Hi [[ session.user.profile.firstName ]]

Global Trends in Cloud Security: Gaps in Security Persist in a Multi-Cloud World

Nearly half (48%) of all corporate data is stored in the cloud according the 2019 Thales Global Cloud Security Study conducted by the Ponemon Institute. However, despite the growth in cloud adoption, the study also found that there is a wide gap in the level of security precautions being applied by organizations and in different countries. Organizations admitted that on average, only about half (49%) of the data stored in the cloud is secured with encryption and only one-third (32%) believe protecting data in the cloud is their responsibility.

The reality is the cloud has created challenges in knowing where data is stored, who has access to it, and how to best secure it. In 2019, breaches like Capital One occurred because of improperly configured security or web and cloud applications. A major catalyst to address the challenges of cloud security are new government regulations and compliance mandates that will make securing multi-cloud strategies more complex. As a result, companies will be faced with more complicated and intricate auditing to demonstrate security and privacy best efforts in the cloud.

During this webinar, Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Eric Wolff, Senior Manager of Product Marketing at Thales, will discuss the key findings in the global report and how cloud adoption and cloud security have progressed over the past several years. Join us to learn more about:
- Which cloud services are being commonly used
- What types of security technologies organizations are applying to protect data in the cloud
- What types of data are companies putting in the cloud and which are most at risk
- Which countries are more advanced than others when it comes to cloud security
- Strategies for how organizations can best secure data in multi-cloud environments
- The best security approaches to comply with regulations
Recorded Nov 7 2019 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dr. Larry Ponemon, Ponemon Institute, and Eric Wolff, Senior Manager of Product Marketing at Thales
Presentation preview: Global Trends in Cloud Security: Gaps in Security Persist in a Multi-Cloud World
  • Channel
  • Channel profile
  • The State of Data Security in Financial Services Dec 12 2019 7:00 pm UTC 45 mins
    Charles Goldberg, VP of Data Protection Product Marketing, Thales
    Digital transformation is fundamentally impacting all industries, and nowhere is this truer than in the financial services industry. The internet and mobile technologies have fundamentally changed financial services companies’ business models, not only by opening new channels to reach customers, but also how they communicate with, serve, and support them.

    While digital transformation is touching every industry, financial services companies are leaders are on the leading edge of implementations, with 49% of financial services firms saying they are either aggressively disrupting the markets in which they participate or embedding digital capabilities that enable greater organizational agility. While Digital Transformation is allowing financial services companies to introduce new business models and reach more customers in new and innovative ways, it is introducing added difficulties for information security professionals and raises the potential to put sensitive customer data at risk.

    Based on the results from the 2019 Thales Data Threat Report – Financial Services Edition, participants in this webinar can expect to learn about:
    • How the adoption of digital transformation technologies, and especially cloud, is putting sensitive data at greater risk
    • The data security challenges facing retail companies today
    • Critical analyst recommendations for how organizations can be most effective when selecting the right tools that will enable them to manage greater amounts of complexity, that span legacy on-premises needs as well as modern, cloud-based, edge-oriented technologies.
  • Next Generation Digital Security Nov 28 2019 10:00 am UTC 60 mins
    Simone Mola, Channel Account Manager e Luca De Fassi, Presales Consultant, Thales
    In un mondo che richiede massima flessibilità e continua evoluzione è di fondamentale importanza saper offrire Sicurezza Digitale in una pluralità di contesti diversi. Thales rappresenta un partner affidabile capace di fornire Data Protection sia on-premise, sia in Cloud, che in soluzioni ibride. Thales è pronta per la “next generation digital security”, e tu?
  • Securing Cloud Storage: Overcome Human Error, Vulnerabilities & Insider Threats Nov 21 2019 4:00 pm UTC 60 mins
    Eric Wolff, Senior Manager Data Protection Product Marketing, Thales
    The drum beat of cloud data breaches, the worst being from Amazon S3, continues. The causes of cloud data breaches are no different than on-premises. The difference is the confusion about who is responsible for data security in the cloud, and how cloud-provider encryption is both weak and a violation of multiple best practices, including the shared security model for cloud computing and separation of duties as a core security principle. Learn how Thales’ Bring Your Own Encryption solutions strengthens security, mitigating the effect of cloud data breaches.
  • Thales Data Protection: best practices e casi reali Recorded: Nov 15 2019 54 mins
    Simone Mola, Channel Account Manager, Thales e Luca De Fassi, Presales Consultant, Thales
    La necessità di cifrare i propri dati più sensibili perchè richiesto da Normative oppure per proteggere la proprietà intellettuale, i brevetti ed informazioni preziose sono attività ormai centrali per la sicurezza informatica di un’azienda. Thales è in grado di offrire una visione completa ed affidabile per mettere in sicurezza i dati che risiedono in DataCenter locali o cloud e in questo webinar ci illustra tali soluzioni attraverso casi di studio realmente implementati in Italia.
  • “Cloud Data Security: Own Your Data Encryption Keys” Recorded: Nov 13 2019 61 mins
    ISSA International
    Numerous cloud trends, including storing sensitive data in cloud and the recognition that data security mandates also apply there, drive both cloud consumers and providers to endeavor to share the challenge of keeping data secure in the cloud. This webinar will explore trends and challenges in multicloud computing, introduce a cloud data security toolkit, including requirements to control cloud data encryption keys. From there we will explore a cloud provider case study: Salesforce Shield Platform Encryption and its newest and most secure key management feature: “Cached Keys”. The webinar will close with potential solutions to multicloud data encryption key management including Salesforce Cached Keys.

