Closed captioning will be available in English and Japanese for all keynotes and RSAC track sessions.
Please note: All times are in SGT.
  1. Moscone South

Cybersecurity has become the focus for information security, but cryptography has been downgraded to a supplemental security control. At the same time, cybersecurity relies on cryptography to secure itself and manages cryptography for other systems. However, cybersecurity can use bad cryptography or poor key management. This session will look at typical shoddy practices.

Learning Objectives:
1: Learn to recognized and understand bad crypto practices.
2: Learn to recognize and understand good crypto practices.
3: Explore recommended changes.

Download pdf