| Image | Title | Summary | Link | 
|---|---|---|---|
| CTO Sessions On Demand: Trusted Data in Motion – Securing Government Communications in the PQC Era | Quantum computing threatens to render today’s encryption obsolete, exposing classified data and undermining national security. …  | ||
| On Demand ATARC Webinar: Intersection of Quantum, AI, and Security | Artificial intelligence is rapidly transforming our world, from the way we work to the way …  | ||
| CTO Sessions On Demand: Zero Trust Best Practices for Federal Agencies | In today’s rapidly evolving cybersecurity landscape, federal agencies face increasing pressure to implement Zero Trust …  | ||
| CTO Sessions On Demand: When AI Learns to Breach and Quantum Learns to Decrypt – The Endgame | As public and private sectors accelerate AI adoption, they’re deploying it atop cryptographic foundations built …  | ||
| CTO Sessions Webcast On Demand: Intersection of Quantum, AI and Security | Artificial intelligence (AI) is rapidly transforming our world, from the way we work to the …  | ||
| CTO Session Webcast On Demand: Intersection of AI and Security | Artificial intelligence (AI) is rapidly transforming our world, from the way we work to the …  | ||
| On Demand GovLoop Webinar: Taking a Realistic Look at Quantum Computing in Government | Quantum computing in government is poised to make an impact. Updates and timelines from the …  | ||
| CTO Sessions On Demand: Best Practices for Implementing Quantum-Resistant Security | Quantum computing’s potential computational power will render today’s widely-deployed encryption algorithms obsolete. Both the National …  | ||
| CTO Sessions On Demand: 2024 Data Threat Report – Federal Edition Webcast | The 2024 Thales Data Threat Report highlights the unique security challenges faced by U.S. Federal …  | ||
| The Underappreciated Tactic of MITRE ATT&CK Framework – Collection | A Security Engineers Guide to Database Activity Monitoring Databases are key targets for hackers looking …  | ||
| Securing the Future: Navigation Post Quantum Cryptography Standards | As quantum computing advances, initiatives from NIST and CISA are vital for organizations facing emerging …  | ||
| CTO Sessions: Best Practices for Phishing-Resistant MFA: FIDO & PKI | With recent vulnerabilities such as EUCLEAK and Executive Order 14028 deadlines, phishing-resistant Multi-Factor Authentication (MFA) is …  | ||
| CTO Sessions: Cloud HSM Best Practices | Although federal agencies are deploying cloud solutions at a rapid pace, they are often hesitant …  | ||
| CTO Sessions Webcast: Best Practices for Data in Transit Encryption | High speed networks are the critical foundation that supports many of an agency’s most vital …  | ||
| CTO Sessions Webcast: How-to Guide for Enhancing HPE Infrastructure Security | Sensitive data stored in HPE deployments must be encrypted edge-to-cloud. For encryption to successfully secure …  | ||
| CTO Sessions Webcast: Thales TCT + Imperva Trusted End-to-End Data Security | Ongoing government-wide zero trust implementations exemplify the fact that traditional end-point and perimeter-based security are …  | ||
| CTO Sessions: Quantum-Resistant Code Signing | Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the …  | ||
| CTO Sessions: Quantum Resistant Security | Quantum computing’s impact is likely to be large—the potential computational power could render today’s encryption …  | ||
| CTO Sessions Webcast: Word on the Street – 2024’s Top Tech Trends | Buzzword tracking is overwhelming. From AI to Quantum, it can be challenging for federal agencies …  | ||
| CTO Sessions On Demand Webcast: Everything You Need to Know About Phishing-Resistant MFA | Without secure, enterprise-managed identity systems, adversaries can take over user accounts and gain a foothold …  | ||
| CTO Sessions Webcast: A Guide to BYOK and HYOK for AWS, Azure, Google, Oracle and More | Cloud Security Alliance best practices require that keys be stored and managed outside of the …  | ||
| CTO Sessions Webcast On Demand: AI & Cybersecurity | This CTO Sessions Webcast is all about the elephant in the room—Artificial Intelligence! Rather than …  | ||
| CTO Sessions Webcast On Demand: Network Encryption Boot Camp – A Guide to Network Encryption from the Core to the Cloud to the Edge | High speed networks are the critical foundation that supports many of an agency’s most vital …  | ||
| CTO Sessions Webcast On Demand: HSM Boot Camp – A Guide to HSM Deployments from the Core to the Cloud to the Edge | Thales TCT’s Luna T-Series Hardware Security Modules (HSMs) can be deployed either in the cloud …  | ||
| CTO Sessions Webcast On Demand: Deliver Secure Hyper-Converged Infrastructure Solutions | With the growing number of digital transformation initiatives, hyper-converged infrastructure (HCI) has emerged as a …  | ||
| CTO Sessions Webcast On Demand: Zero Trust – Beyond the Buzzword | Zero Trust is not just another buzzword in a never-ending list of tech trends. The …  | ||
| CTO Sessions Webcast On Demand: Building a Root of Trust in How to Secure the Most Sensitive Data | Watch a replay of this webinar to learn: Secure critical data and digital identities Support …  | ||
| CTO Sessions Webcast On Demand: Top 10 Reasons to Protect Your Agency with CipherTrust Data Security Platform | In this installment of Thales TCT’s CTO Sessions Webcast Series, our Deputy CTO shared the …  | ||
| CTO Sessions Webcast On Demand: Taking Control of 2023’s Top Tech Trends | On the first installment of Thales TCT’s CTO Sessions Webcast Series for 2023, Thales TCT’s …  | ||
| CTO Sessions On Demand: Protecting Your Data in Their Cloud | Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud …  | ||
| CTO Sessions On Demand: Are You Quantum Ready? | Despite large-scale quantum computing being several years away from being a practical reality, federal government …  | ||
| CTO Sessions On Demand: Data Protection at the Edge | Core computing functionality, commonly found in data centers and in the cloud, is also being …  | ||
| On Demand Webinar: Rapid Protection for Teradata Database and Big Data Environments | Teradata databases and big data analytics enable agencies to leverage information to fuel improved decisions, …  | ||
| On Demand Webinar: No-Excuse Defenses Against Supply Chain Attacks | Files from the web are network assassins. Here are no-excuse defenses. As of 2018, supply …  | ||
| On Demand Webinar: Best Practices for Data Visibility | To recap, during this webinar attendees learned how to develop a data classification strategy that enables …  | ||
| On Demand Webinar: Best Practices for Cloud Data Protection | Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud …  | ||
| On Demand Webinar – Intelligence Community: Cyber Security is National Security | In January, the National Security Agency issued its first Cybersecurity Year in Review, detailing the …  | ||
| On Demand Webinar: The Key Pillars for Protecting Sensitive Data | During this webinar, attendees learned how to develop a three-point strategy for protecting sensitive data …  | ||
| On Demand Webinar: Fireside Chat: Data Protection for Multi-Domain Operations | The U.S. Military generates data at unprecedented rates, all the time, and in various locations …  | ||
| On Demand Webinar: Shifting the Mindset from “Breach Prevention” to “Acceptance” | During this webinar, we discussed what agencies need to do before their networks are compromised. …  | ||
| On Demand Webinar: Building a Root of Trust to Secure the Most Sensitive Data | Government agencies’ digital transformation has vastly increased the complexity of security. Technologies such as cloud …  | ||
| On Demand Webinar: Complementing Splunk: Balancing Big Data Benefits & Big Risks | Federal agencies require a simple way to correlate all security-relevant data so they can manage …  | ||
| On Demand Webinar: How To Issue Hardware-Based Identity Credentials To Software Robots | During this webinar, attendees learned how Thales Trusted Cyber Technologies’ Luna Credential System introduces a new approach …  | ||
| On Demand Master Class: Zero Trust Beyond the Buzzword | Watch an on demand recording of Thales TCT Deputy CTO Gina Scinta’s presentation from the …  | ||
| CTO Sessions On Demand: Securing the Convergence of HPC and AI in the Enterprise | High-performance computing (HPC) has long expanded from research labs to commercial use. Computational modeling and …  | ||
| CTO Sessions On Demand: Best Practices for Data in Transit Encryption | High speed networks are the critical foundation that supports many of an agency’s most vital …  | ||
| CTO Sessions On Demand: Preventing Ransomware in Microsoft 365 Environments | View this on-demand recording to learn how federal agencies can ensure that their data is properly …  | 
					














































