Decision Criteria and Analysis for Hardware-Based Encryption
- Wednesday, July 13th, 2016 at 12:00 PM EDT (16:00:00 UTC)
- Eric Cole, PhD and John Grimm
You can now attend the webcast using your mobile device!
Dedicated hardware-based encryption and key management can offer higher levels of protection for sensitive data and business applications than software-based methods. In addition to offering superior protection against key compromise or loss, hardware-based solutions help organizations meet regulatory mandates and address todays challenging threat environment.
But how can an organization decide which of its digital assets are best suited for the extra measure of security offered by hardware-based solutions such as hardware security modules (HSMs)? In this webcast, the presenters will explain how to create a set of criteria for prioritizing applications and data, and assign the risks and benefits that would come with hardware-based encryption. With such a set of criteria, information security professionals can make supportable, informed recommendations about the applications and systems that would benefit the most from hardware-based encryption.
Be among the first to receive the associated whitepaper written by Eric Cole.
View the associated whitepaper here.
Eric Cole, PhD, is a SANS faculty fellow, course author and instructor who has served as CTO of McAfee and chief scientist at Lockheed Martin. He is credited on more than 20 patents, sits on several executive advisory boards and is a member of the Center for Strategic and International Studies' Commission on Cybersecurity for the 44th Presidency. Eric's books include Advanced Persistent Threat, Hackers Beware, Hiding in Plain Sight, Network Security Bible and Insider Threat. As founder of Secure Anchor Consulting, Eric puts his 20-plus years of hands-on security experience to work helping customers build dynamic defenses against advanced threats.
John Grimm is senior director of security strategy at Thales. He has over 25 years of experience in the information security field, starting as a systems and firmware engineer building secure cryptographic key distribution systems for government applications, and progressing through product management, solution development, and marketing leadership roles. He received his bachelor's degree in electrical engineering from Worcester Polytechnic Institute in Worcester, Mass., and is a member of Tau Beta Pi, the engineering honor society.