channel company logo

Thales - Cybersecurity Solutions

Building a future we can all trust

Thales is a global leader in cybersecurity, helping the most trusted companies, organizations and governments around the world protect critical applications,
sensitive data, and identities anywhere at scale. Through our innovative services and integrated platforms, Thales helps customers achieve better visi
  • 80,599 Subscribers
  • 629 talks
  • 7 series

Building a future we can all trust

Thales is a global leader in cybersecurity, helping the most trusted companies, organizations and governments around the world protect critical applications,
sensitive data, and identities anywhere at scale. Through our innovative services and integrated platforms, Thales helps customers achieve better visi
  • 80,599 Subscribers
  • 629 talks
  • 7 series

Upcoming talks

Navigating Hong Kong’s Critical Infrastructure Protection Law

Navigating Hong Kong’s Critical Infrastructure Protection Law

As cybersecurity threats continue to escalate, the Hong Kong Government has introduced the Protection of Critical Infrastructures (Computer Systems) Bill to
enhance cybersecurity standards for essential services and critical societal and economic activities. This Bill was passed into law on 19th March 2025. The
new law mandates that operators across key sectors—such as banking, healthcare, and transportation—implement robust cybersecurity measures to safeg…

Crypto Agility in the Age of AI and Quantum

Crypto Agility in the Age of AI and Quantum

This webinar will explore the impact of quantum computing on cryptography, addressing key questions such as the nature of quantum technology, the
threats it poses, and the concept of crypto-agility. We will discuss regulatory perspectives and identify organizations most affected by these changes. Finally,
actionable steps will be provided for enhancing crypto-agility to safeguard against emerging risks in the evolving technological landscape. Join us to stay inf…

Protecting Australian healthcare’s sensitive data from a cyber-attack pandemic

Protecting Australian healthcare’s sensitive data from a cyber-attack pandemic

With the sheer number of new platforms and technologies being adopted by the healthcare and life sciences industry, it dramatically expands the attack
surfaces and making these industries more vulnerable to attacks by cybercriminals. This results in more sensitive data could be at risk in more platforms.
68% of healthcare and life-sciences organizations reported that more than 40% of their data in cloud is sensitive. However, on average, only 45% of sensiti…

On-demand talks

How DISC™ QRNGs Combined with Luna HSMs Brings Security Innovation to Customers

How DISC™ QRNGs Combined with Luna HSMs Brings Security Innovation to Customers

To kick off 2025 as UNESCO’s International Year of Quantum Science and Technology, this webinar will showcase how quantum-enabled technologies provide
opportunities to strengthen systems against emerging threats and how the advent of post-quantum computing is driving the development of new
cryptographic standards. Enhancing cryptographic agility and resilience to support crypto-agility and post-quantum readiness starts with advanced random …

Addressing 3rd-Party & Supply Chain Risks in Critical Infrastructure with B2B IAM

Addressing 3rd-Party & Supply Chain Risks in Critical Infrastructure with B2B IAM

Third-party and supply chain vulnerabilities are among the biggest threats to critical infrastructure security. This session will delve into how
Business-to-Business IAM (B2B IAM) can help organizations mitigate external risks, enforce least privilege access, and ensure compliance with evolving
regulations. Learn how to secure supplier and partner access without compromising operational agility.

Unlock OT Cyber Maturity: Real-World Strategies

Unlock OT Cyber Maturity: Real-World Strategies

Operational technology (OT) systems are at the core of critical infrastructure, yet they are increasingly vulnerable as IT/OT convergence accelerates. Is your
organization prepared to address these challenges and improve your cybersecurity posture? Join us for an insightful webinar where our panel of industry
experts will share proven strategies to elevate OT cybersecurity maturity and resilience. Key Takeaways Include: • Navigating the unique challenges of OT c…

Business Continuity: 5 Tactics for a More Resilient IAM in Critical Infrastructure

Business Continuity: 5 Tactics for a More Resilient IAM in Critical Infrastructure

IAM plays a crucial role in business continuity planning for critical infrastructure organizations. This session will cover five key tactics to ensure seamless
access control during disruptions, cyber incidents, and operational crises. Learn how to mitigate risks and keep systems secure while maintaining productivity
in high-stakes environments.

Top 4 Considerations for Zero Trust in Critical Infrastructure

Top 4 Considerations for Zero Trust in Critical Infrastructure

Zero Trust is now a necessity for securing critical infrastructure against evolving cyber threats. In this session, we’ll explore four key considerations for
implementing Zero Trust in high-risk environments, including identity verification, least privilege access, continuous monitoring, and segmentation strategies.
Learn how to build a Zero Trust architecture that enhances resilience while maintaining operational efficiency.

Securing the Future: Achieving Quantum Resilience with PKI and HSM Integration

Securing the Future: Achieving Quantum Resilience with PKI and HSM Integration

As quantum computing capabilities and global technological competition intensify, organisations must act now to future-proof their security strategies. Join
industry leaders from Keyfactor and Thales as they explore how to achieve quantum resilience with PKI and HSM technologies, drawing insights from recent
industry milestones such as Deepseek's advancements and shifting global cybersecurity priorities. Discover practical guidance on integration best practices,…

Data Risk Intelligence - Priorizar, automatizar, controlar y proteger los sistemas de bases de datos

Data Risk Intelligence - Priorizar, automatizar, controlar y proteger los sistemas de bases de datos

Ven y conoce de primera mano el futuro de la integración de Thales e Imperva, aprovechando lo mejor de las tecnologías de Protección de Bases de Datos,
construyendo una hoja de ruta con priorización, automatización y Postura. Conversaremos sobre el recién lanzamiento de Data Risk Intelligence.

Data Risk Intelligence - Priorizando, Automatizando, Controlando e Protegendo Sistemas de Bancos de Dados

Data Risk Intelligence - Priorizando, Automatizando, Controlando e Protegendo Sistemas de Bancos de
Dados

Data Risk Intelligence: Priorizando, Automatizando, Controlando e Protegendo Sistemas de Bancos de Dados Gerenciados através de indicadores de Postura

Series