Thales Security Sessions
-

The Future of Payments

Download it: MP3 | AAC | OGG | OPUS

The payments ecosystem has evolved tremendously over the past few years, raising the question: where will digital payment technologies take us in the future, and how does this affect retailers and financial services organizations?
In this episode, Neira Jones is joined by Scott Abrahams, Senior Vice President Business Development & FinTech, United Kingdom and Ireland, International Markets at Mastercard and Simon Keates, Head of Strategy and Payment Security at Thales to discuss the major challenges retailers and other financial services organizations are facing.

The 2021 Thales Cloud Security Study

Download it: MP3 | AAC | OGG | OPUS

The COVID-19 pandemic has accelerated what has been a long-term broad adoption of cloud environments, including multicloud and hybrid deployments. Organizations need to extend and adapt their capabilities to take more control of their security efficiently and effectively in these new, dispersed environments, according to the 2021 Thales Cloud Security Study. The study is comprised of analysis from 451 Research, part of S&P Global Market Intelligence, and based on a survey commissioned by Thales of more than 2,600 security professionals worldwide.
In this episode, Sol Cates, Principal Technologist at Thales, and regular host Neira Jones break down some of the key findings and statistics in the report.
Download the full 2021 Thales Cloud Security Study Report.

Bonus Episode: Understanding the Data Process with a Security Platform

Download it: MP3 | AAC | OGG | OPUS

Mapping data flow is a fundamental part of the enterprise data process. There's no way an organization can understand their data cycle without knowing where their data is located. Despite this, findings from the 2021 Data Threat Report by Thales reveals that only 24% of companies have complete knowledge of where their data is stored. With such strong ties between the two data operations, the numbers just aren't adding up - why?
How to Approach the Enterprise Data Process
In this podcast, Dr Eric Cole, Founder and CEO of Secure Anchor Consulting, and Todd Moore, Global Head of Encryption Solutions at Thales, look at the relationship between data flows, data discovery, automation, and understanding the data process. In his exploration, Todd draws on Thales's report on data security in the era of accelerated cloud transformation and remote work, alongside the company's stance on 'discover, protect and control' based on their CipherTrust Data Security Platform. The question of how organizations should approach the data process and bridge gaps in their knowledge remains the overarching focal point of the conversation.

Evolution of Cloud Security: From Shared Responsibility to Shared Fate

Download it: MP3 | AAC | OGG | OPUS

The rapid adoption of digital technologies and remote or hybrid working is now an accepted part of society. The pandemic forced companies to adapt swiftly and many have turned to the cloud to help their digital acceleration. According to McKinsey cloud adoption has been accelerated by three years compared to pre-pandemic adoption rates. Gartner is also estimating that spending on public cloud services will exceed $480 billion next year.
In this episode, Sebastian Cano of Thales and Sunil Potti of Google join host Neira Jones to discuss the key challenges of more workloads and data being moved to the cloud in our new hybrid world, and how Thales and Google Cloud are working together to enable customers to fulfill their part of the shared responsibility model for cloud security.

The 2021 Thales Access Management Index

Download it: MP3 | AAC | OGG | OPUS

The shift to remote working and the acceleration of cloud-based services have put a strain on identity and access management infrastructure. As remote access becomes the norm rather than the exception, many organisations need to evolve their security approaches in a world where there is no longer a defined perimeter, according to the 2021 Thales Access Management Index.
In this first Thales Security Sessions episode of series 2, François Lasnier, VP Authentication and Access Management Products at Thales, joins regular host, Neira Jones, to talk through the key findings of the report. They will discuss how COVID has introduced new security concerns around remote working, and explore some of the key challenges of trusted access in a cloud-first world.
Download the full 2021 Thales Access Management Index.
https://cpl.thalesgroup.com/access-management-index

Building a Trusted World for Crypto Payments

Download it: MP3 | AAC | OGG | OPUS

Bitcoin and other cryptocurrencies have exploded in value—making them an ever-more attractive target for scammers and hackers. So is cryptocurrency secure? How can businesses and individuals make sure they protect their digital investments? And what are the key security measures that should be implemented to secure the cryptocurrency backend? In this episode, we’ll be exploring the current cryptocurrency landscape, and how we can make a trusted world for crypto payments.
Joining our regular host Neira Jones for this episode, we have Nitin Gaur, Director, IBM Financial Sciences and Digital Assets and Krishna Ksheerabdhi, VP Product Marketing, Thales.

