Hi [[ session.user.profile.firstName ]]

How to Tackle Ransomware Head-on with PowerProtect Cyber

How does PowerProtect Cyber Recovery protect your most critical data across your infrastructure, clouds, applications and devices? Experts will be on hand to advise on some of the essential steps needed to ensure you can recover from a cyber-attack. The panel will demonstrate how to isolate your recovery vault, ensure the integrity of your vault and will discuss how AI can help ensure you recover. In addition, Dell and Thales will discuss what we do that extends this security to the data itself.
Live online Jun 16 2:00 pm UTC
or after on demand 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jason Proctor, System Engineer, Dell; David Mitchell, Product Consultant, Dell; Pete Gerr, Dell; Joshua Slade, Dell
Presentation preview: How to Tackle Ransomware Head-on with PowerProtect Cyber
  • Channel
  • Channel profile
  • Luna HSMs: Not Just the Foundation, But the Future of Digital Trust Jun 16 2021 3:15 pm UTC 45 mins
    John Ray, Director of HSM Product Management, Thales
    Learn about the current Hardware Security Module market and where it is heading. You’ll find out how Thales Luna HSMs are the foundation of digital trust for existing solutions, and how they continue to evolve to meet the challenges of new use cases, new technologies and deployment scenarios. Lastly, you will learn how to build a root of trust for your digital transformation using a modern HSM infrastructure.
  • How to Tackle Ransomware Head-on with PowerProtect Cyber Jun 16 2021 2:00 pm UTC 45 mins
    Jason Proctor, System Engineer, Dell; David Mitchell, Product Consultant, Dell; Pete Gerr, Dell; Joshua Slade, Dell
    How does PowerProtect Cyber Recovery protect your most critical data across your infrastructure, clouds, applications and devices? Experts will be on hand to advise on some of the essential steps needed to ensure you can recover from a cyber-attack. The panel will demonstrate how to isolate your recovery vault, ensure the integrity of your vault and will discuss how AI can help ensure you recover. In addition, Dell and Thales will discuss what we do that extends this security to the data itself.
  • Retaining Control of Your Encryption Keys and Data in Google Cloud Jun 16 2021 1:00 pm UTC 32 mins
    Paul Hampton, Snr Product Manager & Claire Pitman-Massie, Director of EMEA Field Marketing, Thales CPL
    When it comes to encryption keys, security best practice is all about control and separation between encrypted data at rest and the keys. Google Cloud encrypts customer data at rest by default and offers organisations multiple options to control and manage their encryption keys. For many organisations hosting sensitive data or looking to migrate workloads to the cloud, they require additional control and ownership over their encryption keys in order to meet compliance or internal security requirements.
    In the first of our Data Protection Coffee Break Series for 2021, we will discuss how Google and Thales are helping organisations address this challenge by giving customer’s enhanced control over how and when their encryption keys are used to protect and access encrypted data in the cloud.
  • "Back to the Future" – Why Quantum Threatens Encryption Security Now Jun 16 2021 11:45 am UTC 45 mins
    Julian Fay, CTO, Senetas
    Large scale quantum computers do not yet exist but even today they pose a clear and present danger to our information security. As quantum computing looks set to render many of today’s security methods obsolete, from the algorithms we have trusted for so long to cybercriminals data harvesting today for decryption later, you need to prepare for long-term data protection in a quantum world. Join us to find out more about the practical strategies you can adopt today to defeat this threat, to learn how to become crypto-agile, by combining conventional and quantum-resistant encryption in a single network security platform. And assess where your organization ranks in a new global research report of IT and cybersecurity decision-makers that highlights serious concerns about the security of data in motion. Find out here what you can do to make sure your data is secure as it crosses the network by taking a crypto-agile approach to network encryption today and into a Post-Quantum world.
  • Deciphering the Data Security Implications of Schrems II Jun 16 2021 10:30 am UTC 39 mins
    Todd Moore, VP of Encryption Products; Claire Pitman-Massie, Senior Director EMEA Field Marketing
    The Schrems II ruling has created serious implications for data privacy around the globe, forcing organisations to understand its ramifications for their data security strategies. With many opinions surfacing as to what is right and what is wrong, the recent recommendations from the European Data Protection Board provides guidance on measures organisations can take to be compliant with GDPR when sending EU citizen data outside the region.

