Hi [[ session.user.profile.firstName ]]

COVID-19’s Impact on How CISOs View Cloud Access Management and Remote Working

Thales research conducted earlier this year captured the opinions from risk management and cloud security professionals just as the Covid-19 emergency erupted. Three months on, we have a unique vantage point to assess how this data lines up with the way remote access has played out in reality. Join us in this session to hear the latest trends and future directions in IAM as we discuss the findings of Thales’s annual Access Management Index for North America.
Recorded Jun 16 2020 37 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Danna Bethlehem, Director of Product Marketing, Thales
Presentation preview: COVID-19’s Impact on How CISOs View Cloud Access Management and Remote Working
  • Channel
  • Channel profile
  • Accelerating Business Transformation in the Post-COVID Era Recorded: Nov 26 2021 47 mins
    Thales CPL, PwC Hong Kong, Microsoft
    The COVID-19 pandemic has accelerated what has been a long-term broad adoption of cloud environments, including multicloud and hybrid deployments. How to secure cloud data and the business transformation is a big challenge for CISO and their security teams.

    In this panel discussion, audiences will hear the top cyber security experts from Microsoft and PWC to share their insights on:
    - How does cloud migration facilitate business growth in the new normal;
    - What are the challenges in Security and Compliance;
    - What is digital sovereignty and how important it is to enterprises and governments that are taking on the cloud migration journey;
    - What governments and enterprises should do to accelerate business transformation while staying secure and compliant.

    [Moderator]
    • Welland Chu, Business Development Director, APAC, Thales Cloud Protection & Licensing
    [Panelists]
    • Kok-Tin Gan, Partner - Cyber Security & Privacy, Darklab Founder, PwC Hong Kong
    • Harry Pun, Cybersecurity Executive, Greater China, Cybersecurity Solutions Group, Microsoft
  • CLEAR - Cloud Exposure Analysis and Resilience Recorded: Nov 18 2021 46 mins
    Evrard Callot, Cybersecurity Consultant, Thales
    In this webinar, attendees will learn how the Thales CLEAR solution allows you to monitor the hardening of your cloud environments.
  • Why Are CISO's Asking for a Data-Centric Security Approach? Recorded: Nov 18 2021 45 mins
    Matthew Baldy Worldwide Data Security Leader, IBM; Dinesh Nagarajan; Worldwide Services Leader, IBM
    Security teams today are facing a unique challenge of protecting their sensitive and confidential data in the midst of unprecedented data growth, technology transformation, increasing regulations and cyber security threats. Whilst protecting data is the core of most security plans, Investment in security controls have been historically focussed on the underlying infrastructure, applications and network. Client's need a data-centric security approach to navigate the current challenges and improve their data security posture.

