Watch the recorded session of Key Management Best Practices:
Did you miss the Key Management Best Practices webinar or would like to watch it again? You can now view the session's recording and material online.
During the webinar, QuintessenceLabs CTO John Leiseboer discussed the challenges of managing encryption keys and other cryptographic objects, the best practices for key management, how they work, and what they mean for a successful key management deployment.
- The most important encryption key management recommendations and best practices from the cyber security space
- How a successful key management deployment can strengthen your data protection strategy
- What to look for in a key manager for successful encryption deployments and what QuintesseceLabs' key & policy manager offers
Chief Technical Officer
John has worked in the fields of communications, and information security for over thirty-five years, designing and architecting commercial and military communications and information security hardware, software and systems.
He is also the founding CTO at QuintessenceLabs, responsible for the research, design and development of key management, comsec and infosec products. He has contributed to the development of multiple major security standards.
Director Enterprise Sales, APAC
Vince Lee is an experienced executive sales and business development manager with over 25 years of experience in the information security industry across the APAC region. He has worked closely with government organisations, FSI’s and large enterprises to deliver endpoint, network, identity, data, and transaction security solutions.