Hi [[ session.user.profile.firstName ]]

'Back to the Future' – Why Quantum Threatens Encryption Security Now

Large scale quantum computers do not yet exist but even today they pose a clear and present danger to our information security. As quantum computing looks set to render many of today’s security methods obsolete, from the algorithms we have trusted for so long to cybercriminals data harvesting today for decryption later, you need to prepare for long-term data protection in a quantum world. Join us to find out more about the practical strategies you can adopt today to defeat this threat, to learn how to become crypto-agile, by combining conventional and quantum-resistant encryption in a single network security platform. And assess where your organization ranks in a new global research report of IT and cybersecurity decision-makers that highlights serious concerns about the security of data in motion. Find out here what you can do to make sure your data is secure as it crosses the network by taking a crypto-agile approach to network encryption today and into a Post-Quantum world.
Recorded Jun 16 2021 71 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Julian Fay, CTO, Senetas
Presentation preview: 'Back to the Future' – Why Quantum Threatens Encryption Security Now
  • Channel
  • Channel profile
  • A Single Platform to rule them all - Control your data, encryption and keys Jul 20 2021 10:00 am UTC 60 mins
    Axel Debray - Cyber Security Specialist, Thales UKI
    Encryption has shown to be one of the strongest solutions to support most organisations' data protection strategy. However, the growing number of data encryption tools (and respective key managers) for on-premises and cloud systems, increases complexity and reduces visibility. Ultimately resulting in unexpected costs and security risks.

    Join Axel Debrary to discover:
    • How you can centrally manage all your encryption keys from a single pane of glass and simplify auditing
    • How CipherTrust Manager can help you gain full control and visibility over your encryption keys
    • How CipherTrust Manager delivers enterprise-grade key management and encryption for leading software and hardware vendors solutions
    • The added benefits of a unified data security platform to reduce cost and minimise risk
  • Network Data Security Vulnerabilities: Cybersecurity Survey Reveals Weaknesses Recorded: Jun 17 2021 57 mins
    Julian Fay, CTO, Senetas; Stan Mesceda, Senior Product Manager for Network Encryption, Thales
    More data is in motion than ever before—a trend that will continue in line with the steep cloud adoption and digital transformation curves, as well as the significant impact of the COVID-19 pandemic on remote working. A number of important factors have significantly increased demand for, and dependency on, high-speed wide-area networks. These include workloads migrating to and from the cloud, real-time global collaboration, big data and cloud data storage, 5G and the expectation of higher bandwidth out to the edge and need for larger and faster aggregation points.
    However, only 54% of enterprises feel confident their network security will protect them against cyber threats. As organizations of all sizes continue to adopt connected technologies in support of Cloud Services, Mobility, CCTV, BYOD and Business Continuity; their increased network traffic expose them to increased data in motion security risks. A global research report of IT and cybersecurity decision-makers highlights serious concerns about the security of data in motion across networks. Assess where your organization ranks amongst these findings. Find out here what you can do to make sure your data is secure as it crosses the network by taking a crypto-agile approach to network encryption.
  • Where IT meets Telco: The End-to-End Solutions Needed for 5G Security Recorded: Jun 17 2021 40 mins
    Chen Arbel, VP, 5G Business Development, Thales
    The impacts of 5G on our daily life will be massive, with promises of high-speed connections, ultra-low latency, and long battery life for low-power IoT devices. This fifth-generation telecom standard shifts the underlying networks to software-centric open architectures. This openness speeds innovation but also introduces security risks.

    In this session, hear from industry-leading experts in the 5G field, as they discuss the security challenges facing modern Telco, and how Thales is uniquely positioned to help address these challenges to enable continued innovation.
  • Recent Advances in Cloud Key Management Recorded: Jun 17 2021 48 mins
    Leonor Jones, Director of Product Management, Thales; Eric Wolff, Senior Product Marketing Manager, Cloud Key Management
    Cloud key management began with bring your own key (BYOK) and hold your own key (HYOK) offerings from cloud providers are multiplying. In this session, Leonor Jones and Eric Wolff will provide a quick introduction to cloud key life cycle management followed by a live conversation between Leonor Jones and Eric about the lastest advances in cloud key management.
  • Protecting credentials, data, and secrets in a containerized DevOps environment Recorded: Jun 17 2021 29 mins
    Dave Meurer, Red Hat; Evan Litwak, CyberArk; Rohini Deepak, Senior Manager, Strategy, Thales
    Industry leaders from CyberArk, Red Hat, and Thales will discuss how the strength of our portfolios come together to protect credentials, data, and secrets in modern containerized DevOps environments. Learn how the combination of Red Hat OpenShift Container Platform, CyberArk Conjur, CyberArk Privileged Access Manager, Thales CipherTrust Data Security Platform, and Thales Luna HSMs provide end-to-end encryption, secrets & key management for the DevOps community to build secure cloud-native applications.
  • Flexible Crypto with Uncompromised Trust: Security to Meet Your Business Needs Recorded: Jun 17 2021 37 mins
    Paul Hampton, Senior Product Manager, Thales
    Maintaining digital security best practices and ensuring business continuity in challenging times does not mean compromising on confidentiality and integrity. Next generation Thales Luna Hardware Security Modules (HSMs) can provide an uncompromised foundation of digital trust across cloud, on-premises and hybrid environments.

