
How encryption can protect - and deceive you
While E2EE is a powerful security tool, Peter will shed light on the nuances that, if overlooked in implementation, can pose serious risks.
Register for this session and add it to the bookmarks in your personal area.
Topic
Cloud SecurityData protection / GDPRGovernance, Riskmanagement and Compliance
When & Where
Wed, 04/17/2024, 14:30 - 15:00
Details
Format:
it-sa insights
Session description
Many companies promise robust E2EE, but behind the scenes, the level of protection may not meet expectations. Some restrict E2EE to specific configurations, leaving users vulnerable in other scenarios.
Learn about the fine details of end-to-end encryption (E2EE) with Tresorit’s CTO Peter Budai. While E2EE is a powerful security tool, Peter will shed light on the nuances that, if overlooked in implementation, can pose serious risks. Uncover the challenges, from the robustness of encryption to key rotation complexities, and gain practical insights on mitigating these risks effectively.
Learn about the fine details of end-to-end encryption (E2EE) with Tresorit’s CTO Peter Budai. While E2EE is a powerful security tool, Peter will shed light on the nuances that, if overlooked in implementation, can pose serious risks. Uncover the challenges, from the robustness of encryption to key rotation complexities, and gain practical insights on mitigating these risks effectively.