Track Background Color
#42d4f4
Old ID
11
Track Text Color
#000
Slack Channel Url
https://app.slack.com/client/T02DWHYB4P7/C02EC8PQ533

Quantum Safe Cryptography for Long Term Security

Submitted by Anonymous (not verified) on

Quantum computers with the capability to threaten the cryptography used today may seem a long way off, but they already pose a threat to both data and systems that we are protecting today. This talk will introduce the quantum threat and discuss why this is already a topic for today and not sometime in the future when large quantum systems will emerge, with particular considerations for long-term secure storage. This will be followed by an overview of the race to standardize new cryptographic algorithms that are secure even against large quantum computers of the future.

Emerging Storage Security Landscape

Submitted by Anonymous (not verified) on

Current storage technologies include a range of security features and capabilities to allow storage to serve as a last line of defense in an organization’s defense in depth strategy. However, the threat landscape continues to change in negative ways, so new responses are needed. Additionally, the storage technology itself is changing to address the increased capacity and throughput needs of organizations. Technical work in ISO/IEC, IEEE, NVM Express, DMTF, OpenFabric Alliance, Trusted Computing Group (TCG), Open Compute Project (OCP), Storage Networking Industry Association (SNIA), etc.

Designing with Privacy in Mind

Submitted by Anonymous (not verified) on

Business requirements are not the only influencers of our technical solutions. Laws and Regulations transform the technical landscape in ways that require us to redefine our architecture, as well as our skill-set. This is especially true with Data Privacy. Since GDPR and CCPA, our industry is witnessing a new career path emerge: the Privacy Engineer. Where security started 10 years ago, so does privacy engineering. Join us as we look at Privacy by Design (PbD) and introduce some architecture patterns that align with privacy strategies.

Privacy's Increasing Role in Technology

Submitted by Anonymous (not verified) on

Every organization today is in some state of digital transformation. While the understanding of security needs in the digital age has matured significantly in the last 2 decades, the implication for data privacy and in particular its interaction with technology solutions, are still not well understood. As data regulations and laws continue to evolve, globally, organizations require an increased understanding of privacy requirements and their impact on technology solutions.

Sanitization – Forensic-proofing Your Data Deletion

Submitted by Anonymous (not verified) on

Almost everyone understands that systems and data both have lifecycles that typically include a disposal phase (i.e., what you do when you do not need something anymore). Conceptually, data needs to be eliminated either on a system or entirely (everywhere stored) as part of this disposal. Simply hitting the delete-key may seem like the right approach, but the reality is that eliminating data can be difficult. Additionally, failing to correctly eliminate certain data can result in costly data breach scenarios.

Ransomware!!! – an Analysis of Practical Steps for Mitigation and Recovery

Submitted by Anonymous (not verified) on

Malware, short for malicious software, is a blanket term for viruses, worms, trojans and other harmful software that attackers use to damage, destroy, and gain access to sensitive information; software is identified as malware based on its intended use, rather than a particular technique or technology used to build it. Ransomware is a blended malware attack that uses a variety of methods to target the victim’s data and then requires the victim to pay a ransom (usually in crypto currency) to the attacker to regain access to the data upon payment (with no guarantees).

Subscribe to Security and Privacy