Hi [[ session.user.profile.firstName ]]

The cryptographic landscape is shifting – how do you stay safe?

The recent Snowden disclosures regarding the NSA’s alleged activity, as well as its influence on NIST and other organizations, put existing industry standard cryptographic algorithms and key lengths under renewed scrutiny. Equally, academic analysis of the same algorithms may indicate their useful lifecycle to be shorter than previously predicted. This combination may precipitate the need for rapid shifts from outdated algorithms and key strengths, to different ones less susceptible to attack or collisions.

In this webinar, analyst Securosis will discuss these important landscape changes and you’ll hear strategies for managing the cryptographic algorithm and key length elements necessary for data protection, separate from core application functions so that algorithms can be replaced quickly and administratively - without requiring changes to application code. You’ll leave knowing how Prime Factor’s EncryptRIGHT makes encryption easy and Thales HSMs make encryption even stronger!
Recorded Oct 30 2013 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rich Mogull, Securosis, Jeff Cherrington, Prime Factors, Richard Moulds, Thales e-Security
Presentation preview: The cryptographic landscape is shifting – how do you stay safe?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Key Management in the world of Multiple Cloud providers Jun 6 2017 6:00 pm UTC 60 mins
    Adrian Lane, Analyst and CTO, Securosis and Derek Tumulak, Vice President Global Product Management, Thales e-Security
    Controlling encryption keys — and thus your data — while adopting cloud services is one of the more difficult puzzles in moving to the cloud.

    Customers need to know if there is a consistent way to handle this across all their cloud services.

    In this webinar Adrian Lane (Securosis) and Peter Galvin (Thales e-Security) will discuss challenges specific to multi-cloud key management and why customers may need something different than the native encryption options offered by their cloud providers. They will help you select the right strategy from the many possible combinations, how each customer requirement maps to different deployment options, and what to look for in a key management system.
  • Tick, Tock: Just 1 Year to GDPR Enforcement – How to be technology ready Recorded: May 25 2017 56 mins
    Derek Brink, VP, Research Fellow, Information Technology
    Just one year remains before enforcement of the EU General Data Protection Regulation (GDPR) goes into effect. It’s arguably the most important privacy regulation in a generation. But it’s time to move beyond mere awareness and understanding of what GDPR is, and start making decisions about how you’re going to address it.

    In this webinar, join Derek Brink, vice president and research fellow for Aberdeen Group, and Neil Cooper, Regional Sales Manager, UK&I, for Thales eSecurity, as they share the following helpful insights:

    • Short synopsis of the timeline and key provisions of GDPR
    • Quantify the business risk of GDPR, in terms of both the likelihood and the business impact of non-compliance
    • Summarise the six fundamental strategies for safeguarding sensitive data
    • Identify the three most important capabilities for addressing GDPR requirements
  • Data Encryption for the Cloud-First Era Recorded: May 18 2017 58 mins
    Doug Cahill, Senior Analyst, at Enterprise Strategy Group, Inc.
    The broad adoption of cloud applications has resulted in more and more data assets leaving the corporate perimeter and being stored in the cloud. However, many organizations need to retool their cybersecurity processes, skills, and technology to be ready for the Cloud First Era. This webinar will explore how bring your own key (BYOK) and Key Management as a Service (KMaaS) offers flexible enterprise-class data encryption capabilities to secure cloud-resident data and meet and maintain compliance with industry regulations.

    About the presenter:

    Doug Cahill is a senior analyst covering cybersecurity at Enterprise Strategy Group drawing upon more than 25 years of industry experience across a broad range of cloud, host, and network-based products and markets.

    Prior to joining ESG, Doug held executive leadership positions at security firms Threat Stack and Bit9 where he launched market leading products and forged strategic partnerships. Over the course of his career, Doug has also served in product management, marketing, and business development roles for cybersecurity, storage management, networking, and database vendors, and started his career in IT as a business analyst. 
  • Data Protection for IoT – Securing Enterprise Business Intelligence Recorded: May 17 2017 61 mins
    Jay Irwin, Director, Teradata InfoSec COE and Andrew Lance Sr. Manager, Business Development at Thales e-Security
    The Internet of Things (IoT) has us now counting data elements in the trillions. Collecting, storing, and analyzing this data is transforming business intelligence. However, with this new capability, security is also essential. Teradata offers a best-in-class platform for IoT data processing, storage, and analytics. Together with Thales, the solution address the evolving business intelligence needs of enterprises, while protecting data elements and business intelligence. In this webinar, we will examine the key elements necessary to process IoT data, and the security aspects that enterprises need to focus on to safely harness the power of the technology.

