Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Using Cloud Identity to Protect On-Prem Applications Okta FSI Customer Summit - DATE 2020 Okta FSI Customer Summit - DATE 2020 100% 10 Erik Karlinsky, Product Manager & Frederi Enterprises are saddled with an IT architecture that has evolved organically over time. Mergers, acquisitions, changing priorities, new applications, ... 2 years ago | 43 mins Thales Cloud Security Summit Welcome Video Tina Stewart, Vice President of Global Marketing, Thales Tina Stewart, Vice President of Global Marketing at Thales, shares what you can expect from the Thales Cloud Security Summit. Learn about best practic... 2 years ago | 3 mins Why Highly Regulated Industries Need Secured Third Party Collaborations Rob Oden, L3 Harris Technologies, Monil Naicker, Applied Materials, Evgeniy Kharam, Herjavec Group & Vishal Gauri, Seclore While all organizations need to turn their thoughts to data security to adjust to the increase in data breaches, the need is even more pressing for th... 6 months ago | 50 mins Introductory video - Trusted Access Management Summit 2020 François Lasnier, Vice President of Access Management, Thales Vice President of Access Management, François Lasnier, shares what you can expect from the Thales Trusted Access Virtual Summit. Learn about best prac... 2 years ago | 3 mins What to Watch Out for in 2021: Top Trends in Crypto John Ray (Director of HSM Product Management, Thales), Mike Brown (CTO, ISARA), Chris Hickman (CSO, Keyfactor) We can agree 2020 was anything but ordinary – but what can we expect in the year ahead? From sleeping dragons to expected crypto-compromises, this pan... 2 years ago | 35 mins Zero Trust am Arbeitsplatz Stefan Seitz Digital summit for identity & access managers, IT architects and IT security & risk decision-makers Founded by the creators of Rethink! IT Security i... 1 year ago | 20 mins Why Highly Regulated Industries Need Secured Third Party Collaborations Rob Oden, L3 Harris Technologies, Monil Naicker, Applied Materials, Evgeniy Kharam, Herjavec Group & Vishal Gauri, Seclore While all organizations need to turn their thoughts to data security to adjust to the increase in data breaches, the need is even more pressing for th... 6 months ago | 50 mins Keynote: What Happens If You Don’t Protect Machine Identities? Jeff Hudson, CEO, Venafi Spend a few minutes with someone who arguably cares more about protecting machine identities than most security executives. Venafi CEO Jeff Hudson kic... 3 years ago | 15 mins Securing the CI/CD Pipeline Without Disrupting Developers Shian Sung, Senior DevSecOps Engineer at Keyfactor, and Chris Paul, Cybersecurity SME at Infinite Ranges During this webinar, we’ll explore how TLS and code-signing certificates fit in the CI/CD pipeline and why an integrated and automated approach is key... 2 years ago | 25 mins Breaking up with password: The path to a passwordless future Tommy NHAM, Thales Cloud Security / Amy LO, Microsoft Hong Kong Thales was invited to share the path to a passwordless future at Microsoft Hong Kong Cybersecurity Summit 2021, with the theme of mitigating risks and... 5 months ago | 26 mins Load more