Virtual Lunch and Learn: What you don’t understand about crypto can hurt you

Logo
Presented by

Joseph Ling, Chief Solutions Architect, nCipher Security

About this talk

We know from the Hong Kong Encryption Trends Study that many Hong Kong enterprises have adopted encryption to protect their data. But what kind of encryption should you choose? Will you just convert the data into something illegible and put it back into storage? I am sure you won’t. How about going back to basics – let’s learn why protecting encryption keys should be your ultimate focus. In this webinar you will learn: - The evolution of encryption - The difference between symmetric and asymmetric encryption - The truth about modern encryption – it takes just 160 days for a hacker to find your keys - Why you should secure your keys in hardware Crypto keys are everywhere – from database encryption, file encryption, digital signatures and certificates to IoT device certification, blockchain, digital payments, SSL/TLS, PKI and more. And together with solutions from BeyondTrust, CyberArk, F5, Gigamon and Palo Alto, to name but a few, nCipher’s general purpose HSMs can protect all your keys at all costs! We will show you why it is so important. Click here to register now and for the chance to receive a HK$100 Food Panda evoucher! A HK$100 Food Panda evoucher will be sent to the first 60 registrations who also attend the webinar.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (406)
Subscribers (36161)
Entrust keeps the world moving safely by enabling trusted identities, payments and data protection around the globe. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, or accessing corporate networks. With our unmatched breadth of digital security and credential issuance solutions, it’s no wonder the world’s most entrusted organizations trust us.