Webcast | Would the real Format Preserving Encryption please stand up?
     
 
On-demand Webcast:
"Would the real Format Preserving Encryption please
stand up?"

Format Preserving Encryption (FPE) and related technologies like Tokenization have become accepted methods for protecting data and reducing breach risks since the first proven approach was announced by Voltage Security. Format Preserving Encryption provides a powerful and secure method to protect data wherever it goes to almost any structured data type without losing the important business and operational properties of the data – its format, intent, structure, and integrity. With FPE, organizations can quickly and easily secure data in applications, databases, transactions, payments, and in cloud and big data environments.

However, getting FPE right is critical to avoid giving up sensitive data to attackers. Not all FPE methods are created equal, and attackers know it. Risky, non-standard encryption and related unproven Tokenization methods are useless in claiming safe harbor in the event of a data privacy breach and unpublished, secret methods must be treated as insecure until publicly proven otherwise.

Join Mark Bower, VP Product Management, Voltage Security, as he hosts this webcast featuring John Kindervag, Principal Analyst, Forrester, who will shares his perspective on getting FPE right.

During this webcast you will learn about:

 
How attackers may circumvent supposedly secure yet unproven encryption and tokenization methods
 
How products and services using vulnerable methods are very likely to result in data that can be compromised   
 
Why auditors and assessors need proofs and standards compliance especially for government privacy laws and PCI DSS credit card security compliance  
 
Illustrated examples of system breaches from weak proprietary encryption, and why security and proofs and peer reviewed publications are absolutely critical for enterprises protecting data in clouds and applications  
Featured Speakers
John Kindervag
John Kindervag
Principal Analyst, Forrester
John is a 25-year veteran of the high-tech world. He holds numerous industry certifications including CISSP, CEH, QSA, and CCNA. Prior to joining Forrester, John was the senior security architect with security consultancy Vigilar, and he started the security practice for a Cisco Gold VAR, Flair Data Systems, where he was a principal security consultant. He has particular expertise in the areas of wireless security, intrusion detection and prevention, and voice over IP hacking. He has been interviewed and published in numerous magazines including Hospitality Technology Magazine, SecurityFocus.com, and Techtarget.com. John has spoken at many security conferences and events including ToorCon, ShmoCon, and InfoSec World.
Tom Field
Mark Bower
VP Product Management, Voltage Security
Mark Bower is a noted expert in data protection solutions, with over two decades of industry and technology experience in this area. Mark is heavily involved in industry standards bodies including the PCI Security Standards Council and the Security POS Vendors Alliance (SPVA). He has authored several patents for e-commerce technology innovations in POS software management and remote control, based on his extensive experience in banking and payment solutions.
Please register here:
  •  Voltage Security news & events