Hi [[ session.user.profile.firstName ]]

'Back to the Future' – Why Quantum Threatens Encryption Security Now

Large scale quantum computers do not yet exist but even today they pose a clear and present danger to our information security. As quantum computing looks set to render many of today’s security methods obsolete, from the algorithms we have trusted for so long to cybercriminals data harvesting today for decryption later, you need to prepare for long-term data protection in a quantum world. Join us to find out more about the practical strategies you can adopt today to defeat this threat, to learn how to become crypto-agile, by combining conventional and quantum-resistant encryption in a single network security platform. And assess where your organization ranks in a new global research report of IT and cybersecurity decision-makers that highlights serious concerns about the security of data in motion. Find out here what you can do to make sure your data is secure as it crosses the network by taking a crypto-agile approach to network encryption today and into a Post-Quantum world.
Recorded Jun 16 2021 71 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Julian Fay, CTO, Senetas
Presentation preview: 'Back to the Future' – Why Quantum Threatens Encryption Security Now
  • Channel
  • Channel profile
  • Best Practices for Adding Data Protection to Cloud Applications Nov 17 2021 2:15 am UTC 45 mins
    Sol Cates, Principal Technologist, Thales; Marc Seguin, Director, DevSecOps Solutions; Eric Wolff, Sr. Mgr, Marketing, Thales
    The panel will open with a discussion of why the most sensitive data requires protection at the application-layer, rather than, for example, protection for data at rest. From there the panel will discuss alternatives for data protection including both tokenization and traditional encryption. The panel will compare cloud-native and serverless application architectures and how their unique attributes affect data protection implementation. Finally best practices for selecting a data protection solution for such applications will cover separation of duties, the role of DevSecOps, RESTful versus embedded libraries, and why a secure key source and root of trust is needed.
  • Where is my Data? Let’s find out... Nov 16 2021 11:00 am UTC 60 mins
    Romi Hamplova - Cyber Security Specialist, Thales
    The number 1 barrier to a successful data protection strategy is the ability to discover where sensitive data resides. Still over 60% companies are unable to analyze all the data they collect. Thales brought to the market the industry first Next Generation Solution: Data discovery, classification, and protection in a single, integrated Data Security Platform.

    This webinar will discuss one of the first steps to protect your data - find and know what your sensitive data is.

    Join Romi Hamplova, CyberSecurity Specialist at Thales UKI, to learn:
    - What do Data Privacy regulations demand with implications on Data Security strategy
    - How can companies streamline the path to compliancy
    - Can you effectively discover both structured and unstructured data?
    - Gain visibility into data classification and risk analysis
    - What is next in the data security life cycle?
    - How can you Discover, Protect and Control with Thales CipherTrust Data Security Platform
  • 5G Data Security Challenges - how to embrace the new Telecoms Security Standards Nov 10 2021 11:00 am UTC 60 mins
    Manoj Bhati, Business Development Manager - 5G Security (EMEA), Thales
    The impacts of 5G on our daily life will be massive, with promises of high-speed connections, ultra-low latency and long battery life for low-power IoT devices. This fifth-generation telecom standard shifts the underlying networks to software-centric open architectures. This openness speeds innovation but also introduces security risks.

    Join Manoj Bhati as he explores the data security challenges in 5G, seeing them through the same lens of security by design and zero trust security. He will cover:
    • how to make sure that the data is only accessed by the relevant virtualized environment
    • how to manage secure sensitive data access policy across multiple vendors at each and every location whether edge, core or in the cloud
    • how to enhance the automation using zero touch with robust and agnostic key management (for separation of duty) and security policies across all platform/users and applications
  • Ransomware Protection: How to Keep Your Data Safe with Strong Data Security Nov 9 2021 7:00 pm UTC 61 mins
    Narayan Makaram - Sr. Product Marketing Manager & Larry Herzog Jr. - Sales Engineering Manager
    Ransomware attacks have become a top cybersecurity concern in 2021 with nation states targeting everything from critical infrastructure, to hospitals and city governments, and demanding millions of dollars in ransom. These recent cyberattacks has gotten the attention at the highest levels in the United States, with the White House issuing an Executive Order on improving the nation’s cybersecurity.
    As attackers become more sophisticated, they find more ways to run malicious code on workstations and digital infrastructure. This makes it critical for businesses to strengthen its data security and improve cyber resilience.  So how can you better protect your organization from ransomware attacks and strengthen data security.
    In this webinar, Thales’ Narayan Makaram and Larry Herzog Jr. delve into the world of Ransomware attacks, how to contain and prevent them, and how to become more proactive, rather than reactive, with regards to data security processes.

