Welcome Video
**Join this three-day global virtual summit on the latest trends in data encryption, key management and multi-cloud security. Register for free thought leadership and insights from security evangelists and technologists in the form of live webinars, on-demand webinars and interactive Tech Talk sessions. From IT security managers and CSOs to cloud transformation leaders, professionals from a diverse range of technical backgrounds are welcome!
Todd Moore, Vice President of Encryption Products, shares what you can expect from the Thales Crypto Summit. Learn about best practices and trends in encryption, key management and multi-cloud security so your organization can discover and protect sensitive data wherever it resides. You will also learn more about the new Thales
Agenda
Day 1 - October 5, 2021
UP COMING
9:15AM HKT
How to Enable Multiple User Authentication Journeys with Modern Authentication
Asaf Lerner, IAM Market Owner, Thales
The new normal of remote working has led to an explosion of unforeseen authentication needs. The multitude of end devices, locations, applications and roles means that a single user will likely need more than one way of accessing the range of apps they need throughout their day. Join us in this session to hear how to effectively support multiple user authentication journeys to achieve secure remote access, without burdening your end users.
UP COMING
10:30AM HKT
Identity Authentication: Ensuring the Integrity of Your Systems
Simon Piff, VP Security Research - APAC Region, IDC
Today's businesses rely on digital technologies far more than ever before. Digital industry ecosystems are emerging as the supply chain choice of a most industries; requiring digital connectivity between all parties in the supply chain to facilitate better product planning and ability to serve the markets and customers. Governments are relying on technology to more deeply engage, inform and serve their population. Consumer in most markets have had no choice but to default to ecommerce to have even the most basic necessities delivered during these times of social distancing and lockdowns.
In spite of this, millions still rely on the most basic of security features to secure these highly critical, and yet mostly fragile, networks of commerce. Passwords are still used as the default for security.
Threat actors know this, which is why millions of passwords appear on the Deep Web markets every year. They are stolen, sold, traded and ultimately used to break into networks and systems the world over. The only way to prevent this activity, and to implement a more mature security environment is through identity authentication. This means not just trusting to a password, but actively following up with other challenges to the identity of the user, device or application, eventually being able to dispense with passwords altogether and relying on more robust identifiers for security purposes.
However, whilst IDC believes IT buyers should already have MFA solutions included within their present year security software budgets; if not, include such next year and that this is a must-do security thing, but we believe current market acceptance rates to be a disappointing 30% or less. That means 7 out of 10 users are all still making up passwords.
The IDC presentation will take a closer look into the advanced authentication market and provide guidance to technology buyers on what to look for in such an important solution.
UP COMING
2:15PM HKT
What is Modern Authentication and Its Role in Achieving Zero Trust Security?
Danna Bethlehem, Director of IAM Product Marketing
The need for secure, yet convenient ways of logging into apps is driving the quest for more effective authentication. In this session we'll do a deep dive into the innovations shaping modern authentication concepts and the role they play in achieving Zero Trust security.
UP COMING
3:30PM HKT
Key Findings from the 2021 Thales Access Management Index: APAC Edition
Rana Gupta, VP APAC Sales, Thales
The changes that the last year has wrought upon organizations' technology teams have been most acute in access management. Seemingly overnight, remote access went from being an exception to the default working model for a large swath of employees. The 2021 Thales Access Management Index, based on data from a survey of more than 2,600 respondents worldwide including 750 security professionals across Asia-Pacific, looks to identify the depth of that change, as well as the current state of and plans for access management across a range of industries.
This webinar will review the findings of the 2021 Thales Access Management Index APAC Edition and how organizations in APAC are responding to the new challenges for authentication and access management created by increased remote work and cloud adoption. Specifically, in this webinar attendees will learn:
- How prepared were organizations in APAC for the changes of remote work and cloud adoption
- Which access management technologies APAC organizations are deploying to secure access to the cloud and remote work
- Where APAC organizations are in their adoption of Zero Trust
- What technologies are APAC organizations investing in to modern their IAM strategy
UP COMING
4:45PM HKT
Identity Proofing: The New Foundation for Every Digital Identity
Hsin Hau Hanna, Identity & Biometrics Solutions, Thales
Know Your Customer (KYC) has become one of the most prevalent terms in the post-pandemic digital identity world. And for every enterprise's digital initiatives, Identity Proofing must become the foundation of KYC be they on-boarding new customers, partners or employees. This session looks at how advances in identity proofing such as biometrics and smartphone technologies is enabling organisations to deliver KYC effectively grow by offering a quick, frictionless and secure identity proofing environment.
