Abstract
Securing storage ecosystems can be challenging because of the specialized technologies involved as well as limited availability of relevant information. This panel will explore some of the more subtle, but troublesome, aspect of data at-rest encryption and key management, cryptographic erase as a sanitization method, proof of encryption/sanitization, the collision of virtualization and security, etc. Participants will have a better understanding of the issues and the approaches that are being used to address them.