    Join us to discover how Thales Luna HSMs give you the flexibility to run your business the way you want, and to manage your business continuity seamlessly and securely.

    We’ll focus on different use cases that will help you understand how your organization can:

    - safeguard digital identities, applications and sensitive key materials with flexible deployment and billing models
    - move freely between on-premises, cloud, hybrid and multi-cloud environments
    - securely migrate, scale and backup HSMs regardless of your environment
    - meet compliance needs with an HSM root of trust
  • Network Data Security Vulnerabilities: Cybersecurity Survey Reveals Weaknesses Recorded: Jun 17 2021 55 mins
    Stan Mesceda, Senior Product Manager for High-Speed Encryption, and Julian Fay, CTO at Senetas
    More data is in motion than ever before—a trend that will continue in line with the steep cloud adoption and digital transformation curves, as well as the significant impact of the COVID-19 pandemic on remote working. A number of important factors have significantly increased demand for, and dependency on, high-speed wide-area networks. These include workloads migrating to and from the cloud, real-time global collaboration, big data and cloud data storage, 5G and the expectation of higher bandwidth out to the edge and need for larger and faster aggregation points.
    However, only 54% of enterprises feel confident their network security will protect them against cyber threats. As organizations of all sizes continue to adopt connected technologies in support of Cloud Services, Mobility, CCTV, BYOD and Business Continuity; their increased network traffic expose them to increased data in motion security risks. A global research report of IT and cybersecurity decision-makers highlights serious concerns about the security of data in motion across networks. Assess where your organization ranks amongst these findings. Find out here what you can do to make sure your data is secure as it crosses the network by taking a crypto-agile approach to network encryption.
  • The CipherTrust Data Security Platform for Developers: Offerings & Vision Recorded: Jun 17 2021 39 mins
    Marc Seguin, Director of Engineering, Thales; Eric Wolff, Senior Product Marketing Manager, Thales
    Software developers don't need to be crypto experts, or source, use, and store in dangerous places poor-quality keys. With CipherTrust Application Data Protection, devops gets a solution for integrating data protection into applications with a secure key source and repository, and then sending those applications into production. In this session, Eric Wolff will provide a quick introduction to the application-level data protection tools in the CipherTrust Data Security Platform, followed by a live conversation between Marc Segiun and Eric about the Thales vision for app-layer data protection.
  • Any Time, Any Way, Anywhere: Trends Accelerating the Payments Market Recorded: Jun 17 2021 48 mins
    Claire Pitman-Massie, Sr. Director, EMEA Field Marketing, Thales; Simon Keates, Head of Payment Security Strategy, Thales
    Rapid adoption of contactless and alternative payment methods, increase use of cloud technologies, and significant changes to consumer spending habits have required organisations to rethink their strategies to address changes to internal and external requirements. In this session Simon and Claire will discuss the significant trends that emerged in 2020, trends for 2021 and beyond, and the security implications that need to be considered by organisations to ensure that they remain compliant and maintain the security of their customers’ data.
  • Flexible Crypto with Uncompromised Security to Meet Your Dynamic Business Needs Recorded: Jun 17 2021 30 mins
    Paul Hampton, Cloud Security Expert, Thales
    Maintaining digital security best practices and ensuring business continuity in challenging times does not mean compromising on confidentiality and integrity. Next generation Thales Luna Hardware Security Modules (HSMs) can provide an uncompromised foundation of digital trust across cloud, on-premises and hybrid environments.

    Join us to discover how Thales Luna HSMs give you the flexibility to run your business the way you want, and to manage your business continuity seamlessly and securely.