    • Examine the realities of IoT data processing and analytics
    • Describe the architectures needed to support the capability
    • Analyze drivers and technique to secure IoT data elements
  • 2017 Global Encryption State of the State: The Latest Cloud Trends and More! Recorded: Apr 19 2017 62 mins
    Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute, John Grimm, Sr. Director of Security Strategy, Thales e-Security
    This twelfth installment of the Ponemon Global Encryption Trends study, sponsored by Thales e-Security, reveals both deployment plans and pains associated with increasingly aggressive cloud and data protection strategies. Although compliance remains a top driver for encryption, the gap has narrowed as organizations move to protect sensitive IP and customer information from both external and internal threats. Join Larry Ponemon and John Grimm to learn about some of the top findings in this year’s Global Encryption Trends Study, including:

    • Variation in encryption and key management trends across multiple vertical industries
    • Attitudes regarding protection of sensitive data and control of keys in the cloud
    • Types of data most commonly encrypted, and associated applications that perform the encryption
    • The role of Hardware Security Modules (HSMs) in addressing cloud and enterprise encryption and key management use cases.
  • 2017 Data Threats – The Big Disconnect Recorded: Feb 8 2017 53 mins
    Andy Kicklighter, Director - Product Strategy, Thales e-Security
    Spending on IT security to protect data is up - sharply in some sectors – yet successful data breaches are also up significantly. Clearly, there’s still a big disconnect.

    In this webinar Andy Kicklighter with Thales e-Security, and four time prime mover behind the Thales Data Threat Report, reviews the detailed findings of the report.

    The 2017 Data Threat Report – Global Edition will be showcased with an emphasis about the data threats that enterprises are experiencing, what they are doing to secure their data and actionable recommendations that can be used today to secure their sensitive data from data threats.

    • IT Security spending is increasing at 73% of enterprises driven by compliance and data security concerns
    • Data breaches at enterprises are also up - with 68% of enterprises experiencing a breach, 26% in the last year
    • What’s behind the big disconnect? And what should you be doing?
  • Secure Web Application Delivery with Real Time Analytics Recorded: Dec 6 2016 63 mins
    Asha Kalyur, Citrix and Juan Asenjo, Thales e-security
    View our webinar with Citrix to learn how to build an end-to-end network architecture that enables you to secure web applications with robust security
  • Is Your PKI Future-Proofed? Recorded: Oct 12 2016 60 mins
    Larry Ponemon, Chairman & Founder Ponemon Institute, and John Grimm, Senior Director of Security Strategy, Thales e-Security
    Enterprises are dealing with a new and evolving set of challenges and requirements that are driving changes to their core public key infrastructure (PKI). The number of applications that depend on certificate issuance services is increasing dramatically, and ranges from basic SSL and user/device authentication to cloud services and now to the Internet of Things (IoT). So, what are enterprises doing to meet these new challenges?

    Join Larry Ponemon, Chairman & Founder of the Ponemon Institute, and John Grimm, Senior Director of Security Strategy at Thales e-Security, for an overview of the top findings of the 2016 Global PKI Trends Study, including:
    •PKI best practices that enterprises are adopting
    •The latest trends in PKI deployment – from internal to managed to the cloud and more
    •How hardware security modules (HSMs) are being used to improve the trust and assurance level of mission-critical PKIs
  • Protecting Application Delivery without Network Security Blind Spots Recorded: Jul 21 2016 55 mins
    Don Laursen, Sr. Product Manager, F5 & Juan Asenjo, Sr. Partner Manager, Thales e-Security
    SSL/TLS is extensively used to protect web traffic, but the technology can also be exploited to create security blind spots. SSL/TLS encrypted tunnels can be used to hide malicious codes and other threats from network security and performance monitoring tools. To prevent possible malware propagation across networks requires decrypt/encrypt capabilities that enable careful traffic monitoring and inspection.
    Join Don Laursen, Sr. Product Manager from F5 and Juan Asenjo, Sr. Partner Manager at Thales e-Security, to learn how a security architecture using application delivery controllers (ADCs) and hardware security modules (HSMs) can ensure you can optimizes web services with traffic inspection, while safeguarding and managing the critical cryptographic keys that underpin security.
  • 2016 Encryption Application Trends Recorded: Jul 20 2016 61 mins
    Larry Ponemon, Chairman & Founder, the Ponemon Institute & John Grimm, Sr. Director of Security Strategy, Thales e-Security
    Encryption is an increasingly important and prevalent technique to keep data safe. But where should you use it, what are the pitfalls, and how can you ensure you get maximum impact for your investment?