Day 2 - October 6, 2021
UP COMING
11:45AM HKT
Security in Your Hands: The Force is with You
Ellen Thorén, Program Manager, Versasec
John Asan, Technical Leader, Versasec
In the cybersecurity space there are myths that Public Key Infrastructure (PKI) is an old technology and a high-priced solution. Some companies are still assured that hardware based PKI multi-factor authentication is only for large entities and the companies might even think that their information is not important and will never be hacked.
Enterprises have access to a big range of advantages and methods when using hardware-based PKI. Together, Versasec vSEC:CMS and Thales products bring world-class PKI security solutions required for strong authentication, with physical or virtual smart cards for enterprises of any size.
In this Tech Talk you will learn more about:
Join us here and we will help you make the very justified case for PKI-based multi factor authentication at your organisation and show that security is in your hands.
UP COMING
2:00PM HKT
新遠端辦公年代資安全新思維 : 零信任 、無密碼認證邁向主動防禦 (The Challenge of Remote Work to Trust Access – Zero Trust, Passwordless Authentication and Move Towards Active Defense)
Jeff Chen Sales Engineering Manager, Thales
網路犯罪者利用疫情和遠端辦公轉移趨勢,不斷發動各種攻擊,其中勒索軟體攻擊激增150%,而台灣更是排名前五大的受害區。為了強化資安戰略,政府除了推動「資安即國安2.0」戰略,也成立資通安全署以期建立並提升國內關鍵基礎設施及核心資料庫的防護韌性。當今遠端辦公成為新常態,企業要做好資安防護,而身份認證與存取就是第一道防線。
疫情將人們快速帶入遠端辦公年代,伴隨而來的新風險促使IT專業人員努力運用既有的安全工具進行安全管控。遠端存取從原本屬於例外的使用例,轉變成許多員工預設的工作模式。
當企業踏入了一個多變且複雜的世界,該如何在不確定性之間繼續安全的營運,並在鎖住存取和不中斷工作流程之間取得平衡,執行工作和協同合作將需要存取機敏資料,而企業主管如何確保不會出現衝擊生產力的副作用。
Thales Trusted Access Summit 線上會議-公佈《Thales 2021存取管理指標》 將在 2021 年 10 月 6 日14:00 舉行,邀請您一同參加。Thales大中華區資深技術顧問陳昶旭,將與您分享報告中其他存取安全現況與趨勢,也將透過現代化身份驗證和存取管理的應用實例,協助掌握新的調適性或脈絡存取與無密碼認證等方法,強化資安防禦新戰略。
在會議中您將可以進一步了解:
UP COMING
3:15PM HKT
Panel Discussion: IAM Essentials to Securing the Future of Work
Burgess Cooper, Ernst & Young; Yogesh Kumar, Tata Power; Bijender Mishra, Alkem Laboratories; CK Prasad, RailTel
In this panel, experts from Thales, Ernst & Young, Tata Power, Alkem Laboratories, and RailTel Corporation will discuss strategies and technologies organizations should deploy to be ready to secure the changes in how users are accessing data - from the cloud to enterprise applications.
