Storage Networking Security Series: Key Management 101
In order to effectively use cryptography to protect information, one has to ensure that the associated cryptographic keys are also protected. Attention must...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in South Korea under the topic 'cybersecurity news today'.
About this video
In order to effectively use cryptography to protect information, one has to ensure that the associated cryptographic keys are also protected. Attention must be paid to how cryptographic keys are generated, distributed, used, stored, replaced and destroyed in order to ensure that the security of cryptographic implementations are not compromised.
This webinar introduces the fundamentals of cryptographic key management including key lifecycles, key generation, key distribution, symmetric vs asymmetric key management and integrated vs centralized key management models. Relevant standards, protocols and industry best practices will also be presented. After you watch the video, check out the Q&A blog: https://bit.ly/3dcnpId
Presented by Judy Furlong, Dell Technologies; J Metz, Rockport Networks
Video Information
Views
932
Total views since publication
Likes
17
User likes and reactions
Duration
01:01:00
Video length
Published
Jun 15, 2020
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#SNIA #Storage Networking Industry Association #storage #standards #Key Management #Data Security #Data Protection #Encryption
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.