Cybersecurity vs. Tokenization


Posted on in Presentations

Tokenization is the most recent data protection method but who wants it, what is it, where is it specified, when can it be used, how does it positively or negatively affect cybersecurity or operations, and why should it be used? This session will debate the answers to these controversial questions and examine the top four implementation issues when using tokenization as a data protection method.

Participants
Jeff Stapleton

Participant

VP Security Architect, Wells Fargo

Sandra Lambert

Participant

CEO, Lambert & Associates

Protecting Data & Applied Crypto

data security mobile security network security security architecture application security


Topic

Subtopic


Share With Your Community