Thales Security Sessions

By: Thales Group
  • Summary

  • Welcome to the Thales Security Sessions podcast, hosted by Steve Prentice, an accomplished writer and speaker focusing primarily on the interaction of people and technology in the workplace. This podcast series explores the technologies, people, and processes behind information security. We’ll delve into topics like data security, remote access and digital transformation, as well as the people and technologies that make it all work behind the scenes. We’ll speak to Thales and industry experts to bring you fresh perspectives on how to navigate the world of information security.
    Show More Show Less
Episodes
  • The Predictions Episode 2025
    Jan 2 2025
    What does 2025 have in store for us? If it is anything like 2024, it will be interesting times indeed. In this episode, host Steve Prentice has a virtual fireside chat with David Holmes, CTO for Application Security, Imperva, a Thales company. The two of them chat about Salt Typhoon, ransomware, AI as a threat surface, quantum computing, the software supply chain, the importance of having a breach coach, and why there are so few young people in cybersecurity. It’s a can’t miss summary of the year just past, and a peek into what lies ahead.
    Show More Show Less
    38 mins
  • The Three Dimensions of Data Sovereignty
    Nov 22 2024
    Data sovereignty has three dimensions: data residency, access to data, and stewardship of data. Besides deciding where to store data, it is essential to determine who can have access to it - which becomes more crucial as we consider priorities such as access to cloud across national borders, as well as using the data for training AI models. Furthermore, many organizations do not have complete knowledge of where their data is stored, and others do not have complete control of the encryption keys that keep their cloud data safe. The deeper we get into a data dependent ecosystem, the more complex the issues of data sovereignty, access and security become.
    Show More Show Less
    28 mins
  • Post Quantum Cryptography - Let’s Do the Math
    Oct 30 2024
    The quantum computing revolution is almost upon us, and this means a new world of cryptography, cybersecurity and, of course, cybercrime. Not all of us are aware of the magnitude of the change that needs to be made. It’s not like swapping out one component of a network for a newer bigger one. There are many small parts holding the cyber world together. Moving toward the age of post quantum cryptography and repositioning our existing data security infrastructure around it relies on timely adaptation and immediate action, with a budget to match. How ready are we? How ready are you to hear that when it comes to a quantum-based world, one plus one might no longer equal two?
    Show More Show Less
    31 mins

What listeners say about Thales Security Sessions

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.