Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Securing the Breach Using a Holistic Data Protection Framework

via YouTube

Overview

Explore a comprehensive approach to data protection in this 34-minute conference talk from the Central Ohio InfoSec Summit 2016. Delve into security breaches, key management encryption, and centralized key management strategies. Learn about best practices for implementing a holistic framework that improves collaboration and enhances overall security. Gain insights from a real-world customer success story and discover how to effectively secure your organization's data against potential breaches.

Syllabus

Introduction
Security Breaches
Null Decisions
Key Management Encryption
Key Management Options
Best Practices
Centralized Key Management
Improves Collaboration
Holistic Framework
Customer Success Story
Conclusion

Reviews

Start your review of Securing the Breach Using a Holistic Data Protection Framework

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.