
The rapid advancement of Cybercriminal tactics has rendered traditional Cybersecurity measures ineffective in protecting against data breaches.
Methods like edge / perimeter / network protection, cloud outsourcing, and cybersecurity awareness training are no longer sufficient against the increasingly sophisticated hacking techniques employed by cybercriminals. As a result, many organizations continue to face serious data breaches.
During the roadshow, participants will have access to valuable global insights, emerging trends, key challenges, and best practices in data security.
It is an event not to be missed for organizations seeking to bolster their data protection measures.
To address these challenges, the Thales - CyberAttack Data Security Roadshow 2024 offers a unique opportunity for data-dependent organizations.
This multi-city event aims to facilitate discussions on strategies for a comprehensive approach to identifying and securing critical data while ensuring compliance with relevant regulations.

Event Topics

The Data Security Life Cycle and Security Posture Optimization

The Data Security Life Cycle and Security Posture Optimization

Understanding the data security life cycle and its role in achieving comprehensive data security

Assessing the real threats posed by emerging technologies like AI and Quantum Computing
Agenda
9:00 AM
9:30 AM
10:10 AM
10:50 AM
11:30 AM
12:10 PM
9:00 AM
Registration
9:30 AM
Session 1: The Data Security Life Cycle and Its Role
- Overview of the data security life cycle and its significance in safeguarding critical data
- Understanding the different phases of the life cycle and their interdependencies
- Exploring the role of each phase in achieving comprehensive data security
- Case studies highlighting successful implementation of the data security life cycle
10:10 AM
Session 2: Achieving Comprehensive Data Security
- In-depth analysis of the data security life cycle and its practical implementation
- Best practices and strategies for effectively protecting data at each phase
- Identifying potential vulnerabilities and implementing appropriate security measures
- Real-world examples of organizations achieving comprehensive data security through the life cycle approach
10:50 AM
Break – Game, Lucky Draw and Gift away
11:30 AM
Session 3: Emerging Threats: AI and Quantum Computing
- Understanding the unique threats posed by emerging technologies like AI and Quantum Computing
- Assessing the potential risks and vulnerabilities associated with these technologies
- Exploring real-world instances of cyber threats leveraging AI and Quantum Computing
- Strategies for mitigating and addressing the emerging threats effectively
12:10 PM
Session 4: Future-proofing Data Security
- Examining the evolving landscape of technology and its impact on data security
- Strategies for adapting data security practices to keep pace with emerging technologies
- Importance of continuous monitoring, threat intelligence, and proactive defense measures
Panel discussion with experts on the future of data security and ways to stay ahead of evolving threats