CTO Sessions: Thales TCT + Imperva: Tru...
Ongoing government-wide zero trust implementations exemplify the fact that traditional end-point and perimeter-based security are not enough to protect valuable data. Enter data-centric security, which offers CISOs transformative opportunities to fortify data protection, compliance adherence and operational efficiency. Yet, ensuring robust defense mechanisms remains imperative, given the diverse pathways to data each with its own unique securi...
CTO Sessions: How-to Guide for Enhancin...
Sensitive data stored in HPE deployments must be encrypted edge-to-cloud. For encryption to successfully secure sensitive data, the cryptographic keys used to encrypt/decrypt data must be secured, managed and controlled by the data owner. Thales TCT’s CipherTrust Data Security Platform unifies data encryption and unprecedented granular access controls with centralized key management—all on a single platform. This results in fewer r...
CTO Sessions: Best Practices for Data i...
High speed networks are the critical foundation that supports many of an agency’s most vital communications and operations. However, this foundation is at risk of surveillance and attack by increasingly sophisticated cyber criminals and well-funded nation states. These network connections, if unprotected, are proving to be highly vulnerable, leaving sensitive assets exposed. So, what is the best way to protect network traffic? Encrypt ev...
CTO Sessions: Cloud HSM Best Practices
Although federal agencies are deploying cloud solutions at a rapid pace, they are often hesitant to move their core cryptographic infrastructure to the cloud—namely their roots of trust. Hardware security modules (HSMs) are used as a root of trust and generate, store, protect, and manage cryptographic keys used to secure sensitive data and critical applications. HSMs are traditionally deployed on-premises but they can be safely deployed...
CTO Sessions: Best Practices for Phishi...
With recent vulnerabilities such as EUCLEAK and Executive Order 14028 deadlines, phishing-resistant Multi-Factor Authentication (MFA) is top-of-mind in Federal IT. Although FIDO is the golden solution for phishing-resistant MFA, federal agencies with outdated infrastructures instead rely on PKI to defend against phishing and other cyber-attacks. Furthermore, FIDO may not be able to support specific operations that PKI does, such as digital sig...
CTO Sessions: The Underappreciated Tact...
Databases are key targets for hackers looking to steal data. However, there is insufficient emphasis by the MITRE ATT&CK Framework on the Collection tactic regarding access of data from a database. Hackers collect data through eavesdropping/man in the middle attacks of data in transit, by capturing data at the point of collection (such as point of sale devices), exfiltrating files containing sensitive data, etc. But the motherlode is the d...
CTO Sessions: 2024 Data Threat Report -...
The 2024 Thales Data Threat Report highlights the unique security challenges faced by U.S. Federal agencies. This report reveals new cybersecurity strategies as well as key differences between federal and global survey responses, providing valuable insights to stay ahead in the evolving security landscape. Key Findings40% of USFED agencies and organizations report having experienced a ransomware attack47% of agencies reported breaches in 2021,...
CTO Sessions: Intersection of AI and Security
Artificial intelligence (AI) is rapidly transforming our world, from the way we work to the way we interact with machines. But, with this immense power comes immense responsibility. As AI becomes more sophisticated, so too do the security risks. This CTO Session focused on the critical issues at the intersection of AI and security. Our speaker, Gina Scinta, explored:Countering malicious use of AI systems by actors with ill intentions, such as...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.