Skip Navigation

The Cloud First initiative is now a reality—civilian and defense agencies are being asked to default to cloud-based solutions when possible. In order to facilitate the transition to the cloud, the Federal Government has implemented the government-wide Federal Risk and Authorization Management Program (FedRAMP) to provide a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

Download Now

Attendees of this webcast learned how to easily secure data in a virtual environment through encryption in order to:

  • Ensure compliance with regulations and security policies
  • Protect directory services and intellectual property
  • Secure data in disaster recovery sites

Download Now

Kirk Spring, President of Thales TCT, addresses the security challenges that federal agencies face when moving sensitive data to the cloud. He shares his insight into how data owners can ensure that their data is secure in any cloud environment by controlling their encryption and owning their encryption keys.


Kirk Spring, President and Board Member, Thales TCT, shares his insight with SIGNAL Media Editor in Chief Bob Ackerman about the hybrid cloud.


Securing data properly requires that customers own—and can prove that they own—their data, from inception to deletion. That means that customers—not their cloud provider—must own their encryption and encryption keys. Watch our video to learn more.


Cipher Summit 2019 Replay

Check out the on demand videos and presentations from the event. Download Now

This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.