Database Encryption - Defining the Root of Trust
- Friday, September 19th, 2014 at 1:00 PM EDT (17:00:00 UTC)
- Andreas Philipp and Greg Porter
You can now attend the webcast using your mobile device!
Today, industries across a slew of different verticals seek advanced security through database encryption to secure, authenticate and enable sensitive infrastructures and data. At the core of these industries lies the need to secure sensitive consumer, corporate and citizen data, as well as advanced IP-based networks in the face of connected devices and the Internet of Things. These sectors and industries include:
- Public Sector to protect citizen privacy
- eHealth to protect patient data and diagnostic information
- Financial Services to protect credit card data and other sensitive payment information
Worldwide database encryption is a well regulated and standardized field of application. Certification schemas based on FIPS-validated key storage are defined (e.g. PCI-DSS), as well as APIs for security devices in different kinds of database products.
In this Webcast, Andreas Philipp, vice president of business development at Utimaco, will give an overview of different kinds of application scenarios and best practices of database encryption based on Hardware Security Modules (HSM). HSMs provide a hardware root of trust by managing cryptographic keys to ensure tamper-proof protection and prevent third-party data breaches.
Andreas Philipp is Vice President of Marketing and Business Development with Utimaco, the innovation leader in Hardware Security Module. With over 10 years of experience in software development, consulting and system implementation, Andreas joined the technical sales for HSM and ran the worldwide sales force in Utimaco for over 8 years. With an overall extensive experience in the Security Module Business of 20 years, Andreas has become well-known industry expert and a frequent conference speaker.
Greg Porter is the Founder of Allegheny Digital, an information security firm specializing in enterprise security operations, incident response, and network security monitoring. For the past several years, Mr. Porter has both led and delivered comprehensive Health Insurance Portability and Accountability Act ("HIPAA") security assessments that monitor, test and audit the effectiveness of information system controls designed to protect patient data. Most recently, he has been focused on the availability of Protected Health Information ("PHI") on the public Internet as well as examining the secure configuration of electronic health records systems.