Remove Cloud Migration Remove Encryption Remove Presentation
article thumbnail

Why Discomfort Might Be the Ultimate Power Move for Cybersecurity Leaders

Jane Frankland

Or consider cloud migration. Many leaders resisted cloud infrastructure for years due to concerns about compliance and security. For those who pushed through the discomfort, however, the pain of securing cloud implementations led to better agility, streamlined operations, and enhanced defense capabilities.

article thumbnail

IoT and Quantum Computing’s Impact on the Federal Government

Thales Cloud Protection & Licensing

Although one presentation was on IoT and the other was on quantum computing, they both had the same undertone and messaging. I would not recommend entrusting your data in the cloud without maintaining control of the encryption keys that protect that data. Quantum Computing is Coming-Is the Federal Government Ready?

IoT 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Necessity of Data Security: Recapping the 2019 Thales Data Security Summit

Thales Cloud Protection & Licensing

Digital transformation is driving IT modernization, IoT, and cloud migrations at a record pace in the federal government. Under the rules of the roundtable, the content of the discussion was not for individual attribution, except for two formal presentations that set the stage. are discovered.

article thumbnail

Best Practices for Your Digital Transformation Journey

Thales Cloud Protection & Licensing

Two main challenges involve application modernization and cloud migration. Along with these evolutionary changes in behavior and process, the security component of digital transformation presents new challenges. Encryption. Cloud security. Cloud Storage Encryption. More About This Author >.

article thumbnail

The Role Zero Trust Plays in Combating Privileged Credential Attacks

CyberSecurity Insiders

Credential-based attacks continue to present a risky situation for security teams because of the inability to recognize friend from foe. With such elevated rights, the adversary has the power to encrypt data for a ransom, exfiltrated and sell sensitive customer and employee details on the Dark Web, and halt business operations.

article thumbnail

Forrester and Accenture on Schrems II and the Security of International Data Flows

Thales Cloud Protection & Licensing

Enza Iannopollo presented a brief timeline of the EU Court of Justice decision and clarified that the Schrems II ruling covers both the storage and processing of Personal Identifiable Information (PII) of European citizens. Control access to your data by controlling and managing the encryption keys. Encryption. Access Control.

article thumbnail

Thales at GITEX 2021 – An Exciting Time With Exciting News

Thales Cloud Protection & Licensing

This included presentations by Ministers and Heads of Government, who shared information about innovation in their countries, YouthX, which brought together young innovators, and the leaders of more than 40 women-led startups. Identity and security management is one of the challenges of any organization’s cloud migration initiative.