Cyber Is Hot; Crypto Is Not


Posted on in Presentations

Cybersecurity has become the focus for information security, but cryptography has been downgraded to a supplemental security control. At the same time, cybersecurity relies on cryptography to secure itself and manages cryptography for other systems. However, cybersecurity can use bad cryptography or poor key management. This session will look at typical shoddy practices.

Learning Objectives:
1: Learn to recognized and understand bad crypto practices.
2: Learn to recognize and understand good crypto practices.
3: Explore recommended changes.

Participants
Sandra Lambert

Participant

CEO, Lambert & Associates

Jeff Stapleton

Participant

VP Security Architect, Wells Fargo


Share With Your Community