Welcome to the Thales Security Sessions podcast, hosted by Neira Jones, business advisor on all things fintech, regtech, cybercrime, information security, regulations and digital innovation. This podcast series explores the technologies, people, and processes behind information security. We’ll delve into topics like data security, remote access and digital transformation, as well as the people and technologies that make it all work behind the scenes. We’ll speak to Thales and industry experts to bring you fresh perspectives on how to navigate the world of cloud security.
A cyberattack is a period of enormous stress for an organization. Most companies lack the experience and the expertise to handle such an event effectively, which can lead to further damage to assets, brand, and reputation. This is why it is so important to have a breach coach at the top of your list of emergency contacts, should the worst happen. In this episode, hear from an actual breach coach, who will tell us why this person is so important to a company's future.
Software monetization isn't just about selling more subscriptions—it's about survival. In today's fast-moving digital economy, companies that fail to capture, protect, and maximize the value of their software risk falling behind, losing revenue, and even compromising security. From industrial automation to cutting-edge AI in healthcare, software isn't just a product—it's the backbone of modern business strategy. In this episode, we're joined by Dale Hopkinson, an expert in software monetization, to uncover why this strategy is essential for growth, resilience, and competitive advantage. If you think monetization is just about pricing models, think again—because without the right strategy, you might be leaving your company's future on the table.
Cybersecurity is at a crossroads, and so are the women in it. While progress is visible, the numbers tell a different story—women's representation in cyber is stagnating, and in some cases, even declining. Why is that happening? What barriers still stand in the way, and what can we do about it? In this episode, we sit down with two powerhouse women in the field—Jane Frankland and Kate Barecchia—to uncover the real challenges, the hard truths, and the path forward. If you think the future of cybersecurity can thrive without women leading the charge, think again.
What happens when a 10-year NFL veteran swaps the gridiron for the world of cybersecurity? In this episode, we sit down with John Fina, a former professional football player who's made a remarkable transition from defending end zones to defending corporate networks. John shares how lessons from the field—like strategic thinking, relentless diligence, and studying opponents inside and out—gave him a unique edge in the fight against today's cyber threats. Through captivating stories from both his NFL career and his cybersecurity work, John reveals surprising parallels between the high-stakes worlds of pro sports and cybersecurity. Whether you're a cybersecurity professional looking for fresh perspectives or a corporate leader seeking insights into building a resilient team, this episode promises to challenge the way you think about defense, strategy, and staying ahead of your adversaries.
What does 2025 have in store for us? If it is anything like 2024, it will be interesting times indeed. In this episode, host Steve Prentice has a virtual fireside chat with David Holmes, CTO for Application Security, Imperva, a Thales company. The two of them chat about Salt Typhoon, ransomware, AI as a threat surface, quantum computing, the software supply chain, the importance of having a breach coach, and why there are so few young people in cybersecurity. It's a can't miss summary of the year just past, and a peek into what lies ahead.
Data sovereignty has three dimensions: data residency, access to data, and stewardship of data. Besides deciding where to store data, it is essential to determine who can have access to it - which becomes more crucial as we consider priorities such as access to cloud across national borders, as well as using the data for training AI models. Furthermore, many organizations do not have complete knowledge of where their data is stored, and others do not have complete control of the encryption keys that keep their cloud data safe. The deeper we get into a data dependent ecosystem, the more complex the issues of data sovereignty, access and security become.
The quantum computing revolution is almost upon us, and this means a new world of cryptography, cybersecurity and, of course, cybercrime. Not all of us are aware of the magnitude of the change that needs to be made. It's not like swapping out one component of a network for a newer bigger one. There are many small parts holding the cyber world together. Moving toward the age of post quantum cryptography and repositioning our existing data security infrastructure around it relies on timely adaptation and immediate action, with a budget to match. How ready are we? How ready are you to hear that when it comes to a quantum-based world, one plus one might no longer equal two?
