Pervasive Encryption: Protecting the Keys to the Kingdom
				Project and Program: 
Enterprise Data Center, 
Security and Compliance
				Tags: 
Proceedings, 
SHARE Virtual 2020, 
2020
		
		
		
			
		Encryption protects us. But only if we protect the encryption keys. Otherwise we are just fooling ourselves. This session will discuss best practices for protecting the keys to your kingdom, from master keys to operational keys. We will also look at best practices for ensuring availability of your keys during an emergency to enable continuous operations.-Roan Dawkins-IBM
		
		
		
		
		
		
	 Back to Proceedings File Library