Data Encryption and Key Management, Part I & II

webinar

Author(s)/Presenter(s):

Ray Lucchesi

Gordon Arnold

Walt Hubis

Library Content Type

Presentation

Tutorial

Library Release Date

Focus Areas

Data Governance & Security

Abstract

We hear every month of another cyber attack, hacking event or just plain data theft where thousands to millions of data records are exposed. A number of techniques are available that can minimize the data exposure risk in these cases but they all involve some form of data-at-rest-security. We discuss the many different approaches to secure data-at-rest in your IT shop.

Learning Objectives

Understand the many ways to provide data-at-rest security for block and file data.
Understand the implications of various approaches to data-at-rest security with respect to key management, storage performance, and cost