Storage Networking Security Series – Key Management 101

Logo
Presented by

Judy Furlong, Dell Technologies; J Metz, Rockport Networks

About this talk

In order to effectively use cryptography to protect information, one has to ensure that the associated cryptographic keys are also protected. Attention must be paid to how cryptographic keys are generated, distributed, used, stored, replaced and destroyed in order to ensure that the security of cryptographic implementations are not compromised. This webinar will introduce the fundamentals of cryptographic key management including key lifecycles, key generation, key distribution, symmetric vs asymmetric key management and integrated vs centralized key management models. Relevant standards, protocols and industry best practices will also be presented. After you watch the webcast, check-out the Q&A blog at: https://bit.ly/3dcnpId
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (142)
Subscribers (55163)
SNIA is a not-for-profit global organization made up of corporations, universities, startups, and individuals. The members collaborate to develop and promote vendor-neutral architectures, standards, and education for management, movement, and security for technologies related to handling and optimizing data. SNIA focuses on the transport, storage, acceleration, format, protection, and optimization of infrastructure for data.