
How encryption can protect - and deceive you
While E2EE is a powerful security tool, Peter will shed light on the nuances that, if overlooked in implementation, can pose serious risks.
Topic
Cloud SecurityData protection / GDPRGovernance, Riskmanagement and Compliance
When & Where
Wed, 04/17/2024, 14:30 - 15:00
Details
Format:
it-sa insights
Session description
Many companies promise robust E2EE, but behind the scenes, the level of protection may not meet expectations. Some restrict E2EE to specific configurations, leaving users vulnerable in other scenarios.
Learn about the fine details of end-to-end encryption (E2EE) with Tresorit’s CTO Peter Budai. While E2EE is a powerful security tool, Peter will shed light on the nuances that, if overlooked in implementation, can pose serious risks. Uncover the challenges, from the robustness of encryption to key rotation complexities, and gain practical insights on mitigating these risks effectively.
Learn about the fine details of end-to-end encryption (E2EE) with Tresorit’s CTO Peter Budai. While E2EE is a powerful security tool, Peter will shed light on the nuances that, if overlooked in implementation, can pose serious risks. Uncover the challenges, from the robustness of encryption to key rotation complexities, and gain practical insights on mitigating these risks effectively.
Speaker
Moderator
