Lessons in Resilience from DORA
Thales Security Sessions
by Mark Hughes/Romain Deslaurieux
4d ago
Understanding ICT and DORA, with Mark Hughes, Global Managing Partner, Cybersecurity Services, IBM Consulting, and Romain Deslorieux, Strategic Partners Director, Global System Integrators at Thales To learn more, visit: https://cpl.thalesgroup.com/compliance/emea/data-security-compliance-dora-resilience-act ..read more
Visit website
What is Your Formula for Digital Trust?
Thales Security Sessions
by James Leaton Gray/Haider Iqbal
2M ago
A discussion of the findings in the Thales 2024 Digital Trust Index, and what this all means for your company and your customers. The 2024 Digital Trust Index is a survey gauging the level of trust consumers have with digital services and their personal data across major industries. Trust is not a monolithic construct. This is why it takes brands months and sometimes years to earn the trust of their customers. These customers in turn then become brand advocates. First impressions certainly count, but it is a combination of multiple good interactions that lead to a sense of trust in the minds o ..read more
Visit website
The Predictions Episode 2024
Thales Security Sessions
by Thales Group
4M ago
Thoughts and observations on the new year from some of last year’s podcast guests. We had a great year talking with experts on a range of security topics, so who better to turn to for prognostications for the new year? Here’s a collection of predictions from some of our guests. Don't forget you can go back and listen to any of our episodes at https://cpl.thalesgroup.com/podcasts/data-security-sessions ..read more
Visit website
Self-Sovereign Identities - Whose Life is it Anyway?
Thales Security Sessions
by Paul Fisher/Ward Duchamps
5M ago
Redefining and claiming your digital life with Paul Fisher of KuppingerCole and Ward Duchamps from Thales. The practice of using different passwords for the hundreds or thousands of online locations we visit has grown quite out of control and long ago fell short of being a practical or secure process. In this episode, we discuss the practicality of Self-Sovereign Identities, in which a person’s individual, identifiable self is based on attributes and behaviours rather than centrally stored data. Is this the future of secure identity online? And if so, who gets to run it ..read more
Visit website
A Thousand Things About Yourself
Thales Security Sessions
by Justin Sherman
6M ago
A discussion about what people and organizations don’t know – and should know about data brokers, with Justin Sherman of Global Cyber Strategies. A discussion about what people and organizations don’t know – and should know about data brokers, with Justin Sherman of Global Cyber Strategies. The data about ourselves is willingly submitted to organizations every time we make a purchase, open an account, or simply move around, online and in-person. Where does it go? Who owns it? What do they do with it? Steve Prentice talks with Justin Sherman, who thinks we should be more proactive about underst ..read more
Visit website
The Vendor of My Vendor: the importance of finding the right relationships for cloud
Thales Security Sessions
by Steve Prentice/Sean Heide/Chris Holland
11M ago
A discussion with Sean Heide from Cloud Security Alliance and Chris Holland, VP Cloud Services at Thales Cloud continues to evolve, but so too do the human organizations that depend on it. Companies expand into new territories, they buy other companies, or get bought, and the vendors with whom they drew up contracts also change, evolve, and farm out work. It’s a landscape of shifting sands where you can never be quite sure of who you’re really dealing with. Host Steve Prentice invites Sean Heide from Cloud Security Alliance and Chris Holland, VP Cloud Services Thales, to weigh in ..read more
Visit website
The Eternal Sunshine of the Criminal Mind
Thales Security Sessions
by Steve Prentice/Amanda Widdowson/Freaky Clown
1y ago
What makes the criminal mind so good at thinking outside the box, and how we can develop those skills inside security professionals? When you are a hammer, everything looks like a nail. Cybercriminals continue to succeed in discovering flaws and weaknesses in every connected technology. From zero days to SQL injection, what most people see as technology designed to perform a specific task, they see as a door, a window, or even a simple crack through which they can gain access. On this episode, host Steve Prentice talks with Amanda Widdowson, Head of Human Factors Capability at Thales UK, and F ..read more
Visit website
Season 3, Episode 1: The Rise of the Sovereign Cloud
Thales Security Sessions
by Thales Group
1y ago
A discussion with Nellie Porter, head of product, Google Cloud Confidential Computing, and Todd Moore, Vice President of encryption products at Thales An increasing number of countries are adopting laws and regulations designed to protect the privacy of citizens by defining how data can be securely collected, stored, and used. As a result, many businesses and organizations are evaluating how to comply with the changing geo-political landscape, including the increased concern about the sovereignty of data, workloads and infrastructure in the cloud. The rise of “digital sovereignty” is the resul ..read more
Visit website
The Human Element of Cybersecurity – do we have a skills gap?
Thales Security Sessions
by Thales Group
1y ago
We often hear talk of a “skills gap” in the IT Security World. But is that really the case, and if so, what can the industry do about it? Over the past few years, the definition of the chief information security officer (CISO) has changed as business environments have evolved. With digital transformation, cloud and hybrid working taking an increasingly dominant role in the day-to-day operations of the typical organization, the CISO has a unique and highly valuable role to play. However, a shortage of qualified IT workers at a time of high demand has put many leaders in a difficult situation ..read more
Visit website
Exploring Consumer Trust in a Digital World
Thales Security Sessions
by Thales Group
1y ago
Our insatiable appetite for digital services has no sign of slowing down. But as we consume more and our digital footprints grows, we are presented with a mounting challenge – cyber security. Exploring Consumer Trust in a Digital World Our insatiable appetite for digital services has no sign of slowing down. But as we consume more and our digital footprints grows, we are presented with a mounting challenge – cyber security. In fact, today data breaches are so endemic that it could be argued that consumers are becoming numb to the effects – they change their passwords, get a few reassuring emai ..read more
Visit website

Follow Thales Security Sessions on FeedSpot

Continue with Google
Continue with Apple
OR