Passkeys are a groundbreaking technology that leaves traditional passwords in the dust. They are designed to be resistant to phishing attacks thanks to their relationship to specific websites or services, and they significantly reduce the risk of credential theft. As organizations struggle with the noise of cybersecurity issues such as ransomware and social engineering, the widescale adoption of passkeys seems to be a little drowned out. Which is a shame, since it really is a solution to many of our security problems. This episode looks a little more closely at where we are with passkey technology. Episode: S4E5
Cloud technology may be efficient and vital to the global economy, but it comes at a substantial cost in terms of the power to make it run. This will only increase as more sophisticated forms of computing such as AI become normalized. But there are solutions for making this elastic and ubiquitous technology more ecologically responsible, ranging from using innovative cooling techniques through to shared responsibility and even Carbon FinOps. Our guests from AWS and Thales will make it all clear.
Information and communication technology (ICT) risk management is a vital part of daily practice for organizations in any industry. For those in the EU financial sector, a new set of regulations is being put in place in the form of the Digital Operational Resilience Act aka DORA. But it doesn't just affect European financial companies – it affects anyone in the world that does business with them, as well as being a good lesson in ICT overall.
In discussing the recent acquisition of Imperva into the Thales fold, Nanhi Singh, VP Application Security and Customer Success at Imperva, and Todd Moore, Global Head of Data Security Products at Thales, dive deep into the many areas of security that will be positively affected, including APIs, bots and of course, generative AI. This is not a self-congratulation conversation: it's a roadmap for heightened data security, with host Steve Prentice.
Guests: James Leaton Gray, Director at The Privacy Practice, a firm that specializes in privacy and data protection and Haider Iqbal Manager of Product Marketing for Thales Identity and Access Management business. Trust is vital to the relationship between companies and their customers, especially when it comes to protecting data. But companies have been traditionally confronted by a resistance on the part of consumers to adopt safe online practices like MFA. But is this changing now. James and Haider join host Steve Prentice for a lively discussion on the nature of trust, security technology and the findings within the Digital Trust Index report. They present some intriguing new strategies for companies looking to keep their customers and their operations safe.
We had a great year talking with experts on a range of security topics, so who better to turn to for prognostications for the new year? Here's a collection of predictions from some of our guests.
The practice of using different passwords for the hundreds or thousands of online locations we visit has grown quite out of control and long ago fell short of being a practical or secure process. In this episode, we discuss the practicality of Self-Sovereign Identities, in which a person's individual, identifiable self is based on attributes and behaviours rather than centrally stored data. Is this the future of secure identity online? And if so, who gets to run it?
The data about ourselves is willingly submitted to organizations every time we make a purchase, open an account, or simply move around, online and in-person. Where does it go? Who owns it? What do they do with it? Steve Prentice talks with Justin Sherman, who thinks we should be more proactive about understanding the roles data brokers play in our lives and our futures.
The concepts behind Diversity, Equity, and Inclusion have been practiced by some organizations in the past, but in this new era where the border lines between work and life are becoming increasingly blurred, and where technologies are helping people contribute in ways never seen before, it's a good time to reassess what DEI is and how central it is to an organization. Dwan Jones of ISC2 brings her wisdom, some actionable tips, and a great role model organization to follow.
Is there such a thing as a quantum computing cryptopocalypse? Will we see the end of current security practices within the next few years, and what does this mean for the data that organizations would like to keep safe for longer than that? Nemertes CEO Johna Till Johnson and Bob Burns, Chief Product Security Officer at Thales, join host Steve Prentice to explain it all, and – of course – what you should do about it.
Cloud continues to evolve, but so too do the human organizations that depend on it. Companies expand into new territories, they buy other companies, or get bought, and the vendors with whom they drew up contracts also change, evolve, and farm out work. It's a landscape of shifting sands where you can never be quite sure of who you're really dealing with. Host Steve Prentice invites Sean Heide from Cloud Security Alliance and Chris Holland, VP Cloud Services Thales, to weigh in.
When you are a hammer, everything looks like a nail. Cybercriminals continue to succeed in discovering flaws and weaknesses in every connected technology. From zero days to SQL injection, what most people see as technology designed to perform a specific task, they see as a door, a window, or even a simple crack through which they can gain access. On this episode, host Steve Prentice talks with Amanda Widdowson, Head of Human Factors Capability at Thales UK, and Freaky Clown, the co-CEO and Co-Founder, Head of Ethical Hacking at Cygenta about what makes the criminal mind so good at thinking outside the box, and more importantly, how we can develop those skills inside security professionals, senior managers, and everyday people.