    Join Larry Ponemon, Chairman & Founder of the Ponemon Institute, and John Grimm, Senior Director of Security Strategy at Thales e-Security, for an overview of the top findings in this latest study focused on applications that use encryption, including:
    •A ranked list of what applications encryption is most often deployed with, including vertical industry-level and country-level data splits
    •What features of encryption solutions that users find the most valuable and effective in combatting the challenges associated with increased encryption usage
    •How trends such as cloud computing, big data and the IoT are affecting data protection plans.
  • 2016 Encryption Application Trends Recorded: Jul 20 2016 62 mins
    Larry Ponemon, Chairman & Founder - Ponemon Institute and John Grimm, Senior Director of Security Strategy, Thales e-Security
    Encryption is an increasingly important and prevalent technique to keep data safe. But where should you use it, what are the pitfalls, and how can you ensure you get maximum impact for your investment?

    Join Larry Ponemon, Chairman & Founder of the Ponemon Institute, and John Grimm, Senior Director of Security Strategy at Thales e-Security, for an overview of the top findings in this latest study focused on applications that use encryption, including:
    •A ranked list of what applications encryption is most often deployed with, including vertical industry-level and country-level data splits
    •What features of encryption solutions that users find the most valuable and effective in combatting the challenges associated with increased encryption usage
    •How trends such as cloud computing, big data and the IoT are affecting data protection plans.
  • Scalability & Security – Will we always be playing catch-up? Recorded: Jun 9 2016 42 mins
    Michael Rothschild - Vormetric & Rohit Goyal - Nutanix
    With more organizations operating anywhere and everywhere, the question plaguing both business and IT titles alike is, how do I scale my infrastructure AND my security to keep up with the demands of my business. A more heterogeneous user base in more locations using more cloud based applications – both public and private - and transferring huge amounts of data. Is it even possible to ensure always-on capabilities while also being secure?
    Join us for this exciting webcast where we will talk about the security and scalability challenges that organizations face as well as the enterprise cloud concept – the new approach many organizations are turning to in order to ensure secure “any-to-any service”. Any app, anywhere, anytime, always secured.
  • Cloud Based Payments: the future of Mobile Payments? Recorded: May 19 2016 46 mins
    Simon Keates, Business Development Manager, Thales e-Security & Rob MacMillan, VP Marketing – Digital Payments, Proxama
    In this webcast Simon Keates, Business Development Manager, Thales and Rob Macmillan, VP Marketing, Proxama will present and discuss the history, scope and current status of mobile payments based on Cloud Based Payment (CBP) and Host Card Emulation (HCE) technology. Since HCE first became available in Android handsets, card issuers have been using it to deliver mobile payment solutions to the customers. With scheme specifications and the arrival of tokenisation there has been an increasing rate of adoption. Now, with an increasing number of payment options becoming available from the 'X-Pays' and a growing convergence between on-line, in-store and in-app transactions, what is the future for CBP?
  • Innovation and security in the digital payments world Recorded: Apr 20 2016 59 mins
    Ian Hermon, Payment Security Product Marketing Mgr. & Jose Diaz, Director, Payment Strategy
    Digital commerce is growing rapidly with new ways to make payments more streamlined (e.g., in-app payments). The drive towards improving the overall purchasing experience and ‘frictionless payments’ is forcing new security and trust models to evolve to meet new challenges and threats. Cards are no longer adequate to fulfill the continuing evolution of new purchasing methods. New trust models are necessary to secure transactions when the consumer uses an off-the-shelf PC browser, tablet application, mobile phone app, or wearable to initiate a purchase and resulting payment.


    Please join Ian Hermon and Jose Diaz from Thales e-Security for a webinar to learn more about the latest innovative payment trends as well as the demand for security and trust behind the scenes

    •Hear about the latest trends in digital commerce and payment methods
    •Gain a better understanding of the security behind the diverse solutions
    •Learn about EMVCo plans for improving the 3D Secure user experience while making it easier for merchant adoption
    •Benefit from the sharing of use cases to help determine the best approach for your business
  • Innovation and security in the digital payments world Recorded: Apr 20 2016 59 mins
    Ian Hermon, Payment Security Product Marketing Mgr. & Jose Diaz, Director, Payment Strategy
    Digital commerce is growing rapidly with new ways to make payments more streamlined (e.g., in-app payments). The drive towards improving the overall purchasing experience and ‘frictionless payments’ is forcing new security and trust models to evolve to meet new challenges and threats. Cards are no longer adequate to fulfill the continuing evolution of new purchasing methods. New trust models are necessary to secure transactions when the consumer uses an off-the-shelf PC browser, tablet application, mobile phone app, or wearable to initiate a purchase and resulting payment.

