The Evolution of Encryption: Getting Ready for the Quantum Watershed

  • LANGUAGE: English DATE: Tuesday, September 29, 2020 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
The Evolution of Encryption: Getting Ready for the Quantum Watershed How data protection went from mysterious to mainstream

The relentless move towards the digital transformation seems unstoppable. Organizations must secure their trust and reputation in the face of increasing attacks, advances in technology, increased regulation and compliance, and the continued shift to the cloud and cloud services. Unfortunately, not a single week goes by without another large-scale data breach or leak reported by the media – it seems that a company of any size or industry can fall victim to insufficient or ineffective data protection controls.

Encryption nowadays is (at least in theory) the most effective and undoubtedly the most ubiquitous method of protecting sensitive data from unauthorized access, at rest, in transit, and in use. So, what prevents companies from taking advantage of the recent advancements in applied cryptography? Why do so many people still consider encryption a kind of devilishly complicated magic? 

While encryption needs to become easier in order to maintain control over its central elements, the emergence of quantum computing is worrying as it puts virtually all the technologies at risk which we use to communicate, exchange and protect information. But there is light on the horizon with developments in crypto-agility and quantum-resistant algorithms. 

This webinar takes you through that shift from peripheral to popular and discusses what technologies are coming to the market today to help you take control of the protection of your data both locally and in the cloud. 

In this webinar, you will learn about: 

  • The impact of encryption becoming mainstream and pervasive in the last 15 years
  • The emergence of the cloud forcing organizations to abandon older, infrastructure-focused security controls and to concentrate on data-centric security 
  • Advanced applications of encryption beyond just protecting data against theft 
  • The emerging challenges of post-quantum cryptography 
  • Best practices for organizations to consider today to protect themselves in the future 

Alexei Balaganski, Lead Analyst at KuppingerCole, will take you through the past, present, and future of cryptography and will talk about demystifying encryption and putting it to use for your business. 

He will be joined by Chris Harris, Technical Director for Data Security solutions at Thales, who will present the best practices for adopting modern encryption solutions across hybrid IT environments and help you prepare for the post-quantum future. 


Speakers

Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...


Lead Sponsor

Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands in the world rely on Thales to help them protect and secure access to their most sensitive information and software. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management.

Thales Cloud Protection & Licensing is part of Thales Group.

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Reduce Dependency on Active Directory With Cloud Identity

When it comes to identity management many companies depend heavily on Microsoft Active Directory (AD). This high degree of dependency on one service can become a problem when this service faces an outage. Also, respective of the requirements companies have, all services have certain limitations which are sometimes necessary to overcome. Many cyberattacks are perpetrated via staff endpoint devices (computers, smartphones or even printers). This necessitates a fine-mesh risk management approach with a centralized solution, called Identity Fabric at KuppingerCole.

Next Conference

Congress

European Identity & Cloud Conference 2021

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from September 13 - 16, 2021, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 1000 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00