Hi [[ session.user.profile.firstName ]]

Leaky Buckets: Effective Encryption Techniques to Secure AWS S3 Buckets

Several of the most well-known data breaches have involved unsecured Amazon Simple Storage (S3) buckets that resulted in millions of customer data records be exposed. In most cases the main culprit was human error: Administrators who improperly configured the security settings.

While cloud native encryption and key management can be used, these options are mostly “just good enough security” and do not follow best practices for encryption and key management. Using third party encryption and key management solutions give users total control over the security of sensitive data in the cloud.

For cloud and security teams, understanding the most effective encryption technology available for securing data in AWS can help them make them make the right choices. In this webinar, you will learn about a more secure approach for protecting sensitive data in AWS S3 buckets using Vormetric Transparent Encryption (VTE).

Key topics in this webinar will be:
• Causes of misconfigured permissions to AWS S3 buckets
• What happens if an S3 bucket is intentionally or unintentionally exposed
• Why Bring Your Own Encryption is better than cloud native encryption
• The specific techniques VTE offers to provide a more effective encryption mechanism to secure sensitive data in AWS S3 buckets
Live online Sep 23 11:30 am UTC
or after on demand 42 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jermaine Ashman, Senior Sales Engineer, Thales
Presentation preview: Leaky Buckets: Effective Encryption Techniques to Secure AWS S3 Buckets
  • Channel
  • Channel profile
  • Understanding How to Bring Your Own Key to Azure Sep 23 2020 9:30 pm UTC 33 mins
    Eric Wolff, Senior Manager Data Protection Product Marketing, Thales
    Cloud trends, including storing sensitive data in cloud and the recognition that data security mandates also apply there, drive both cloud consumers and providers to endeavor to share the challenge of keeping data secure in Microsoft Azure. This webinar will discuss those trends, introduce a cloud data security toolkit, including a solution that fulfills best practices for managing cloud data encryption keys.
  • When to Use Provider Encryption, Bring Your Own Key & BYOE for Public Clouds Sep 23 2020 8:15 pm UTC 62 mins
    Charles Goldberg, VP of Data Protection Product Marketing, Thales
    The 2020 Thales Data Threat Report found that 100% of surveyed organizations have sensitive data in the cloud and 57% of it is encrypted. That is a lot of encryption! Furthermore, the trend shows we are encrypting more often to protect brand reputation, authorize data use, and to meet regulations. However, selecting the right encryption and key management solutions for different cloud use cases isn’t always obvious. In this webinar we will discuss the available options, tradeoffs, and how to streamline supporting the ultimate mix of solutions most organizations need to deploy across their multi-cloud and hybrid cloud environments.
  • Driving Access Management Adoption in Large Enterprises Sep 23 2020 7:00 pm UTC 60 mins
    Eric Avigdor, Director of Product Management, IAM, Thales; Asaf Lerner, Business Development Manager, Thales
    Strategic IT initiatives such as O365 adoption, MFA consolidation, SSO for All alongside compelling events such as COVID 19 – often drive enterprise IT modernization. At no time is this more relevant than the present, when cloud adoption, accelerated by the need to support work from home, has exposed many weaknesses in existing on-premises legacy schemes.

    This session will discuss why Access Management and Authentication is at the heart of enterprise security and how drives a Zero Trust architecture and creates synergies across IT modernization programs and present a technical demonstration of how a cloud-based access management can simplify user access to cloud services and enterprise apps.
  • Identity-Centric Zero Trust Models for a Multi-Cloud World Sep 23 2020 5:30 pm UTC 60 mins
    Danna Bethlehem, Director of Product Marketing, Thales
    The need to enable mass work from home has exposed weaknesses in existing on-premises security solutions. As traditional security perimeters disintegrate, the login point becomes the front line of enterprise security. Now is the time to rethink how identity-centric Zero Trust models can offer an effective strategic framework for transforming security schemes in order to accommodate our users’ need for anywhere, anytime access to cloud applications and services. During this session we’ll discuss:
    • The Benefits of ID-centric Zero Trust
    • How ID-centric zero trust concepts can address the fast moving needs related to COVID-19
    • The advantages of identity-centric zero trust for modernizing IAM schemes
  • Bring Your Own Encryption Strategies for a Multi-Cloud World Sep 23 2020 4:00 pm UTC 60 mins
    Charles Goldberg, Vice President of Data Protection Product Marketing, Thales
    The 2020 Thales Data Threat Report found that 100% of surveyed organizations have sensitive data in the cloud and 57% of it is encrypted. In addition, the trend shows organizations are encrypting more often to protect brand reputation, authorize data use, and to meet regulations. However, selecting the right encryption solutions for different cloud use cases isn’t always obvious. In this webinar we will discuss the available options, trade offs, and how to streamline supporting the ultimate mix of solutions most organizations need to deploy encryption across their multi-cloud and hybrid cloud environments.
  • Bring Your Own Key Strategies for a Multi-Cloud World Sep 23 2020 2:30 pm UTC 60 mins
    Gary Marsden, Senior Director, Cloud Services, Thales; Eric Wolff, Senior Product Marketing Manager, Thales
    A centralized cloud key management strategy puts security professionals in the driver’s seat. However, today only about half of organizations have complete control the keys of the keys to their encrypted data in the cloud. This webinar will review best practices and the different approaches for maintaining access and control over your keys with BYOK and cloud HSM technologies, so your organization will continue to benefit from the scale and cost effectiveness that the cloud provides, while ensuring that data is secure and financial risks are minimized.
  • How to Choose the Right Cloud HSM Sep 23 2020 1:00 pm UTC 60 mins
    Gary Marsden, Senior Director, Cloud Services, Thales
    Although most major cloud providers now offer native cloud Hardware Security Module (HSM) services, how do you choose the right cloud HSM? According to 451 Research, 69% of enterprises now have a hybrid, multi-cloud strategy. With hybrid, multi-cloud environments being the norm in 2020, managing multiple cloud HSMs will increase complexity, cost of ownership and operational overhead.

