Hi [[ session.user.profile.firstName ]]

The Changing Landscape of Data Security for U.S. Federal Agencies

With digital government initiatives underway throughout U.S. Federal agencies, new attacks occurring daily, and traditional threats, many agencies are struggling to protect critical citizen data, financial information and government secrets. In this session we’ll address the state of data security in U.S. Federal agencies today, the changing landscape of risks to data, and agency IT security pros priorities for data security today.

Based on the results from the 2019 Thales Data Threat Report – Federal Edition (now in its seventh year), expect to learn about:

• How the adoption of digital transformation technologies, and especially cloud, are putting sensitive data at greater risk
• The data security challenges facing agencies today
• Critical analyst recommendations for how agencies can be most effective when investing in protecting their crown jewels – their sensitive data
Recorded May 30 2019 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Andy Kicklighter, Director of Product Marketing, Thales
Presentation preview: The Changing Landscape of Data Security for U.S. Federal Agencies

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Changing Landscape of Data Security for U.S. Federal Agencies Recorded: May 30 2019 45 mins
    Andy Kicklighter, Director of Product Marketing, Thales
    With digital government initiatives underway throughout U.S. Federal agencies, new attacks occurring daily, and traditional threats, many agencies are struggling to protect critical citizen data, financial information and government secrets. In this session we’ll address the state of data security in U.S. Federal agencies today, the changing landscape of risks to data, and agency IT security pros priorities for data security today.

    Based on the results from the 2019 Thales Data Threat Report – Federal Edition (now in its seventh year), expect to learn about:

    • How the adoption of digital transformation technologies, and especially cloud, are putting sensitive data at greater risk
    • The data security challenges facing agencies today
    • Critical analyst recommendations for how agencies can be most effective when investing in protecting their crown jewels – their sensitive data
  • Proactive Data Defence for Digital Transformation Recorded: Nov 22 2018 32 mins
    Brett Bourke Abela, Senior Sales Engineer, UK, Thales eSecurity
    In the third of our #CoffeeBreak webcasts, Chris Ogilvie interviews Brett Abela, Thales eSecurity Sales Consultant on proactive data defence for digital transformation.

    Digital transformation is business enhancing but fraught with danger. With services moving into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, with more and more of your corporate attack surface being exposed.

    The rise of cloud and the Internet of Things (IoT), has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.

    Join Chris and Brett for the third “coffee break” webcast when they will discuss:
    a) Key security considerations for a digital transformation strategy
    b) Why a proactive data defence strategy is crucial
    c) The benefits of maximising the level of control over data irrespective of where it is created, stored or shared.
    d) How can enterprises regain control of their data security?
  • Is Your Retail Data at Risk? Recorded: Nov 6 2018 47 mins
    Tina Stewart, VP of Mktg, Andy Kicklighter, Dr. of Product Mktg, Vikram Ramesh, Sr Dr. of Slns & Ptnr Mktg, Thales eSecurity
    The retail industry, already at intersection of online with brick-and-mortar, is one of the most heavily targeted for cyber-attacks, and encountering record levels of data breaches as a result. With digital transformation an imperative, dealing with concerns over data breaches has become every retailer’s new reality. Research shows 99% of the industry uses digital transformation technologies with sensitive data – Cloud, Big Data, Mobile Payments, IoT, Blockchain and Containers.
    The 2018 Data Threat Report for retail sponsored by Thales explores the depths of these problems, enterprise plans for combating them, and best practice data security recommendations.

    - How does your company compare to the benchmarks in 451 Research’s findings?
    - How do you recognize, track and report data breaches?
    - How do all the existing and new regulations impact your data security strategies? (e.g., CCPA, Vermont Data Broker Law, GDPR, etc.)
    - What are best practices when it comes to protecting and securing your sensitive data? Are they enough?
  • Ensuring Data Security in Hybrid and Multi-Cloud Environments Recorded: Oct 18 2018 41 mins
    Simon Keates, Business Development Manager, Thales eSecurity
    Chris Ogilvie interviews Simon Keates, Thales eSecurity Business Development Manager, EMEA on “cloud” - the biggest growth area of technology investment this year.