    We’ll focus on different use cases that will help you understand how your organization can:

    - safeguard digital identities, applications and sensitive key materials with flexible deployment and billing models
    - move freely between on-premises, cloud, hybrid and multi-cloud environments
    - securely migrate, scale and backup HSMs regardless of your environment
    - meet compliance needs with an HSM root of trust
  • What is high trust remote signing & how can it benefit your business? Recorded: Jun 17 2021 49 mins
    Geoff Bartlett, Customer Success Manager, Ascertia
    Topics covered in this session include:

    - What is remote signing?
    - Learn more about interoperability, standardization and compliance
    - Ultimate high trust solution – Ascertia ADSS Server & SigningHub
    - Short demo
  • Accelerating IoT Deployment and Addressing the Latest Regulatory Compliance Recorded: Jun 17 2021 43 mins
    Brian Trzupek, DigiCert; Welland Chu, Thales DIS CPL
    IoT is the building block in Smart Devices, Connected vehicles, Digital Cities, etc. Its prevalence and expected market growth at 25% CAGR in the next 6 years is attracting more hardware products, software applications and services to come into the market. How to ensure the “efficiency”, “scalability”, “security & compliance” aspects during the manufacturing, implementation and operation phases are of paramount importance to the industry. In this webinar, Brian Trzupek, Senior VP of Product from DigiCert, will share his insights of the market, technology and regulatory landscape, including the latest Cybersecurity Labelling Scheme (CLS) that is launched by the Cyber Security Agency of Singapore recently.

    <Speakers>
    Brian Trzupek, SVP, Emerging Markets Product Management, DigiCert
    Welland Chu, Business Development Director, Asia Pacific, Thales Group, CPL
  • Accenture 5G security solutions powered by Thales Data Security Solutions Recorded: Jun 17 2021 49 mins
    GANESH NARAYANAN, South East Asia Lead – 5G /Next-Gen Telco/ SW Security Accenture Security
    5G brings together various new cutting-edge technologies like Cloud, NB IoT, Edge computing, Virtualization and Network slicing, increasing the unknown vulnerabilities and hence expanding the attack surface posing many risks to the service provider and to users. The security threats in 5GT include networks, infrastructure, application and databases, including identity and access breach resulting in service disruption, network degradation and eventually loss of trust in the services offered to the market. Specific 5G differentiators like MEC, Edge services, low latency applications and critical infrastructure applications, need highest levels of data/application/network identity, access, authentication and authorization management supported by encryption and digital certificate life cycle management.
    Accenture with its global expertise in 5G networks and security, in partnership with THALES global 5G security products and solutions, provides you a holistic end-end visibility of 5G security across end user terminals, access networks, RAN, back-haul/mid-haul/front haul transport networks, Core networks all the way to internet client facing applications. In this webinar we explain to you how, the security services provided by Accenture include pre & post 5G network/ data security assessments, target 5G security architecture &controls, deployment of Thales data security solutions and a next generation 5G Security Operations Centre that monitors and detects alerts, events and incidents based on 3GPP/NIST/GSMA best practices for 5GT security.
  • Double Key Encryption for enterprises to achieve convenience and security Recorded: Jun 17 2021 34 mins
    Harry Pun, Microsoft; Welland Chu, Thales DIS CPL
    “Convenience”, and “Security” are the holy grail to run any businesses in a digital economy. In the past, attaining both criteria has never been easy. In this seminar, Harry Pun, Cyber Security Executive of Microsoft, and Welland Chu, Business Development Director of Thales, will share their insights and use cases of how this holy grail can finally be achieved, thanks to the “Double Key Encryption” from Microsoft 365 which leverages certified security solution from Thales.

    At the end of attending the session, our audience will see the security and compliance challenges facing enterprises, and how these enterprises can now operate and grow their business with the support of the world’s top cloud & security providers.

    <Presenters>
    Harry PUN, Cybersecurity Executive, Cybersecurity Solutions Group, Microsoft
    Welland CHU, Business Development Director, Asia Pacific, Thales Group, CPL
  • Hey, someone forgot to invite Sec(urity) to the DevOps party?! Recorded: Jun 17 2021 65 mins
    Shane Boulden, Red Hat; Piyush Ranjan, CyberArk; Erick Reyes & Andrew Younger, Thales DIS CPL
    PANEL Session:

    Industry leaders from CyberArk, Red Hat, and Thales will discuss how the strength of our portfolios come together to protect credentials, data, and secrets in modern containerized DevOps environments. Learn how the combination of Red Hat OpenShift Container Platform, CyberArk Conjur, CyberArk Privileged Access Manager, Thales CipherTrust Data Security Platform, and Thales Luna HSMs provide end-to-end encryption, secrets & key management for the DevOps community to build secure cloud-native applications.

