Encryption, as with any security tactic, quickly becomes complex and diffuse without a unifying strategy. The question of how it protects the organization’s mission must be answered. And what about threats and criminal activities? This session will detail how to identify and document the business processes, convert threat intelligence into actionable threat models and strategically deploy encryption.

Download pdf
Participants: