Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Preventing a Data Loss Disaster: Encryption’s Role in Your Compliance Strategy

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

There are many sectors – including government, finance, and healthcare – where encryption is required as a last line of defense in data security. Many regulatory regimes not only require the encryption of certain sensitive data, but consider it a best practice. With more than 44% of organizations employing encryption technologies in 2012 according to data from B2B International, the strategy has become increasingly appealing. Yet the implementation can at times confound the most seasoned GRC professionals in their effort to secure data and maintain compliance.

Encryption strategies, however, are not a one-size-fits-all proposition. Your businesses requirements and regulatory considerations will dictate what approach is best given your budget, workforce, and the assets you are protecting. Join us for this 60-minute webinar, as our panel lays out the possibilities.

This webinar will:

  • Discuss trends in encryption uptake, and the challenges many organizations face when implementing their strategy
  • Advise what data and devices should make use of encryption, and in which circumstances
  • Explore encryption’s effectiveness in preventing unauthorized access to information


Drew Amorosi

Drew Amorosi Deputy Editor, Infosecurity Magazine

Gary Gerber

Senior Product Marketing Manager, Imation

    Eddie Schwartz

    Chief Information Security Officer, RSA

      Brought to You by