Abstract
Public disclosures of data indiscretions have become regular enough and embarrassing enough that many organizations are exploring encryption options to simply stay out of the headlines. Those who have ventured into this space quickly realize that there is no magic crypto fairy dust that will make the problems go completely away. However, with careful planning and judicious use of the right technologies, organizations can eliminate many of their exposures. This session focuses on the efforts required at the storage layer to create a successful encryption strategy. Major uses along with factors to consider are presented for protecting storage management, data in-flight, and data at-rest. The session provides expanded coverage on encrypting data at-rest, including key management and a step-by-step approach.
Learning Objectives
Identify where encryption is applied to the storage layer
Discuss uses and issues associated with the application of encryption, with special emphasis on data at-rest encryption prerequisites and opportunities
Develop an approach for implementing data at-rest encryption