Companies and cloud providers around the world are tackling the thorny issue of digital sovereignty, seeking to protect their customer's data as it travels across physical borders, while simultaneously respecting the various data privacy laws already in place. But digital sovereignty is not just a matter of location. On this episode, host Steve Prentice talks with Nellie Porter, head of product, Google Cloud Confidential Computing, and Todd Moore, Vice President of encryption products at Thales about the challenges of transparency, the use of encryption, and the rise of AI as powerful influences on true digital sovereignty, and what this means to your data in the cloud and on-prem.
Over the past few years, the definition of the chief information security officer (CISO) has changed as business environments have evolved. With digital transformation, cloud and hybrid working taking an increasingly dominant role in the day-to-day operations of the typical organization, the CISO has a unique and highly valuable role to play. However, a shortage of qualified IT workers at a time of high demand has put many leaders in a difficult situation – is there a so called “skills gap”? Or does the industry have an “attitude gap”?
Today, data breaches are so endemic that it could be argued that consumers are becoming numb to the effects – they change their passwords, get a few reassuring emails from the company and more often than not nothing comes of it. Of course, businesses will feel the impact, and perhaps after repeated breaches consumers might start getting worried, but is the idea that a large data breach could seal an organisations fate too far fetched? Joining Neira Jones to discuss the Thales Consumer Trust Index in this episode are Philippe Vallée, Executive Vice-President, Digital Identity and Security at Thales and Professor Carsten Maple, Professor of Cyber Systems Engineering and Director for Cyber Security Research, at the University of Warwick.
For this episode, Kevin Williams, VP Americas Sales at Thales Cloud Protection & Licensing and Michael Bahar, Partner & Co-Lead of Global Cybersecurity and Data Privacy at Eversheds Sutherland, join Neira Jones to discuss the current cybersecurity, privacy and regulatory landscape in the Americas.
More digital has meant mean more cloud. The pandemic and the shift to hybrid working has prompted an acceleration in the adoption of cloud technologies by IT leaders worldwide, which looks set to continue for the foreseeable future. Previously, organizations have primarily looked at new application development and deployment for cloud, taking a ‘cloud first' approach. However many have now pivoted towards a ‘cloud now' approach.
In this episode, we discuss what we mean by cyber insurance, and why are we seeing more companies take out policies. We will also look at what types of threats are covered and how cyber insurance jurisdiction works across different regions. The experts joining, Neira Jones, for this episode are Danna Bethlehem, Product Marketing Director at Thales and Anthony Dagostino, CEO and Co-Founder, Converge.
In this episode we explore the typical style of ransomware attacks, look at who is carrying them out, and discuss some best practice protective strategies Joining our regular host, Neira Jones, for this episode are Paul Chichester, Director of Operations of the UK National Cyber Security Centre, and Bob Burns, Chief Product Security Officer at Thales.
Attacking OT systems presents a major threat not only to business disruption, but also to national economy and security. So how can we strengthen the security posture of critical infrastructure? Joining our regular host, Neira Jones, for this episode are François Lasnier, VP Authentication and Access Management Products at Thales and Sid Shaffer, VP and Chief Delivery Officer at ITEGRITI.
In this bonus podcast episode, Rob Elliss, Vice President of Sales, EMEA at Thales Cloud Security joins Neil Hughes to discuss the rise of the sovereign cloud. They discuss how data sovereignty is not just about localization; it is ensuring that nation-states can store their data in their own country and control access to it.
In this episode, Asaf Lerner, Director, Product Management at Thales Cloud Protection & Licensing and Uri Rivner, Founder & CEO, at Regutize join our host Neira Jones to answer the question – are our digital identities really safe?
In this episode, we discuss trends and predictions for 2022. Will we be seeing more of the same?
The payments ecosystem has evolved tremendously over the past few years, raising the question: where will digital payment technologies take us in the future, and how does this affect retailers and financial services organizations? In this episode, Neira Jones is joined by Scott Abrahams, Senior Vice President Business Development & FinTech, United Kingdom and Ireland, International Markets at Mastercard and Simon Keates, Head of Strategy and Payment Security at Thales to discuss the major challenges retailers and other financial services organizations are facing.
