Upcoming Webcasts

On Demand Webcasts

ImageTitleSummaryLink
CTO Sessions: Quantum-Resistant Code Signing

Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the …

CTO Sessions: Quantum Resistant Security

Quantum computing’s impact is likely to be large—the potential computational power could render today’s encryption …

CTO Sessions Webcast: Word on the Street – 2024’s Top Tech Trends

Buzzword tracking is overwhelming. From AI to Quantum, it can be challenging for federal agencies …

CTO Sessions On Demand Webcast: Everything You Need to Know About Phishing-Resistant MFA

Without secure, enterprise-managed identity systems, adversaries can take over user accounts and gain a foothold …

CTO Sessions Webcast: A Guide to BYOK and HYOK for AWS, Azure, Google, Oracle and More

Cloud Security Alliance best practices require that keys be stored and managed outside of the …

CTO Sessions Webcast On Demand: AI & Cybersecurity

This CTO Sessions Webcast is all about the elephant in the room—Artificial Intelligence! Rather than …

CTO Sessions Webcast On Demand: Network Encryption Boot Camp – A Guide to Network Encryption from the Core to the Cloud to the Edge

High speed networks are the critical foundation that supports many of an agency’s most vital …

CTO Sessions Webcast On Demand: HSM Boot Camp – A Guide to HSM Deployments from the Core to the Cloud to the Edge

Thales TCT’s Luna T-Series Hardware Security Modules (HSMs) can be deployed either in the cloud …

CTO Sessions Webcast On Demand: Deliver Secure Hyper-Converged Infrastructure Solutions

With the growing number of digital transformation initiatives, hyper-converged infrastructure (HCI) has emerged as a …

CTO Sessions Webcast On Demand: Zero Trust – Beyond the Buzzword

Zero Trust is not just another buzzword in a never-ending list of tech trends. The …

CTO Sessions Webcast On Demand: Building a Root of Trust in How to Secure the Most Sensitive Data

Watch a replay of this webinar to learn: Secure critical data and digital identities Support …

CTO Sessions Webcast On Demand: Top 10 Reasons to Protect Your Agency with CipherTrust Data Security Platform

In this installment of Thales TCT’s CTO Sessions Webcast Series, our Deputy CTO shared the …

CTO Sessions Webcast On Demand: Taking Control of 2023’s Top Tech Trends

On the first installment of Thales TCT’s CTO Sessions Webcast Series for 2023, Thales TCT’s …

CTO Sessions On Demand: Protecting Your Data in Their Cloud

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud …

CTO Sessions On Demand: Are You Quantum Ready?

Despite large-scale quantum computing being several years away from being a practical reality, federal government …

CTO Sessions On Demand: Data Protection at the Edge

Core computing functionality, commonly found in data centers and in the cloud, is also being …

On Demand Webinar: Rapid Protection for Teradata Database and Big Data Environments

Teradata databases and big data analytics enable agencies to leverage information to fuel improved decisions, …

On Demand Webinar: No-Excuse Defenses Against Supply Chain Attacks

Files from the web are network assassins. Here are no-excuse defenses. As of 2018, supply …

On Demand Webinar: Best Practices for Data Visibility

To recap, during this webinar attendees learned how to develop a data classification strategy that enables …

On Demand Webinar: Best Practices for Cloud Data Protection

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud …

On Demand Webinar – Intelligence Community: Cyber Security is National Security

In January, the National Security Agency issued its first Cybersecurity Year in Review, detailing the …

On Demand Webinar: The Key Pillars for Protecting Sensitive Data

During this webinar, attendees learned how to develop a three-point strategy for protecting sensitive data …

On Demand Webinar: Fireside Chat: Data Protection for Multi-Domain Operations

The U.S. Military generates data at unprecedented rates, all the time, and in various locations …

On Demand Webinar: Shifting the Mindset from “Breach Prevention” to “Acceptance”

During this webinar, we discussed what agencies need to do before their networks are compromised. …

On Demand Webinar: Building a Root of Trust to Secure the Most Sensitive Data

Government agencies’ digital transformation has vastly increased the complexity of security. Technologies such as cloud …

On Demand Webinar: Complementing Splunk: Balancing Big Data Benefits & Big Risks

Federal agencies require a simple way to correlate all security-relevant data so they can manage …

On Demand Webinar: How To Issue Hardware-Based Identity Credentials To Software Robots

During this webinar, attendees learned how Thales Trusted Cyber Technologies’ Luna Credential System introduces a new approach …

On Demand Master Class: Zero Trust Beyond the Buzzword

Watch an on demand recording of Thales TCT Deputy CTO Gina Scinta’s presentation from the …

CTO Sessions On Demand: Securing the Convergence of HPC and AI in the Enterprise

High-performance computing (HPC) has long expanded from research labs to commercial use. Computational modeling and …

On Demand Webinar: Getting to Compliance with the National Security Memo on Cybersecurity

On January 19, 2022, the White House issued National Security Memorandum 8 (NSM) to improve …

CTO Sessions On Demand: Best Practices for Data in Transit Encryption

High speed networks are the critical foundation that supports many of an agency’s most vital …

CTO Sessions On Demand: Preventing Ransomware in Microsoft 365 Environments

View this on-demand recording to learn how federal agencies can ensure that their data is properly …