    Please join Ian Hermon and Jose Diaz from Thales e-Security for a webinar to learn more about the latest innovative payment trends as well as the demand for security and trust behind the scenes.


    • Hear about the latest trends in digital commerce and payment methods
    • Gain a better understanding of the security behind the diverse solutions
    • Learn about EMVCo plans for improving the 3D Secure user experience while making it easier for merchant adoption
    • Benefit from the sharing of use cases to help determine the best approach for your business
  • 2016 Top Trends in Encryption and Data Protection Recorded: Mar 23 2016 58 mins
    Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute and John Grimm, Senior Director
    Not surprisingly, companies are continuing to increase their use of encryption and other data protection techniques in response to data breaches and cyber attacks. But some of the other top deployment reasons – and techniques being used -- may surprise you.

    Join Larry Ponemon and John Grimm to learn about some of the top findings in this year’s Global Encryption Trends Study, including:

    • Variation in encryption and key management trends across multiple vertical industries
    • Attitudes regarding protection of sensitive data in the cloud
    • Types of data that are most commonly encrypted
    • Common use cases for encryption, and where Hardware Security Modules are most commonly deployed for key protection and management
  • Data Protection in 2016 - Top 5 Use Cases Recorded: Feb 17 2016 20 mins
    Kristina Cairns, Sr Product Marketing Manager and Sander Temme, Sr Product Line Manager
    2015 Highlighted what we all know: data protection issues are a big deal.

    Join Thales e-Security as we share our practical knowledge of the top ways companies are protecting their data. Please register below to learn from our examples and make sure you’re on track for 2016!
  • Data Protection in 2016 - Top 5 Use Cases Recorded: Feb 17 2016 36 mins
    Kristina Cairns, Sr Product Marketing Manager and Sander Temme, Sr Product Line Manager
    2015 Highlighted what we all know: data protection issues are a big deal.

    Join Thales e-Security as we share our practical knowledge of the top ways companies are protecting their data. Please register below to learn from our examples and make sure you’re on track for 2016!
  • Cloud Payments (HCE): A Simpler Step with Thales HSMs Recorded: Jan 13 2016 50 mins
    Simon Keates, Principal Consultant, Mobile Security
    Deploying a cloud payment (HCE) solution can be a daunting and complex task. Cryptographic and key management requirements don’t have to be something to slow down your project. At Thales e-Security we have been at the forefront of designing solutions to reduce the complexity of cryptographic security and implementation, helping organisations rapidly bring solutions to market.

    This webinar will explain the key management requirements of the various schemes’ specifications, and explain how using Thales HSMs can shorten your development cycle and allow you to rapidly bring your product to market.
  • Digital Certificates - A Critical Line of Defense Against Cybercrime Recorded: Dec 16 2015 62 mins
    John Grimm, Sr. Director, Product Marketing - Thales e-Security and Ted Shorter, CTO - Certified Security Solutions (CSS)
    Digital Certificates are a critical line of defense against cybercrime. From authenticating traditional user endpoints to enabling trusted e-commerce purchases, digital certificates and the public key infrastructure (PKI) that issues them create a high assurance foundation for digital security when implemented correctly.

    Partnering to provide best-in-class PKI solutions, Certified Security Solutions and Thales e-Security invite you to a live webinar to discuss digital certificate use cases, the security threat landscape and resolutions to dangerous enterprise problems putting your company at risk for costly outages and data breaches.

    Join John Grimm, Sr. Director, Product Marketing - Thales e-Security and Ted Shorter, CTO at Certified Security Solutions (CSS) as they discuss:

    • "Newest" security technology
    • Why it's different today
    • Digital certificate use cases
    • Security threat landscape
Encryption and Key Management Solutions
Data protection and security solutions to help companies meet compliance and protect the security of your most sensitive data leveraging encryption and key management.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The cryptographic landscape is shifting – how do you stay safe?
  • Live at: Oct 30 2013 3:00 pm
  • Presented by: Rich Mogull, Securosis, Jeff Cherrington, Prime Factors, Richard Moulds, Thales e-Security
  • From:
Your email has been sent.
or close