The COVID-19 pandemic has accelerated what has been a long-term broad adoption of cloud environments, including multicloud and hybrid deployments. Organizations need to extend and adapt their capabilities to take more control of their security efficiently and effectively in these new, dispersed environments, according to the 2021 Thales Cloud Security Study. The study is comprised of analysis from 451 Research, part of S&P Global Market Intelligence, and based on a survey commissioned by Thales of more than 2,600 security professionals worldwide. In this episode, Sol Cates, Principal Technologist at Thales, and regular host Neira Jones break down some of the key findings and statistics in the report. Download the full 2021 Thales Cloud Security Study Report.
Mapping data flow is a fundamental part of the enterprise data process. There's no way an organization can understand their data cycle without knowing where their data is located. Despite this, findings from the 2021 Data Threat Report by Thales reveals that only 24% of companies have complete knowledge of where their data is stored. With such strong ties between the two data operations, the numbers just aren't adding up - why? How to Approach the Enterprise Data Process In this podcast, Dr Eric Cole, Founder and CEO of Secure Anchor Consulting, and Todd Moore, Global Head of Encryption Solutions at Thales, look at the relationship between data flows, data discovery, automation, and understanding the data process. In his exploration, Todd draws on Thales's report on data security in the era of accelerated cloud transformation and remote work, alongside the company's stance on 'discover, protect and control' based on their CipherTrust Data Security Platform. The question of how organizations should approach the data process and bridge gaps in their knowledge remains the overarching focal point of the conversation.
The rapid adoption of digital technologies and remote or hybrid working is now an accepted part of society. The pandemic forced companies to adapt swiftly and many have turned to the cloud to help their digital acceleration. According to McKinsey cloud adoption has been accelerated by three years compared to pre-pandemic adoption rates. Gartner is also estimating that spending on public cloud services will exceed $480 billion next year. In this episode, Sebastian Cano of Thales and Sunil Potti of Google join host Neira Jones to discuss the key challenges of more workloads and data being moved to the cloud in our new hybrid world, and how Thales and Google Cloud are working together to enable customers to fulfill their part of the shared responsibility model for cloud security.
The shift to remote working and the acceleration of cloud-based services have put a strain on identity and access management infrastructure. As remote access becomes the norm rather than the exception, many organisations need to evolve their security approaches in a world where there is no longer a defined perimeter, according to the 2021 Thales Access Management Index. In this first Thales Security Sessions episode of series 2, François Lasnier, VP Authentication and Access Management Products at Thales, joins regular host, Neira Jones, to talk through the key findings of the report. They will discuss how COVID has introduced new security concerns around remote working, and explore some of the key challenges of trusted access in a cloud-first world. Download the full 2021 Thales Access Management Index. https://cpl.thalesgroup.com/access-management-index
Bitcoin and other cryptocurrencies have exploded in value—making them an ever-more attractive target for scammers and hackers. So is cryptocurrency secure? How can businesses and individuals make sure they protect their digital investments? And what are the key security measures that should be implemented to secure the cryptocurrency backend? In this episode, we'll be exploring the current cryptocurrency landscape, and how we can make a trusted world for crypto payments. Joining our regular host Neira Jones for this episode, we have Nitin Gaur, Director, IBM Financial Sciences and Digital Assets and Krishna Ksheerabdhi, VP Product Marketing, Thales.
