The Ins and Outs of Enterprise Crypto in the world of cloud and mobile computing

Logo
Presented by

Thad Mann, CISSP, CISM, CCSK, CEH, PMP VP and Cybersecurity Strategist WaveStrong, Inc.

About this talk

Crypto is everywhere. And if used properly can help organizations of all sizes better protect their digital assets, reduce their attack surface and reduce costs. However, if done improperly, crypto can increase risk and give a false sense of comfort. With the rapid expansion of work from home and its dependence upon the cloud and remote access solutions, properly applied encryption can significantly improve an organization’s security posture, reduce the cost of regulatory compliance, and improve their ability to respond to threats. However, this rapid growth in the use of remote collaboration solutions, many of which were deployed hastily and outside an organization’s normal authorization to operate (ATO) process, have added cyber risk from both regulatory actions and nefarious threat actors. Yes, there are a number of ways to mitigate these risks, but I contend that expanding current use of encryption is a cost-effective way to reduce an organization’s attack surface while minimizing risk from regulatory actions and fines. Although vendors have done a good job of simplifying the deployment and management of their tools, deploying these solutions in the context of a complex enterprise is nontrivial. For example, it is fairly straightforward to encrypt your Azure stored files. However, this same process is more complex for a regulated entity that must hold its own keys. It is also fairly straightforward to encrypt traffic (aka data in transit). But how does an organization know which traffic cannot be encrypted due to monitoring and regulatory requirements? In this webinar you will learn: - What are the necessary pieces to support typical use cases - When and when not to use encryption - Where can crypto be used - Who are some of the leading vendors in the enterprise crypto space - How to cost effectively deploy cryptosystems without adding risk and impacting productivity
Related topics:

More from this channel

Upcoming talks (10)
On-demand talks (708)
Subscribers (199093)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.