The Evolution of Encryption: Getting Ready for the Quantum Watershed

  • LANGUAGE: English DATE: Tuesday, September 29, 2020 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
The Evolution of Encryption: Getting Ready for the Quantum Watershed How data protection went from mysterious to mainstream

The relentless move towards the digital transformation seems unstoppable. Organizations must secure their trust and reputation in the face of increasing attacks, advances in technology, increased regulation and compliance, and the continued shift to the cloud and cloud services. Unfortunately, not a single week goes by without another large-scale data breach or leak reported by the media – it seems that a company of any size or industry can fall victim to insufficient or ineffective data protection controls.

Encryption nowadays is (at least in theory) the most effective and undoubtedly the most ubiquitous method of protecting sensitive data from unauthorized access, at rest, in transit, and in use. So, what prevents companies from taking advantage of the recent advancements in applied cryptography? Why do so many people still consider encryption a kind of devilishly complicated magic? 

While encryption needs to become easier in order to maintain control over its central elements, the emergence of quantum computing is worrying as it puts virtually all the technologies at risk which we use to communicate, exchange and protect information. But there is light on the horizon with developments in crypto-agility and quantum-resistant algorithms. 

This webinar takes you through that shift from peripheral to popular and discusses what technologies are coming to the market today to help you take control of the protection of your data both locally and in the cloud. 

In this webinar, you will learn about: 

  • The impact of encryption becoming mainstream and pervasive in the last 15 years
  • The emergence of the cloud forcing organizations to abandon older, infrastructure-focused security controls and to concentrate on data-centric security 
  • Advanced applications of encryption beyond just protecting data against theft 
  • The emerging challenges of post-quantum cryptography 
  • Best practices for organizations to consider today to protect themselves in the future 

Alexei Balaganski, Lead Analyst at KuppingerCole, will take you through the past, present, and future of cryptography and will talk about demystifying encryption and putting it to use for your business. 

He will be joined by Chris Harris, Technical Director for Data Security solutions at Thales, who will present the best practices for adopting modern encryption solutions across hybrid IT environments and help you prepare for the post-quantum future. 


Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

Lead Sponsor

Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands in the world rely on Thales to help them protect and secure access to their most sensitive information and software. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.
We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management.

Thales Cloud Protection & Licensing is part of Thales Group. 

Watch now


Trending Videos

Next Webinar


Managing Cyber Risk in a Hybrid Multi-Cloud IT Environment

Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00