Shared security, also known as shared responsibility, is a cloud security management model that describes the distribution of enterprise data security management and accountability between a company and its cloud service provider(s). The framework essentially enables improved productivity and unparalleled agility, so why isn't every organization adopting it? In this episode, introduced by Neira Jones, Dr. Eric Cole, Founder and CEO of Secure Anchor Consulting,, explores adopting shared security as best practice. Dr. Eric speaks with Chris Martin, IAM Presales Solution Architect for EMEA at Thales. The podcast delves into the main areas of organizational risk concerning cloud migration and vendor native decisions before shedding light on the limitations of a single service provider. The guests then discuss the shared security model - its benefits and the implementation process. Final thoughts centre on what organizations need to understand about control over all users and effectively build a best practice shared security strategy You can also learn more about this topic in our new whitepaper, Owning Your Own Access Security. Dr Eric Cole Dr. Eric Cole is an industry-recognized expert with over 20 years of hands-on experience, founder and an executive leader at Secure Anchor Consulting where he provides leading-edge cybersecurity consulting services, expert witness work, and R&D initiatives to advance our field. Dr. Cole has experience in information technology with a focus on helping customers focus on the right areas of security by building out a dynamic defense. Dr. Cole has a master's degree in computer science from NYIT and a doctorate from Pace University with a concentration in information security. He served as CTO of McAfee and Chief Scientist for Lockheed Martin. Dr. Cole is the author of several books, including Advanced Persistent Threat, Hackers Beware, Hiding in Plain Sight, Network Security Bible 2nd Edition, and Insider Threat. You can connect with Dr Cole on LinkedIn. Chris Martin Chris Martin is the lead EMEA Pre-Sales Solution Architect at Thales. With over 20 years expertise in the IAM space, Chris' extensive background includes Enterprise SSO, PAM, IDaaS and Identity Governance that enables him to bring a holistic approach to enterprise IAM. Within Thales, Chris works alongside our customers to help them define, develop and execute their IAM strategies, either aligning Thales solutions to an existing IAM architecture or building from the ground up. Prior to joining Thales, Chris honed his IAM skills with Sentillion, Centrify, OneLogin, Omada and MicroFocus. You can connect with Chris on LinkedIn.
Network security encompasses the security tools, policies, and techniques used to monitor, prevent, and respond to unauthorised network access. Having such a broad definition and, therefore, challenging approach, it is important that businesses know what key areas to focus on and what enterprise tech solutions they should look to to ensure appropriate, airtight protection. Forming part of an exclusive three-part cybersecurity podcast series featuring Thales and host Dr. Eric Cole, Founder and CEO of Secure Anchor Consulting, this episode looks at data in motion and future-proofing from a quantum perspective. Dr. Eric speaks with Julian Fay, CTO at Senetas, a global partner of Thales. The pair explore the primary concerns of network security within the realm of data in motion with the help of key findings from our latest global survey on the encryption of public/private networks. You can also learn more about this topic in our new whitepaper, Security Weaknesses in Data in Motion Identified in Cybersecurity Survey.
The threat and arrival of quantum computers is ever-present with physics breakthroughs, more Qubits, quantum “supremacy”, and cloud service providers designing quantum computers, but what does it really mean to data protection? Is it really the end of encryption as we know it? In Episode 11 of the Thales Security Sessions, host Neira Jones is joined by Mike Brown, CTO at Isara, and Michael Gardiner, Solution Architect at Thales, to discuss the ways in which quantum computing will change the technology landscape, and how organizations can deal with the potential security threats that quantum brings.
Organizations have only just begun discovering and benefiting from the opportunities provided by the Internet of Things. The ability to capture and analyze data from distributed connected devices offers the potential to optimize processes, create new revenue streams, and improve customer service. However, the IoT also exposes organizations to new security vulnerabilities introduced by increased network connectivity and devices that are not secured by design. And advanced attackers have demonstrated the ability to pivot to other systems by leveraging vulnerabilities in IoT devices. For this episode, host Neira Jones is joined by Ellen Boehm, VP, IoT Strategy and Operations at Keyfactor, and Paul Hampton, Senior Product Manager at Thales.