    Companies are increasingly reliant upon multi-cloud or hybrid cloud to meet specific workload and needs. However, these multi-faceted environments come with advanced threats in the form of security gaps which exploits individuals and organisations. In addition, embracing cloud environments brings challenges around data control, complex security policies and compliance reporting.

    Join Chris and Simon for the second in our series of “coffee break” webcasts when they will discuss:

    a) How can enterprises reduce security gaps in the cloud without affecting their business efficiency?
    b) How are organisations maintaining effective security whilst adopting new digital technologies to improve agility, customer engagement and support business growth?
    c) How does BYOE (Bring Your Own Encryption) alleviate the core issues of security, control and compliance and can it be applied to the common public cloud environments cost-effectively?
    d) How can enterprises regain control of their data security?
  • Nutanix and Thales, Hyerconverged & Hypersecure Recorded: Sep 26 2018 46 mins
    Stephen O’Connor, Sr. Sales Engineer & Mike Wronski, Principal Product Marketing Manager, Nutanix
    The rapid adoption of hyperconverged infrastructure (HCI) solutions have been due to their proven ability to deliver scalability, agility, reduced costs, storage redundancy, and reliability. While these are great benefits, perhaps one of the elements that is garnering the most attention right now is data security. Nutanix certainly knows this and is working hard with Thales eSecurity to protect the confidentiality and integrity of sensitive data through strong encryption of user and application data. When used with Vormetric Data Security Manager (DSM), the combined solution provides FIPS certified robust key management and role separation to meet the most stringent security requirements.

    In this webinar, we will examine the key elements of the joint solution as well as what may be the best options for your organization.

    • Understand the types of encryption and their characteristics
    • Understand the critical role of best-in-class key management
    • Learn how to go beyond the encryption basics
  • Thales eSecurity - CipherTrust Cloud Key Manager Recorded: Aug 30 2018 60 mins
    Vishal Gupta, Sr. Product Manager – Thales eSecurity
    For virtually every organization today, the adoption of multiple cloud services continues to expand. According to the AlphaWise/Morgan Stanley 2016 Annual CIO Survey of 100 CIOs, by 2020 over 46% of the application workload will move to the public cloud. So any way you look at it, a multi-cloud environment is part of your future. With this move to the cloud, the proliferation of encryption will continue at an increased rate in order to protect and secure sensitive data. That means the number of keys and the potential risks will also increase dramatically. With the CipherTrust Cloud Key Manager (formerly Vormetric Key Management as a Service), your organization can establish strong controls over encryption keys and policies for data encrypted by cloud services. So what are you waiting for? Learn how Thales eSecurity and our CipherTrust Cloud Key Manager can put you in control of your keys and help you secure your sensitive data.

    * Application workloads are moving to the Cloud - 46% by 2020 - make sure you are prepared
    * Encryption for sensitive data in the Cloud doesn't mean you should lose control of your keys
    * CipherTrust Cloud Key Manager ensures you have control of your keys in the cloud
  • Tokenization: Ready for Prime Time Recorded: Aug 15 2018 61 mins
    Mark Royle, Sr. Manager, Solutions Partner Marketing & Eric Wolff, Sr. Manager, Product Marketing, Thales eSecurity
    The digital transformation has changed how the world does business, creating whole new enterprises and industries, but it has also left many organizations vulnerable to new and destructive threats. Individuals and businesses need to combat these threats to secure their own assets and reputations as well as to comply with increasingly numerous and rigorous regulations, such as GDPR. Among the tools that protect the data itself by making it unusable, should it be stolen, is tokenization. Tokenization protects sensitive data by substituting non-sensitive data.

    In this webinar, we will examine the key elements of a tokenization solution as well as reviewing several example use cases.

