YoVDO

Cybersecurity vs. Tokenization

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses Cryptography Courses Encryption Courses Data Protection Courses

Course Description

Overview

Explore the debate surrounding tokenization as a data protection method and its impact on cybersecurity in this 42-minute conference talk from RSA Conference. Delve into the who, what, where, when, how, and why of using tokens, led by Sandra Lambert, CEO of Lambert & Associates. Examine various tokenization environments, detokenization methods, and cryptographic approaches including encryption, MAC, random, and table methods. Gain insights into EMV payment tokenization and non-payment tokenization applications. Learn to apply the knowledge gained and draw conclusions about the effectiveness of tokenization in enhancing or potentially hindering cybersecurity efforts.

Syllabus

Intro
Cybersecurity vs. Tokenization - Agenda
Who Wants Tokenization and Where?
When Can It Be Used?
What is Detokenization? Encryption Method
What is Detokenization? MAC Method
What is Detokenization? Table Method
EMV Payment Tokenization
Non-Payment Tokenization
Tokenization Environments: Internal
Tokenization Environments: Multiple
Tokenization Isolation
Cryptography: Encryption Method
Cryptography: MAC Method
Cryptography: Random Method
Cryptography: Table Method
Apply What You've Learned Today...
Conclusions
References


Taught by

RSA Conference

Related Courses

Internet History, Technology, and Security
University of Michigan via Coursera
Sicherheit im Internet
openHPI
أساسيات التشفير
Rwaq (رواق)
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera