Encryption & Key Management , Security Operations

Encryption in a Multi-Cloud Environment

Waskevich of ePlus and Moore of Thales on Encryption and Access in the Cloud
Todd Moore, VP of data protection products, Thales (left) and Lee Waskevich VP of security solutions, ePlus

Many organizations have leapfrogged from “cloud concerns” to “cloud first” mindsets. What are the implications for encryption and access control in a multi-cloud environment? Lee Waskevich of ePlus and Todd Moore of Thales discuss the challenges and solutions.

In a video interview with Information Security Media Group at RSA 2020, Waskevich and Moore also discuss:

  • What it means to be “cloud first”;
  • Regulatory implications for encryption and access control;
  • How ePlus and Thales together help enterprises tackle these challenges in a multi-cloud environment.

Waskevich, vice president of security solutions at ePlus Technology is responsible for overall strategy for the ePlus Security practice. He and his team design and deliver tailored cybersecurity programs aimed at mitigating business risk, fortifying digital transformation and creating a safer environment for customers' data and brand.

Moore is the senior vice president of data protection products at Thales, where he has business line ownership for a data protection business. He is has over 25 years of experience helping organizations protect their most sensitive data. Previously, he was the senior vice president of encryption at Gemalto.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.