Don't want to be tied to one specific location or cloud service provider, and need some flexibility in the security of your assets? Learn how you can ensure key ownership and control of your applications, identities, and data wherever it may be with HSMs (hardware security modules) and how to build a root of trust for your digital transformation using a modern HSM infrastructure.

HSMs can be deployed either in the cloud, as-a-service, on-premises, or across hybrid environments. With so many options available, how do you choose the right HSM for your needs? In this session, we'll take a closer look at different use cases and how you can modify your HSM deployment choices as your business needs change and evolve.

We'll also look at how HSMs secure your digital transformation, guard against evolving threats, and capitalize on emerging technologies and use cases such as Double Key Encryption (DKE).

Attendees are eligible to receive 1 CPE credit.

Generously supported by:

supported by logo
Speakers
speaker photo
John Ray
Director, Product Management, Hardware Security Modules, Thales

John Ray has over 20 years of experience in the security industry spanning many roles, from Sales Engineering, Security Architecture, and Professional Services to Product Management and Strategy. He is currently Director of Hardware Security Module (HSM) Product Management at Thales helping enterprises protect their keys and data on-premises and in the cloud.

Moderator
speaker photo
Tom Bechtold
Digital Events Director, SecureWorld