You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
Go to file
Jens Neuhalfen 9a3d029df8 REdI edition 4 years ago
README.inc Extend README 6 years ago
assets Add slides tradeoff value/liability & airbag slide 6 years ago
docs Prepare for 1E3 5 years ago
examples Provide an example for public key en-/decryption 6 years ago
slides REdI edition 4 years ago
.gitignore Initial import 6 years ago
LICENSE.md Initial import 6 years ago
Neuhalfen_Content-Encryption.pdf Prepare for 1E3 5 years ago
README.md Fix link to PDF 5 years ago

README.md

Say Thanks!

Sleep Better With Content Encryption

Content encryption can secure data even when the database has left the company. Effective content encryption not only makes attackers life harder, it also provides sound sleep for management, OPs, and everybody else responsible for data.

But there is another, equally important side: Microservices, Big Data, Machine Learning — these are the buzzwords that make a developers eye gleam.

In reality these are often replaced by Integrating legacy systems, file based data exchange via ftp, and laws & compliance.

Content encryption and other cryptographic measures can help bring together technology and the ugly side of business. Though they are not for the careless to implement. This slide deck will give you a very short introduction into the why and how of implementing cryptography into your applications.

You might even push snooze on your alarm clock when the next Heartbleed hits the news.

Where

Slides

Here are some example slides. The whole presentation (Keynote) can be found here. A pdf export is also available. You can view the slides in your browser.

Topic Slide

Disclaimer

Value of data

Why?

Why?

Data classification

Trust Anchors

Pattern 1/2

Pattern 2/2

Transparent Encryption 1

Transparent Encryption 2

Storing Keys

Algorithm Rollover

Login

Data Integrity

Access Control

LICENSE

CC BY-SA 4.0