of multi-factor authentication using hardware based PKI
  • Versasec vSEC:CMS and its role in device management.

Join us here and we will help you make the very justified case for PKI-based multi factor authentication at your organisation and show that security is in your hands.

UP COMING

webinar image

1:45PM EDT

Taking Control of Your Access Security in a Multi-Cloud Environment

Danna Bethlehem, Director of IAM Product Marketing

watch now

 

watch now

Taking Control of Your Access Security in a Multi-Cloud Environment

By trusting identity protection and authentication to your cloud provider, you may be exposing your organizations to a higher threat of data breach. Join us in this session to learn more about the Shared Security model, how it allows you to control your own access security and reduce the risks of inherited threats, lateral breaches in your IT environment and vendor lock-in.

Day 2 - October 6, 2021

UP COMING

webinar image

8:30AM EDT

What is Modern Authentication and Its Role in Achieving Zero Trust Security?

Danna Bethlehem, Director of IAM Product Marketing

watch now

 

watch now

What is Modern Authentication and Its Role in Achieving Zero Trust Security?

The need for secure, yet convenient ways of logging into apps is driving the quest for more effective authentication. In this session we'll do a deep dive into the innovations shaping modern authentication concepts and the role they play in achieving Zero Trust security.

UP COMING

webinar image

9:45AM EDT

Power of Identity-Centric Zero Trust Network Access

Eitan Bremler, VP Product Strategy, Marketing & BD, Safe-T
Danna Bethlehem, Director of IAM Product Marketing, Thales

watch now

 

watch now

Power of Identity-Centric Zero Trust Network Access

ZTNA has seen tremendous growth in the past 2 years, due primarily to the surge in remote work. Organizations quickly realized the scaling and security limitations of conventional VPN solutions. With the never trust, always verify mantra, ZTNA + Access Management solutions have emerged to make remote access safe and straightforward. Discover how these complementary solutions converge to enable a scalable and more secure mechanism that can address the spectrum of remote work use cases.

UP COMING

webinar image

11:00AM EDT

SOAR + IAM: The Perfect Recipe for Threat Management and Response

Rishi Bhargava, VP of Product Strategy, Palo Alto Networks
Manav Khanna, Sr. Director IAM Product Management, Thales
Dirk Strauch, Managing Consultant Cybersecurity, NTT Data

 

watch now

 

watch now

SOAR + IAM: The Perfect Recipe for Threat Management and Response

Incident detection and response are crucial for effective security operations. SOAR (security orchestration, automation & response) systems empower security operation teams to identify threats sooner, and automate many of the playbook actions that would otherwise be subject to manual processing glitches. In this session, we discuss how security teams can leverage SOAR (Cortex XSOAR) and IAM (SafeNet Trusted Access) to build a much stronger security posture for the enterprise.

UP COMING

webinar image

12:15PM EDT

Beyond Zero Trust: The Future of Continuous and Granular Access

Asad Ali, Senior Technologist, CTO Office, Thales

watch now

 

watch now

Beyond Zero Trust: The Future of Continuous and Granular Access

The concept of Zero Trust security is not new. The term itself was coined more than a decade ago at Forrester with a general premise that all network traffic should be considered untrusted. Over the years we have seen refinements to this idea by Google in their BeyondCorp publication, Gartner in their definition of CARTA framework, and to complete the circle by Forrester again in Zero Trust eXtended report that explained Zero Trust in the light of current cybersecurity challenges. One of these challenges is fine grained and continuous access to resources and data.

This Talk will review the history of Zero Trust and then explore how Zero Trust applies to continuous authentication and access. We will discuss the historical trends that have shaped our authentication evolution, and then look at Continuous Access Evaluation Protocol (CAEP) a nascent but promising technology that can fundamentally change how we define and implement Zero Trust in web applications. The role of major players in this effort, such as Thales and Google will be explained.

UP COMING

webinar image

1:30PM EDT

How to Enable Multiple User Authentication Journeys with Modern Authentication

Asaf Lerner, IAM Market Owner, Thales

watch now

 

watch now

How to Enable Multiple User Authentication Journeys with Modern Authentication

The new normal of remote working has led to an explosion of unforeseen authentication needs. The multitude of end devices, locations, applications and roles means that a single user will likely need more than one way of accessing the range of apps they need throughout their day. Join us in this session to hear how to effectively support multiple user authentication journeys to achieve secure remote access, without burdening your end users.

UP COMING

webinar image

2:45PM EDT

Creating Trusted Collaboration with Google Workspace and Thales

Nikhil Sinha, Product Manager for Google Cloud Security, Google
Danna Bethlehem, Director of Product Marketing, Thales

watch now

 

watch now

Creating Trusted Collaboration with Google Workspace and Thales

The transition of moving workloads and applications to the cloud is frequently spearheaded by leveraging cloud-based collaboration suites such as Google Workspace. While offering immense benefits in terms of easy, anywhere access from any device, recent lateral attacks within cloud environments highlight the need to be proactive and strategic about securing these services.

Join us for a Q&A session with Nikhil Sinha, Product Manager for Google Cloud Security at Google, and Danna Bethlehem, Director of Product Marketing from Thales, who will discuss best practices for protecting Google Workspace and how organizations can build on a 'shared security' model for protecting sensitive data in the cloud.

What Attendees Said About Last Year’s Summit

Featured speakers

Speakers

+

Rows

+

Dirk Geeraerts

Dirk Geeraerts

Vice President, IAM Sales EMEA
Thales

Danna Bethlehem

Danna Bethlehem

Director IAM Product Marketing
Thales

Rana Gupta

Rana Gupta

VP Sales APAC Region
Thales

Manav Khanna

Manav Khanna

Sr. Director, IAM Product Management, Thales

Gregory Vigroux

Gregory Vigroux

Director of IAM Product Management
Thales

Asaf Lerner

Asaf Lerner

IAM Market Owner
Thales

Claire Pitman-Massie

Claire Pitman-Massie

Sr. Director, EMEA Field Marketing
Thales

Hsin Hau Hanna

Hsin Hau Hanna

Product Marketing,
Identity & Biometrics
Thales

Montri Trainaphakul

Montri Trainaphakul

Regional Sales Manager, IAM
Thales

Montri Trainaphakul

Asad Ali

Senior Technologist, CTO Office
Thales

 

 

Featured Guest Speakers

John Asan

John Asan

Technical Leader
Versasec

Rishi Bhargava

Rishi Bhargava

VP of Product Strategy
Palo Alto Networks

Eitan Bremler

Eitan Bremler

VP Product Strategy,
Marketing & BD, Safe-T

Frank Briguglio

Frank Briguglio

Global Public Sector Strategist
SailPoint

Eric Hanselman

Eric Hanselman

Chief Analyst
451 Research, part of S&P Global Marketing Intelligence

Martin Kuppinger

Martin Kuppinger

Founder and Principal Analyst,
KuppingerCole Analysts

Simon Piff

Simon Piff

VP, Security Practice, Asia-Pacific
IDC

Natee Pretikul

Natee Pretikul

Program Manager
Microsoft Identity

Nikhil Sinha

Nikhil Sinha

Product Manager for Google Cloud Security, Google

Dirk Strauch

Dirk Strauch

Managing Consultant Cybersecurity - Identity & Key Management, NTT Data

Ellen Thorén

Ellen Thorén

Program Manager
Versasec

Thanks to Our Partners and Sponsors

google logomicrosoft logosailpoint logoversasec logo