    <Panelists>
    Shane Boulden, Solution Architect, Red Hat
    Piyush Ranjan, Team Lead, Engineering, CyberArk
    Erick Reyes, Regional Sales Manager, Thales Group, CPL
    Andrew Younger, ANZ Manager Security Consultants, Thales Group, CPL
  • PKI for IoT: How to Secure Connected Devices from Design to End-of-Life Recorded: Jun 16 2021 46 mins
    Ellen Boehm, VP of IoT Strategy & Operations, Keyfactor; Ryan Sanders, Sr. Product Marketing Manager, Keyfactor
    Companies are now deploying billions of network-connected devices into mission-critical environments, such as medical devices, industrial, and manufacturing control systems.

    However, as more stringent customer requirements and regulations emerge, manufacturers must address security concerns, such as authentication, data encryption, and integrity of software and firmware on their devices.

    With the emergence of IoT, PKI has become an instrumental tool in securing the next generation of industrial and consumer-connected devices. In this session, Keyfactor’s VP of IoT Strategy and Operations, Ellen Boehm, and Senior Product Marketing Manager, Ryan Sanders, will discuss:

    Security challenges that IoT developers and device manufacturers face
    How PKI can address challenges with complex supply chains and product lifecycles
    Considerations for design, deployment and management of PKI for IoT devices
  • Dell Intrinsic Security Recorded: Jun 16 2021 45 mins
    Josh Jaffe, Vice President, Cyber Security, Dell Technologies; David Schwarzbach, Senior Consultant, Dell Technologies
    Dell Technologies is leveraging the depth and breadth of its portfolio to change the entire culture of cyber security. Intrinsic security is not a product, but an end-to-end modern security strategy designed entirely around achieving trust. Learn how security is being designed into Dell Technologies solutions from the start, and how the approach can help better protect your IT assets, data, and business.
  • Google Cloud & Thales: Building Trusted Cloud Environments Recorded: Jun 16 2021 43 mins
    Leonor Jones, Director of Encryption Product Management, Thales; Eric Wolff, Sr. Manager Product Marketing, Thales
    Join this webinar and listen to the latest updates on how Google Cloud and Thales are working together to secure sensitive data and workloads in the cloud. Last year, Google Cloud and Thales announced new external key management capabilities that allow organizations to be in full control of the keys to their encrypted data in Google Cloud. This webinar will share a new solution available with Google Workspace and Thales.
  • "Back to the Future" – Why Quantum Threatens Encryption Security Now Recorded: Jun 16 2021 49 mins
    Julian Fay, CTO, Senetas
    Large scale quantum computers do not yet exist but even today they pose a clear and present danger to our information security. As quantum computing looks set to render many of today’s security methods obsolete, from the algorithms we have trusted for so long to cybercriminals data harvesting today for decryption later, you need to prepare for long-term data protection in a quantum world. Join us to find out more about the practical strategies you can adopt today to defeat this threat, to learn how to become crypto-agile, by combining conventional and quantum-resistant encryption in a single network security platform.
  • White House Executive Order on Cybersecurity Recorded: Jun 16 2021 74 mins
    Robert Bigman, Security Consultant; Stephen O'Connor, Thales; Ron Stamboly, Thales; Cina Shaykhian, Thales
    On May 12, 2021, President Biden signed an Executive Order to improve the nation’s cybersecurity and protect federal government networks. In the order it stated “Recent cybersecurity incidents such as SolarWinds, Microsoft Exchange, and the Colonial Pipeline incident are a sobering reminder that U.S. public and private sector entities increasingly face sophisticated malicious cyber activity from both nation-state actors and cyber criminals. These incidents share commonalities, including insufficient cybersecurity defenses that leave public and private sector entities more vulnerable to incidents.” Two key areas of focus from the Executive Order mandate Federal agencies to implement multi-factor authentication and encryption for data at rest and in motion. This session will provide the specifics on this mandate and how Thales can help you achieve this required security posture.
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 'Back to the Future' – Why Quantum Threatens Encryption Security Now
  • Live at: Jun 16 2021 7:30 am
  • Presented by: Julian Fay, CTO, Senetas
  • From:
Your email has been sent.
or close