YoVDO

Devaluing Cloud Breaches while Gaining Safe Harbor

Offered By: YouTube

Tags

GrrCon Courses Amazon Web Services (AWS) Courses Cloud Security Courses Data Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore cloud security strategies in this conference talk from GrrCON 2019. Learn about devaluing cloud breaches and achieving safe harbor through advanced encryption techniques, data security platforms, and tokenization. Discover how to mitigate human error, implement separation of duties, and navigate complex AWS responses. Gain insights into metric transparent encryption, data protection in the clear, and relevant safe harbor regulations. Understand the importance of comprehensive planning and the role of cloud provider encryption in safeguarding sensitive information.

Syllabus

Introduction
AWS Response
Complexity
Black Swan
Human Error
Better Plan
Cloud Provider Encryption
Separation of Duties
Data in the Clear
Advanced Encryption
Data Security Platform
Metric Transparent Encryption
Tokenization
Safe Harbor Regulations
Summary


Related Courses

Managing Devices using Enterprise Mobility Suite
Microsoft via edX
Firebase Essentials For Android
Google via Udacity
Research Data Management and Sharing
The University of North Carolina at Chapel Hill via Coursera
SAP HANA CLOUD PLATFORM の重要事項
SAP Learning
Windows 10 pour l'entreprise
Microsoft Virtual Academy via OpenClassrooms