    • Understand the problems tokenization addresses
    • Describe the architectures needed to support tokenization
    • Review relevant tokenization use cases
  • 2018 Data threats - data breaches, digital transformation - and the way forward Recorded: Jun 14 2018 45 mins
    Andy Kicklighter, Product Marketing, Thales eSecurity
    When 451 Research surveyed 1200 IT security professionals, including 400 across Europe, for the 2018 Thales Data Threat Report, we found that today’s threat environment, digital transformation initiatives and regulations are having a deep impact on enterprises. In 451 Research’s Analyst Garrett Bekker’s view – with a big disconnect around what is effective at preventing data breaches and where we’re spending our IT security dollars today. In this session, we’ll cover:

    • The depth of the problem with data breaches – and the numbers around how deeply it has affected enterprises in Europe.
    • How IT security spending is being prioritized today – and why that can be a problem.
    • How adoption of cloud, containers, big data, IoT and other technologies add risk and complicate the data security picture – and what your peers would like to see to make this adoption safer
    • Perceived barriers to use of data security tools, and whether these are still relevant – or relics of past experiences.
    • Simple best practice recommendations that can enable you to evaluate your current stance, and improve it.
  • Proactive Data Defence for Digital Transformation Recorded: Mar 23 2018 35 mins
    Ian Greenwood, Regional Sales Manager UK&I
    Digital transformation is business enhancing and fraught with danger. With services moving online and into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, more and more your corporate attack surface is being exposed.

    With data breaches at an all-time high and incidents of identity theft risen by 57% in a year, consumers are questioning the security of their personal data held by organisations. The rise of cloud and the Internet of Things, has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.

    This webinar will consider:

    • Key security considerations for a digital transformation strategy

    • Why a proactive data defence strategy is crucial

    • The benefits of maximising the level of control over data irrespective of where it is created, store or shared.
  • 2018 Data Threats - What will it take to stop the breaches? Recorded: Mar 15 2018 57 mins
    Garrett Bekker, Principal Analyst, 451 Research
    Digital transformation initiatives and increased threats have put enterprise data at risk more than ever, with 67% already experiencing a breach, and over half of those breaches in the last year. In this webinar Garrett Bekker, Principal Analyst for Information Security at 451 Research, details critical findings from the 2018 Thales Data Threat Report around the rise in data breach rates, what IT security pros around the world are doing to respond, and best practice recommendations for how to keep from becoming another statistic.
  • Is Your Business Fit for GDPR? Recorded: Jan 9 2018 55 mins
    Jay Trinckes, NCC Group Risk Management and Governance Expert
    With the clock ticking towards May 2018, NOW is the time to ensure you are taking the right steps to protect your organization and your customers in order to be compliant with General Data Protection Regulation (GDPR).
    Less than a 1/3 companies are prepared…join us for a discussion with Jay Trinckes of the NCC Group on how GDPR will impact the way in which organizations handle their data.
    What you will learn:

    •How GDPR affects U.S. businesses
    •Organizational best practices to achieve GDPR compliance
    •Penalties for non-compliance
    •How Thales Vormetric Data Protection Platform addresses the GDPR “Security of Personal Data” requirement

    About the speaker:
    Jay Trinckes is a Principal Security Consultant with NCC Group’s Risk Management and Governance Practice where he specializes in security and privacy assessments specifically around GDPR, HIPAA, HITRUST, PCI, DFARS and more.
  • Best Practices for GDPR when hosting data off-premises Recorded: Nov 17 2017 49 mins
    Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity
    GDPR is coming into force in May 2018. Many organisations are now getting into gear in order to ensure they are compliant by the deadline. This is even more important for those organisations who are hosting their data off premises.

    But what does GDPR really mean to businesses, how will it impact the way in which organisations handle their data and engage with trusted third parties?

    Join Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity for a thought provoking discussion drawing from real-life examples on:

    1) Organisational best practices when working with cloud service providers to adhere to GDPR

    2) Key factors organisations to take into account when complying to GDPR

    3) The steps global enterprises are taking get themselves #fit4GDPR
  • Cifrado transparente. Asegurando la transformación digital Recorded: Sep 28 2017 55 mins
    Santiago Perez y Brian Riviera
    La nube, IoT, movilidad y big data están reinventando la forma en que operan y hacen negocios las organizaciones. Sin embargo, muchas empresas no han incluido la seguridad como pieza clave de la transformación digital. Conozca porque es necesario proteger los datos sensibles en este nuevo escenario y como realizar cifrado de los datos almacenados, controlar el acceso a usuarios privilegiados y reunir registros de seguridad sin volver a diseñar las aplicaciones, bases de datos o la infraestructura.
  • Data Security – Identifying Your Last Line of Defense Recorded: Jul 13 2017 54 mins
    Jules Anderson – UK Regional Sales Manager, Thales e-Security
    Join Verisec and Thales and gain a deeper understanding into how you can review your data security in an efficient and effective way to enable your organisation to focus on the truly challenging areas of data security and compliance.

    Sensitive data continues to make it into a broader set of environments, including cloud deployments, big data platforms, virtualised systems, and more. The policies and regulatory mandates in effect continue to grow more stringent. At the same time, these groups have to guard against more sophisticated cyber-attacks, and the continuous threats posed by users that have stolen privileged user credentials.

    To adapt to these expanding demands, IT and security professionals have to leverage technologies that offer a strong mix of security, implementation flexibility, and operational efficiency.

    During this webinar we will cover:
    - Compliance with privacy and data security requirements (helping you comply with the critical Article 32 and 34 GDPR rules)

    - Cyber-security risk management and mitigation - using Thales encryption, an organisation can render private data unintelligible to a cyber-intruder (external or internal) even in the event of a breach

    - Enabling organisations to securely drive digital transformation such as BYOD, Cloud Migration, IoT, Blockchain

    - Giving organisations capability to keep control and visibility on their data and encryption keys while moving to the cloud

    This introduction is aimed at those within your organisation looking to gain an insight into data protection and the potential challenges that your organisation could face.
  • IT Sicherheitsbedrohungen in Deutschland 2017 Recorded: Jul 6 2017 35 mins
    Mario Galatovic, Business Development Manager, and Bernd Stamp, Technical Lead DACH, Thales e-Security
    Datensicherheitsvorfälle. DSGVO Risiken. Daten in der Cloud, Big Data und das Internet der Dinge (IoT).

    95% aller deutschen Unternehmen glauben, dass sie nicht ausreichend gegen Cyberangriffe geschützt sind

    Was erleben Unternehmen in Deutschland und wie gehen sie mit den Herausforderungen um?

    Basierend auf der Forschung des renommierten IT-Marktforschungs- und Beratungsunternehmen 451 Research zeigen die Ergebnisse des Thales Data Threat Reports 2017 wie Unternehmen in Deutschland auf die Herausforderungen in Bezug auf ihre Daten reagieren. Diese beziehen sich auf die gestiegenen Anforderungen an Daten um das Geschäftswachstum zu unterstützen, und gehen bis hin zu regulatorischen Anforderungen, die Implementierung fortschrittlicher Technologien sowie Datensicherheitsvorfälle. Die Risiken für vertrauliche persönliche Informationen, Finanzdaten und kritische Unternehmensdaten steigen.
    Dieses Webinar behandelt die Sicherheitsbedrohungen in Bezug auf Daten für Unternehmen, was Organisationen machen um Daten zu schützen, und praktische Empfehlungen für die Sicherheit von vertraulichen und sensitiven Daten.

    Nehmen Sie an unserem Webinar teil und erfahren Sie mehr zu folgenden Punkten:
    • Die Auswirkungen von fortschrittlichen Technologien wie Container, IoT, Big Data und die Cloud und welche Herangehensweisen gebraucht werden um dort kritische und sensitive Daten zu schützen.
    • Die Art und Weise, wie neue Datenschutzregelungen die Strategie für Datensicherheit beeinflussen.
    • Auf welche Herausforderungen Unternehmen treffen, wenn sie Datensicherheitsinstrumente einsetzen und nutzen – und wie man diese Herausforderungen bewältigen kann
    • Die Ausgaben für IT Sicherheit steigen, Antreiber hier sind Compliance und Bedenken in Bezug auf Datensicherheit
  • NY DFS Cybersecurity Regulations - Are You Prepared? Recorded: Jun 15 2017 59 mins
    Pamela Gupta, President, Outsecure Inc., Kenneth N. Rashbaum, Esq., Cybersecurity Practice Group, Barton LLP, New York, NY
    New York State Department of Financial Services(DFS) has enacted rigorous, first-in-the-nation cybersecurity regulations for financial institutions and others that do business in the state. It is clear that regulators are raising the bar for the security of confidential and sensitive data.

    August 30 2017 is the first milestone date for this regulation. What is the state of your compliance?