    IBM Security will present on what a data-centric security approach is and how other client have benefitted from such an approach.
  • Enhanced Security & Compliance for MSFT 365 Using DKE & Thales External Keys Recorded: Nov 18 2021 45 mins
    Benjy Levin, Program Manager, Microsoft
    Delivering the modern digital workplace with Microsoft 365 requires the highest security assurances as data is now off-premise, traversing the clouds, and being stored and accessed across a broad set of uncontrolled remote working environments. Up until now, businesses have been challenged to find security solutions that can easily interoperate with Microsoft 365 and meet the highest level of data security compliance and regulation. Together, Microsoft and Thales with their Double Key Encryption solution allow a CISO, architect, or auditor to address crucial cybersecurity objectives including secure remote work, information protection on the go, secure data storage and more. All of this found in a simple, integrated solution with customer-controlled external key stores.
  • Red Hat Guidance for a Modern Cloud Security Architecture Recorded: Nov 18 2021 42 mins
    Cameron Skidmore, Global ISV Partner Solution Architect, Red Hat
    For decades Red Hat has helped bring the power of open source to companies around the world. Partnering with Thales, Red Hat takes the latest in open source innovation and crafts that into secure, enterprise-ready solutions. Come spend time with Red Hat solution architect Cameron Skidmore as he breaks down everything needed for a modern cloud security architecture.
  • PKI & Credential Management Cloud Migration: What’s Really Happening Out There? Recorded: Nov 18 2021 30 mins
    Anders Adolfsson, Global Product Manager at Versasec
    This discussion is for professionals tasked with moving Public Key Infrastructure (PKI) and credential management to the cloud. Understanding all the options when moving Identity and Access Management (IAM) to the cloud can be daunting, but among the greatest challenges are ensuring your security policies and regulations are not left behind. It is possible to migrate IAM to the cloud without compromising on security, without breaching current security policies, and while using your current resources. In this talk you will learn: 1. Trends when it comes to authentication and the cloud 2. Typical scenarios for moving to the cloud 3. How to leverage an organisation’s existing PKI, HSM and hardware token when migrating to the cloud 4. How to keep current security policies, gain usability, and avoid impact on current processes Join us here and contact us at info@versasec.com and we will help you on your path to move your IAM to the cloud.
  • Understanding Salesforce's MFA Requirement and How Best to Meet It Recorded: Nov 18 2021 46 mins
    Danna Bethlehem, Director of IAM Product Marketing
    As of 1st February 2022, Salesforce will be enforcing multi-factor authentication for internal employees. Whether you are already using an authentication solution or not, this session will provide guidelines on what SFDC’s requirement is, and how you can best meet it by adopting an ‘authentication everywhere’ approach to your access security.
  • PKI & Credential Management Cloud Migration: What’s Really Happening Out There? Recorded: Nov 18 2021 30 mins
    Anders Adolfsson, Global Product Manager at Versasec
    This discussion is for professionals tasked with moving Public Key Infrastructure (PKI) and credential management to the cloud. Understanding all the options when moving Identity and Access Management (IAM) to the cloud can be daunting, but among the greatest challenges are ensuring your security policies and regulations are not left behind. It is possible to migrate IAM to the cloud without compromising on security, without breaching current security policies, and while using your current resources. In this talk you will learn: 1. Trends when it comes to authentication and the cloud 2. Typical scenarios for moving to the cloud 3. How to leverage an organisation’s existing PKI, HSM and hardware token when migrating to the cloud 4. How to keep current security policies, gain usability, and avoid impact on current processes Join us here and contact us at info@versasec.com and we will help you on your path to move your IAM to the cloud.
  • Digital Sovereignty & Cloud Adoption Recorded: Nov 18 2021 49 mins
    Spandan Mahapatra, TCS HiTech; Ganesh Subramanya, TCS Cybersecurity; Eddye Dibar, IDC; Romain Deslorieux, Thales
    The digitalisation of services has accelerated in the past two years, leveraging cloud scalability and innovation. With that, the concept of digital sovereignty gained momentum as the dependence on giant hyperscalers became a societal issue. This webinar will discuss digital sovereignty in its impact on cloud adoption, as software, workload, and especially data needs to be monitored, controlled and protected in shared cloud environments.
  • Why Access Security Has Never Been More Relevant to Employee Satisfaction Recorded: Nov 18 2021 37 mins
    Danna Bethlehem, Director of IAM Product Marketing
    Hybrid and remote work models have become the norm. At the same time economic resurgence from the pandemic has created a shortage of skilled workers. The combination of these two factors is allowing employees to call the tune about how they want to work, particularly, when it comes to mobility. Join us in this session to hear how your organization can thrive by making sure your employees have secure, convenient access to their apps – wherever they are, on any device.
  • eIDAS Certified High Trust Remote Signing & How Can It Benefit Your Business Recorded: Nov 18 2021 45 mins
    Geoff Bartlett, Customer Success Manager, Ascertia
    Ascertia Customer Success Manager Geoff Bartlett will be hosting a presentation at the Thales Cloud Security Crypto Summit about high trust remote signing & how can it benefit your business. The presentation will cover: - What is remote signing or a Remote Signing Service Provider (RSSP)? - Learn more about interoperability, standardization and compliance - Ultimate high trust solution –Ascertia ADSS Server & SigningHub - Short demo
