Storage Networking Security Series – Encryption 101

Logo
Presented by

Judy Furlong, Dell Technologies; Ed Pullin, Intel; Alex McDonald, NetApp

About this talk

Encryption has been used through the ages to protect stored secrets, authenticate messages, communicate secretly in broad daylight, and even to check that messages were properly transmitted and received without tamper. Now, it’s often our first go-to tool for making sure that data simply isn’t readable to prying eyes, ears or AI bots. But how does encryption actually work, what makes it tick, and how is it managed? How do we ensure compatibility? How do we protect the keys; i.e., “Who will guard the guards themselves?” It’s a big topic that we’re breaking down into three parts: Encryption 101, Key Management 101, and Applied Cryptography. Join us on May 20th for the first encryption webcast: Storage Networking Security: Encryption 101 where security experts will cover: •A brief history of Encryption •Cryptography basics •Definition of terms – Entropy, Cipher, Symmetric & Asymmetric Keys, Certificates and Digital signatures, etc. •Introduction to Key Management After you watch the webcast, check out the Encryption 101 Q&A blog at https://bit.ly/2ZGMisl
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (787)
Subscribers (198325)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.