    Moderator:
    Tylen Cohen Wood, Private Consultant

    Speakers:
    Eric Wolff, Senior Product Marketing Manager, Thales
    Tuhin Kumar, Product Manager–Security, Salesforce
  • Global Trends in Cloud Security: Gaps in Security Persist in a Multi-Cloud World Recorded: Nov 7 2019 45 mins
    Dr. Larry Ponemon, Ponemon Institute, and Eric Wolff, Senior Manager of Product Marketing at Thales
    Nearly half (48%) of all corporate data is stored in the cloud according the 2019 Thales Global Cloud Security Study conducted by the Ponemon Institute. However, despite the growth in cloud adoption, the study also found that there is a wide gap in the level of security precautions being applied by organizations and in different countries. Organizations admitted that on average, only about half (49%) of the data stored in the cloud is secured with encryption and only one-third (32%) believe protecting data in the cloud is their responsibility.

    The reality is the cloud has created challenges in knowing where data is stored, who has access to it, and how to best secure it. In 2019, breaches like Capital One occurred because of improperly configured security or web and cloud applications. A major catalyst to address the challenges of cloud security are new government regulations and compliance mandates that will make securing multi-cloud strategies more complex. As a result, companies will be faced with more complicated and intricate auditing to demonstrate security and privacy best efforts in the cloud.

    During this webinar, Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Eric Wolff, Senior Manager of Product Marketing at Thales, will discuss the key findings in the global report and how cloud adoption and cloud security have progressed over the past several years. Join us to learn more about:
    - Which cloud services are being commonly used
    - What types of security technologies organizations are applying to protect data in the cloud
    - What types of data are companies putting in the cloud and which are most at risk
    - Which countries are more advanced than others when it comes to cloud security
    - Strategies for how organizations can best secure data in multi-cloud environments
    - The best security approaches to comply with regulations
  • Encrypt Everything in the Cloud. OK, But What About All the Keys? Recorded: Oct 30 2019 60 mins
    Adrian Lane, Securosis CTO, and Charles Goldberg, VP of Data Protection Product Marketing at Thales
    With cloud data security, the new mantra is “Encrypt Everything”. And why not. Encryption delivers proven security, automatically addresses existing and upcoming compliance requirements — like California Consumer Privacy Act (CCPA) and General Data Protection Regulation (GDPR) — and is fully integrated into the fabric of the cloud service. But the “just turn it on” mentality abdicates control over data and custodial responsibilities. The reality is that to control and protect your data, you need to own your cloud encryption keys.

