Of the 13 billion data records breached across IT systems since 2013, only 4 percent were encrypted. The Internet of Things (IoT) brings network connectivity to everyday devices, many of which may be handling sensitive data. Let's examine the flow of health information in an IoT environment and explore how pervasive encryption can protect IoT data in transit and data at rest at multiple layers of the computing environment. Join this session to learn how to:- interpret US regulations regarding the protection of health information- describe the process for encrypting sensitive data in transit and at rest- differentiate between several levels of encryption for data at rest- analyze various encryption technologies
17. 17
Encryption Keys
Inadvertent or malicious deletion or
modification of encryption keys will
result in data loss!
Robust key management and key
protection is a must for all organizations
– Large
– Medium
– Small
Avoid self-inflicted RANSOMWARE!
Deploy enterprise key
management system
Policy based key gen
Key rotation
Key usage tracking
Key backup & recovery
Implement multiple
levels of backup and
recovery
Physical backup
Logical backup
Offline backup