

Oct 8, 2025 00:00:00
Days43
Hours09
Minutes33
Seconds41
10-11 December 2025
Your presence made the event a real success, and we truly appreciate your participation and engagement. We hope you found the sessions insightful and valuable. We would like to express our gratitude on behalf of the entire Thales Team.
If you wish to download the slide decks, click on the download buttons next to each presentation.
Your feedback is essential to us, so please feel free to share any thoughts or suggestions on how we can improve for future events by filling out the survey below.
The Thales Partner Connect is designed to foster deep engagement between industry peers and executives alike, providing a worthwhile opportunity to gain exclusive insights into the Thales vision, innovation roadmap, and go-to-market strategies.
Additionally, there will be ample time for networking and meaningful interactions.
We are looking forward to welcoming you to this annual partner event in Dubai, where together, we will explore new possibilities for growth and collaboration.
Hear from Thales leaders on:
Engage with Thales leaders from our local Channel, Specialist, and leadership teams and network with other channel partners.
At Thales, we understand the importance of providing a seamless and enjoyable experience for our channel partners.
To facilitate your attendance at the Partner Connect event, we would like to cover the cost of your accommodation on Wednesday, 10th December and Thursday, 11th December 2025.
Please indicate in the registration form if you will be requiring accommodation for the above-mentioned date so that we can make the necessary arrangements.
PLEASE NOTE:
Listen to Sebastien Cano, SVP, Thales Cloud Protection & Licensing, as he shares exclusive insights into the added benefits Thales can offer you.
BOOK A MEETINGListen to Sebastien Cano, SVP, Thales Cloud Protection & Licensing, as he shares exclusive insights into the added benefits Thales can offer you.
BOOK A MEETINGListen to Sebastien Cano, SVP, Thales Cloud Protection & Licensing, as he shares exclusive insights into the added benefits Thales can offer you.
BOOK A MEETINGListen to Sebastien Cano, SVP, Thales Cloud Protection & Licensing, as he shares exclusive insights into the added benefits Thales can offer you.
BOOK A MEETING|
Achieving Full Visibility and Data Security in the Quantum
Era: Insight into today and tomorrow's Data Security landscape Todd Moore, Global Head/VP of Data Security Products Download |
|
|
Imperva Application Security – The Market, the Solution, and How it Fits with Data Security
Tim Ayling, VP EMEA Cybersolution Specialists & GTM Lead AppSec Download |
|
|
Insight into the Thales technology partners' ecosystem
Marko Bobinac, Director of Business Development Download |
|
|
IAM Insight into today and tomorrow's Identity and Access Management landscape
Waleed Marji, Regional Sales Manager Download |
|
|
How To Win with Thales: Tech Session
Data Security, AppSec, IAM Download |
|
|
How To Win with Thales: Sales Session
Data Security, AppSec, IAM
Download |
|
|
Final words - Partners in Power: Closing the Loop, Opening a Successful Future
Florian Malecki, VP EMEA Channel Sales Download |

Ideally situated amid Dubai’s cosmopolitan business district, the Conrad hotel offers the epitome of discreet luxury and contemporary, sophisticated style. The hotel enjoys a privileged setting: a stone’s throw from Dubai International Convention and Exhibition Centre, and within a short distance of the city’s financial and commercial hub, the Dubai International Financial Centre.
Address: Sheikh Zayed Road, Trade Centre, Dubai, United Arab Emirates
2024 holds promise and a lot of action, and we’re excited to show you what we have in store. Here’s to an exciting journey ahead, as we continue to build frictionless, secure and trusted digital journeys. Together, we shape a future we can all trust.
We protect modern and hybrid applications against advanced and multi-vector attacks regardless of where they are running.
We redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
Seamless, secure and trusted access online for customers, employees and partners.
We protect modern and hybrid applications against advanced and multi-vector attacks regardless of where they are running.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGSeamless, secure and trusted access online for customers, employees and partners.
BOOK A MEETINGWe protect modern and hybrid applications against advanced and multi-vector attacks regardless of where they are running.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGSeamless, secure and trusted access online for customers, employees and partners.
BOOK A MEETINGWe protect modern and hybrid applications against advanced and multi-vector attacks regardless of where they are running.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGSeamless, secure and trusted access online for customers, employees and partners.
BOOK A MEETINGWe protect modern and hybrid applications against advanced and multi-vector attacks regardless of where they are running.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGSeamless, secure and trusted access online for customers, employees and partners.
BOOK A MEETINGWe protect modern and hybrid applications against advanced and multi-vector attacks regardless of where they are running.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGSeamless, secure and trusted access online for customers, employees and partners.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGEnsure online users are who they claim to be, and protect against identity fraud.
BOOK A MEETINGSeamless, secure and trusted access online for customers, employees and partners.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGEnsure online users are who they claim to be, and protect against identity fraud.
BOOK A MEETINGSeamless, secure and trusted access online for customers, employees and partners.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETING
People rely on Thales to manage their digital identities
Customers worldwide are being protected by Thales
Engineers are innovating and enhancing our product offerings
A good and solid solution in constant evolution: We’ve been using the Thales OneWelcome Identity Platform to offer 1.3 million customers a simple and secure connection to our websites and mobile application since December 2020."
—Our customer at Gartner®
Explore the exciting new technologies that enable a seamless convergence of today's and tomorrow’s digital and physical identities. Discover how the highly customizable OneWelcome CIAM solutions accelerate your
organization into the identity-first era.
Join our discussion led by Marco Venuti, Thales IAM Business Acceleration Director on March 5th on “The Best Practices of B2B IAM to Streamline 3rd Party Interactions.” Together we will explore the confluence of real-world scenarios and current market solutions in B2B-IAM.
Learn from actionable examples demonstrating how access and delegation management can be smoothly implemented for third-party users.
Schedule a one-on-one with one of our identity experts at the summit to gain insights into the Thales OneWelcome Identity Platform and learn how it can support your identity journey.
Our consolidated offering covers the entire spectrum of your data security needs, including:
Our consolidated offering covers the entire spectrum of your data security needs, including:
Our consolidated offering covers the entire spectrum of your data security needs, including:
Our consolidated offering covers the entire spectrum of your data security needs, including:

Quote, Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum sed lectus et nunc."
—Full Name and Job Title

Experience quick deployment in just a few weeks. Our purpose-built, cloud-based B2B IAM solution caters to all your B2B user groups, delivering unmatched security, scalability, and ease of use for seamless collaboration across your B2B ecosystem
The only true B2B IAM solution to streamline collaboration and enhance security
Access the InsightsEstablish seamless collaboration and a scalable B2B ecosystem
Get the ebookEnd-to-end delegated user management for any B2B use case
Get the solution briefDiscover a new approach to addressing modern B2B and B2B2C IAM challenges
Watch on-demandLogrando privacidad y protección de propiedad intelectual mientras se acelera la innovación.
Access the InsightsAborda las brechas en la seguridad de dispositivos médicos, reduce riesgos y crea una ventaja competitiva usando Módulos de Seguridad de Hardware (HSM).
Get the ebookDescubre cómo las empresas biotecnológicas pueden proteger los dispositivos IoMT y encontrar el equilibrio perfecto entre agilidad, resiliencia y seguridad.
Get the solution briefCómo asegurar la agilidad criptográfica en la era post-cuántica.
Watch on-demand