The Evolution of Encryption: Getting Ready for the Quantum Watershed
- LANGUAGE: English DATE: Tuesday, September 29, 2020 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
The relentless move towards the digital transformation seems unstoppable. Organizations must secure their trust and reputation in the face of increasing attacks, advances in technology, increased regulation and compliance, and the continued shift to the cloud and cloud services. Unfortunately, not a single week goes by without another large-scale data breach or leak reported by the media – it seems that a company of any size or industry can fall victim to insufficient or ineffective data protection controls.
Encryption nowadays is (at least in theory) the most effective and undoubtedly the most ubiquitous method of protecting sensitive data from unauthorized access, at rest, in transit, and in use. So, what prevents companies from taking advantage of the recent advancements in applied cryptography? Why do so many people still consider encryption a kind of devilishly complicated magic?
While encryption needs to become easier in order to maintain control over its central elements, the emergence of quantum computing is worrying as it puts virtually all the technologies at risk which we use to communicate, exchange and protect information. But there is light on the horizon with developments in crypto-agility and quantum-resistant algorithms.
This webinar takes you through that shift from peripheral to popular and discusses what technologies are coming to the market today to help you take control of the protection of your data both locally and in the cloud.
In this webinar, you will learn about:
- The impact of encryption becoming mainstream and pervasive in the last 15 years
- The emergence of the cloud forcing organizations to abandon older, infrastructure-focused security controls and to concentrate on data-centric security
- Advanced applications of encryption beyond just protecting data against theft
- The emerging challenges of post-quantum cryptography
- Best practices for organizations to consider today to protect themselves in the future
Alexei Balaganski, Lead Analyst at KuppingerCole, will take you through the past, present, and future of cryptography and will talk about demystifying encryption and putting it to use for your business.
He will be joined by Chris Harris, Technical Director for Data Security solutions at Thales, who will present the best practices for adopting modern encryption solutions across hybrid IT environments and help you prepare for the post-quantum future.
350 Longwater Ave, Green Park • UK RG2 6G Reading, Berkshire • United Kingdom
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands in the world rely on Thales to help them protect and secure access to their most sensitive information and software. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.
We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management.
Thales Cloud Protection & Licensing is part of Thales Group.
Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and companies. To reduce the risk of privileged accounts being hijacked or used fraudulently, and to uphold regulatory compliance, a strong PAM solution is essential. But finding the right PAM solution can be challenging.