Contrary to popular belief, securing “data at rest” does not simply mean encrypting the data prior to storage. While it is true that data encryption plays a major role in securing “data at rest,” there are several other factors that come into play and are as important as encryption. In this webinar, we present the end-to-end process to securing “data at rest,” and discuss all the factors and trade-off that must be considered, and some of the general risks that need to be mitigated, discussing: •How requirements for “data at rest” differ from “data in flight” •Understanding the costs of ransomware •How to protect cryptographic keys from malicious actors •Good and bad uses of key managers: Best policies for retaining cryptographic keys over time (understanding the “key lifecycle”) •How IT departments can increase security risks by introducing weaknesses in the cryptographic security chain •Strengths and weaknesses of relying on government security recommendations •The importance of test validation of data backups

Hora

19:00 - 20:00 hs GMT+1

Organizador

Storage
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Mayo / 2020 1144 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 27 de Mayo de 2020
Mar 28 de Mayo de 2020
Mié 29 de Mayo de 2020
Jue 30 de Mayo de 2020
Vie 01 de Mayo de 2020
Sáb 02 de Mayo de 2020
Dom 03 de Mayo de 2020
Lun 04 de Mayo de 2020
Mar 05 de Mayo de 2020
Mié 06 de Mayo de 2020
Jue 07 de Mayo de 2020
Vie 08 de Mayo de 2020
Sáb 09 de Mayo de 2020
Dom 10 de Mayo de 2020
Lun 11 de Mayo de 2020
Mar 12 de Mayo de 2020
Mié 13 de Mayo de 2020