    Join us as we discuss the complexities of managing native cloud HSMs separately, leading to islands of security with different features and rules for each. We’ll show you how the smarter and simpler route is to use a cloud HSM provider that can centrally manage and secure your entire cryptographic operations across all cloud environments.

    This informative webinar will cover:
    • A current view of the cloud’s impact on IT business models
    • Why HSMs are critical to data security on premise or in the cloud
    • How creating centralized key management and security strategy will make your cloud life a whole lot easier
    • Building blocks for an HSM strategy for security across all cloud and hybrid IT environments
  • Leaky Buckets: Effective Encryption Techniques to Secure AWS S3 Buckets Sep 23 2020 11:30 am UTC 42 mins
    Jermaine Ashman, Senior Sales Engineer, Thales
    Several of the most well-known data breaches have involved unsecured Amazon Simple Storage (S3) buckets that resulted in millions of customer data records be exposed. In most cases the main culprit was human error: Administrators who improperly configured the security settings.

    While cloud native encryption and key management can be used, these options are mostly “just good enough security” and do not follow best practices for encryption and key management. Using third party encryption and key management solutions give users total control over the security of sensitive data in the cloud.

    For cloud and security teams, understanding the most effective encryption technology available for securing data in AWS can help them make them make the right choices. In this webinar, you will learn about a more secure approach for protecting sensitive data in AWS S3 buckets using Vormetric Transparent Encryption (VTE).

    Key topics in this webinar will be:
    • Causes of misconfigured permissions to AWS S3 buckets
    • What happens if an S3 bucket is intentionally or unintentionally exposed
    • Why Bring Your Own Encryption is better than cloud native encryption
    • The specific techniques VTE offers to provide a more effective encryption mechanism to secure sensitive data in AWS S3 buckets
  • COVID-19’s Impact on How CISOs View Cloud Access Management and Remote Working Sep 23 2020 5:30 am UTC 60 mins
    Danna Bethlehem, Director of Product Marketing, Thales
    Thales research conducted earlier this year captured the opinions from risk management and cloud security professionals just as the Covid-19 emergency erupted. Three months on, we have a unique vantage point to assess how this data lines up with the way remote access has played out in reality. Join us in this session to hear the latest trends and future directions in IAM as we discuss the findings of Thales’s annual Access Management Index for North America.
  • Cloud Security Trends and Strategies in the Asia-Pacific Region Sep 23 2020 4:00 am UTC 60 mins
    Rana Gupta, Vice President of Sales, APAC, Thales
    Digital transformation and the move to the cloud are fundamentally changing business operations throughout the Asia-Pacific region and are putting organizations’ sensitive data at risk. Traditional market leaders are driven to digital transformation by the opportunity for greater efficiency, flexibility and new business models – while also fending off rivals entering their markets with an “all digital” focus. In this session we’ll address the state of cloud and data security in Asia-Pacific enterprises today, the changing landscape of risks to data due to digital transformation, and IT security pros priorities for data security today.

    Based on the results from the 2020 Thales Data Threat Report – APAC Edition, in this webinar you will learn about:
    - How the adoption of digital transformation technologies, and especially cloud, is putting sensitive data at greater risk
    - The data security challenges facing Asia-Pacific enterprises today
    - Recommendations for how organizations can be most effective when selecting the right tools to protect their sensitive data
  • The Global State of Data Security: Zero Trust in a Multi-Cloud World Sep 22 2020 9:00 pm UTC 44 mins
    Charles Goldberg, VP of Data Protection Product Marketing, Thales
    Based on the findings from 2020 Thales Data Threat Report – Global Edition, digital transformation and the move to the cloud are fundamentally changing business operations across the globe and are putting organizations sensitive data at risk. According to the report, 50% of all corporate data is now stored in the cloud, and 42% of all data stored in the cloud is sensitive. However, only 57% of that sensitive data is protected by encryption.

