Storage Networking Security Series – Key Management 101

Logo
Presented by

Judy Furlong, Dell Technologies; J Metz, Rockport Networks

About this talk

In order to effectively use cryptography to protect information, one has to ensure that the associated cryptographic keys are also protected. Attention must be paid to how cryptographic keys are generated, distributed, used, stored, replaced and destroyed in order to ensure that the security of cryptographic implementations are not compromised. This webinar will introduce the fundamentals of cryptographic key management including key lifecycles, key generation, key distribution, symmetric vs asymmetric key management and integrated vs centralized key management models. Relevant standards, protocols and industry best practices will also be presented. After you watch the webcast, check-out the Q&A blog at: https://bit.ly/3dcnpId
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (119)
Subscribers (30944)
The Enterprise Storage channel has the most up-to-date, relevant content for storage and infrastructure professionals. As data centers evolve with big data, cloud computing and virtualization, organizations are going to need to know how to make their storage more efficient. Join this channel to find out how you can use the most current technology to satisfy your business and storage needs.