The shift to remote work and the acceleration of the shift to cloud-based infrastructure have profoundly impacted security teams. With the security risks and threats that these changes pose, most organizations have some work to do to improve their security posture, according to the new 2021 Thales Data Threat Report. Many organizations were unprepared for the unexpected security challenges they faced in 2020. In fact, according to the report only 20% of IT professionals said their security infrastructure was very prepared for the effects of the pandemic In this episode, Neira Jones is joined by Todd Moore, VP Encryption Products at Thales, to talk through the key findings of the report. They'll take a look back at the key trends seen in 2020 and the impacts of the pandemic that have carried over into 2021. Todd Moore Todd Moore is a respected cybersecurity professional, with over 28 years' experience in helping organizations protect their most sensitive data. In his role as Vice President of Encryption Solutions, Todd drives strategy for the company's data encryption portfolio – bringing together a set of well-known security brands (SafeNet, Vormetric and Thales eSecurity) together, into a single data protection business line that addresses existing and new customer needs. Todd joined Thales through a series of acquisitions from his prior roles; these predominantly entailed product leadership positions for both SafeNet and then Gemalto. He had already gained deep understanding of security challenges and technologies within the defence industry, having spent almost two decades with Harris Corporation. Over his career, Todd has a proven track record of developing business cases and market analysis for new security products and delivering them to market. He routinely develops strategies for new product development and execution, as well as negotiating strategic relationships and alliances. With a rich combination of technology, product and customer understanding, Todd has frequently offered insights and commentary to media on topics such as hybrid cloud, encryption and cryptographic agility. Recent media contributions include the likes of IoT Now, Finextra and BankInfo Security. You can connect with Todd on LinkedIn.
Passwordless and FIDO authentication is one of the hottest topics on the radar of identity and access management professionals. While passwordless authentication offers convenience for end users, not all methods offer the same level of protection. In this special bonus edition podcast, Garrett Bekker, principal cybersecurity analyst at from 451 Research and Asaf Lerner, Director of Product Management at Thales discuss the merits and various angles of moving to passwordless. Garrett Bekker Garrett Bekker is a Senior Research Analyst in the Information Security Channel at 451 Research, a part of S&P Global Market Intelligence. He has viewed enterprise security from a variety of perspectives over the past 20 years. Garrett started his career in security as an equity research analyst at several investment banking firms, most recently Merrill Lynch, where he covered information security, infrastructure software and networking companies. Garrett has also worked with early stage enterprise security vendors in sales and marketing role, including Bat Blue (acquired by OPAQ Networks). Prior to joining 451 Research, he also worked at a boutique investment bank focused on M&A and fundraising for small-to-midsized technology companies. Garrett has focused on a wide variety of subsectors within enterprise security during his career, and is now focusing primarily on identity and access management (IAM), cloud security and data security. Garrett is also a member of 451 Research's Center of Excellence for Quantum Technologies. You can connect with Garrett on LinkedIn. Asaf Lerner Asaf Lerner brings with him over 20 years of swimming in the high IAM seas, serving in different positions in the industry, from R&D management to PKI and Authentication Product Management and various market-facing roles. Located in Austin, TX, Asaf is in charge of the IAM solutions market for the Americas at Thales. Under his responsibility is creating market awareness of Thales’s IAM solutions, enhancing market partnerships, and creating healthy channel workstreams. You can connect with Asaf on LinkedIn.
5G connectivity promises to break traditional paradigms of data delivery by providing network connectivity virtually everywhere. To accommodate this new paradigm in diverse data delivery, the building out of 5G infrastructures is underway. It is expected that in two years’ time 5G will reach 25 billion connected devices globally and this number will triple to 75 Billion by 2025. For enterprises and subscribers, it will enable exciting new low latency, high performance and reliable connectivity that will create new business opportunities. For mobile network operators it will unlock significant new revenue-generating opportunities. 5G poised to change how digital technology-based solutions delivered and consumed across different industry verticals by connecting people and devices using high quality services whenever wherever. Our economy, and our national security had so many participants, each reliant on the other and none of which have the final responsibility for enterprise /subscriber data security. Some believe that consumers should be given the tools which can make informed decisions. The concept of shared responsibility model between cloud service providers and enterprises will be extended to these Telco edge and cloud edge sites. In this episode Neira is joined by Prashant Deo, Senior Information Security Consultant at Tata Consultancy Services and Chen Arbel, Vice President Business Development, 5G & Cloud Security and Thales. Prashant Deo Prashant is currently Senior Information Security Consultant at Tata Consultancy Services, a global leader in IT services, consulting & business solutions with a large network of innovation & delivery centers. He has over 20 years experience in lead roles in Cyber Security Consulting and Cyber Defense Operations. Prashant is currently Service Delivery Lead for Security Solutions and Services at TCS, managing end to end project delivery for Infrastructure Security Solutions and Identity & Access Management Solutions, Security Operations Management and Management of Information Security for all client deliverables. You can connect with Prashant on LinkedIn. Chen Arbel With over 20 years of information security, Chen has served in key development roles leading to uniquely powerful innovations that effectively align data security technology with real-life business objectives. Playing a leading role in the implementation of security solutions within some of the world’s largest organizations, Chen has worked in all major industries on strategic initiatives that deliver clear business advantages through unmatched technology. Chen held a government classified technology position in North America and served as Captain for the Defense Force where he gained extensive information security experience. You can connect with Chen on LinkedIn.