  • Discover, Protect, Control in the Cloud Recorded: Nov 18 2021 28 mins
    Nisha Amthul, Sr. Mgr. Encryption Product Marketing, Thales
    Organizations are moving their workloads to cloud-based solutions to scale, keep up with remote workforces, improve flexibility and availability. With numerous products and services needed to discover, protect, and control sensitive data in the cloud and on-premise, IT security professionals need an integrated data protection solution to protect the data and reduce the risk that it will be compromised. In this session you will learn how you can discover, classify, and protect data with CipherTrust Intelligent Protection. This ‘all-in-one’ solution discovers and classifies data based on sensitivity, vulnerability, and other risk profiles and proactively protects at-risk data using encryption, access controls, and key management giving you an easy to implement data protection solution to secure your workloads in the cloud.
  • Secure File-Sharing Collaboration: Improving Your Cloud-First Security Posture Recorded: Nov 17 2021 45 mins
    Julian Fay, CTO, Senetas; Stan Mesceda, Sr. Mgr. Product Management, High-Speed Encryption
    Data sovereignty in the cloud is growing concern, brought to the fore by regulations such as GDPR, and the Schrems II ruling. With more organizations’ workforces following a hybrid or full-remote model, how can you ensure secure file-sharing collaboration? These are key to a satisfied and productive workforce, but the market is crowded with applications such as DropBox, Box, and OneDrive all promising to deliver a work anywhere, with anyone, culture. However, conventional file-sharing collaboration tools are not as secure as they should be, especially in a world of relentless cyber-attacks. In this session we’ll discuss the challenges of secure file sharing and collaboration across cloud, hybrid and on-premises environments and the urgency of protecting data and applications using encryption.
  • Cross-Cloud Data Encryption: Securing your Gateway to the Cloud Recorded: Nov 17 2021 51 mins
    Julian Fay, CTO, Senetas; Stan Mesceda, Sr. Mgr. Product Management, High-Speed Encryption
    Today cloud compute and storage services must accommodate any-any connectivity amongst a wide range of devices, applications and third parties across the Internet and other communication channels. Cloud connectivity is a complex mix that makes protecting data across it a challenge for even the most advanced security teams. As more laws and regulations call out network encryption as a requirement for essential intrinsic protection for cloud services, today’s network encryption devices must handle intensive encryption algorithms, operate across a diverse range of cloud and hybrid architectures and connectivity and be future proof against emerging threats. Join Julian Fay and Stan Mesceda to learn more about ensuring that your data paths to/from and between cloud environments are encrypted and how to build a crypto-agile data protection strategy across modern hybrid infrastructures.
  • Security On-Demand: Making Cloud Services Work for You Recorded: Nov 17 2021 42 mins
    Paul Hampton, Cloud Data Protection Services, Thales
    Cloud services are everywhere. Beyond the major cloud service providers – AWS, Azure and Google - and their broad software, infrastructure and platform as a services offerings, there are a range of other marketplaces offering aggregated services for a variety of different services including security across multiple vendor and multicloud/hybrid offerings. Data protection and key management, once an only in-house operation, is now being shared, or even fully outsourced to experts, to teams who know best how to do it, allowing organizations to focus on their core business. Simpler, more cost-effective, on-demand options that allow the organization to focus on its business, knowing that their data is securely under control, and only they have control of the keys to that data, is redefining the way organizations do data protection. Find out more about cloud security services, how to leverage cloud based marketplaces to achieve maximum benefit for your organization in a multicloud and hybrid world.
  • Discover, Protect, Control in the Cloud Recorded: Nov 17 2021 39 mins
    Chris Holland, Vice President, Encryption Product Management, Thales; Nisha Amthul, Sr. Mgr. Encryption Product Marketing
    Organizations are moving their workloads to cloud-based solutions to scale, keep up with remote workforces, improve flexibility and availability. With numerous products and services needed to discover, protect, and control sensitive data in the cloud and on-premise, IT security professionals need an integrated data protection solution to protect the data and reduce the risk that it will be compromised. In this session you will learn how you can discover, classify, and protect data with CipherTrust Intelligent Protection. This ‘all-in-one’ solution discovers and classifies data based on sensitivity, vulnerability, and other risk profiles and proactively protects at-risk data using encryption, access controls, and key management giving you an easy to implement data protection solution to secure your workloads in the cloud.
  • To the Cloud & Beyond: Choosing the Right HSM for Your Digital Transformation Recorded: Nov 17 2021 40 mins
    John Ray, Director of Product Management, Hardware Security Modules, Thales
    Don't want to be tied to one specific location or cloud service provider and need some flexibility in the security of your assets? Learn how you can ensure key ownership and control of your applications, identities and data wherever it may be with Thales Luna HSMs and how to build a root of trust for your digital transformation using a modern HSM infrastructure.

