Swing by the Thales booth to see our solutions in action, connect with our experts, and discover how we can elevate your security strategy. Our security experts are ready to chat and demo our latest innovations and insight into Application Security, Data Security and Identity & Access Management.
We’ll be diving into the hottest topics including HSM, DSPM, AI and solutions to secure cloud, on premise, and hybrid environments.
Plus, be entered to win an exciting giveaway!
Use our exclusive code SEC32EDC at registration to save.
Secure your spot for an exclusive demo or a one-on-one meeting with our senior leaders and security experts.
AI is moving from experimentation to full-scale enterprise transformation, with 59% of organizations already in advanced deployment stages and 11% using AI to reinvent core business processes. But as adoption accelerates, so do the risks. AI introduces an expanded attack surface—from prompt injection and model poisoning to sensitive-data leakage, excessive agency, and compromised vector databases—reflected in OWASP’s 2025 Top 10 for LLMs and in a surge in real-world incidents, including data-poisoning exploits, leaked API keys, and exposed LLM conversation logs.
Speaker: Todd Moore, VP, Encryption Products, Thales
This session presents a practical, data-centric blueprint for securing AI in production, where the stakes are highest. Drawing on the Thales AI Security Fabric, we demonstrate how enterprises can safeguard sensitive data throughout the RAG lifecycle, enforce with AI application firewalls, prevent malicious prompts, protect vector stores, and maintain compliance with frameworks such as GDPR and HIPAA.
Gartner, Market Guide for User Authentication, James Hoover, Nayara Sangiorgio, Yemi Davies, 11 August 2025. Gartner, Magic Quadrant for Access Management, Brian Guthrie, Nathan Harris, Yemi Davies, Steve Wessels, 11 November 2025. Gartner, How to Improve Data Security With Cloud Key Management, Brian Lowans, Sarah Almond, 7 August 2024.
Gartner does not endorse any company, vendor, product or service depicted in its publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner publications consist of the opinions of Gartner’s business and technology insights organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this publication, including any warranties of merchantability or fitness for a particular purpose. Gartner and Magic Quadrant are trademarks of Gartner, Inc., and/or its affiliates.