Download pdf
Cybersecurity has become the focus for information security, but cryptography has been downgraded to a supplemental security control. At the same time, cybersecurity relies on cryptography to secure itself and manages cryptography for other systems. However, cybersecurity can use bad cryptography or poor key management. This session will look at typical shoddy practices.

Learning Objectives:
1: Learn to recognized and understand bad crypto practices.
2: Learn to recognize and understand good crypto practices.
3: Explore recommended changes.