Menu

Deployment Strategies for Effective Encryption

  • Wednesday, February 27, 2013 | 1:40 PM – 2:00 PM | Room: Room 310

View all Sessions

Encryption is a double-edged sword. It can ensure that no one, not even the NSA can read your data. But ineffective encryption can ensure that no one, including yourself, can read your data. The fine line that separates the two is an effective encryption strategy.

Participants

This document was retrieved from https://www.rsaconference.com/events/us13/agenda/sessions/182/deployment-strategies-for-effective-encryption on Tue, 26 Jul 2016 13:54:22 -0400.
© 2016 EMC Corporation. All rights reserved.