Posted on
in Presentations
How can you implement an enterprise-wide PKI governance function where previously the emphasis was simply on issuing certificates for applications’ use. What are your governance goals? What metrics show the effectiveness of a governance program? No Press Permitted.
Pre-Requisites: Basic understanding of x.509 Certificates and how they are used to authenticate websites, machines, and individuals. An understanding of the differences between public key encryption and symmetric encryption systems.
Cloud Security & Virtualization
network security encryption strategy & trends cloud security authentication audit
Topic
Cloud Security & Virtualization
Subtopic
network security
encryption strategy & trends
cloud security
authentication
audit
Share With Your Community