YoVDO

Securing the Breach Using a Holistic Data Protection Framework

Offered By: YouTube

Tags

Conference Talks Courses Data Protection Courses Security Breaches Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive approach to data protection in this 34-minute conference talk from the Central Ohio InfoSec Summit 2016. Delve into security breaches, key management encryption, and centralized key management strategies. Learn about best practices for implementing a holistic framework that improves collaboration and enhances overall security. Gain insights from a real-world customer success story and discover how to effectively secure your organization's data against potential breaches.

Syllabus

Introduction
Security Breaches
Null Decisions
Key Management Encryption
Key Management Options
Best Practices
Centralized Key Management
Improves Collaboration
Holistic Framework
Customer Success Story
Conclusion


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube