YoVDO

Cybersecurity vs. Tokenization

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses Cryptography Courses Encryption Courses Data Protection Courses

Course Description

Overview

Explore the debate surrounding tokenization as a data protection method and its impact on cybersecurity in this 42-minute conference talk from RSA Conference. Delve into the who, what, where, when, how, and why of using tokens, led by Sandra Lambert, CEO of Lambert & Associates. Examine various tokenization environments, detokenization methods, and cryptographic approaches including encryption, MAC, random, and table methods. Gain insights into EMV payment tokenization and non-payment tokenization applications. Learn to apply the knowledge gained and draw conclusions about the effectiveness of tokenization in enhancing or potentially hindering cybersecurity efforts.

Syllabus

Intro
Cybersecurity vs. Tokenization - Agenda
Who Wants Tokenization and Where?
When Can It Be Used?
What is Detokenization? Encryption Method
What is Detokenization? MAC Method
What is Detokenization? Table Method
EMV Payment Tokenization
Non-Payment Tokenization
Tokenization Environments: Internal
Tokenization Environments: Multiple
Tokenization Isolation
Cryptography: Encryption Method
Cryptography: MAC Method
Cryptography: Random Method
Cryptography: Table Method
Apply What You've Learned Today...
Conclusions
References


Taught by

RSA Conference

Related Courses

Master Mathematical Cryptography 2020: Crack Any Code
Udemy
Cryptography from Scratch| Master Cryptography in Java
Udemy
Information Security in Python
Udemy
Cryptography
Caleb Curry via YouTube
Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube