Preventing a Data Loss Disaster: Encryption’s Role in Your Compliance Strategy

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

There are many sectors – including government, finance, and healthcare – where encryption is required as a last line of defense in data security. Many regulatory regimes not only require the encryption of certain sensitive data, but consider it a best practice. With more than 44% of organizations employing encryption technologies in 2012 according to data from B2B International, the strategy has become increasingly appealing. Yet the implementation can at times confound the most seasoned GRC professionals in their effort to secure data and maintain compliance.

Encryption strategies, however, are not a one-size-fits-all proposition. Your businesses requirements and regulatory considerations will dictate what approach is best given your budget, workforce, and the assets you are protecting. Join us for this 60-minute webinar, as our panel lays out the possibilities.

This webinar will:

  • Discuss trends in encryption uptake, and the challenges many organizations face when implementing their strategy
  • Advise what data and devices should make use of encryption, and in which circumstances
  • Explore encryption’s effectiveness in preventing unauthorized access to information

Speakers

Drew Amorosi

Drew Amorosi Deputy Editor, Infosecurity Magazine

Gary Gerber

Senior Product Marketing Manager, Imation

    Eddie Schwartz

    Chief Information Security Officer, RSA

      Brought to You by

      Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.