YoVDO

Securing Sensitive Data - A Strange Game

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Compliance Courses Data Security Courses

Course Description

Overview

Explore a conference talk that delves into the complexities of securing sensitive data in the digital age. Learn about compliance challenges, experiences from QSA trenches, and the potential solution of Point-to-Point Encryption (P2PE). Discover key elements of P2PE, examine contrasting contract scenarios, and understand the limitations of traditional database structures. Gain insights into potential drawbacks and challenges in implementing secure data practices. This presentation from BSidesLV 2014 offers valuable perspectives on navigating the intricate landscape of data security and compliance.

Syllabus

SECURING SENSITIVE DATA
The Fine Print
Compliance Math
TALES FROM THE QSA TRENCHES
Jericho was right
THE POTENTIAL SOLUTION P2PE (POINT TO POINT ENCRYPTION)
KEY (get it?) ELEMENTS of P2PE
A TALE OF TWO CONTRACTS
THERE ARE FAR MORE THAN 3
BUT MY DATABASE ONLY TAKES NUM*16
THE POTENTIAL DRAWBACKS


Taught by

BSidesLV

Related Courses

Managing Devices using Enterprise Mobility Suite
Microsoft via edX
Firebase Essentials For Android
Google via Udacity
Research Data Management and Sharing
The University of North Carolina at Chapel Hill via Coursera
SAP HANA CLOUD PLATFORM の重要事項
SAP Learning
Windows 10 pour l'entreprise
Microsoft Virtual Academy via OpenClassrooms