41AC Tokenization

= Award Winning Session | = AIX | = IBM i | = Linux

Wednesday, May 9, 2012: 8:00 AM-9:15 AM
Nile (Disneyland Hotel )

Session Abstract:
This session will describe how tokenization works to protect sensitive data, the core technologies involved in tokenizing data, which compliance regulations allow tokenization, how encryption and key management work with tokenization solutions, and what you need to know before starting a tokenization project.
Learning Objectives:

Home Annual Meeting and Exposition

Share |

Copyright © 2010 COMMON, A Users Group.
All Rights Reserved.