Gartner Blog Network


Webinar “When Encryption Won’t Work: Implementing Practical Information Protection”

by Erik T. Heidt  |  July 21, 2014  |  Comments Off on Webinar “When Encryption Won’t Work: Implementing Practical Information Protection”

Enterprise data breaches are occurring all-too-often. Many enterprises have overestimating or misunderstood the protection provided by current, or planned, encryption deployments. This presentation focuses on the attacks that are resulting in expensive and embarrassing data disclosures, and provide prioritized actions for you to consider for addressing these threats.  Portable media and data outside the data center are not discussed. We explore the limitations of database, bulk storage and application encryption approaches. Recommendations include a solid mix of controls – sometimes including encryption – that complement and strengthen each other.

Questions we will explore:

  • If your encryption strategy poised to address likely threats
  • Whether you have invested properly in database, bulk storage or application encryption
  • How to leverage other preventative controls to complement or replace encryption

Click here to register.

How to see you there,
Erik

Follow me on Twitter (@CyberHeidt)

Category: 

Erik T. Heidt
IoT Agenda Manager, Research VP
5 years at Gartner
25 years IT Industry

Erik Heidt is the Research Agenda Manager for Gartner for Technical Professionals (GTP). Mr. Heidt covers Internet of Things (IoT) architecture, IoT strategy as well as security and risk management within the IoT context. Mr. Heidt focuses on developing and delivering research related to the architecture, development and operation of IoT for both users and suppliers. Mr. Heidt has more than 25 years of industry experience, with a significant focus on information security and risk management. Read Full Bio




Comments are closed

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.