    What You Will Learn:
    - Why are baseline security measures not enough to prevent ransomware attacks.
    - What are the essential data protection capabilities required to prevent ransomware.
    - Live Demo: Preventing a simulated ransomware attack using CipherTrust Transparent Encryption.
    - Live Q&A – feel free to ask us anything ransomware related!
  • Secteur public : comment sécuriser les accès à votre SI ? Nov 9 2021 2:00 pm UTC 60 mins
    Romain Geiger, Regional Sales Manager Access Management, Thales - Nicolas Anéas, Pre-Sales Manager, Thales
    La transition vers le télétravail, l’accélération de la migration vers le cloud et la multiplication des incidents de sécurité ont eu un impact considérable sur les équipes de sécurité. 42% des organisations ont indiqué avoir subi une brèche de données dans les 12 derniers mois d'après l'enquête annuel de Thales sur l'état des menaces.
    Venez découvrir comment Thales aide les organisations publiques à sécuriser l'accès à leurs systèmes d'information, on-prem ou dans le cloud, grâce à l'authentification multi facteurs et à la gestion sécurisée des accès .
  • Passwordless Access to Microsoft Oct 26 2021 12:00 am UTC 45 mins
    Alessandro Cardoso, Architect: Industry Solutions, Microsoft; Sai Ranjan, Regional Mgr - Identity & Access Management, Thales
    Microsoft and Thales together can help enable your organisation go passwordless with FIDO2 technologies. Together Microsoft and Thales offers organisations a simple and smooth way to a secure cloud access with passwordless FIDO authentication. Those organisations which have already invested into a PKI based access for on premise applications can now add PKI-FIDO to support their cloud based digital transformation providing a single & secure access to their legacy apps, cloud apps and network domains. Join us to hear how to get started on your Passwordless journey, what it means to go Passwordless from a security and usability perspective and the broad range of use cases that Thales FIDO 2 devices can help you address.
  • Data embarking beyond your secure control (Data in Motion Survey) Recorded: Oct 19 2021 32 mins
    Manoj Bhati - PreSales Consultant UKI, Thales
    Only 54% of enterprises feel confident their network security will protect them against cyber threats.
    As organisations of all sizes continue to adopt connected technologies in support of Cloud Services, Mobility, CCTV, BYOD and Business Continuity; their increased network traffic expose them to increased data in motion security risks.

    Thales has commissioned a global survey of IT and Cyber Security decision-makers and the findings are in. It highlights serious concerns about the security of data in transit across enterprise networks. Security vulnerabilities issues such as, emerging technologies and cyber-threats; the impact of legacy approaches to encrypting data in motion on business systems’ performance should be evaluated and acted upon immediately by organisations

    Join our Cyber Security Specialist as we reveal the survey findings. Assess where your organisation ranks amongst these findings. Learn:

    - How to take a more modernised approach to network encryption
    - Why legacy approaches are not fit for our modern networks
    - The advantages of a purpose built encryption solution for data in transit
    - How separation of duties and policy-based management can support full data sovereignty
    - Quantum readiness with Quantum Key Distribution (QKD)
  • 澳門網路安全事件增加 — 數據安全和存取管理實施之道 Recorded: Oct 18 2021 66 mins
    Victor IEONG - Vastcom Technology Limited, Shaun CHEN / Tommy NHAM / Ray LAW - Thales
    特區行政長官賀一誠先生在新成立的澳門特別行政區網路安全委員會第一次會議上表示,今年上半年的網路安全形勢「非常嚴峻」,包括澳門在内的全球數個政府機構或私營公司遭受「嚴重的網路攻擊」,並可從以下幾方面反映:

    • 2020年,澳門網路安全事件預警與回應中心平均每天接獲約 1,600 宗網絡安全風險預警,並向主要的數據基礎設施運營商發出 38 次警告;
    • 今年第一季,澳門境內提報的網路犯罪案件數量暴增,為去年同期的 300%;
    • 且其中一件發生於今年 5 月的嚴重攻擊事件目標為澳門衛生局。

    Vastcom 携手數據保護和存取管理領域的領導廠商 Thales,從Thales 最新發表的2021年資料威脅報告探討亞太區數據威脅趨勢、企業對網路安全的投資,如何保護雲端和遠端工作中的敏感數據;同時探討澳門政府和企業如何在網路安全計劃實施中,參考亞太區其他地方如香港和新加坡的合規應用案例。

    Speakers:
    • Victor IEONG - Vastcom Technology Limited 總經理
    • Shaun CHEN - Thales 雲數據保護與軟件授權亞太區技術總監
    • Tommy NHAM - Thales 雲數據保護與軟件授權大中華與韓國區區域經理
    • Ray LAW - Thales 雲數據保護與軟件授權安全顧問
  • Thales and Google Cloud: Solving the complexities of data in the cloud Recorded: Oct 6 2021 24 mins
    Rob Elliss, VP EMEA Sales at Thales, and Tim Phipps, Director EMEA Alliances at Thales
    Thales and Google Cloud are solving complex problems together by accelerating the ability of enterprises everywhere to safely and efficiently migrate sensitive data from private IT infrastructures to both cloud and hybrid environments. Together, we offer new capabilities to transfer data to the cloud or multi-cloud while maintaining digital sovereignty, allowing ownership and control over private encryption keys, and helping to address heightened regulatory requirements.

