The Next Frontier for Data Security: Insights from Safeguarding Fortune 500 Data Transfers

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Major corporations and businesses around the world run on data. And that data is growing exponentially. It can make organisations more efficient, more targeted, and more profitable. But protecting that data is increasingly vital.

Over the last two decades the challenges of moving, securing, automating, and protecting corporate data have had to evolve to cater for the evolving threat landscape and rapidly changing business requirements.

Mandated and aggressive cloud adoption, new regulations and compliance requirements, growing integration patterns, the Great Resignation’s impact on technical teams and the adoption of a zero-trust security model have all driven the implementation of file transfer technology in the enterprise space. 

Join this session to:

  • Review how data transfer requirements continue to change
  • Understand what has been done to secure that data from bad actors
  • How Data Security is set to evolve over the next two decades


Photo of Chandu  Manda

Chandu Manda

Field CTO, Axway

Photo of Greg Palmer

Greg Palmer

TMT/IP Partner, Linklaters

Photo of Chris  Payne

Chris Payne

Director of Strategic Alliances and Technical, Pro2col

Photo of Elliott  Wilkes

Elliott Wilkes

CTO, Advanced Cyber Defence Systems

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Pro2col here: Please see the privacy policy for Axway here: Please see Infosecurity Magazine’s privacy policy for more information.