Posted on
in Presentations
Tokenization is the most recent data protection method but who wants it, what is it, where is it specified, when can it be used, how does it positively or negatively affect cybersecurity or operations, and why should it be used? This session will debate the answers to these controversial questions and examine the top four implementation issues when using tokenization as a data protection method.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>Participants
Jeff Stapleton
Participant
Executive Director Cybersecurity Researcher, Wells Fargo and X9F4 Cybersecurity and Cryptography Workgroup Chair
Share With Your Community