    Thales is trusted worldwide as a frontrunner in cloud security innovation. Combined with the industry-leading Google Cloud Platform, our two companies empower IT professionals to shift sensitive workloads to the cloud while gaining the external key management needed to control and secure their digital transformation. This ensures that organizations own their data and decide exactly who, when, and where it is accessed.

    Learn best practices from customers who have taken security needs into consideration early for different stages of cloud migration:
    - Managing against risk
    - Demonstrating compliance
    - Maintaining control of your data
  • Creating Trusted Collaboration with Google Workspace and Thales Recorded: Oct 6 2021 41 mins
    Nikhil Sinha, Product Manager for Google Cloud Security, Google; Danna Bethlehem, Director of Product Marketing, Thales
    The transition of moving workloads and applications to the cloud is frequently spearheaded by leveraging cloud-based collaboration suites such as Google Workspace. While offering immense benefits in terms of easy, anywhere access from any device, recent lateral attacks within cloud environments highlight the need to be proactive and strategic about securing these services.
    Join us for a Q&A session with Nikhil Sinha, Product Manager for Google Cloud Security at Google, and Danna Bethlehem, Director of Product Marketing from Thales, who will discuss best practices for protecting Google Workspace and how organisations can build on a ‘shared security’ model for protecting sensitive data in the cloud.
  • How to Enable Multiple User Authentication Journeys with Modern Authentication Recorded: Oct 6 2021 39 mins
    Asaf Lerner, IAM Market Owner, Thales
    The new normal of remote working has led to an explosion of unforeseen authentication needs. The multitude of end devices, locations, applications and roles means that a single user will likely need more than one way of accessing the range of apps they need throughout their day. Join us in this session to hear how to effectively support multiple user authentication journeys to achieve secure remote access, without burdening your end users.
  • Beyond Zero Trust: The Future of Continuous and Granular Access Recorded: Oct 6 2021 59 mins
    Asad Ali, Senior Technologist, CTO Office, Thales
    The concept of Zero Trust security is not new. The term itself was coined more than a decade ago at Forrester with a general premise that all network traffic should be considered untrusted. Over the years we have seen refinements to this idea by Google in their BeyondCorp publication, Gartner in their definition of CARTA framework, and to complete the circle by Forrester again in Zero Trust eXtended report that explained Zero Trust in the light of current cybersecurity challenges. One of these challenges is fine grained and continuous access to resources and data.

    This Talk will review the history of Zero Trust and then explore how Zero Trust applies to continuous authentication and access. We will discuss the historical trends that have shaped our authentication evolution, and then look at Continuous Access Evaluation Protocol (CAEP) a nascent but promising technology that can fundamentally change how we define and implement Zero Trust in web applications. The role of major players in this effort, such as Thales and Google will be explained.
  • SOAR + IAM: The Perfect Recipe for Threat Management and Response Recorded: Oct 6 2021 51 mins
    Manav Khanna, Sr. Dir. Product Management, Thales; Rishi Bhargava, VP, Product, Palo Alto Networks; Dirk Strauch, NTT Data
    Incident detection and response are crucial for effective security operations. SOAR (security orchestration, automation & response) systems empower security operation teams to identify threats sooner, and automate many of the playbook actions that would otherwise be subject to manual processing glitches. In this session, we discuss how security teams can leverage SOAR (Cortex XSOAR) and IAM (SafeNet Trusted Access) to build a much stronger security posture for the enterprise.
  • Power of Identity-Centric Zero Trust Network Access Recorded: Oct 6 2021 33 mins
    Eitan Bremler, VP Product Strategy, Marketing & BD, Safe-T; Danna Bethlehem, Director IAM Product Marketing
    ZTNA has seen tremendous growth in the past two years, due primarily to the surge in remote work. Organizations quickly realized the scaling and security limitations of conventional VPN solutions. With the never trust, always verify mantra, ZTNA + Access Management solutions have emerged to make remote access safe and straightforward. Discover how these complementary solutions converge to enable a scalable and more secure mechanism that can address the spectrum of remote work use cases.
  • What is Modern Authentication and Its Role in Achieving Zero Trust Security? Recorded: Oct 6 2021 40 mins
    Danna Bethlehem, Director of IAM Product Marketing
    The need for secure, yet convenient ways of logging into apps is driving the quest for more effective authentication. In this session we'll do a deep dive into the innovations shaping modern authentication concepts and the role they play in achieving Zero Trust security.
  • How to Enable Multiple User Authentication Journeys with Modern Authentication Recorded: Oct 6 2021 32 mins
    Asaf Lerner, IAM Market Owner, Thales
    The new normal of remote working has led to an explosion of unforeseen authentication needs. The multitude of end devices, locations, applications and roles means that a single user will likely need more than one way of accessing the range of apps they need throughout their day. Join us in this session to hear how to effectively support multiple user authentication journeys to achieve secure remote access, without burdening your end users.
  • Security in Your Hands: The Force is with You Recorded: Oct 6 2021 27 mins
    Ellen Thorén, Program Manager, Versasec; John Asan, Technical Leader, Versasec
    In the cybersecurity space there are myths that Public Key Infrastructure (PKI) is an old technology and a high-priced solution. Some companies are still assured that hardware based PKI multi-factor authentication is only for large entities and the companies might even think that their information is not important and will never be hacked.