    In this webinar we’ll address the state of data security for enterprises today, the changing landscape of risks to data due to cloud adoption and digital transformation, and IT security pros priorities for data security. Specifically, you can expect to learn about:
    - How the adoption of digital transformation technologies, and especially cloud, is putting sensitive data at greater risk
    - The data security challenges facing enterprises today, including emerging threats like quantum computing
    - Critical analyst recommendations for how organizations can be most effective when selecting the right tools to protect their sensitive data
  • Discover, Protect & Control Your Data in the Cloud Sep 22 2020 6:30 pm UTC 60 mins
    Chris Holland, VP of Encryption, Thales; Nisha Amthul, Sr. Prod. Mktg Mgr, Thales; Steve Kingston, Sr. Product Mgr., Thales
    Complexity is one of the biggest challenges to implementing effective data security in the cloud. With numerous products and services needed to discover, protect, and control sensitive data in the cloud and on-premise, it's difficult for IT security professionals to achieve unified visiblity into the efficacy of an organizations data security operations because of the siloed nature of these products and services. In this session you will learn how you can simplify data security with the CipherTrust Data Security Platform. This new and innovative platform from Thales unifies data discovery, classification, encryption and key management in a single solution, giving you a single plan of glass to implement data protection across your entire organization and in the cloud. This session will also have a live demonstration of the platform.
  • Is Native Cloud Security Enough? Sep 22 2020 5:00 pm UTC 60 mins
    Gary Marsden, Sr. Director, Thales; Eric Wolff, Sr. Product Marketing Mgr., Thales; Matt Sparks, Sr. Sales Engineer, Thales
    Major cloud providers, from AWS and Azure to Google and IBM, offer a wide range of security services to complement their infrastructure, platform and software as a service offerings. These security services include cloud native encryption, key management and IAM tools. However, most of these offerings provide "just good enough" security and still leave the cloud provider in control of your data, keys and identities. Businesses and organizations need to apply Zero Trust strategies when it comes to cloud providers in order to be in total control of their data and identities both in terms of security best practices and compliance mandates. This session will take a look at how organizations can bring their own security, specifically encryption, key management and access management technologies to their cloud environments and take a centralized approach to applying these technologies to protect data and secure access to all of their cloud environments.
  • Introducing the Zero-Trust Triad Framework for End-to-End Cyber Security Sep 22 2020 3:30 pm UTC 30 mins
    Charles Goldberg, VP of Data Protection Product Marketing, Thales; Manav Khanna, Sr. Director of Product Mgmt., IAM, Thales
    Zero-Trust is a hot industry buzz word with no shortage of solutions from a myriad of vendors. The greatest challenge has been implementing a comprehensive solution that covers identities, devices, and data end-to-end. Deploying multi-vendor piecemeal solutions becomes expensive to operate and often leaves exceptions that hackers identify and exploit.

    In this session we will introduce the Zero-Trust Triad Framework for a comprehensive cyber security solution that spans all IT assets and users across an organization.

    Join us in this session to learn:
    • The latest strategies and considerations when architecting a zero-trust solution that include identities, devices and data
    • How to secure your business on-premises and through cloud adoptions
    • To control risk while expanding remote workers and broadening use of devices
  • Roundtable: Securing Data and Identities in the Cloud Sep 22 2020 2:00 pm UTC 60 mins
    Garrett Bekker, Sr. Analyst, 451 Research; Charles Goldberg, VP, Thales; Manav Khanna, Sr. Dir, Thales; Mike Kiser, SailPoint
    The cloud has fundamentally changed the IT and security landscape by breaking down traditional approaches to security with the need for new strategies that move security closer to the new perimeter: data and identities. This panel discussion will address the current state of cloud security, practical approaches for protecting data and identities in the cloud with zero trust strategies that focus on centralized encryption, key management, cloud access management and identity governance strategies.

    Speakers:
    Garrett Bekker, Senior Analyst, 451 Research
    Charles Goldberg, VP, Thales
    Manav Khanna, Sr. Director, Thales
  • Cloud Security: Now It Is a Game Changer for SMBs Sep 22 2020 11:30 am UTC 30 mins
    Rob Elliss, VP for EMEA, Thales; Claire Pitman-Massie, Senior Director of EMEA Field Marketing, Thales
    If the recent race to the cloud has taught us anything, it is that businesses and organizations of every shape and size are embracing it.