Bonus Episode - Adopting the Shared Security Management Model

Download it: MP3 | AAC | OGG | OPUS

Shared security, also known as shared responsibility, is a cloud security management model that describes the distribution of enterprise data security management and accountability between a company and its cloud service provider(s). The framework essentially enables improved productivity and unparalleled agility, so why isn't every organization adopting it?
In this episode, introduced by Neira Jones, Dr. Eric Cole, Founder and CEO of Secure Anchor Consulting,, explores adopting shared security as best practice. Dr. Eric speaks with Chris Martin, IAM Presales Solution Architect for EMEA at Thales. The podcast delves into the main areas of organizational risk concerning cloud migration and vendor native decisions before shedding light on the limitations of a single service provider. The guests then discuss the shared security model - its benefits and the implementation process. Final thoughts centre on what organizations need to understand about control over all users and effectively build a best practice shared security strategy

You can also learn more about this topic in our new whitepaper, Owning Your Own Access Security.

Dr Eric Cole
Dr. Eric Cole is an industry-recognized expert with over 20 years of hands-on experience, founder and an executive leader at Secure Anchor Consulting where he provides leading-edge cybersecurity consulting services, expert witness work, and R&D initiatives to advance our field.
Dr. Cole has experience in information technology with a focus on helping customers focus on the right areas of security by building out a dynamic defense. Dr. Cole has a master's degree in computer science from NYIT and a doctorate from Pace University with a concentration in information security. He served as CTO of McAfee and Chief Scientist for Lockheed Martin. Dr. Cole is the author of several books, including Advanced Persistent Threat, Hackers Beware, Hiding in Plain Sight, Network Security Bible 2nd Edition, and Insider Threat.
You can connect with Dr Cole on LinkedIn.
Chris Martin
Chris Martin is the lead EMEA Pre-Sales Solution Architect at Thales. With over 20 years expertise in the IAM space, Chris’ extensive background includes Enterprise SSO, PAM, IDaaS and Identity Governance that enables him to bring a holistic approach to enterprise IAM.

Within Thales, Chris works alongside our customers to help them define, develop and execute their IAM strategies, either aligning Thales solutions to an existing IAM architecture or building from the ground up. Prior to joining Thales, Chris honed his IAM skills with Sentillion, Centrify, OneLogin, Omada and MicroFocus.

You can connect with Chris on LinkedIn.

Bonus Episode - What Encryption Means in Quantum Resistant Networks

Download it: MP3 | AAC | OGG | OPUS

Network security encompasses the security tools, policies, and techniques used to monitor, prevent, and respond to unauthorised network access. Having such a broad definition and, therefore, challenging approach, it is important that businesses know what key areas to focus on and what enterprise tech solutions they should look to to ensure appropriate, airtight protection.
Forming part of an exclusive three-part cybersecurity podcast series featuring Thales and host Dr. Eric Cole, Founder and CEO of Secure Anchor Consulting, this episode looks at data in motion and future-proofing from a quantum perspective. Dr. Eric speaks with Julian Fay, CTO at Senetas, a global partner of Thales. The pair explore the primary concerns of network security within the realm of data in motion with the help of key findings from our latest global survey on the encryption of public/private networks.

You can also learn more about this topic in our new whitepaper, Security Weaknesses in Data in Motion Identified in Cybersecurity Survey.

Quantum Computing

Download it: MP3 | AAC | OGG | OPUS

The threat and arrival of quantum computers is ever-present with physics breakthroughs, more Qubits, quantum “supremacy”, and cloud service providers designing quantum computers, but what does it really mean to data protection? Is it really the end of encryption as we know it?

In Episode 11 of the Thales Security Sessions, host Neira Jones is joined by Mike Brown, CTO at Isara, and Michael Gardiner, Solution Architect at Thales, to discuss the ways in which quantum computing will change the technology landscape, and how organizations can deal with the potential security threats that quantum brings.

About this podcast

Welcome to the Thales Security Sessions podcast, hosted by Steve Prentice, an accomplished writer and speaker focusing primarily on the interaction of people and technology in the workplace.
This podcast series explores the technologies, people, and processes behind information security. We’ll delve into topics like data security, remote access and digital transformation, as well as the people and technologies that make it all work behind the scenes. We’ll speak to Thales and industry experts to bring you fresh perspectives on how to navigate the world of information security.

by Thales Group

Subscribe

Follow us