Preventing a Data Loss Disaster: Encryption’s Role in Your Compliance Strategy

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

There are many sectors – including government, finance, and healthcare – where encryption is required as a last line of defense in data security. Many regulatory regimes not only require the encryption of certain sensitive data, but consider it a best practice. With more than 44% of organizations employing encryption technologies in 2012 according to data from B2B International, the strategy has become increasingly appealing. Yet the implementation can at times confound the most seasoned GRC professionals in their effort to secure data and maintain compliance.

Encryption strategies, however, are not a one-size-fits-all proposition. Your businesses requirements and regulatory considerations will dictate what approach is best given your budget, workforce, and the assets you are protecting. Join us for this 60-minute webinar, as our panel lays out the possibilities.

This webinar will:

  • Discuss trends in encryption uptake, and the challenges many organizations face when implementing their strategy
  • Advise what data and devices should make use of encryption, and in which circumstances
  • Explore encryption’s effectiveness in preventing unauthorized access to information


Photo of Drew Amorosi

Drew Amorosi

Deputy Editor, Infosecurity Magazine

Photo of Gary Gerber

Gary Gerber

Senior Product Marketing Manager, Imation

Photo of Eddie Schwartz

Eddie Schwartz

Chief Information Security Officer, RSA

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.