    Luna HSMs can be deployed either in the cloud, as-a-service, on-premises or across hybrid environments. With so many options available, how do you choose the right HSM for your needs? In this session, we’ll take a closer look at how you can benefit from a common architecture across all Luna HSMs and have the flexibility to modify your HSM deployment choices as your business needs change and evolve. We’ll also look at how Luna HSMs secure your digital transformation, guard against evolving threats and capitalize on emerging technologies and use cases including our latest integration with Microsoft’s Double Key Encryption (DKE).
  • CLEAR - Cloud Exposure Analysis and Resilience Recorded: Nov 17 2021 39 mins
    Evrard Callot, Cybersecurity Consultant, Thales
    In this webinar, attendees will how the Thales CLEAR solution enables organizations to monitor the hardening of their cloud environments.
  • Cloud Data Security: Not an Oxymoron! Recorded: Nov 17 2021 45 mins
    Andras Cser, Vice President, Principal Analyst, Forrester
    Today, firms can no longer ignore the cloud and its significant operational, staffing, and security benefits. In this webinar, Andras Cser, Vice President & Principal Analyst serving Security & Risk Professionals for Forrester Research, will review the accelerated state of cloud migration and the security best practices firms should implement to ensure sensitive data is protected and can be securely accessed in the cloud. Specifically, this webinar will address:
    - Key challenges for IaaS and SaaS security
    - The appropriate protections for cloud users, workloads, and applications
    - Data protection requirements, from discovery and prioritization to protect of data at rest, in use and inmotion
    - Examples of the appropriate security controls for cloud apps and services such as key management and authentication
    - Forrester’s best practices and predictions for cloud security
  • The Challenges of Cloud Security in a Multicloud World Recorded: Nov 17 2021 49 mins
    Eric Hanselman, Principal Research Analyst, Information Security, 451 Research
    As the world continues to grapple with the COVID-19 pandemic, it is clear that the technology sector in general – and cloud services in particular – has been instrumental in helping the world cope with the enormity of the task. It has provided the advanced medical research at various stages; helped instrument public health, officials, and the general public, and provided the foundation of ongoing commerce, communication and entertainment.

    For those looking into cloud adoption, the pandemic merely accelerated what has been a long-term broad adoption of cloud environments, including multicloud and hybrid deployments. There are numerous benefits to this adoption: faster time to value and time to market, as well as the ability to experiment and quickly leverage elasticity and resiliency. That said, the benefits of cloud come with significant new security challenges for organizations. They need to understand
    how responsibilities are shared between provider and customer, how the threat models change, how internal stakeholders respond to cloud, and much more.

    Throughout all this, it is useful to get a sense of how others are handling these issues. Just how widespread is multicloud? What are the operational challenges of managing security across multiple clouds? Is all this cloud transformation as hard as it seems? How do organizations secure data in cloud? Which technologies and best practices are most effective in securing data in the cloud? This webinar delves into these and other trends in cloud security and reviews key findings in the 2021 Thales Cloud Security Study, which is based on data from a global survey of more than 2,600 IT and security professionals from around world.
Building a future we can all trust
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: COVID-19’s Impact on How CISOs View Cloud Access Management and Remote Working
  • Live at: Jun 16 2020 6:00 pm
  • Presented by: Danna Bethlehem, Director of Product Marketing, Thales
  • From:
Your email has been sent.
or close