Creating an Encryption Strategy for Your Enterprise

Maybe it’s not time yet to start “quantum-proofing” (and maybe it is), but that doesn’t mean your encryption strategy doesn’t need a refresh. If your organization is like most enterprises, you’ve likely purchased or adopted a wide variety of encryption tools and capabilities over the years. But does this mixture of technologies and strategies really ensure that your most sensitive data is protected? How are you managing encryption keys across all of your systems? How do you make encryption work across your own infrastructure, as well as the infrastructures of your service providers? In this webinar, experts discuss a variety of tools and strategies for implementing and managing enterprise encryption, and how you can not only implement next-generation encryption technology, but make better use of what you already have.

On Demand
1h 00min

Attend this webinar and you'll:

  • Learn about the latest encryption strategies for securing your data.
  • Gain insights for incorporating encryption throughout your infrastructure.
  • Find out about tools and strategies for implementing and managing enterprise encryption.
  • Get immediate ideas for encryption using tools you already have.

Featured Speakers

  • Jason Clark
    Jason Clark
    Independent Security Researcher

    Dr. Jason Clark is a subject matter expert in cyber security with more than 15 years of real-world experience within the intelligence community, academia, and industry. His main area of interest is researching and analyzing better methods to detect, deter, and mitigate insider threats. He helped develop insider threat programs while also helping to improve already mature programs. Jason also holds a CISSP and is a member of IEEE and ACM. He has served on a number of program committees and has presented his published work at a variety of conferences around the world. Jason completed his doctorate in Information Technology at George Mason University with a focus on cyber-crime under the advisement of Dr. Damon McCoy. He also holds two Master’s degrees in Information Technology from Rensselaer Polytechnic Institute (RPI) and Computer Forensics from George Mason University. He holds a Bachelor of Science from Syracuse University in Information Technology & Management with a minor in Economics.

  • Anand Kashyap
    Anand Kashyap
    CTO and Co-Founder

    Anand has previously worked at Symantec and VMware, as a researcher and an engineer in the areas of security and networking. He has presented at Financial Cryptography and BlackHat conferences and has filed over 25 patents. Anand holds a Ph.D. from Stony Brook University and a Bachelor of Technology from IIT Kanpur, both in Computer Science.

  • Terry Sweeney
    Terry Sweeney
    Dark Reading

    Terry Sweeney is a Los Angeles-based writer and editor who's covered business technology for three decades. He's written about cyber security for more than 15 years and was one of the founding editors of Dark Reading. Sweeney has covered enterprise networking extensively, as well as its supporting technologies like storage, wireless, cloud-based apps and the emerging Internet of Things. He's been a contributing editor to The Washington Post, Crain’s New York Business, Red Herring, Information Week, Network World,, and Stadium Tech Report.

Sponsored By