Beware! Encryption Jedi Mind Trick

When a cloud service provider (CSP) says they are using encryption, that's when you know you need to dig deeper into the details rather than succumb to the Jedi mind tricks of encryption. "You can trust us. We use encryption." We will cover BYOK -- what it actually is - and misconceptions, along with end-to-end encryption. Where do you use encryption? How do you perform encryption?

How do you protect the keys throughout the key management life cycle?

Learning Objectives:

  • Know what you didn't know you needed to know about encryption
  • Learn better questions to ask during your security assessments
  • Best practices around key management

This webcast supports knowledge and concepts from SEC510: Public Cloud Security: AWS, Azure, and GCP