UP COMING
4:45PM HKT
ยืนยันตัวตนอย่างรวดเร็วและมั่นคงปลอดภัยด้วย (Optimize Security & Convenience with Passwordless Authentication)
Montri Trainaphakul, Regional Sales Manager - IAM, Thales
ภายในงานสัมมนานี้ ท่านจะได้รู้จักการพิสูจน์ตัวตนแบบ Passwordless ประเภทต่างๆ ประโยชน์ที่ธุรกิจองค์กรจะได้รับ ข้อดีข้อเสียเมื่อเทียบกับการใช้ Password แบบดั้งเดิม การวางกลยุทธ์เพื่อให้การพิสูจน์ตัวตนแบบ Passwordless สัมฤทธิ์ผล และแนะนำโซลูชัน Passwordless จาก Thales
หัวข้อการบรรยายประกอบด้วย
- ปัญหาของการพิสูจน์ตัวตนแบบ Password
- Passwordless คืออะไร สำคัญอย่างไร
- ความมั่นคงปลอดภัย VS ความสะดวกในการยืนยันตัวตน
- Passwordless แบบ Zero Factor, Single Factor, Multi-factor และ SSO
- แนะนำโซลูชัน SafeNet Trusted Access จาก Thales
- วางกลยุทธ์ Passwordless ให้สัมฤทธิ์ผล
Day 1 - October 5, 2021
UP COMING
9:30AM CET
Change for the Better: Latest Trends and Future of Identity & Access Management
Martin Kuppinger, Founder and Principal Analyst, KuppingerCole Analysts
Throughout the last year, organisations have ridden a tidal wave of change. Not all change was good. With the rise of ransomware and identity based breaches perpetrating organisations because of the sudden rise in remote working, the hackers grasped the opportunity to make the most of the vulnerabilities it caused.
However, it’s not all doom and gloom. There has been positive change, and change is driving trends that will take IAM into the future. Join Martin Kuppinger, as he discusses the latest IAM trends that are driving positive organisational direction and what this means for future growth, security and IAM modernisation.
UP COMING
10:45AM CET
Identity Proofing: The New Foundation for Every Digital Identity
Hsin Hau Hanna, Identity & Biometrics Solutions, Thales
Know Your Customer (KYC) has become one of the most prevalent terms in the post-pandemic digital identity world. And for every enterprise's digital initiatives, Identity Proofing must become the foundation of KYC be they on-boarding new customers, partners or employees. This session looks at how advances in identity proofing such as biometrics and smartphone technologies is enabling organisations to deliver KYC effectively grow by offering a quick, frictionless and secure identity proofing environment.
UP COMING
12:00PM CET
Key Findings from the 2021 Thales Access Management Index: European Edition
Dirk Geeraerts, VP IAM Sales - EMEA, Thales
A new era of remote working and accelerated cloud transformation calls for a modern security mindset for European organisations when it comes secure access to cloud services and enterprise apps. Find out what lies ahead for identity and access management and the latest findings in the results of the 2021 Thales Access Management Index Report for Europe and the UK.
UP COMING
1:15PM CET
Taking Control of Your Access Security in a Multi-Cloud Environment
Danna Bethlehem, Director of IAM Product Marketing, Thales
Claire Pitman-Massie, Sr. Director EMEA Field Marketing, Thales
By trusting identity protection and authentication to your cloud provider, you may be exposing your organizations to a higher threat of data breach. Join us in this session to learn more about the Shared Security model, how it allows you to control your own access security and reduce the risks of inherited threats, lateral breaches in your IT environment and vendor lock-in.
UP COMING
2:45PM CET
Key Findings from the 2021 Thales Access Management Index: Global Edition
Eric Hanselman, Principal Research Analyst, 451 Research, a part of S&P Global Market Intelligence
The changes that the last year has wrought upon organizations' technology teams have been most acute in access management. Seemingly overnight, remote access went from being an exception to the default working model for a large swath of employees. The 2021 Thales Access Management Index, based on data from a survey of more than 2,600 respondents in more than 10 countries across the globe, looks to identify the depth of that change, as well as the current state of and plans for access management across a range of industries.
This webinar will review the findings of the 2021 Thales Access Management Index and how organizations around the world are responding to the new challenges for authentication and access management created by increased remote work and cloud adoption. Specifically, in this webinar attendees will learn: - How prepared were organizations for the changes of remote work and cloud adoption - Which access management technologies organizations are deploying to secure access to the cloud and remote work - Where are organizations in their adoption of Zero Trust - What IAM technologies are organizations investing in to modern their IAM strategy
UP COMING
4:00PM CET
Kick Off Your Passwordless FIDO Journey with Thales and Microsoft
Natee Pretikul, Program Manager, Microsoft Identity
Danna Bethlehem, Director of IAM Product Marketing, Thales
Thales and Microsoft have partnered to help our customers go passwordless with our FIDO2 technologies. Join us to hear how to get started on your Passwordless journey, what it means to go Passwordless from a security and usability perspective, and the broad range of use cases that that Thales FIDO 2 device can help you address.