    Drawing on real-life examples, and his own experiences, Todd Moore, Vice President of Data Protection Products at Thales, looks at how organisations can decipher the data security implications of Schrems II and create a data protection framework that:
    • Drives action and removes the ambiguity through an organisation’s choice for data protection strategies
    • Enables the creation of a best practice continuum to be carried across all areas of the data protection lifecycle from discovery, through the many nuances of encryption and key management to controlling access
    • Ensures that discover, protect, control is now at the core of every Board level business continuity plan
  • The Latest Insights into the State of Data Security in Europe Jun 16 2021 9:15 am UTC 45 mins
    Chris Harris, Director, Solutions Engineering, Thales
    Based on the findings from 2021 Thales Data Threat Report, the global pandemic has had a significant impact on data security with accelerated cloud migration and increased remote working. Many organizations were unprepared for these security challenges. In fact, according to the report only 20% of IT professionals said their security infrastructure was very prepared for the effects of the pandemic. Even with the challenges over the past year, security professionals were already adapting to better secure and protect access to data in the cloud. According to the report, 82% of IT security professionals are concerned about the security risks of employees working remotely and nearly half reported an increase in cyberattacks over the past 12 months.

    The 2021 Thales Data Threat Report is based on a survey of more than 2,600 security professionals and executive leaders worldwide conducted by 451 Research, part of S&P Global Market Intelligence. Discover what your industry peers have reported, what they are doing, and what 451 Research recommends to better protect your organization.

    This webinar will review the changing landscape of data security risks and threats, especially those due to the acceleration of cloud migration and remote working due to the pandemic. Specifically, you can expect to learn about:
    • Leading sources of data threats
    • Trends in the adoption of Zero Trust strategies across organizations
    • Top security investments to secure sensitive data in cloud and remote working
    • Cloud migration trends and most effective security controls
    • Future security threats, including quantum computing
  • From Zero Trust to Confidential Computing Jun 16 2021 7:45 am UTC 60 mins
    Claire Pitman-Massie, Thales; Mike Small, Distinguished Analyst, KuppingerCole
    Working from home driven by the pandemic has dramatically accelerated digital transformation and cloud adoption. This has massively increased the amount of data outside of direct organizational control and hence the risks of data breaches and compliance failures. On top of this the recent European Court of Justice Schrems II judgement has raised the bar on the protection needed for personal data in the cloud. The European Data Protection Board recommendations on this judgment mean that organizations cannot rely solely on legal controls over how data is processed, and that they must implement supplementary technical controls. The term “Confidential Computing” is being promoted as the solution to these challenges. So, what is Confidential Computing and how can this practically help your organization?
    This presentation will cover:
    • How the pandemic has changed the way in which data is processed.
    • What the Schrems II judgement / European Data Protection Board technical recommendations are.
    • What Confidential Computing covers and how it can help to satisfy these requirements.
    • The longer-term challenges of data confidentiality.
    Attend this session to learn how your organization can be better prepared for the next phase on your data protection journey.
  • 'Back to the Future' – Why Quantum Threatens Encryption Security Now Jun 16 2021 7:30 am UTC 75 mins
    Julian Fay, CTO, Senetas
    Large scale quantum computers do not yet exist but even today they pose a clear and present danger to our information security. As quantum computing looks set to render many of today’s security methods obsolete, from the algorithms we have trusted for so long to cybercriminals data harvesting today for decryption later, you need to prepare for long-term data protection in a quantum world. Join us to find out more about the practical strategies you can adopt today to defeat this threat, to learn how to become crypto-agile, by combining conventional and quantum-resistant encryption in a single network security platform. And assess where your organization ranks in a new global research report of IT and cybersecurity decision-makers that highlights serious concerns about the security of data in motion. Find out here what you can do to make sure your data is secure as it crosses the network by taking a crypto-agile approach to network encryption today and into a Post-Quantum world.
  • How to improve security posture with lowest cost in digital transformation? Jun 16 2021 6:15 am UTC 45 mins
    Shaun Chen, Director of Sales Engineer - APAC, Thales DIS CPL
    As a corporate IT security manager, on one hand you are facing growing security risks and compliance regulations, on the other hand you need to support the fast paced digital transformation on Cloud and DevOps, which introduces additional security challenges.
    How to prioritize your data security implementation?
    Is there any fast track and cost effective approach for you to address compliance and cloud transformation risk?
    In this session, we will discuss about different data encryption techniques, the associated cost and assurance returns…
  • Best Practice for multi-cloud key management Jun 16 2021 5:15 am UTC 60 mins
    Wood Lam, Senior Security Consultant – Greater China & Korea, Thales DIS CPL
    Multi-cloud strategy always a headache for the managements, security and operators but it is the most common practice for most enterprises. In this session, Wood will show you how to perform the best practice on multi-cloud key management to secure the valuable assets inside the clouds.
  • Native vs Bringing Your Data Protection to the Cloud Jun 16 2021 4:15 am UTC 60 mins
    Prasun Srivastava, Senior Sales Engineer - India & SAARC, Thales DIS CPL
    Are all Data Protection options available in today’s cloudy world created equal? As a corporate IT Security Manager what are some of the features that you should evaluate while deciding to adopt Data Data Protection choices available on the Public Cloud.
  • IDC Spotlight - How to Protect Organisation's Future Revenues? Jun 16 2021 3:00 am UTC 75 mins
    Simon Piff, Vice President IDC Asia Pacific
    The essence of Digital Transformation is to create new business models leveraging technology. Many of these business models will leverage data, either as an enabler or as the product itself. Data management, however, has in the past focused on ensuring uptime availability of the data for the business, whilst the IT security function has focused on protecting systems, networks and devices. Data security has, until recently, fallen through the gaps of siloed organizations, but it needs to change and there are three driving forces in the region that make this an imperative for all organizations, public and private.

