Games of Keys and Clouds: Finding a (Nash) Equilibrium of Trust
As enterprises look to move their production workloads into the public and hybrid clouds, encryption is critical to ensuring the confidentiality and integrity of their data. But what happens with the keys? Does the enterprise continue to maintain sole control of them? This session explores strategies for the relationship of keys and clouds and what game theory can say about those strategies.