UP COMING
5:15PM CET
Meeting the US Executive Order IAM Requirements with SailPoint and Thales
Frank Briguglio, Global Public Sector Strategist, Sailpoint
Danna Bethlehem, Director of IAM Product Marketing, Thales
The US Presidential Executive Order identifies IAM as a key component of securing organizations with Zero Trust. Join us in this panel discussion to hear how Identity Management solutions from SailPoint and Access Management solutions from Thales can help organizations achieve Zero Trust security.
Day 2 - October 6, 2021
UP COMING
9:30AM CET
How MFA and IAM Enable Schrems II Compliance
Danna Bethlehem, Director of IAM Product Marketing, Thales
Claire Pittman-Massie, Sr. Director EMEA Field Marketing, Thales
The Schrems II ruling has succeeded in shuffling the compliance and regulatory deck completely, and has forced organizations to re-think their compliance frameworks. In this session, we'll discuss how a strong and effective access security solution can help you ensure lawful data transfers in accordance with the Schrems II ruling.
UP COMING
10:45AM CET
Case Study: RedCentric and Thales Partner to Deliver IAM Solutions
Ben Willis, Channel Account Manager, Thales
Managed security service providers are playing an increasingly critical role in helping organizations and enterprises carry out extensive digital transformation initiatives. Join us for this session where RedCentric, a leading UK MSSP, will discuss how their partnership with Thales allows them to deliver cloud-based remote access services ensuring that users can securely access data and applications. During this session we will hear from RedCentric how they have successfully utilized key Thales platform capabilities including user-based pricing models, multi-tier - multi-tenancy architecture and easily customizable interfaces to deliver cloud-based access management and authentication services to hundreds of organizations.
UP COMING
12:00PM CET
Security in Your Hands: The Force is with You
Ellen Thorén, Program Manager, Versasec
John Asan, Technical Leader, Versasec
In the cybersecurity space there are myths that Public Key Infrastructure (PKI) is an old technology and a high-priced solution. Some companies are still assured that hardware based PKI multi-factor authentication is only for large entities and the companies might even think that their information is not important and will never be hacked.
Enterprises have access to a big range of advantages and methods when using hardware-based PKI. Together, Versasec vSEC:CMS and Thales products bring world-class PKI security solutions required for strong authentication, with physical or virtual smart cards for enterprises of any size.
In this Tech Talk you will learn more about:
Join us here and we will help you make the very justified case for PKI-based multi factor authentication at your organisation and show that security is in your hands.
UP COMING
1:15PM CET
How to Enable Multiple User Authentication Journeys with Modern Authentication
Asaf Lerner, IAM Market Owner, Thales
The new normal of remote working has led to an explosion of unforeseen authentication needs. The multitude of end devices, locations, applications and roles means that a single user will likely need more than one way of accessing the range of apps they need throughout their day. Join us in this session to hear how to effectively support multiple user authentication journeys to achieve secure remote access, without burdening your end users.
UP COMING
2:30PM CET
What is Modern Authentication and Its Role in Achieving Zero Trust Security?
Danna Bethlehem, Director of IAM Product Marketing
The need for secure, yet convenient ways of logging into apps is driving the quest for more effective authentication. In this session we'll do a deep dive into the innovations shaping modern authentication concepts and the role they play in achieving Zero Trust security.
UP COMING
3:45PM CET
Power of Identity-Centric Zero Trust Network Access
Eitan Bremler, VP Product Strategy, Marketing & BD, Safe-T
Danna Bethlehem, Director of IAM Product Marketing, Thales
ZTNA has seen tremendous growth in the past 2 years, due primarily to the surge in remote work. Organizations quickly realized the scaling and security limitations of conventional VPN solutions. With the never trust, always verify mantra, ZTNA + Access Management solutions have emerged to make remote access safe and straightforward. Discover how these complementary solutions converge to enable a scalable and more secure mechanism that can address the spectrum of remote work use cases.
UP COMING
5:00PM CET
SOAR + IAM: The Perfect Recipe for Threat Management and Response
Rishi Bhargava, VP of Product Strategy, Palo Alto Networks
Manav Khanna, Sr. Director IAM Product Management, Thales
Incident detection and response are crucial for effective security operations. SOAR (security orchestration, automation & response) systems empower security operation teams to identify threats sooner, and automate many of the playbook actions that would otherwise be subject to manual processing glitches. In this session, we discuss how security teams can leverage SOAR (Cortex XSOAR) and IAM (SafeNet Trusted Access) to build a much stronger security posture for the enterprise.
