Technology Communities |
SecurityMaterial on this page is intended solely for the purpose of content review by SNIA members. Tutorial material may be read and commented upon by any SNIA member, but may not be saved, printed, or otherwise copied, nor may it be shared with non-members of the SNIA. Tutorial managers are responsible for responding to all comments made during the open review period. No responses will be given to comments made outside the open review period. Jump straight to an abstract:
The Abstracts
Data Encryption and Key Management, Part I & II We hear every month of another cyber attack, hacking event or just plain data theft where thousands to millions of data records are exposed. A number of techniques are available that can minimize the data exposure risk in these cases but they all involve some form of data-at-rest-security. We discuss the many different approaches to secure data-at-rest in your IT shop. Learning Objectives
Practical Secure Enterprise Storage Learning Objectives
Legal Issue Relevant to Storage Many organizations face the challenge of implementing protection and data security measures necessary to comply with a wide range of regulatory, statutory, and other legal requirements. Because storage systems (actually the data they contain) play an important part in many of these issues, storage managers and administrators may be asked to assist in supporting a variety of legal actions as well as help their organizations guard against data transgressions having legal consequences. Thus, they need to be capable of taking abstract regulatory, statutory and other legal requirements and translating them into implementable solutions. In addition, they must be able to partner with the legal community to ensure these solutions address the organization’s compliance requirements and that the support is timely and responsive. This session describes the legal issues storage security professionals are likely to encounter as part of their role as the focal point for securing storage systems. Learning Objectives
|
LoginFeatured Events
|