    In this webinar Adrian Lane, Securosis CTO, co-author of the Cloud Security Alliance (CSA) Security Guidance and cloud security instructor, and Charles Goldberg, Vice President of Data Protection Product Marketing will review best practices for life cycle management of AWS, Azure, GCP, Salesforce, and other cloud provider encryption with Bring Your Own Key (BYOK).
  • Global Trends in Cloud Access Management, Single Sign On & Authentication Recorded: Oct 30 2019 49 mins
    Danna Bethlehem, Director of Product Marketing, Thales
    The explosion of cloud applications and identities have set IT decision makers on a quest for reconciling the benefits of the cloud with the security and compliance requirements needs of the enterprise. Much like the user experience offered by mainstream consumer applications, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud applications now a crucial part of day-to-day business operations, the 2019 Thales Access Management Index found that almost half (49%) of IT security professionals believe cloud applications make them a target for cyber-attacks. Cloud applications are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices (54%) and web portals (50%).

    This webinar will review the findings of the Thales global report and how organizations around the world are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn:
    - What are the major attack vectors for cyber attacks
    - Which access management technologies organizations are deploying to secure access to the cloud
    - Which access management technologies IT professionals deem the most effective in securing access to the cloud
    - The criteria IT professionals use to determine access policies for users
    - Who are the internal stakeholders involved in Access Management deployments
  • Secure and Automate Certificate Lifecycle Management with Thales and Keyfactor Recorded: Oct 29 2019 25 mins
    Paul Massis, Solution Engineer, Thales | Anthony Ricci, VP Solutions Engineer & Michael Kubach, Solution Engineer, Keyfactor
    61% of organizations are concerned about their ability to keep keys and certificates secure throughout their lifecycle. As demand to support more devices and applications continues to put pressure on PKI teams, the need for security and automation has reached a tipping point.
    Join our 30-minute webinar and live demo with Michael Kubach, Solutions Engineer at Keyfactor, and Paul Massis, Solutions Engineer at Thales. You’ll learn how to overcome the challenges of keeping keys and certificates secure, and understand which assets demand the highest level of protection.
    Discover how Keyfactor and Thales have partnered together to help organizations protect and automate the lifecycle of their keys and X.509 certificates, including a demo of the integration between Keyfactor and Thales SafeNet Luna and SafeNet Cloud HSMs.
  • Global Trends in Cloud Access Management, Single Sign On and Authentication Recorded: Oct 17 2019 47 mins
    Danna Bethlehem, Director of Product Marketing, Thales
    The explosion of cloud applications and identities have set IT decision makers on a quest for reconciling the benefits of the cloud with the security and compliance requirements needs of the enterprise. Much like the user experience offered by mainstream consumer applications, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud applications now a crucial part of day-to-day business operations, the 2019 Thales Access Management Index found that almost half (49%) of IT security professionals believe cloud applications make them a target for cyber-attacks. Cloud applications are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices (54%) and web portals (50%).

    This webinar will review the findings of the Thales global report and how organizations around the world are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn:
    - What are the major attack vectors for cyber attacks
    - Which access management technologies organizations are deploying to secure access to the cloud
    - Which access management technologies IT professionals deem the most effective in securing access to the cloud
    - The criteria IT professionals use to determine access policies for users
    - Who are the internal stakeholders involved in Access Management deployments
  • The State of Data Security in Retail Recorded: Oct 10 2019 35 mins
    Andy Kicklighter, Director of Product Marketing, Thales
    Digital transformation is fundamentally impacting all industries, and nowhere is this truer than in retail. The internet and mobile technologies have fundamentally changed retailers’ business models, not only by opening new channels to reach customers, but also how they communicate with, serve, and support them.

    While digital transformation is touching every industry, U.S. retailers are leaders are on the leading edge of implementations,
    with 42% of retailers saying they are either aggressively disrupting the markets in which they participate or embedding digital capabilities that enable greater organizational agility. While Digital Transformation is allowing retailers to introduce new business models and reach more customers in new and innovative ways, it is introducing added difficulties for information security professionals and raises the potential to put sensitive customer data at risk.

    Based on the results from the 2019 Thales Data Threat Report – Retail Edition, participants in this webinar can expect to learn about:
    •How the adoption of digital transformation technologies, and especially cloud, is putting sensitive data at greater risk
    •The data security challenges facing retail companies today
    •Critical analyst recommendations for how organizations can be most effective when selecting the right tools that will enable them to manage greater amounts of complexity, that span legacy on-premises needs as well as modern, cloud-based, edge-oriented technologies.
  • Identities Are the New Security Perimeter in a Zero Trust World Recorded: Sep 26 2019 32 mins
    Ashley Adams, Product Marketing Manager for Authentication & Access Management, Thales
    In a recent Thales survey, two thirds of CISOs cited the increase in cloud service adoption, combined with a lack of strong security solutions, as the main reasons cloud services are the prime targets of attack. As organizations undergo digital and cloud transformation, CISOs and security officers are operating in a high stress environment caused by security, compliance and manageability challenges.

