Information Security Leader, Author, Instructor and Speaker

Podcast: Endpoint encryption strategies

Posted on August 1, 2009 in Presentations | by

When a laptop turns up stolen, it’s reassuring to know that the contents of the device were encrypted, transforming a potentially disastrous data breach into a simple case of missing hardware. In this podcast we look at the issues surrounding the use of encryption to secure data stored on endpoint computers.

Specifically, we address

  • Basics of endpoint encryption: what are we trying to accomplish?
  • Commonly used encryption technologies
  • Legal protections afforded to encryption users
  • Key management and escrow
  • Extending encryption to smartphones, PDAs and other non-computer mobile devices

Listen to the podcast: <A HREF=”http://searchsecurity.techtarget.com/podcast/Curveball-Endpoint-encryption-strategies”>Endpoint encryption strategies</A>

Broadcast on SearchSecurity, August 2009

TAGS: ,

Leave a Reply

Your email address will not be published. Required fields are marked *