Quick Look: Cyber Is Hot; Crypto Is Not

Cybersecurity has become the focus for information security, but cryptography has been downgraded to a supplemental security control. At the same time, cybersecurity relies on cryptography to secure itself and manages cryptography for other systems. However, cybersecurity can use bad cryptography or poor key management. This session will look at typical shoddy practices.

Learning Objectives:
1: Learn to recognized and understand bad crypto practices.
2: Learn to recognize and understand good crypto practices.
3: Explore recommended changes.



Jeff Stapleton VP Security Architect, Wells Fargo


Sandra Lambert CEO, Lambert & Associates

← View more Videos

This document was retrieved from on Mon, 15 Jul 2019 14:46:08 -0400.