Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Will Encryption Save Europe’s Privacy Plans?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

The proposed general data protection regulation follows a similar theme of being technology agnostic, apart from one particular part of privacy and security. There is nothing new about encryption: it’s been the basis of secure communication for decades, but in the future of European data protection, this was only method of technology mentioned.

Yet it continues to be a problem for businesses and is all too often missed out and this has resulted in breaches – see the TalkTalk breach as an example. Also in the IoT there seems to be a crucial missing part that is encrypted communications – is your fitness accessory, child’s toy or ISP deploying encryption?

In this webinar we will look at encryption deployment problems, what the EU is proposing and will ultimately demand in terms of security and privacy, and offer best practice recommendations for a decent experience for all.

Key takeaways:

  • What does the GDPR say about encryption?
  • Is encryption doing enough, or even anything at all? If not, why not?
  • What are the available libraries, how can you know if they are free from major bugs?

Speakers

Sol Cates

CSO, Vormetric

    Fran Howarth

    Snr Analyst, Security, Bloor Research

      Dan  Raywood

      Contributing Editor, Infosecurity Magazine

      Brought to You by