    However, this has created significant security and compliance challenges, especially for small and medium-sized businesses. While larger enterprises have the resources to deploy and manage an enterprise-wide security infrastructure and strategy, the SMB community has not because of the investment and skills required, especially when it comes to complex data security and access management regulatory requirements.

    Join this webinar to learn how a cloud first, easily consumable alternative for data protection and access management can help this significant and incredibly economically important business sector can implement security in easier and more cost effective manner. Specifically, you will hear about the following:
    • How adopting a cloud first approach can help achieve compliance and increase data protection
    • Why encrypting data is not the monster task SMBs believe it to be
    • How other SMBs are addressing the challenge of being forced by their supply chains to adopt encryption as part of their supply agreements
    • Why SMBs are more at risk from brand damage, financial ruin if a data breach occurs and how cloud based encryption will address this challenge
    • How Thales is enabling the SMB to change the game
  • Data Centric Cloud Security and Compliance Sep 22 2020 10:00 am UTC 60 mins
    Mike Small, Senior Analyst, KuppingerCole
    Today’s economy is driven by data and the most successful companies are those that can use data to get closer to their customers, create new products and operate more efficiently. Cloud services are a key enabler in this. They allow the capture, storage and use of vast amounts of data. They enable the rapid development and deployment of new applications as well as the modernization of existing ones.

    Concerns over Risk & Compliance Are Slowing Adoption
    However, the use of these services causes concerns over risk and compliance and these are slowing the adoption of cloud services. While organizations understand how their internal controls meet their compliance obligations the same is not true for the use of cloud services. It is also clear that many of the security incidents result from the customer’s own use of these services. For example, security and compliance are often outside the skills of DevOps teams or are overlooked and this can lead to the existence of critical vulnerabilities that can be exploited. An additional concern is the risk of government interference in the operation of the service or demands for access to the data.

    Information Protection for the Hybrid Cloud
    To benefit from the opportunities provided by cloud services it is essential that organizations fully understand their responsibilities, and these are centered around access to data. The customer is always responsible for ensuring that their obligations around this access are met and that their controls for this are effective. This means taking a data-centric approach to cloud security and compliance. This webinar will highlight:
    - The challenges around security and compliance in today’s hybrid IT environment
    - The information protection lifecycle and how this is applied in the hybrid cloud
    - Why you need to control access and manage how your data is encrypted
    - What else you need to take care of
  • Financial Services: challenges and solutions to succeed in digital finance Recorded: Sep 17 2020 53 mins
    John Ray, Director of Hardware Security Module (HSM) Product Management at Thales and Neil Cosser, Country Manager Africa
    In this webinar, you will learn:
    •The security problems in the financial services industry as it undergoes a digital transformation
    •How to secure applications and sensitive data and comply with regulations using a modern HSM infrastructure
    • Understand the importance of HSMs and how they protect traditional and emerging use cases
  • Customer Needs: Increasingly Cloudy - Six ways to accelerate your XaaS Revenue Recorded: Sep 17 2020 49 mins
    Gary Marsden: Cloud Services Director, Thales Cloud Protection & Licensing (CPL)
    Today’s new normal has changed the market for data consumption and accelerated the need to protect data at multiple levels. With a feature-rich and comprehensive portfolio, partnering with an industry leader like Thales will help your business flourish. Our technologies enable you to cross-sell to existing customers, retain higher revenues per partner contract and increase stickiness for customer retention. It helps open doors to new markets, obtain new customers and enables you to wrap value add services as a competitive differentiator.

    Join Gary Marsden, Cloud Services Director to learn more about how the Thales New Normal provides unrivalled growth opportunities with zero investment, through data protection on demand, that can help accelerate your client revenues
  • Addressing Singapore Public Sector Data Security Committee's Recommendation Recorded: Sep 15 2020 30 mins
    Vinod Shankar, Security Lead, Southeast Asia, Accenture; Seah Shao Xiong, Regional Head of Sales and Channel, Thales DIS CPL
    This webinar follows the Singapore Government’s acceptance of the Public Sector Data Security Review Committee’s (PSDSRC) five wide-ranging recommendations to better protect citizens’ data. The committee is chaired by Senior Minister Teo Chee Hean, who is also Minister-in-charge of Public Sector Data Governance.

    Join us for an hour and learn how Thales CPL and Accenture address the Singapore Public Sector Data Security Committee Recommendations, specifically the technical recommendations.
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Leaky Buckets: Effective Encryption Techniques to Secure AWS S3 Buckets
  • Live at: Sep 23 2020 11:30 am
  • Presented by: Jermaine Ashman, Senior Sales Engineer, Thales
  • From:
Your email has been sent.
or close