|
Hello Ala,
Thank you for registering to attend How to Take Control by Adopting Sovereign External Key Management. We look forward to having you join the live session.
|
How to Take Control by Adopting Sovereign External Key Management
Gwénaëlle Hervé, Digital Sovereignty Lead @ Proximus NXT, Frank Callewaert, CTO BeLux, EU institutions @ Microsoft, Johan Vandenberghe, Regional Sales Manager Data Security BeLux @ Thales
Join industry experts on June 18th for an insightful webinar: How to Take Control by Adopting Sovereign External Key Management.
In this session,...
Jun 18 2026 11:00 AM | 30 mins
|
You can test your system now to make sure you can view our webinars and videos: https://techtarget.service-now.com/csm/en/why-can-t-i-hear-and-or-see-the-webinar?id=kb_article_view&sysparm_article=KB0030126.
|
Discover more content from Thales - Cybersecurity Solutions
|
|
How to Operationalize API Security: A 5‑Level Operations Model
Luke Babarinde, Global Solutions Architect, Amrit Talapatra, Product Manager, Vivek Purkayastha, Product manager
Yes, APIs drive digital revenue, but unmanaged APIs introduce hidden risk, data exposure, and operational blind spots. Many teams have tools in place but they...
May 07 2026 03:00 PM | 60 mins
|
|
Stop Data Breaches at the Data Layer
Ari HAKALA, Director, Business Development, Thales | Manpreet SINGH, Principal Solutions Engineer, Thales
Organizations today face growing challenges in protecting sensitive data. Many rely on fragmented defenses—encryption without visibility or monitoring...
May 12 2026 05:00 AM | 60 mins
|
Thank you,
Thales - Cybersecurity Solutions
You received this email because you are subscribed to Thales - Cybersecurity Solutions on BrightTALK.
|