Posted on
in Presentations
Many encryption solutions fill a tick box but do not meet the intent of the requirement. This session will look at the practical challenges of architecting an encryption service in hybrid cloud to protect highly sensitive business data from even privileged administrators. It will consider the design decisions, constraints, and risks of implementing effective encryption and key management.
Cloud Security & Virtualization Protecting Data & the Supply Chain Ecosystem Security Strategy & Architecture
cloud security cryptography data security encryption strategy & trends key management
Topic
Cloud Security & Virtualization
Protecting Data & the Supply Chain Ecosystem
Security Strategy & Architecture
Subtopic
cloud security
cryptography
data security
encryption strategy & trends
key management
Share With Your Community