banner

Thales Blog

Five Hot Security and Privacy Topics You Need To Understand in 2022

January 27, 2022

Chad Couser Chad Couser | Director Marketing Communications Thales More About This Author >

Throughout 2021 Thales hosted several webinars whose purpose was to raise awareness on trending topics around cybersecurity and privacy. Panelists included security professionals from many well-established and successful organizations as well as consultants and industry leaders. Our guests provided insights and best practices around a multitude of topics.

Although all webinars were a success, some stood out of the competition for various reasons. Here’s a recap of the most popular webinars.

Schrems II and the Security of International Data Flows

In July of 2020 the Court of Justice of the European Union issued the Schrems II decision, which invalidated the EU-U.S. Privacy Shield Framework. Privacy Shield was the framework used by more than 5,000 registered U.S. companies to conduct transatlantic data flows in compliance with the GDPR.

Neira Jones moderated a very interesting webinar to discuss the implications of the Schrems II ruling and what organizations can do to prevent unlawful cases of data transfers. The webinar panelists were Rob Elliss, VP EMEA at Thales, Enza Iannopollo, Senior Analyst at Forrester, and Arjen Slim, Managing Director, Security at Accenture.

The webinar provides valuable insights and recommendations to navigate the evolving data protection regulatory environment. Watch Schrems II and the Security of International Data Flows webinar, on-demand for viewing at your own convenience.

Protecting Cross-Border Data Flows with Quantum-Safe Security

Stan Mesceda, Senior Product Manager at Thales and Eric Hay, Director of Field Engineering at Quantum Xchange, came together to discuss how to create a dynamic, crypto-agile infrastructure for future-proofing the security of your data and communications networks.

Multinational organizations face difficult and unique compliance challenges to successfully meet the ongoing waves of government regulations for data privacy and security. These privacy requirements have many companies looking into more advanced encryption methods – like post-quantum crypto and Quantum Key Distribution (QKD) – to ensure data transmissions across the Internet or network are protected, secure, and compliant with local laws and regulations now and for years to come.

You can watch this insightful webinar on Protecting Cross-Border Data Flows with Quantum-Safe Security.

The Cloud Trust Paradox: Keeping Control of Data & Encryption Keys in the Cloud

Google Cloud’s External Key Manager (EKM) helps organizations achieve robust control over how and when their encryption keys are used to protect and access the users’ encrypted data. Many organizations hosting sensitive data or looking to migrate workloads to the cloud, require additional control and ownership over their encryption keys to meet compliance and security requirements. When it comes to encryption keys, security best practice is all about control and separation between encrypted data at rest and the keys.

Listen to Anton Chuvakin, Security Solution Strategy at Google, and Paul Hampton, Senior Product Manager at Thales, discuss the Cloud Trust Paradox by exploring use cases where keeping the encryption keys off the cloud may be truly necessary.

Beyond Zero Trust: The Future of Continuous and Granular Access

The concept of Zero Trust security was coined more than a decade ago at Forrester with a general premise that all network traffic should be considered untrusted. Over the years we have seen refinements to this idea by Google in their BeyondCorp publication, Gartner in their definition of CARTA framework, and by Forrester again in the Zero Trust eXtended report that explained Zero Trust in the light of current cybersecurity challenges. One of these challenges is fine grained and continuous access to resources and data.

This on-demand webinar reviews the history of Zero Trust and then explores how Zero Trust applies to continuous authentication and access. Asad Ali, Senior Technologist, CTO Office at Thales, then looks at Continuous Access Evaluation Protocol (CAEP) technology that changes how we define and implement Zero Trust in web applications.

Creating Trusted Collaboration with Google Workspace and Thales

The migration of workloads and applications to the cloud is often enabled by leveraging cloud-based collaboration suites such as Google Workspace. While offering benefits in terms of easy, anywhere access from any device, recent attacks within cloud environments highlight the need to be proactive about securing these services.

In this Q&A session, Nikhil Sinha, Product Manager for Google Cloud Security at Google, and Danna Bethlehem, Director of Product Marketing from Thales, discuss best practices for protecting Google Workspace and how organizations can build on a ‘shared security’ model for protecting sensitive data in the cloud.

Look out for even more insightful webinars we have planned for 2022 covering emerging and evolving issues around security and privacy. Stay tuned!