CXOInsights by CXOCIETY

PodChats for FutureCIO: Securing data with key management systems


Listen Later

Encryption is meant to protect information so that when it falls into the wrong hands, it is unusable.

But what happens when your private key gets compromised? From what we understand, encryption technology is only as good as its weakest link – in this case, your private key becomes one of the weakest links.

Consider that if someone gets their hands on your keys then they’ll be able to decipher the sensitive information that you intended to keep safe and secure. Thus, cryptography keys are one of the most crucial assets that any company has, with the value of the key being equal to that of your most vital data.

In today’s PodChats for FutureCIO, we are joined by Nils Gerhardt, Chief Technology Officer, Ultimaco, who will walk us through some of the latest trends in key management systems.

1.                   Key management systems (KMS) – what are they and why do we need them? [explain to a non-IT/non-security professional]

2.                   What is the most significant advancement in KMS in recent years?

3.                   What business/operating conditions would warrant the use of KMS? 

4.                   Centralized vs Decentralized KSM – how to decide which is best for my operating model?

5.                   In the digital economy where many business initiatives are reliant on software technology, why do we need a hardware-based solution such as HSM?

6.                   Can you provide perhaps the top 3 guidelines when choosing a key manager?

7.                   Long-term trends, quantum computing a real threat to our KSM strategies today?

8.                   In addition to KMS and HSMs, are there other relevant trends and areas to consider?

9.                   PQC – crypto systems, crypto agility, 



...more
View all episodesView all episodes
Download on the App Store

CXOInsights by CXOCIETYBy CXOCIETY | FutureCIO FutureCFO FutureIoT