    Join us for a lively discussion with a panel of experts around the following topics:

    •Understanding the legal drivers for the DFS regulation In addition to the directly covered entities of DFS, FINRA & SEC covered entities should be closely following the DFS
    •What this new regulation means to you
    •Why a thorough risk assessment is necessary
    •Best practices and tools for fully complying with this new regulation
  • Key Management in the world of Multiple Cloud providers Recorded: Jun 6 2017 55 mins
    Adrian Lane, Analyst and CTO, Securosis and Vikram Ramesh, Sr. Director of Solutions and Partner Marketing, Thales e-Security
    Controlling encryption keys — and thus your data — while adopting cloud services is one of the more difficult puzzles in moving to the cloud.

    Customers need to know if there is a consistent way to handle this across all their cloud services.

    In this webinar Adrian Lane (Securosis) and Vikram Ramesh (Thales e-Security) will discuss challenges specific to multi-cloud key management and why customers may need something different than the native encryption options offered by their cloud providers. They will help you select the right strategy from the many possible combinations, how each customer requirement maps to different deployment options, and what to look for in a key management system.
  • Tick, Tock: Just 1 Year to GDPR Enforcement – How to be technology ready Recorded: May 25 2017 56 mins
    Derek Brink, VP, Research Fellow, Information Technology
    Just one year remains before enforcement of the EU General Data Protection Regulation (GDPR) goes into effect. It’s arguably the most important privacy regulation in a generation. But it’s time to move beyond mere awareness and understanding of what GDPR is, and start making decisions about how you’re going to address it.

    In this webinar, join Derek Brink, vice president and research fellow for Aberdeen Group, and Neil Cooper, Regional Sales Manager, UK&I, for Thales eSecurity, as they share the following helpful insights:

    • Short synopsis of the timeline and key provisions of GDPR
    • Quantify the business risk of GDPR, in terms of both the likelihood and the business impact of non-compliance
    • Summarise the six fundamental strategies for safeguarding sensitive data
    • Identify the three most important capabilities for addressing GDPR requirements
  • Data Encryption for the Cloud-First Era Recorded: May 18 2017 58 mins
    Doug Cahill, Senior Analyst, at Enterprise Strategy Group, Inc.
    The broad adoption of cloud applications has resulted in more and more data assets leaving the corporate perimeter and being stored in the cloud. However, many organizations need to retool their cybersecurity processes, skills, and technology to be ready for the Cloud First Era. This webinar will explore how bring your own key (BYOK) and Key Management as a Service (KMaaS) offers flexible enterprise-class data encryption capabilities to secure cloud-resident data and meet and maintain compliance with industry regulations.

    About the presenter:

    Doug Cahill is a senior analyst covering cybersecurity at Enterprise Strategy Group drawing upon more than 25 years of industry experience across a broad range of cloud, host, and network-based products and markets.

    Prior to joining ESG, Doug held executive leadership positions at security firms Threat Stack and Bit9 where he launched market leading products and forged strategic partnerships. Over the course of his career, Doug has also served in product management, marketing, and business development roles for cybersecurity, storage management, networking, and database vendors, and started his career in IT as a business analyst. 
  • Data Protection for IoT – Securing Enterprise Business Intelligence Recorded: May 17 2017 58 mins
    Jay Irwin, Director, Teradata InfoSec COE and Andrew Lance Sr. Manager, Business Development at Thales e-Security
    The Internet of Things (IoT) has us now counting data elements in the trillions. Collecting, storing, and analyzing this data is transforming business intelligence. However, with this new capability, security is also essential. Teradata offers a best-in-class platform for IoT data processing, storage, and analytics. Together with Thales, the solution address the evolving business intelligence needs of enterprises, while protecting data elements and business intelligence. In this webinar, we will examine the key elements necessary to process IoT data, and the security aspects that enterprises need to focus on to safely harness the power of the technology.

    • Examine the realities of IoT data processing and analytics
    • Describe the architectures needed to support the capability
    • Analyze drivers and technique to secure IoT data elements
Encryption and Key Management Solutions
Data protection and security solutions to help companies meet compliance and protect the security of your most sensitive data leveraging encryption and key management.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Changing Landscape of Data Security for U.S. Federal Agencies
  • Live at: May 30 2019 6:00 pm
  • Presented by: Andy Kicklighter, Director of Product Marketing, Thales
  • From:
Your email has been sent.
or close