InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

EC-Conference2024: FIPS 140-2 and 140-3 Explained with Critical Insights for Cryptographic Security and Compliance

Presented by

Parnashree Saha, Security Architect at Encryption Consulting

About this talk

It's time for organizations to transition from FIPS 140-2 to 140-3. The new FIPS 140-3 compliance comes with new security requirements, and every security requirement requires multiple measures that have to be taken into consideration for an effective transition. This session provides a detailed overview of the FIPS 140-2 and FIPS 140-3 frameworks, focusing on security requirements, levels, and key changes. Learn how to navigate the implementation process, understand critical terminologies, and prepare for FIPS 140-3 compliance. Key Takeaways: - Overview of FIPS 140-2 and FIPS 140-3 standards - Key differences and changes introduced in FIPS 140-3 - Understanding security levels and scope of requirements - Steps for transitioning from FIPS 140-2 to FIPS 140-3 - Practical insights for ensuring cryptographic compliance and security
Encryption Consulting LLC

Encryption Consulting LLC

1665 subscribers64 talks
Global Leaders in Applied Cryptography!
We are the world's leading provider of applied cryptography. Over 100 Fortune 500 corporations have sought our help in protecting their most sensitive data and solving the most complex problems. Through our products and professional services, you can strengthen your ability to protect cryptographic keys, digital certificates, software code signing, Certificate Lifecycle management, and more. We are committed to staying up-to-date with the latest technology trends, compliances, and best practices in data security, and we leverage this expertise to help our clients achieve their security goals.
Related topics