Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
September 30 2014

Encryption-The Dark Side: Things to Worry About for 2014 

Web Conference Overview:

Over the past year we have been deluged with breach reports. Each report comes with staggering numbers detailing the PII which was compromised. The experts have been saying the only solution is to use encryption, but is it really as simple as that… Or are we missing something. This session will cover the issues around encryption technology that one might run into when they try to deploy it.

Click here for link to live recording from September 30, 2014
(the first few slides cannot be seen due to technical problems).
Click here to view the Power Point Presentation.

Viewers CPE quiz link is at the end of the recording and slides.
A passing message is a "Certificate of Attendance" can be printed and used as verification of your participation.
Please PRINT this page and use it to submit CPE (continuing professional education) credit in accordance
with the guidelines of the certifying organization.

Join the conversation: #ISSAWebCon

Generously supported by:

Session Moderator:
Mathieu Gorge, CEO and Founder, VigiTrust
ISSA Web Conference Committee, Session Moderator
Mathieu is an international authority on IT security, an expert on key legal aspects of corporate security, their laws and frameworks.

His company, VigiTrust, designs cloud based educational programs, provides security assessments, credit card security compliance packages and corporate governance solutions. VigiTrust operates in Europe, US and Ireland and services clients including financial services, banking, merchant aggregators, government and health care. 

Mathieu is a regular speaker at international security conferences across Europe and works closely with the PCI Council, East West Institute and ANSI, ISACA, ISSA, and ENISA. 

Paul Williams
Chief Technology Officer, White Badger Group
Paul has thirty-five years of breakthrough innovation in cyber security, artificial intelligence, high speed databases, professional software development, software quality test engineering, electronics, communications, mechanical engineering, weapons development and defense related technologies. 

Paul has extensive experience developing effective security solutions and conducting security risk assessments for large commercial and government customers, including the energy industry. Paul is also an expert in rapidly solving complex cybercrime investigations through use of innovative techniques.

Paul is an active national and international public who speaks at many high profile cyber-security speaking engagements every year for prestigious organizations such as the United States Secret Service, U.S. Department of Justice, InfraGard, ACP, ASIS, IIA, ISACA, ISSA, as well as at universities and colleges across the nation and abroad.

As a result of Paul’s long time personal interest in malware, he has collected a wide assortment of hacking tools, worms, Trojan Horses, and computer viruses. He maintains his collection of 24,000 major computer viruses and 1,700 Trojan Horses for advanced research purposes to this day.

Jason Sabin
VP of Research and Development, DigiCert

In this position at DigiCert, Jason develops innovative products using digital certificate management, PKI technologies, and implementing strong authentication and security within companies. He is widely recognized for his thought leadership in cloud computing, identity, authentication, and security best practices. His innovation and engineering has resulted in over 50 patents, recently earning him the “Utah Genius” award.

Kenny Paterson
EPSRC Leadership Fellow and Professor of 
Information Security at Royal Holloway, University of London.
Prior to 
joining Royal Holloway in 2001, Kenny worked at Hewlett-Packard's European Research Laboratories as a technical staff member and project manager (1996-2001). Kenny received his PhD in the area of discrete mathematics in 1993. He worked extensively in coding and communications in the 1990s an switched research areas to cryptography and network security around 2000. A particular research interest in recent years has been applied cryptography, including the design and analysis of real-world protocols using cryptography. This latter area is the focus of his EPSRC-funded Leadership Fellowship, the research output of which is having a significant impact on the security of Internet protocols such as IPsec, SSL/TLS and SSH. He was awarded an Applied Networking Research Prize by the Internet Research Task Force (IRTF) for his work on SSL/TLS. He was appointed co-chair of the Crypto Forum Research Group (CFRG) of the IRTF in June 2014. Kenny was program chair of EUROCRYPT 2011. He serves on the editorial board of the Journal of Cryptology and is co-editor in chief of Springer's Information Security and Cryptography book series. He has published more than 130 refereed articles in conferences and journals. He will be an invited speaker at Asiacrypt 2014.

System Requirements
PC-based attendees
Required: Windows® 8, 7, Vista, XP or 2003 Server

Mac®-based attendees
Required: Mac OS® X 10.6 or newer

Mobile attendees
Required: iPhone®, iPad®, Android™ phone or Android tablet

System Requirements
PC-based attendees
Required: Windows® 8, 7, Vista, XP or 2003 Server

Mac®-based attendees
Required: Mac OS® X 10.6 or newer

Mobile attendees
Required: iPhone®, iPad®, Android™ phone or Android tablet

Community Search
Sign In

Forgot your password?

Haven't registered yet?


ISSA Web Conference: How to Recruit and Retain Cyber-Security Professionals

Chapter Leaders Summit

11/2/2016 » 11/3/2016
2016 ISSA International Conference Registration

11/2/2016 » 11/3/2016
2016 ISSA International Conference

11/3/2016 » 11/4/2016
ISSA CISO Executive Forum - November 2016

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information