    In this presentation we’ll discuss how identities are becoming the new security perimeter in a zero trust world and present best practices for implementing an access management framework that can help organizations remain secure – and scale – in distributed networking environments.
  • The State of Data Security in Healthcare Recorded: Sep 12 2019 42 mins
    Andy Kicklighter, Director of Product Marketing, Thales
    Driven by government mandates, the need for greater efficiency, and the desire to enable better patient care U.S. healthcare organizations are universally adopting cloud and other digital transformation technologies. But this transition can put patients’ sensitive healthcare and financial information fundamentally at risk. In this session, we’ll address the state of data security in healthcare companies today, the changing landscape of risks to data due to digital transformation, and IT security pros priorities for data security today.

    Based on the results from the 2019 Thales Data Threat Report – Healthcare Edition, expect to learn about:
    - How the adoption of digital transformation technologies, and especially cloud, is putting sensitive data at greater risk
    - The data security challenges facing healthcare companies today
    - Critical analyst recommendations for how organizations can be most effective when selecting the right tools to protect their sensitive data
  • Implications of the Australian Prudential Standard CPS 234 Recorded: Sep 5 2019 61 mins
    Graeme Pyper, Regional Director, Australia & New Zealand at Thales
    Since Australia’s Notifiable Data Breaches (NDB) scheme launched on the 22nd February 2018, the Office of the Australian Information Commissioner (OAIC) noted that there were 964 data breaches reported between 1 Apr 2018 and 31 March 2019. This equates to just over 700% increase in data breaches reported compared to the 114 data breaches voluntarily reported in the previous year … a mind blowing statistic.

    With cyber-attacks unwaning, it is not surprising to see that the Australian Prudential Regulation Authority (APRA) released its Prudential Standard CPS 234 for Information Security on 1st July 2019. The objective of CPS 234 is to ensure all APRA regulated entities in the banking, insurance and superannuation industries are prepared to protect against any information security incidents (including cyber-attacks) and are able to respond swiftly and effectively in the event of a data breach.

    This webinar will:
    •Discuss the key requirements of CPS 234
    •Identify disruptive cybersecurity trends and the implications
    •Share best practices to protect against data breaches

    Featuring:
    Graeme Pyper, Regional Director Australia & New Zealand at Thales
  • Global Trends in Cloud Access Management, Single Sign On and Authentication Recorded: Jul 25 2019 45 mins
    Danna Bethlehem, Director of Product Marketing, Thales
    The explosion of cloud applications and identities have set IT decision makers on a quest for reconciling the benefits of the cloud with the security and compliance requirements needs of the enterprise. Much like the user experience offered by mainstream consumer applications, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud applications now a crucial part of day-to-day business operations, the 2019 Thales Access Management Index found that almost half (49%) of IT security professionals believe cloud applications make them a target for cyber-attacks. Cloud applications are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices (54%) and web portals (50%).

    This webinar will review the findings of the Thales global report and how organizations around the world are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn:
    - What are the major attack vectors for cyber attacks
    - Which access management technologies organizations are deploying to secure access to the cloud
    - Which access management technologies IT professionals deem the most effective in securing access to the cloud
    - The criteria IT professionals use to determine access policies for users
    - Who are the internal stakeholders involved in Access Management deployments
  • Choosing the Right Cloud HSM Recorded: Jul 18 2019 44 mins
    Gary Marsden, Senior Director of Data Protection Services at Thales
    Although most major cloud providers now offer native cloud Hardware Security Module (HSM) services, how do you choose the right cloud HSM? According to 451 Research, 69% of enterprises now have a hybrid, multi-cloud strategy. With hybrid, multi-cloud environments likely to be the norm as we move into 2020, managing multiple cloud HSMs will increase complexity, cost of ownership and operational overhead.

