YoVDO

Cybersecurity vs. Tokenization

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses Cryptography Courses Encryption Courses Data Protection Courses

Course Description

Overview

Explore the debate surrounding tokenization as a data protection method and its impact on cybersecurity in this 42-minute conference talk from RSA Conference. Delve into the who, what, where, when, how, and why of using tokens, led by Sandra Lambert, CEO of Lambert & Associates. Examine various tokenization environments, detokenization methods, and cryptographic approaches including encryption, MAC, random, and table methods. Gain insights into EMV payment tokenization and non-payment tokenization applications. Learn to apply the knowledge gained and draw conclusions about the effectiveness of tokenization in enhancing or potentially hindering cybersecurity efforts.

Syllabus

Intro
Cybersecurity vs. Tokenization - Agenda
Who Wants Tokenization and Where?
When Can It Be Used?
What is Detokenization? Encryption Method
What is Detokenization? MAC Method
What is Detokenization? Table Method
EMV Payment Tokenization
Non-Payment Tokenization
Tokenization Environments: Internal
Tokenization Environments: Multiple
Tokenization Isolation
Cryptography: Encryption Method
Cryptography: MAC Method
Cryptography: Random Method
Cryptography: Table Method
Apply What You've Learned Today...
Conclusions
References


Taught by

RSA Conference

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network