Cyber Is Hot; Crypto Is Not


Posted on in Presentations

Cybersecurity has become the focus for information security, but cryptography has been downgraded to a supplemental security control. At the same time, cybersecurity relies on cryptography to secure itself and manages cryptography for other systems. However, cybersecurity can use bad cryptography or poor key management. This session will look at typical shoddy practices.

Learning Objectives:
1: Learn to recognized and understand bad crypto practices.
2: Learn to recognize and understand good crypto practices.
3: Explore recommended changes.

Protecting Data & Applied Crypto

cryptography key management password management security architecture application security


Topic

Subtopic


Share With Your Community