Day 1 - October 5, 2021
UP COMING
8:45AM EDT
Key Findings from the 2021 Thales Access Management Index: Global Edition
Eric Hanselman, Principal Research Analyst, 451 Research, a part of S&P Global Market Intelligence
The changes that the last year has wrought upon organizations' technology teams have been most acute in access management. Seemingly overnight, remote access went from being an exception to the default working model for a large swath of employees. The 2021 Thales Access Management Index, based on data from a survey of more than 2,600 respondents in more than 10 countries across the globe, looks to identify the depth of that change, as well as the current state of and plans for access management across a range of industries.
This webinar will review the findings of the 2021 Thales Access Management Index and how organizations around the world are responding to the new challenges for authentication and access management created by increased remote work and cloud adoption. Specifically, in this webinar attendees will learn:
- How prepared were organizations for the changes of remote work and cloud adoption
- Which access management technologies organizations are deploying to secure access to the cloud and remote work
- Where are organizations in their adoption of Zero Trust
- What IAM technologies are organizations investing in to modern their IAM strategy
UP COMING
10:00AM EDT
Kick Off Your Passwordless FIDO Journey with Thales and Microsoft
Natee Pretikul, Program Manager, Microsoft Identity
Danna Bethlehem, Director of IAM Product Marketing, Thales
Gregory Vigroux, Director of IAM Product Management, Thales
Thales and Microsoft have partnered to help our customers go passwordless with our FIDO2 technologies. Join us to hear how to get started on your Passwordless journey, what it means to go Passwordless from a security and usability perspective, and the broad range of use cases that that Thales FIDO 2 device can help you address.
UP COMING
11:15AM EDT
Meeting the US Executive Order IAM Requirements with SailPoint and Thales
Frank Briguglio, Global Public Sector Strategist, SailPoint
Danna Bethlehem, Director of IAM Product Marketing, Thales
The US Presidential Executive Order identifies IAM as a key component of securing organizations with Zero Trust. Join us in this panel discussion to hear how Identity Management solutions from SailPoint and Access Management solutions from Thales can help organizations achieve Zero Trust security.
UP COMING
12:15PM EDT
Security in Your Hands: The Force is with You
Ellen Thorén, Program Manager, Versasec
John Asan, Technical Leader, Versasec
In the cybersecurity space there are myths that Public Key Infrastructure (PKI) is an old technology and a high-priced solution. Some companies are still assured that hardware based PKI multi-factor authentication is only for large entities and the companies might even think that their information is not important and will never be hacked.
Enterprises have access to a big range of advantages and methods when using hardware-based PKI. Together, Versasec vSEC:CMS and Thales products bring world-class PKI security solutions required for strong authentication, with physical or virtual smart cards for enterprises of any size.
In this Tech Talk you will learn more about:
Join us here and we will help you make the very justified case for PKI-based multi factor authentication at your organisation and show that security is in your hands.
UP COMING
1:45PM EDT
Taking Control of Your Access Security in a Multi-Cloud Environment
Danna Bethlehem, Director of IAM Product Marketing
By trusting identity protection and authentication to your cloud provider, you may be exposing your organizations to a higher threat of data breach. Join us in this session to learn more about the Shared Security model, how it allows you to control your own access security and reduce the risks of inherited threats, lateral breaches in your IT environment and vendor lock-in.
Day 2 - October 6, 2021
UP COMING
8:30AM EDT
What is Modern Authentication and Its Role in Achieving Zero Trust Security?
Danna Bethlehem, Director of IAM Product Marketing
The need for secure, yet convenient ways of logging into apps is driving the quest for more effective authentication. In this session we'll do a deep dive into the innovations shaping modern authentication concepts and the role they play in achieving Zero Trust security.
UP COMING
9:45AM EDT
Power of Identity-Centric Zero Trust Network Access
Eitan Bremler, VP Product Strategy, Marketing & BD, Safe-T
Danna Bethlehem, Director of IAM Product Marketing, Thales
ZTNA has seen tremendous growth in the past 2 years, due primarily to the surge in remote work. Organizations quickly realized the scaling and security limitations of conventional VPN solutions. With the never trust, always verify mantra, ZTNA + Access Management solutions have emerged to make remote access safe and straightforward. Discover how these complementary solutions converge to enable a scalable and more secure mechanism that can address the spectrum of remote work use cases.
