YoVDO

Securing Sensitive Data - A Strange Game

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Compliance Courses Data Security Courses

Course Description

Overview

Explore a conference talk that delves into the complexities of securing sensitive data in the digital age. Learn about compliance challenges, experiences from QSA trenches, and the potential solution of Point-to-Point Encryption (P2PE). Discover key elements of P2PE, examine contrasting contract scenarios, and understand the limitations of traditional database structures. Gain insights into potential drawbacks and challenges in implementing secure data practices. This presentation from BSidesLV 2014 offers valuable perspectives on navigating the intricate landscape of data security and compliance.

Syllabus

SECURING SENSITIVE DATA
The Fine Print
Compliance Math
TALES FROM THE QSA TRENCHES
Jericho was right
THE POTENTIAL SOLUTION P2PE (POINT TO POINT ENCRYPTION)
KEY (get it?) ELEMENTS of P2PE
A TALE OF TWO CONTRACTS
THERE ARE FAR MORE THAN 3
BUT MY DATABASE ONLY TAKES NUM*16
THE POTENTIAL DRAWBACKS


Taught by

BSidesLV

Related Courses

Early Detection through Deception
YouTube
Hack for Show, Report for Dough - Brian King
YouTube
Blue Teamin on a Budget of Zero - Kyle Bubp
YouTube
Windows Event Logs - Zero to Hero
YouTube
Weaponizing Splunk - Using Blue Team Tools for Evil
YouTube