Partially Redacted: Data, AI, Security, and Privacy

Encryption Key Management and Its Role in Modern Data Privacy with Skyflow’s Osvaldo Banuelos


Listen Later

When managing your company’s most sensitive data, encryption is a must. To fit your overall data protection strategy, you need a wide range of options for managing your encryption keys so you can generate, store, and rotate them as needed.


The risk of sensitive data being misused or stolen can be limited, as long as just the people (and services) who are authorized to access data for approved purposes can access the key. Without proper management of encryption keys robust encryption techniques can be rendered ineffective. So, while encryption is a core feature of any effective data privacy solution, encryption only enhances data privacy when paired with effective key management.

Osvaldo Banuelos, lead software engineer at Skyflow, joins the show to share his knowledge and expertise about encryption key management and its role in modern data privacy.

Topics:

  • Can you share some of your background from where you started your engineering career to where you are today?
  • How did you end up with an interest in working in the data privacy space? And what’s your work history in this space?
  • What are the fundamentals of encryption?
  • How do you protect against the key being leaked and rendering encryption ineffective?
  • What is an encryption key management system?
  • What are the components of an effective key management system?
  • How often should a key be rotated and does a KMS provide that functionality out of the box?
  • How does key rotation work?
  • Who within an organization is typically responsible for key management?
  • What are some of the popular KMS systems on the market today?
  • From a feature perspective, are they all the same or are their pros and cons to one over the other?
  • How does key management work in Skyflow?
  • When it comes to data privacy, you likely want to protect your customer data using encryption and to do that effectively, you need a robust key management system. Is this enough or are there other technologies a company would need to incorporate to have an effective privacy and compliance strategy?
  • What are the big gaps in data privacy today? What future technology or development are you excited about?
  • Where should someone looking to learn more about the data privacy space begin?
  • Resources:

    • Encryption Key Management and Its Role in Modern Data Privacy
    ...more
    View all episodesView all episodes
    Download on the App Store

    Partially Redacted: Data, AI, Security, and PrivacyBy Skyflow

    • 4.8
    • 4.8
    • 4.8
    • 4.8
    • 4.8

    4.8

    19 ratings


    More shows like Partially Redacted: Data, AI, Security, and Privacy

    View all
    Security Now (Audio) by TWiT

    Security Now (Audio)

    1,952 Listeners

    This American Life by This American Life

    This American Life

    90,431 Listeners

    Uncanny Valley | WIRED by WIRED

    Uncanny Valley | WIRED

    367 Listeners

    Freakonomics Radio by Freakonomics Radio + Stitcher

    Freakonomics Radio

    32,134 Listeners

    a16z Podcast by Andreessen Horowitz

    a16z Podcast

    1,009 Listeners

    Software Engineering Daily by Software Engineering Daily

    Software Engineering Daily

    624 Listeners

    Hidden Brain by Hidden Brain, Shankar Vedantam

    Hidden Brain

    43,406 Listeners

    Acquired by Ben Gilbert and David Rosenthal

    Acquired

    3,675 Listeners

    The Daily by The New York Times

    The Daily

    112,857 Listeners

    Up First from NPR by NPR

    Up First from NPR

    56,209 Listeners

    Hacking Humans by N2K Networks

    Hacking Humans

    304 Listeners

    Lex Fridman Podcast by Lex Fridman

    Lex Fridman Podcast

    12,708 Listeners

    All-In with Chamath, Jason, Sacks & Friedberg by All-In Podcast, LLC

    All-In with Chamath, Jason, Sacks & Friedberg

    8,385 Listeners

    Hard Fork by The New York Times

    Hard Fork

    5,393 Listeners