    Join us as we discuss the complexities of managing native cloud HSMs separately, leading to islands of security with different features and rules for each. We’ll show you how the smarter and simpler route is to use a cloud HSM provider that can centrally manage and secure your entire cryptographic operations across all cloud environments.

    This informative webinar will cover:
    • A current view of the cloud’s impact on IT business models
    • Why HSMs are critical to data security on premise or in the cloud
    • How creating centralized key management and security strategy will make your cloud life a whole lot easier
    • Building blocks for an HSM strategy for security across all cloud and hybrid IT environments
  • How to Secure Code Signing at the Speed of DevOps Recorded: Jul 9 2019 46 mins
    Gary Marsden, Senior Director of Data Protection Services at Thales and Mark Thompson, VP of Product Management at Keyfactor
    When you sign a piece of code, you make a statement that it comes from your trusted brand and that you stand behind it. But what happens when that trust is broken? Recent attacks, such as the ASUS Live Update hack, underscore the importance of managing reputational risk.

    As attackers become increasingly skilled in the art of signing and spreading malware, all business leaders must invest in the trust associated with their digital brand – and expect the same of their vendors. The challenge is how to secure code signing keys and certificates in today’s distributed and fast-paced DevOps environments.

    Join our experts as they discuss:
    - Code Signing: What is it? Why does it matter?
    - Recent Attacks: The Risks and Challenges of Code Signing
    - How to Secure Code Signing at the Speed of DevOps
    - How Thales and Keyfactor Make It Possible
  • Safeguarding Sensitive and Compliance Data in VMware with Thales Recorded: Jun 27 2019 36 mins
    Brent Hansen at Federal CTO at Thales and Greg Wassenberg, Director of Sales at FedTek
    Many government customers have now realized file-level access control, encryption, and key management are substantial gaps in their cybersecurity architecture and are actively searching for solutions to mitigate this risk.

    Join this webinar to learn how Thales and VMware can help you secure your hyper-converged data. VMware has partnered with the industry leader in access control encryption and key management solutions to allow its customers to secure data and centralize keys on their hyper-converged platform.

    Thales’ Vormetric Data Security Manager provides FIPS-certified, robust key management and role separation to meet most security requirements. The non-disruptive encryption solution provides comprehensive, cost-effective data security for companies that have stringent data protection regulations covering the management of personally identifiable information (PII) and other sensitive information.
  • Skating to the Puck: Preparing to Secure Global Payment Technologies Recorded: Jun 26 2019 58 mins
    Ian Hermon, Thales and Jordan McKee, 451 Research
    There is perhaps no more important security priority than protecting financial transactions. At the rate that FinTech is moving, how will security keep up? How will merchants and financial intuitions find new ways to reduce costs, increase their value proposition and simplify the payment experience for their consumers? The answer is to understand the trends that will be affecting your business and design your security to be ahead of it.

    In this webinar 451 Research and Thales discuss some of the most significant trends emerging in payments today and the technology developments seeking to address a broader range of security threats while supporting a diverse range of new payment approaches.
  • The State of Data Security in Europe Recorded: Jun 13 2019 49 mins
    Andy Kicklighter, Director of Product Marketing, Thales and Dale Wilson, Business Development Director at Kite Distribution
    Digital transformation and the move to the cloud are fundamentally changing business operations throughout Europe – and are putting organizations crown jewels, their sensitive data, at risk. Traditional market leaders are driven to digital transformation by the opportunity for greater efficiency, flexibility and new business models – while also fending off rivals entering their markets with an “all digital” focus. In this session we’ll address the state of data security in European enterprises today, the changing landscape of risks to data due to digital transformation, and IT security pros priorities for data security today.

    Based on the results from the 2019 Thales Data Threat Report – European Edition (now in its sixth year), expect to learn about:

    - How the adoption of digital transformation technologies, and especially cloud, is putting sensitive data at greater risk
    - The data security challenges facing European enterprises today
    - Critical analyst recommendations for how organizations can be most effective when selecting the right tools to protect their sensitive data
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Global Trends in Cloud Security: Gaps in Security Persist in a Multi-Cloud World
  • Live at: Nov 7 2019 7:00 pm
  • Presented by: Dr. Larry Ponemon, Ponemon Institute, and Eric Wolff, Senior Manager of Product Marketing at Thales
  • From:
Your email has been sent.
or close