The EU Open Source Policy Summit 2024
Open Source Driving the European Digital Decade | Belgium
01 April 2015
*** White Paper now available ***
A consensus is growing among IT security experts that security must focus on the data itself, instead of its physical location or the infrastructure (on-premise vs off-premise, specific geographic locations etc.). This helps ensure that data will remain safe even if physical access to the device holding the data is gained.
Encryption is one of the most effective data protection controls available today, as part of a defense-in-depth approach, being correlated with good authentication, authorisation and auditing. When data is encrypted, the access is regulated through the distribution of keys, thus the risk is transferred from the content to the keys.
This round table will look at issues such as the main driving force of encryption, the data that should be protected and the best moment to encrypt this data.