Should You Trust Cloud Providers with Your Encryption Keys?


Posted on in Presentations

A sound cloud key management strategy puts security professionals in the driver’s seat. This session will review best practices and the different approaches for maintaining access and control over your keys, so your organization will continue to benefit from the scale and cost effectiveness that the cloud provides, while ensuring shareholders that data is secure and financial risks are minimized.

Pre-Requisites: Basic understanding of Cloud Encryption and Key Management services and their capabilities.
Participants
Solomon (Sol) Cates

Participant

VP, Research and Technology, Thales

Solomon (Sol) Cates

Participant

VP, Research and Technology, Thales

Identity Cloud Security

key management encryption strategy & trends DevSecOps data security cloud security


Topic

Subtopic


Share With Your Community