    • Cloud computing brings with it a new wave of opportunity to have an incredibly agile IT infrastructure, but it brings with it a new set of data security risks.
    • Legislation around data privacy and data management is emerging across the geographies of Asia-Pacific and with it comes the potential for organizations to experience financial loss should data not be managed and secured correctly.
    • Business partners are beginning to embed data privacy and security clauses in B2B contracts, putting business revenue at risk should a data breach occur.

    During this webinar IDC will highlight some of ways in which data creates value, and identify the reasons why data security, whilst not a new imperative, needs to be addressed in a manner that is more effective and efficient than it has been to date. Data security today is not just about protection against a breach, it's about avoiding losses and incurring costs, but more importantly about securing future revenue streams.
  • The Latest Insights into the State of Data Security in APAC Jun 16 2021 1:30 am UTC 90 mins
    Eric Hanselman, 451 Research; Rana Gupta, Thales
    Based on the findings from 2021 Thales Data Threat Report, the global pandemic has had a significant impact on data security with accelerated cloud migration and increased remote working. Many organizations were unprepared for these security challenges. In fact, according to the report only 20% of IT professionals said their security infrastructure was very prepared for the effects of the pandemic. Even with the challenges over the past year, security professionals were already adapting to better secure and protect access to data in the cloud. According to the report, 82% of IT security professionals are concerned about the security risks of employees working remotely and nearly half reported an increase in cyberattacks over the past 12 months.

    The 2021 Thales Data Threat Report is based on a survey of more than 2,600 security professionals and executive leaders worldwide conducted by 451 Research, part of S&P Global Market Intelligence. Discover what your industry peers have reported, what they are doing, and what 451 Research recommends to better protect your organization.

    This webinar will review the changing landscape of data security risks and threats, especially those due to the acceleration of cloud migration and remote working due to the pandemic. Specifically, you can expect to learn about:
    • Leading sources of data threats
    • Trends in the adoption of Zero Trust strategies across organizations
    • Top security investments to secure sensitive data in cloud and remote working
    • Cloud migration trends and most effective security controls
    • Future security threats, including quantum computing

    <Speakers>
    Eric Hanselman, Principal Analyst at 451 Research, part of S&P Global Market Intelligence
    Rana Gupta, Vice President APAC, Thales Group, CPL
  • Creating Trusted Collaboration with Google Workspace and Thales Jun 15 2021 6:00 pm UTC 60 mins
    Nikhil Sinha, Product Manager for Google Cloud Security, Google; Danna Bethlehem, Director of Product Marketing, Thales
    The transition of moving workloads and applications to the cloud is frequently spearheaded by leveraging cloud-based collaboration suites such as Google Workspace. While offering immense benefits in terms of easy, anywhere access from any device, recent lateral attacks within cloud environments highlight the need to be proactive and strategic about securing these services.
    Join us for a Q&A session with Nikhil Sinha, Product Manager for Google Cloud Security at Google, and Danna Bethlehem, Director of Product Marketing from Thales, who will discuss best practices for protecting Google Workspace and how organizations can build on a ‘shared security’ model for protecting sensitive data in the cloud.
  • Mission Possible - Luna 7 HSMs land to deliver the way forward Jun 15 2021 10:00 am UTC 60 mins
    Manoj Bhati - Cyber Security Specialist, Thales
    The Thales Luna 5/6 HSMs are going end of life in Sept 2022 and as such we have released the latest version of Luna HSM's i.e. Luna 7 Network HSM's. These HSM’s are not only faster than their predecessors but are packed with additional features to provide a more efficient offering and are also the HSM’s that we have submitted for FIPS 140-3 certifications.