More digital will mean more cloud. Now in the second year, the Covid-19 coronavirus pandemic has prompted an acceleration in the adoption of cloud technologies by IT leaders worldwide, which looks set to continue for the foreseeable future. Previously organisations have primarily looked at new application development and deployment for cloud, taking a ‘cloud first’ approach. However many have now pivoted towards a ‘cloud now’ approach. In this two-part episode Neira talks to Chris Harris, EMEA Technical Director at Thales and Vaughn Stewart, VP of Technology Alliance Partners, Pure Storage. Vaughn Stewart, VP of Technology Alliance Partners, Pure Storage Vaughn helps organisations capitalise on what’s possible when pairing memory-based storage technologies with tradiditional and next-generation applications. Prior to joining Pure, he spent 13 years in various leadership roles at NetAPll and has been awarded a U.S. patent. Vaughn strives to simplify the technically complex and advocates thinking outside the box. You can find his perspective online at vaughnstewart.com and in print; he has co-authored multiple books including “Virtualisation Changes Everything: Storage Strategies for VMware vSphere & Cloud Computing. You can connect with Vaughn on Linked in or Twitter Chris Harris, EMEA Technical Director at Thales Chris has over twenty-five years' experience in IT Security with a strong track record providing expert consultancy, pre-sales support and technical assistance to customers across EMEA, in addition to developing and leading a large pan-EMEA team of Pre-Sales Consultants and Sales Engineers. With a strong technical focus on data and information protection solutions, Chris can talk very knowledgably on a vast range of Cybersecurity, Identity Management, Cloud Encryption & Security as well as Cloud Security and Security-as-a-Service offerings. He plays a key role in managing customer and partner relationships across the region, as well as scaling the team, ensuring it has the structure and skills in place to solve problems for customers and respond to market needs. Having joined Thales through its recent acquisition of Gemalto, Chris previously managed the cyber-security pre-sales organisation across EMEA. He has over 20 years’ experience in the group through various company acquisitions that has seen his EMEA Pre-Sales role evolve as the product portfolio grew significantly. With a passion for technology, he keeps acquainting himself with the technical detail, often feeding back the field experience to product management to help advance offerings. He has been pivotal in developing a strong pre-sales technical team across EMEA all equally as passionate for customer excellence. He brings with him a wealth of experience spanning: Hardware Security Modules (HSM), PKI & Digital Certificates, Smart Cards, Tokens, Network Encryption, Database Encryption, Storage Security/Encryption, Cryptographic Hardware and Software. Chris holds a Bachelor of Science degree from the University of Herfordshire. You can connect with Chris on LinkedIn and Twitter.
