32AC Encryption Key Management

= Award Winning Session | = AIX | = IBM i | = Linux

Tuesday, May 8, 2012: 9:30 AM-10:45 AM
Nile (Disneyland Hotel )

Session Abstract:
Your encrypted data is only as secure as your encryption keys.  A strong encryption key management strategy is essential for a comprehensive security policy, as well as meeting compliance requirements.  This session discusses the principles and best practices for encryption key management including key management, key storage, secure key retrieval, key escrow, key mirroring, industry standards, compliance guidelines, and system audit. Attendees will learn how key management systems work and how to evaluate vendor solutions. This is a non-technical session but will be of value to developers and implementers.
Learning Objectives:
Attendees will learn the core principles of effective and secure key management. These principles can be used in developing in-house key management solutions or in evaluating vendor solutions.
IT executives, project managers, security administrators, and programmers who want to understand and implement encryption key management.

Home Annual Meeting and Exposition

Share |

Copyright © 2010 COMMON, A Users Group.
All Rights Reserved.