OSOR 13 June Webinar: Mapping the public sector needs
OSPOs for Good: Building & Designing Cooperative Digital Infrastructure
OpenForum Academy Symposium 2023
The EU Open Source Policy Summit 2024
01 April 2015
*** White Paper now available ***
A consensus is growing among IT security experts that security must focus on the data itself, instead of its physical location or the infrastructure (on-premise vs off-premise, specific geographic locations etc.). This helps ensure that data will remain safe even if physical access to the device holding the data is gained.
Encryption is one of the most effective data protection controls available today, as part of a defense-in-depth approach, being correlated with good authentication, authorisation and auditing. When data is encrypted, the access is regulated through the distribution of keys, thus the risk is transferred from the content to the keys.
This round table will look at issues such as the main driving force of encryption, the data that should be protected and the best moment to encrypt this data.