UP COMING
11:00AM EDT
SOAR + IAM: The Perfect Recipe for Threat Management and Response
Rishi Bhargava, VP of Product Strategy, Palo Alto Networks
Manav Khanna, Sr. Director IAM Product Management, Thales
Dirk Strauch, Managing Consultant Cybersecurity, NTT Data
Incident detection and response are crucial for effective security operations. SOAR (security orchestration, automation & response) systems empower security operation teams to identify threats sooner, and automate many of the playbook actions that would otherwise be subject to manual processing glitches. In this session, we discuss how security teams can leverage SOAR (Cortex XSOAR) and IAM (SafeNet Trusted Access) to build a much stronger security posture for the enterprise.
UP COMING
12:15PM EDT
Beyond Zero Trust: The Future of Continuous and Granular Access
Asad Ali, Senior Technologist, CTO Office, Thales
The concept of Zero Trust security is not new. The term itself was coined more than a decade ago at Forrester with a general premise that all network traffic should be considered untrusted. Over the years we have seen refinements to this idea by Google in their BeyondCorp publication, Gartner in their definition of CARTA framework, and to complete the circle by Forrester again in Zero Trust eXtended report that explained Zero Trust in the light of current cybersecurity challenges. One of these challenges is fine grained and continuous access to resources and data.
This Talk will review the history of Zero Trust and then explore how Zero Trust applies to continuous authentication and access. We will discuss the historical trends that have shaped our authentication evolution, and then look at Continuous Access Evaluation Protocol (CAEP) a nascent but promising technology that can fundamentally change how we define and implement Zero Trust in web applications. The role of major players in this effort, such as Thales and Google will be explained.
UP COMING
1:30PM EDT
How to Enable Multiple User Authentication Journeys with Modern Authentication
Asaf Lerner, IAM Market Owner, Thales
The new normal of remote working has led to an explosion of unforeseen authentication needs. The multitude of end devices, locations, applications and roles means that a single user will likely need more than one way of accessing the range of apps they need throughout their day. Join us in this session to hear how to effectively support multiple user authentication journeys to achieve secure remote access, without burdening your end users.
UP COMING
2:45PM EDT
Creating Trusted Collaboration with Google Workspace and Thales
Nikhil Sinha, Product Manager for Google Cloud Security, Google
Danna Bethlehem, Director of Product Marketing, Thales
The transition of moving workloads and applications to the cloud is frequently spearheaded by leveraging cloud-based collaboration suites such as Google Workspace. While offering immense benefits in terms of easy, anywhere access from any device, recent lateral attacks within cloud environments highlight the need to be proactive and strategic about securing these services.
Join us for a Q&A session with Nikhil Sinha, Product Manager for Google Cloud Security at Google, and Danna Bethlehem, Director of Product Marketing from Thales, who will discuss best practices for protecting Google Workspace and how organizations can build on a 'shared security' model for protecting sensitive data in the cloud.
Testimonials
Speakers
Speakers
Rows
Vice President, IAM Sales EMEA
Thales
Director IAM Product Marketing
Thales
VP Sales APAC Region
Thales
Sr. Director, IAM Product Management, Thales
Director of IAM Product Management
Thales
IAM Market Owner
Thales
Sr. Director, EMEA Field Marketing
Thales
Product Marketing,
Identity & Biometrics
Thales
Regional Sales Manager, IAM
Thales
Senior Technologist, CTO Office
Thales
Technical Leader
Versasec
VP of Product Strategy
Palo Alto Networks
VP Product Strategy,
Marketing & BD, Safe-T
Global Public Sector Strategist
SailPoint
Chief Analyst
451 Research, part of S&P Global Marketing Intelligence
Founder and Principal Analyst,
KuppingerCole Analysts
VP, Security Practice, Asia-Pacific
IDC
Program Manager
Microsoft Identity
Product Manager for Google Cloud Security, Google
Managing Consultant Cybersecurity - Identity & Key Management, NTT Data
Program Manager
Versasec
Partners