Key Management, Encryption
Facebook Twitter LinkedIn

Key Management, Encryption

Combined Session
Thursday, April 19, 2012 16:30—17:30
Location: Alpsee

The Bad Things that can happen if Encryption Management Fails

The recent surplus of security compromises is evidence of major encryption management failure across the IT landscape. Recent research has highlighted some alarming facts; companies have little idea how many of these security assets they have in their inventories, where they are deployed, who has access to them, or how they are managed. With little understanding of best management practices, enterprises are likely to experience significant security, operational, and audit risks. Drawing on many years of work and research in Global 2000 organizations in financial services, retail, manufacturing, telecom and other industries, this session explores the challenge of scaling and managing encryption assets. The session will address how the role of IT security has moved from merely a technological challenge to being a fundamental part of the business. It is essential that organizations apply field-tested, in-production methodologies and best practices for effective key and certificate management.

The Bad Things that can happen if Encryption Management Fails
Presentation deck
The Bad Things that can happen if Encryption Management Fails
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Mike Small
Mike Small
KuppingerCole
Mike Small is the retired director of security management strategy of CA, where he was responsible for the technical strategy for CA's security management software product line within Europe,...
Gregory Webb
Gregory Webb
Venafi, Inc.
As Vice President of Marketing, Gregory is responsible for Venafi product, solution channel, field and web marketing, global branding and demand generation. Gregory joined Venafi in 2008. Prior to...

Cloud Security Depends on Effective Key Management

Enterprises have amassed regulated and valuable data that flows within and beyond their networks, all of which must be protected. As a result, thousands of encryption keys and certificates have been deployed across their global infrastructures and in the cloud—to secure the data and authenticate systems. How are these critical security assets being managed? Organizations that fail to properly manage these assets subject themselves to security vulnerabilities, non-compliance and unplanned outages, all with increasing frequency and cost. Attend the session to learn more.

Cloud Security Depends on Effective Key Management
Presentation deck
Cloud Security Depends on Effective Key Management
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Subscribe for updates
Please provide your email address