10 Key Considerations for an Effective Key Management Strategy

Logo
Presented by

Nisha Amthul, Product Marketing Manager and Claire Pitman-Massie, Snr Director of Field Marketing, EMEA

About this talk

With more cryptographic keys to protect, more value in the data being protected by those keys, and proliferating compliance requirements, including GDPR, PCI-DSS, and many other regulations and standards, nearly every business urgently needs to address key management. An effective key management strategy should take a centralized approach to secure various types of data in different environments, combined with the management and maintenance of keys and crypto resources being utilized. Join Nisha Amthul, Product Marketing Manager of Thales CPL for a “Coffee Break” discussion to understand the best practices for developing a centralised approach to encryption key management, and learn how Thales’ next generation key management platform can help you implement an enterprise-wide key management solution that can simplify operational complexity and minimize overall risks.
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (626)
Subscribers (80466)
Thales is a global leader in cybersecurity, helping the most trusted companies, organizations and governments around the world protect critical applications, sensitive data, and identities anywhere at scale. Through our innovative services and integrated platforms, Thales helps customers achieve better visibility of risks, defend against cyber threats, close compliance gaps, and deliver trusted digital experiences for billions of consumers every day.