It’s time to catch up on the Thales Crypto Summit

The past year has presented significant data security challenges when it comes to compliance, control, and operational complexity. It has become clearer that encryption is the most effective means to protect and remain in control of sensitive data and Crypto is now being applied to protect an ever-increasing number of services.

Thales have recently hosted their 2021 Crypto Summit and we want to share the on-demand content with you – including webinars and interactive talk sessions from the day.

The summit was aimed at helping individuals learn about the latest trends in crypto for protecting sensitive data across multi-cloud and hybrid IT environments, as well as new technology uses cases for encryption and key management. We heard from experts at IDC, 451 Research, KuppingerCole, Thales, Accenture, CyberArk, Dell Technologies, Keyfactor, Google, Microsoft, Red Hat, Senetas, BT and Teradata.

The below are some of our favourite topics from the 2-day summit, watch the on demand webinars, share them with your prospects, and open the conversation today!

Topics included:

• Multi-cloud key management best practices
• Native cloud security vs. bring your own encryption
• Applying encryption to storage environments
• Secure DevOps
• 5G network security
• Quantum computing
• 2021 data threat trends

To catch up with the on demand sessions please click on each individual session below:

Welcome & Key Note Session: From Zero Trust to Confidential Computing Encryption Technologies in the Age of COVID and Cloud

The Latest Insights into the State of Data Security in Europe

Deciphering the Data Security Implications of Schrems II

Back to the Future – Why Quantum Threatens Encryption Security Now

Retaining Control of Your Encryption Keys and Data in Google Cloud (Replay)

How to Tackle Ransomware Head-on with PowerProtect Cyber

Dell Intrinsic Security

The White House Executive Order on Cybersecurity: The Blueprint for How Companies Secure Their Infrastructure

PKI for IoT: How to Secure Connected Devices from Design to End-of-Life

The CipherTrust Data Security Platform for Developers: Offerings and Vision

Network Data Security Vulnerabilities: Cybersecurity Survey Reveals Weaknesses

DKE: Protecting Sensitive Data with Luna Key Broker for Microsoft Double Key Encryption

Hybrid Luna HSM: Flexible Crypto with Uncompromised Trust: Security to Meet Your Dynamic Business Needs

Protecting credentials, data, and secrets in a containerized DevOps environment

Recent Advances in Cloud Key Management

The end-end solutions needed for holistic 5G security

Protecting Teradata Workloads in the Cloud with Data Encryption