    Enterprises have access to a big range of advantages and methods when using hardware-based PKI. Together, Versasec vSEC:CMS and Thales products bring world-class PKI security solutions required for strong authentication, with physical or virtual smart cards for enterprises of any size.
    In this Tech Talk you will learn more about:
    ● Busting myths about Public Key Infrastructure (PKI)
    ● Capabilities and advantages of multi-factor authentication using hardware based PKI
    ● Versasec vSEC:CMS and its role in device management.

    Join us here and contact us at info@versasec.com and we will help you make the very justified case for PKI-based multi factor authentication at your organisation and show that security is in your hands.
  • ยืนยันตัวตนอย่างรวดเร็วและมั่นคงปลอดภัยด้วย Recorded: Oct 6 2021 56 mins
    Montri Trainaphakul, Regional Sales Manager - IAM, Thales
    ภายในงานสัมมนานี้ ท่านจะได้รู้จักการพิสูจน์ตัวตนแบบ Passwordless ประเภทต่างๆ ประโยชน์ที่ธุรกิจองค์กรจะได้รับ ข้อดีข้อเสียเมื่อเทียบกับการใช้ Password แบบดั้งเดิม การวางกลยุทธ์เพื่อให้การพิสูจน์ตัวตนแบบ Passwordless สัมฤทธิ์ผล และแนะนำโซลูชัน Passwordless จาก Thales

    หัวข้อการบรรยายประกอบด้วย
    - ปัญหาของการพิสูจน์ตัวตนแบบ Password
    - Passwordless คืออะไร สำคัญอย่างไร
    - ความมั่นคงปลอดภัย VS ความสะดวกในการยืนยันตัวตน
    - Passwordless แบบ Zero Factor, Single Factor, Multi-factor และ SSO
    - แนะนำโซลูชัน SafeNet Trusted Access จาก Thales
    - วางกลยุทธ์ Passwordless ให้สัมฤทธิ์ผล
  • Case Study: RedCentric and Thales Partner to Deliver IAM Solutions Recorded: Oct 6 2021 50 mins
    Ben Willis, Channel Account Manager, Thales; Grahame Williams, Director, IAM UK Sales, Thales; James McLaughlin, Thales
    Managed security service providers are playing an increasingly critical role in helping organizations and enterprises carry out extensive digital transformation initiatives. Join us for this session where RedCentric, a leading UK MSSP, will discuss how their partnership with Thales allows them to deliver cloud-based remote access services ensuring that users can securely access data and applications. During this session we will hear from RedCentric how they have successfully utilized key Thales platform capabilities including user-based pricing models, multi-tier - multi-tenancy architecture and easily customizable interfaces to deliver cloud-based access management and authentication services to hundreds of organizations.
  • How MFA and IAM Enable Schrems II Compliance Recorded: Oct 6 2021 38 mins
    Danna Bethlehem, Director of IAM Product Marketing; Claire Pittman-Massie, Sr. Director EMEA Field Marketing
    The Schrems II ruling has succeeded in shuffling the compliance and regulatory deck completely, and has forced organisations to re-think their compliance frameworks. In this session, we'll discuss how a strong and effective access security solution can help you ensure lawful data transfers in accordance with the Schrems II ruling.
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 'Back to the Future' – Why Quantum Threatens Encryption Security Now
  • Live at: Jun 16 2021 7:30 am
  • Presented by: Julian Fay, CTO, Senetas
  • From:
Your email has been sent.
or close