More digital will mean more cloud. Now in the second year, the Covid-19 coronavirus pandemic has prompted an acceleration in the adoption of cloud technologies by IT leaders worldwide, which looks set to continue for the foreseeable future. Previously organisations have primarily looked at new application development and deployment for cloud, taking a ‘cloud first’ approach. However many have now pivoted towards a ‘cloud now’ approach. In this two-part episode Neira talks to Chris Harris, EMEA Technical Director at Thales and Vaughn Stewart, VP of Technology Alliance Partners, Pure Storage. Vaughn Stewart, VP of Technology Alliance Partners, Pure Storage Vaughn helps organisations capitalise on what’s possible when pairing memory-based storage technologies with tradiditional and next-generation applications. Prior to joining Pure, he spent 13 years in various leadership roles at NetAPll and has been awarded a U.S. patent. Vaughn strives to simplify the technically complex and advocates thinking outside the box. You can find his perspective online at vaughnstewart.com and in print; he has co-authored multiple books including “Virtualisation Changes Everything: Storage Strategies for VMware vSphere & Cloud Computing. You can connect with Vaughn on Linked in or Twitter Chris Harris, EMEA Technical Director at Thales Chris has over twenty-five years' experience in IT Security with a strong track record providing expert consultancy, pre-sales support and technical assistance to customers across EMEA, in addition to developing and leading a large pan-EMEA team of Pre-Sales Consultants and Sales Engineers. With a strong technical focus on data and information protection solutions, Chris can talk very knowledgably on a vast range of Cybersecurity, Identity Management, Cloud Encryption & Security as well as Cloud Security and Security-as-a-Service offerings. He plays a key role in managing customer and partner relationships across the region, as well as scaling the team, ensuring it has the structure and skills in place to solve problems for customers and respond to market needs. Having joined Thales through its recent acquisition of Gemalto, Chris previously managed the cyber-security pre-sales organisation across EMEA. He has over 20 years’ experience in the group through various company acquisitions that has seen his EMEA Pre-Sales role evolve as the product portfolio grew significantly. With a passion for technology, he keeps acquainting himself with the technical detail, often feeding back the field experience to product management to help advance offerings. He has been pivotal in developing a strong pre-sales technical team across EMEA all equally as passionate for customer excellence. He brings with him a wealth of experience spanning: Hardware Security Modules (HSM), PKI & Digital Certificates, Smart Cards, Tokens, Network Encryption, Database Encryption, Storage Security/Encryption, Cryptographic Hardware and Software. Chris holds a Bachelor of Science degree from the University of Herfordshire. You can connect with Chris on LinkedIn and Twitter.
Are the current rules and regulations for securing information and maintaining privacy fit for purpose when you think about the future? Do you think work and lifestyle changes brought about by Covid-19 will have a regulatory impact that we need to plan for? Neira discusses these questions with Enza Iannopollo, Senior Analyst at Forrester and Thales’ own Mukesh Chandak, Business Development Director.
Many businesses have been forced to accelerate their digital transformation strategies due to the pandemic and doing it successfully has become a major challenge. What do organisations do to transform their infrastructure to where it needs to be from a technology standpoint? The new threats are here to stay – so what is the best DX practice from a technology point of view? How do you focus on the technology process and preservation of your infrastructure? In this episode Neira talks to CJ Cullen, Software Engineer at Google and Sol Cates, Principal Technologist at Thales Cloud Protection & Licensing to get their take on this very topical issue.
In this episode we are looking ahead at what we can expect in 2021 and reviewing how 2020’s remote working, separation from family and teams have changed us. Have a listen to some of the interesting insights from Neira’s guests, Troels Oerting, Chairman of the Board of the World Economic Forum’s Centre for Cybersecurity (C4C) and Ashvin Kamaraju, CTO and Vice President Engineering at Thales Cloud Protection & Licensing.
More digital also means more interactions where the various parties are interacting without knowing each other. This is linked to the much needed focus on digital identity, IAM, CIAM, authentication, behavioural analytics. Has the pandemic forced people’s perception of digital identity to change as they have been forced to accept the digital transformation in their own lives? Our host Neira Jones discussed this topic with guests Sundaram Lakshmanan and Francois Lasnier.
More digital, means more ecommerce, more digital payments, more financial fraud and cybercrime and ultimately more risk. Many organisations within the payment sector are being pushed into digitisation more quickly as they move to operate online to keep cash flow – without doing necessary due diligence on the best solution or vendor and with security not really on their agenda. These are some of the issues we are exploring with guests Arthur van der Merwe and Simon Keates.
More remote, more digital, more risk: what do we do about that? Are businesses being forced into digital transformation too quickly and therefore cutting corners? In this Episode, hosted by Neira Jones, business advisor on all things fintech, regtech, cybercrime, information security, regulations and digital innovation, we are joined by Todd Moore, Head of Encryption Products at Thales, and Rick Robinson, Principal and Trusted Advisor at Goldbug Technology Consulting. They will be discussing how businesses adapt to the changing threat vectors as more valuable data gets pushed further out into the infrastructure due to remote working etc.