Thales Trusted Cyber Technologies   Contact Us | Careers

Upcoming Webcasts

CTO Sessions: 2024 Data Threat Report – Federal Edition

CTO Webcast Events

December 17, 2024 | 2:00 PM ET The 2024 Thales Data Threat Report highlights the unique security challenges faced by U.S. Federal agencies. This report reveals new cybersecurity strategies as well as key differences between federal and global survey responses, providing valuable insights to stay ahead in the evolving security landscape. Key Findings 40% of USFED agencies and organizations report having experienced a ransomware attack. 47% of agencies reported breaches in 2021, but that number dropped to 13% in 2024—a 72% decrease—likely due to increased security investments and certain initiatives. 27% of cloud-based data breaches were caused by human error and zero-day/novel/unknown vulnerabilities, tying them as the leading causes. Attend this webinar to dive deeper into the findings and stay ahead of the curve and discover: Why USFED are prime targets for cyberattacks. The type of cyber-attacks dominating the landscape and key strategies to deflect them. ...

Continue →

On Demand Webcasts

ImageTitleSummaryLink
The Underappreciated Tactic of MITRE ATT&CK Framework – Collection

A Security Engineers Guide to Database Activity Monitoring Databases are key targets for hackers looking …

Securing the Future: Navigation Post Quantum Cryptography Standards

As quantum computing advances, initiatives from NIST and CISA are vital for organizations facing emerging …

CTO Sessions: Best Practices for Phishing-Resistant MFA: FIDO & PKI

With recent vulnerabilities such as EUCLEAK and Executive Order 14028 deadlines, phishing-resistant Multi-Factor Authentication (MFA) is …

CTO Sessions: Cloud HSM Best Practices

Although federal agencies are deploying cloud solutions at a rapid pace, they are often hesitant …

CTO Sessions Webcast: Best Practices for Data in Transit Encryption

High speed networks are the critical foundation that supports many of an agency’s most vital …

CTO Sessions Webcast: How-to Guide for Enhancing HPE Infrastructure Security

Sensitive data stored in HPE deployments must be encrypted edge-to-cloud. For encryption to successfully secure …

CTO Sessions Webcast: Thales TCT + Imperva Trusted End-to-End Data Security

Ongoing government-wide zero trust implementations exemplify the fact that traditional end-point and perimeter-based security are …

CTO Sessions: Quantum-Resistant Code Signing

Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the …

CTO Sessions: Quantum Resistant Security

Quantum computing’s impact is likely to be large—the potential computational power could render today’s encryption …

CTO Sessions Webcast: Word on the Street – 2024’s Top Tech Trends

Buzzword tracking is overwhelming. From AI to Quantum, it can be challenging for federal agencies …

CTO Sessions On Demand Webcast: Everything You Need to Know About Phishing-Resistant MFA

Without secure, enterprise-managed identity systems, adversaries can take over user accounts and gain a foothold …

CTO Sessions Webcast: A Guide to BYOK and HYOK for AWS, Azure, Google, Oracle and More

Cloud Security Alliance best practices require that keys be stored and managed outside of the …

CTO Sessions Webcast On Demand: AI & Cybersecurity

This CTO Sessions Webcast is all about the elephant in the room—Artificial Intelligence! Rather than …

CTO Sessions Webcast On Demand: Network Encryption Boot Camp – A Guide to Network Encryption from the Core to the Cloud to the Edge

High speed networks are the critical foundation that supports many of an agency’s most vital …

CTO Sessions Webcast On Demand: HSM Boot Camp – A Guide to HSM Deployments from the Core to the Cloud to the Edge

Thales TCT’s Luna T-Series Hardware Security Modules (HSMs) can be deployed either in the cloud …

CTO Sessions Webcast On Demand: Deliver Secure Hyper-Converged Infrastructure Solutions

With the growing number of digital transformation initiatives, hyper-converged infrastructure (HCI) has emerged as a …

CTO Sessions Webcast On Demand: Zero Trust – Beyond the Buzzword

Zero Trust is not just another buzzword in a never-ending list of tech trends. The …

CTO Sessions Webcast On Demand: Building a Root of Trust in How to Secure the Most Sensitive Data

Watch a replay of this webinar to learn: Secure critical data and digital identities Support …

CTO Sessions Webcast On Demand: Top 10 Reasons to Protect Your Agency with CipherTrust Data Security Platform

In this installment of Thales TCT’s CTO Sessions Webcast Series, our Deputy CTO shared the …

CTO Sessions Webcast On Demand: Taking Control of 2023’s Top Tech Trends

On the first installment of Thales TCT’s CTO Sessions Webcast Series for 2023, Thales TCT’s …

CTO Sessions On Demand: Protecting Your Data in Their Cloud

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud …

CTO Sessions On Demand: Are You Quantum Ready?

Despite large-scale quantum computing being several years away from being a practical reality, federal government …

CTO Sessions On Demand: Data Protection at the Edge

Core computing functionality, commonly found in data centers and in the cloud, is also being …

On Demand Webinar: Rapid Protection for Teradata Database and Big Data Environments

Teradata databases and big data analytics enable agencies to leverage information to fuel improved decisions, …

On Demand Webinar: No-Excuse Defenses Against Supply Chain Attacks

Files from the web are network assassins. Here are no-excuse defenses. As of 2018, supply …

On Demand Webinar: Best Practices for Data Visibility

To recap, during this webinar attendees learned how to develop a data classification strategy that enables …

On Demand Webinar: Best Practices for Cloud Data Protection

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud …

On Demand Webinar – Intelligence Community: Cyber Security is National Security

In January, the National Security Agency issued its first Cybersecurity Year in Review, detailing the …

On Demand Webinar: The Key Pillars for Protecting Sensitive Data

During this webinar, attendees learned how to develop a three-point strategy for protecting sensitive data …

On Demand Webinar: Fireside Chat: Data Protection for Multi-Domain Operations

The U.S. Military generates data at unprecedented rates, all the time, and in various locations …

On Demand Webinar: Shifting the Mindset from “Breach Prevention” to “Acceptance”

During this webinar, we discussed what agencies need to do before their networks are compromised. …

On Demand Webinar: Building a Root of Trust to Secure the Most Sensitive Data

Government agencies’ digital transformation has vastly increased the complexity of security. Technologies such as cloud …

On Demand Webinar: Complementing Splunk: Balancing Big Data Benefits & Big Risks

Federal agencies require a simple way to correlate all security-relevant data so they can manage …

On Demand Webinar: How To Issue Hardware-Based Identity Credentials To Software Robots

During this webinar, attendees learned how Thales Trusted Cyber Technologies’ Luna Credential System introduces a new approach …

On Demand Master Class: Zero Trust Beyond the Buzzword

Watch an on demand recording of Thales TCT Deputy CTO Gina Scinta’s presentation from the …

CTO Sessions On Demand: Securing the Convergence of HPC and AI in the Enterprise

High-performance computing (HPC) has long expanded from research labs to commercial use. Computational modeling and …

CTO Sessions On Demand: Best Practices for Data in Transit Encryption

High speed networks are the critical foundation that supports many of an agency’s most vital …

CTO Sessions On Demand: Preventing Ransomware in Microsoft 365 Environments

View this on-demand recording to learn how federal agencies can ensure that their data is properly …