Will Encryption Save Europe’s Privacy Plans?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The proposed general data protection regulation follows a similar theme of being technology agnostic, apart from one particular part of privacy and security. There is nothing new about encryption: it’s been the basis of secure communication for decades, but in the future of European data protection, this was only method of technology mentioned.

Yet it continues to be a problem for businesses and is all too often missed out and this has resulted in breaches – see the TalkTalk breach as an example. Also in the IoT there seems to be a crucial missing part that is encrypted communications – is your fitness accessory, child’s toy or ISP deploying encryption?

In this webinar we will look at encryption deployment problems, what the EU is proposing and will ultimately demand in terms of security and privacy, and offer best practice recommendations for a decent experience for all.

Key takeaways:

  • What does the GDPR say about encryption?
  • Is encryption doing enough, or even anything at all? If not, why not?
  • What are the available libraries, how can you know if they are free from major bugs?

Speakers

Sol Cates

CSO, Vormetric

    Fran Howarth

    Snr Analyst, Security, Bloor Research

      Brought to You by

      Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.