Encryption Basics: Symmetric vs Asymmetric Encryption and Key Management (Webinar Cuts)
#Encryption is widely used by companies to secure sensitive data. It comes in different varieties and purposes. There's symmetric vs asymmetric encryption, there's encryption at rest, in transit and in use, there's TDE vs record-level encryption vs column/field-level encryption, and then there's key encryption (wrapping). All of these varieties serve different purposes and use-cases that we review - from the point of view of an infosec person, a sysadmin, a developer, and an architect.
In this webinar cut, we are going to explain the differences between #symmetric and #asymmetric encryption, and what's the role of key management:
- Content of this Video ---
00:00 - Intro
00:08 - Symmetric Encryption and How It Works
00:20 - Symmetric Encryption Example
00:30 - Encryption Efficiency: When is Symmetric Encryption used in Conjunction With Asymmetric Encryption?
01:03 - Asymmetric Encryption and How It Works
01:20 - Asymmetric Encryption Example
01:45 - Key Management
02:17 - Why Does the Secret Key Have to Be Protected?
Watch the full #webinar: https://bit.ly/Encryption-Webinar
👨💼 About the Speaker
Bozhidar Bozhanov is co-founder and CEO at LogSentinel. He is a senior software engineer and solution architect with over 10 years of experience in the software industry. Bozhidar has been a speaker at numerous conferences and is among the popular bloggers and influencers in the technical field. He is one of the top-ranked users in Stack Overflow and his tech blog is recognized as one of the top Java developers blogs by international online media.
About LogSentinel SIEM
LogSentinel SIEM is an easy-to-use next-gen #SIEM system that helps its customers to reduce the time and cost of incident detection, investigation, and response by over 90%. By leveraging the latest technologies like blockchain and machine learning, it enables security teams to eliminate their blind spots and prevent any security incident in real-time.
LogSentinel SIEM offers predictable pricing, based on the number of active users, rather than fluctuating metrics like data volume or events per second. This together with its unparalleled ease of use and flexibility helps organizations of all sizes improve their security posture giving them a SIEM they can afford and manage effectively.