Devaluing Cloud Breaches while Gaining Safe Harbor
Offered By: YouTube
Course Description
Overview
Explore cloud security strategies in this conference talk from GrrCON 2019. Learn about devaluing cloud breaches and achieving safe harbor through advanced encryption techniques, data security platforms, and tokenization. Discover how to mitigate human error, implement separation of duties, and navigate complex AWS responses. Gain insights into metric transparent encryption, data protection in the clear, and relevant safe harbor regulations. Understand the importance of comprehensive planning and the role of cloud provider encryption in safeguarding sensitive information.
Syllabus
Introduction
AWS Response
Complexity
Black Swan
Human Error
Better Plan
Cloud Provider Encryption
Separation of Duties
Data in the Clear
Advanced Encryption
Data Security Platform
Metric Transparent Encryption
Tokenization
Safe Harbor Regulations
Summary
Related Courses
Communicating Data Science ResultsUniversity of Washington via Coursera Cloud Computing Applications, Part 2: Big Data and Applications in the Cloud
University of Illinois at Urbana-Champaign via Coursera Cloud Computing Infrastructure
University System of Maryland via edX Google Cloud Platform for AWS Professionals
Google via Coursera Introduction to Apache Spark and AWS
University of London International Programmes via Coursera