Thales Trusted Cyber Technologies   Contact Us | Careers

Upcoming Webcasts

CTO Sessions Webcast: Quantum Resistant Code Signing

CTO Webcast Events

April 25, 2024 - 2:00 PM ET - LIVE WEBCAST Featured Speaker: Evan Pelecky, PM, Thales TCT Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant quantum computer. NSA’s CNSA 2.0 encourages vendors to adopt stateful HBS schemes as defined in SP 800-208 immediately for all software and firmware code signing, with a requirement to support them by 2025. SP 800-208 requires that all stateful HBS key generation and signature algorithms be implemented within a FIPS 140 certified HSM with level 3 physical security.  Furthermore, the HSM “shall not allow for the export of private keying material.” This is intended to ensure that the state of the OTS signature keys is always enforced and keys are never reused, which would introduce cryptologic vulnerabilities into the signature scheme. Attend this webcast to learn about Thales TCT’s SP800-208 Compliant Code Signing S...

Continue →

On Demand Webcasts

ImageTitleSummaryLink
CTO Sessions: Quantum Resistant Security

Quantum computing’s impact is likely to be large—the potential computational power could render today’s encryption …

CTO Sessions Webcast: Word on the Street – 2024’s Top Tech Trends

Buzzword tracking is overwhelming. From AI to Quantum, it can be challenging for federal agencies …

CTO Sessions On Demand Webcast: Everything You Need to Know About Phishing-Resistant MFA

Without secure, enterprise-managed identity systems, adversaries can take over user accounts and gain a foothold …

CTO Sessions Webcast: A Guide to BYOK and HYOK for AWS, Azure, Google, Oracle and More

Cloud Security Alliance best practices require that keys be stored and managed outside of the …

CTO Sessions Webcast On Demand: AI & Cybersecurity

This CTO Sessions Webcast is all about the elephant in the room—Artificial Intelligence! Rather than …

CTO Sessions Webcast On Demand: Network Encryption Boot Camp – A Guide to Network Encryption from the Core to the Cloud to the Edge

High speed networks are the critical foundation that supports many of an agency’s most vital …

CTO Sessions Webcast On Demand: HSM Boot Camp – A Guide to HSM Deployments from the Core to the Cloud to the Edge

Thales TCT’s Luna T-Series Hardware Security Modules (HSMs) can be deployed either in the cloud …

CTO Sessions Webcast On Demand: Deliver Secure Hyper-Converged Infrastructure Solutions

With the growing number of digital transformation initiatives, hyper-converged infrastructure (HCI) has emerged as a …

CTO Sessions Webcast On Demand: Zero Trust – Beyond the Buzzword

Zero Trust is not just another buzzword in a never-ending list of tech trends. The …

CTO Sessions Webcast On Demand: Building a Root of Trust in How to Secure the Most Sensitive Data

Watch a replay of this webinar to learn: Secure critical data and digital identities Support …

CTO Sessions Webcast On Demand: Top 10 Reasons to Protect Your Agency with CipherTrust Data Security Platform

In this installment of Thales TCT’s CTO Sessions Webcast Series, our Deputy CTO shared the …

CTO Sessions Webcast On Demand: Taking Control of 2023’s Top Tech Trends

On the first installment of Thales TCT’s CTO Sessions Webcast Series for 2023, Thales TCT’s …

CTO Sessions On Demand: Protecting Your Data in Their Cloud

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud …

CTO Sessions On Demand: Are You Quantum Ready?

Despite large-scale quantum computing being several years away from being a practical reality, federal government …

CTO Sessions On Demand: Data Protection at the Edge

Core computing functionality, commonly found in data centers and in the cloud, is also being …

On Demand Webinar: Rapid Protection for Teradata Database and Big Data Environments

Teradata databases and big data analytics enable agencies to leverage information to fuel improved decisions, …

On Demand Webinar: No-Excuse Defenses Against Supply Chain Attacks

Files from the web are network assassins. Here are no-excuse defenses. As of 2018, supply …

On Demand Webinar: Best Practices for Data Visibility

To recap, during this webinar attendees learned how to develop a data classification strategy that enables …

On Demand Webinar: Best Practices for Cloud Data Protection

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud …

On Demand Webinar – Intelligence Community: Cyber Security is National Security

In January, the National Security Agency issued its first Cybersecurity Year in Review, detailing the …

On Demand Webinar: The Key Pillars for Protecting Sensitive Data

During this webinar, attendees learned how to develop a three-point strategy for protecting sensitive data …

On Demand Webinar: Fireside Chat: Data Protection for Multi-Domain Operations

The U.S. Military generates data at unprecedented rates, all the time, and in various locations …

On Demand Webinar: Shifting the Mindset from “Breach Prevention” to “Acceptance”

During this webinar, we discussed what agencies need to do before their networks are compromised. …

On Demand Webinar: Building a Root of Trust to Secure the Most Sensitive Data

Government agencies’ digital transformation has vastly increased the complexity of security. Technologies such as cloud …

On Demand Webinar: Complementing Splunk: Balancing Big Data Benefits & Big Risks

Federal agencies require a simple way to correlate all security-relevant data so they can manage …

On Demand Webinar: How To Issue Hardware-Based Identity Credentials To Software Robots

During this webinar, attendees learned how Thales Trusted Cyber Technologies’ Luna Credential System introduces a new approach …

On Demand Master Class: Zero Trust Beyond the Buzzword

Watch an on demand recording of Thales TCT Deputy CTO Gina Scinta’s presentation from the …

CTO Sessions On Demand: Securing the Convergence of HPC and AI in the Enterprise

High-performance computing (HPC) has long expanded from research labs to commercial use. Computational modeling and …

On Demand Webinar: Getting to Compliance with the National Security Memo on Cybersecurity

On January 19, 2022, the White House issued National Security Memorandum 8 (NSM) to improve …

CTO Sessions On Demand: Best Practices for Data in Transit Encryption

High speed networks are the critical foundation that supports many of an agency’s most vital …

CTO Sessions On Demand: Preventing Ransomware in Microsoft 365 Environments

View this on-demand recording to learn how federal agencies can ensure that their data is properly …