Cybersecurity vs. Tokenization

Posted on in Presentations

Tokenization is the most recent data protection method but who wants it, what is it, where is it specified, when can it be used, how does it positively or negatively affect cybersecurity or operations, and why should it be used? This session will debate the answers to these controversial questions and examine the top four implementation issues when using tokenization as a data protection method.

Jeff Stapleton


VP Security Architect, Wells Fargo

Sandra Lambert


CEO, Lambert & Associates

Protecting Data & Applied Crypto

data security mobile security network security security architecture application security



Share With Your Community