    There are different ways to upgrade your legacy Luna HSM’s to the latest ones. Join the session to learn more about the FIPS roadmap and explore the different ways to upgrade to the latest HSM.
  • Embedding Enterprise Data Security for Critical Workloads in the Cloud Recorded: Jun 1 2021 14 mins
    Brian Grant, Regional Director Thales CPL A/NZ
    This video:

    1. Explains why embedding data security is so critical in today’s dangerous world
    2. Covers what an enterprise approach to data security looks like
    3. Discusses the fundamentals of how to do it. And;
    4. Looks at the outcomes
  • Transformation (DevOps) vs Compliance (Security) - A guide for CXOs Recorded: May 31 2021 60 mins
    Erick Reyes - Thales CPL, Andrew Younger - Thales CPL, Brad Howarth - Moderator
    This webinar covers:
    • How use of DevSecOps can ensure that applications are secure by design
    • How utilisation of encryption can ensure core assets are always protected in any circumstance
    • Tips for designing systems to meet compliance requirements in a flexible way
  • Why Hardware-Based PKI is one of the Best Passwordless Authentication? Recorded: May 20 2021 34 mins
    John Asan, Technical Consultant, Versasec and Yarden Gaon, IAM Product Manager, Thales
    So why is hardware-based Public Key Infrastructure (PKI) considered one of the best passwordless authentication methodologies?
    Join Thales and our technology partner, Versasec for a coffee break discussion on why enterprises should use strong authentication methods and why they should consider choosing a hardware-based PKI offering. We‘ll look at how hardware-based PKI compares with other two-factor authentication (2FA) methods culminating in a deep dive into the advantages of 2FA using hardware-based PKI and the role of vSEC:CMS and the device management system.
    Versasec is a leader in identity and access management, providing customers with a secure solution for managing digital identities. With its flagship product, vSEC:CMS S - Series, Versasec eases the deployment of physical and virtual smart cards for enterprises of any size.
    Key Discussion Points:
    1. Why should enterprises use strong authentication?
    2. Why hardware-based PKI?
    3. What hardware-based PKI brings compared to other 2FA authentication?
    4. How can an organisation address its security requirements with PKI
    5. What is the role of vSEC:CMS and the device management?
    6. The benefits of Thales PKI devices specifically integrated with vSEC.
  • Securely run critical workloads in the Cloud with Microsoft, Dell and Thales Recorded: May 19 2021 59 mins
    • Nick Psomas, Dell APJ • Jay Doyle, Microsoft • Trichy (Prem) Premkumar, Dell APJ • Brian Grant, Thales CPL
    Organisations who rely on SAP, Oracle and other critical workloads want to leverage the benefits of operating in the Cloud, with optimal performance, resilience and security. Join Microsoft, Dell and Thales as we share with you how Enterprises can leverage the integrated capabilities of Microsoft Azure, Dell Data Protection and Thales CipherTrust Data Security to achieve the best possible solution for mission-critical workloads.

    Agenda:
    • Microsoft will share how Azure is the perfect high performance cloud platform on which to run your critical workloads
    • Dell will explain how to build a highly resilient, yet efficient, backup for critical Azure data with Dell Data Protection
    • Thales will show how to easily embed enterprise-wide data security into Azure and Dell to achieve security and compliance
  • Trends, Technologies and Challenges of Payments Industry Recorded: May 18 2021 42 mins
    Simon Keates, Head of Payment Strategy and Radovan Bruncak, CyberSecurity Specialist
    The payments industry is undergoing intense transformation caused by customer demands, technology advancements, globalisation, disintermediation by new entrants, and increasing regulatory requirements. On top of this, fraud by cyber criminals continues to evolve with attacks becoming increasingly sophisticated.

    Join this webinar where will discuss evolving trends, technologies and regulations affecting the payments industry and how Thales can help meet these challenges.
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Tackle Ransomware Head-on with PowerProtect Cyber
  • Live at: Jun 16 2021 2:00 pm
  • Presented by: Jason Proctor, System Engineer, Dell; David Mitchell, Product Consultant, Dell; Pete Gerr, Dell; Joshua Slade, Dell
  • From:
Your email has been sent.
or close