Menu

Seminar

Cyber Attack, Remediation & Mitigation Theatre

Wed 5th Oct 11:00 to 11:30

So you think you’re encrypting…. think again!

Everyone knows they have to encrypt their sensitive data, but cryptography is often seen as a dark art and complex – with terms like hashing, tokenization, symmetric and asymmetric… is it any wonder? In this workshop we’ll reveal how encryption and external key management can be a highly effective security control, yet simple to deploy with the right crypto strategy.

What you will take away from this session

  • Understand the difference between external vs software based key management.
  • Practical examples to protect sensitive data using Encryption & External Key Management.
  • Practical examples to protect sensitive data using Encryption & External Key Management.
  • Understand how to protect storage, file servers, database servers, apps, VMs and cloud infrastructure

Speakers

Photo Speaker Name Profile
Joe Pindar Joe Pindar View Profile

Social Media

Twitter

Linkedin

IP EXPO | LinkedIn

The home of IP EXPO Event Series

Facebook