Technology Communities |
SecurityJump straight to an abstract:
The AbstractsIntroduction to StorageDownloadMany enterprises face the task of implementing data protection and data security measures to meet a wide range of requirements. We have already made you aware of the threats. You know that the risks and threats are real; it is just a matter of time before you become a statistic. The security best practices provided by the SNIA Security Technical Work Group will help you to secure the storage infrastructure to know and manage our risks. However, what will it really take to implement a secure storage infrastructure? What upfront work is required to implement security? What is the ongoing work to insure that the storage infrastructure is secure? This session focuses on the efforts required at the storage layer to create a successful defense-in-depth strategy. Major threats for each of the key storage element are explored. The session provides information on how to determine the security posture of these elements in a particular installation. However, be aware that the session leverages material contained in the SNIA-SSIF whitepaper: Introduction to Storage Security. This enables the session to expand further on these concepts. Learning Objectives:
Cryptographic Use Cases and the Rational for End-to-End SecurityDownloadThe variety of environments in which Fibre Channel (FC) fabrics and other technologies such as iSCSI and FCIP are deployed makes it likely that customers will have many choices for data protection in the future. Data protection solutions such as data integrity, data-at-rest, and in-flight data protection are among those choices. This tutorial surveys many use cases that identify the locations in a SAN where security may be applied and explores an end-to-end security approach.
A Do-It-Yourself Guide to Storage ForensicsDownloadAs more and more enterprise information is consolidated into storage area networks, the likelihood of storage administrators finding themselves challenged to identify, collect and preserve electronic evidence relevant to an intrusion, crime, policy violation or e-discovery request is steadily increasing. This presentation presents a whirlwind tour of the processes for collecting and preserving digital evidence and the challenges traditional forensics practitioners face in a world where servers may have no directly attached disks. Learning Objectives
TCG Trusted Storage SpecificationDownloadThe Trusted Computing Group (TCG) Storage WorkGroup has published formal specifications for security and trust services on storage devices, including hard drives, flash, and tape drives. The majority of hard drive and other storage device manufacturers participated. Putting security directly on the storage device avoids the vulnerabilities of platform OS-based software security. The details of the Specification will be highlighted, as well as various use cases, including Full Disk Encryption with enterprise key management. Learning Objectives
ABCs of EncryptionDownloadPublic disclosures of data 'indiscretions' have become regular enough and embarrassing enough that many organizations are exploring encryption options to simply stay out of the headlines. Those who have ventured into this space quickly realize that there is no 'magic crypto fairy dust' that will make the problems go completely away. However, with careful planning and judicious use of the right technologies, organizations can eliminate many of their exposures. This session focuses on the efforts required at the storage layer to create a successful encryption strategy. Major uses along with factors to consider are presented for protecting storage management, data in-flight, and data at-rest. The session provides expanded coverage on encrypting data at-rest, including key management and a step-by-step approach. Learning Objectives
An Introduction to Key Management for Secure StorageDownloadAs secure storage becomes more pervasive throughout the enterprise, the focus quickly moves from implementing encrypting storage devices to establishing effective key management policies. Without the proper generation, distribution, storage, and recovery of key material, valuable data will be eventually compromised. Worse, without proper management of key information, data can be completely lost. This session explores the fundamental issues and technologies that impact key management for disk, tape, array, and other storage devices. Major issues associated symmetric encryption keys are presented, along with practical advice on effective key management issues and practices. Learning Objectives:
Building a Key Management Strategy: Standards and SolutionsDownloadRecent Taneja Group research demonstrates that the hidden problem is management of disparate key systems and that global key management is a top of mind issue for enterprises. As storage security devices proliferate across highly heterogeneous user environments, key management standards are multiplying, as well. From PKCS#11 to P1619.3 to the various FIPS standards, it can be a challenge understanding what the standards represent and how they benefit your organization. This session, led by a recognized storage security expert, covers all of the key management standards that exist and where each fits in the scope of a comprehensive Key Management Services strategy. Learning Objectives
|
LoginFeatured Events
|

