Skip to main content

CyberHawaii.org

"Encryption:  Mandatory Today, Obsolete Tomorrow?"

Views expressed in this cybersecurity, cyber awareness news update are those of the reporters and correspondents.  Accessed on 01 June 2024, 0211 UTC.

Content and Source:  https://mail.google.com/mail/u/0/#inbox/FMfcgzQVwnZnLKxCDcJrKdSDzqbkzWhM/CyberHawaii.org.

Please scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net).

2024 Fortify Cybersecurity Webinar Series


CyberHawaii and the Cybersecurity & Infrastructure Security Agency present...


Encryption: Mandatory Today, Obsolete Tomorrow?


Tuesday, June 4, 2024

2 pm - 3 pm

Register today!

The risk of data theft requires the use of AES level encryption for valuable data when it’s at rest and in transit. Various types of encryptions are available today in both hardware and software forms, and it is important for businesses to know how these work and what options they have for implementing them.


SMB’s with heterogeneous technology environments such as Windows end points, cloud based apps/storage and Apple/Google mobile devices face the task of ensuring that their data is encrypted in and between each of these environments. An additional layer of complexity comes in when businesses have network enabled measuring devices that transmit sensitive information via W8-Fi (such as in clinics and with security cameras). Since these do not always allow for configuration, it’s important for businesses to be aware of the type of encryption these devices are implementing.


And things are even more complicated with the advent of Quantum Computing which threatens to make the current form of encryption ineffective or obsolete.


In this webinar you’ll learn:

  • What data encryption is
  • How modern data encryption works
  • Some types of encryption are better than others
  • When encryption is bad for you (i.e., ransomware)
  • Should you lose sleep over Quantum Computing?
  • How to use encryption to protect your information and business

Presenter

Faaiuaso L. Lilo, Jr. is the CISA Region 9 first Cybersecurity Law Enforcement Liaison, which is a Cybersecurity Advisor co-located with FBI partners. J.R. retired from active-duty in the Air Force as Master Sergeant (E-7) after 23 years of service. He worked as an Exploitation Analyst and Cyber Intelligence Analyst for the NSA-Texas. His career in the military was in Network Intelligence Analysis, Computer System Operations, and Radio Communications. J.R. holds a Master’s in Cybersecurity and Bachelor’s in Information Technology.

Mahalo to our sponsors

This session is part of the 2024 Fortify Cybersecurity Webinar Series, sponsored by

CyberHawaii and CISA. This series was made possible by a grant from the Hawaii Department of Business, Economic Development and Tourism. Other supporters of this series include the State Office of Homeland Security, the FBI, Chamber of Commerce Hawai‘i, the Hawai‘i Defense Alliance and the University of Hawai‘i.

Register today!

CyberHawaii | www.cyberhawaii.org

Facebook  Twitter  Instagram

CyberHawaii | 2800 Woodlawn Drive, Suite 101G | Honolulu, HI 96822 US

Unsubscribe | Update Profile | Constant Contact Data Notice

Constant Contact

Comments

Popular posts from this blog

Cyber War News Today.

"International Defence Cooperation:  A key to regional stability." Views expressed in this cybersecurity, cyber espionage, and cyber crime update are those of the reporters and correspondents.  Accessed on 15 December 2024, 0134 UTC. Content and Source:   https://cyberwar.einnews.com/news/cyber-war-news?n=2&code=FA9GNesSTpp2rjO1&utm_source=NewsletterNews&utm_medium=email&utm_campaign=Cyber+War+News&utm_content=navig Please check link or scroll down to read your selections.  Thanks for joining us today. Russ Roberts (https://www.hawaiicybersecurityjournal.net). Cyber War News Monitoring Get by    Email    •     RSS Published on  Dec 13, 2024 The Cyber Warfare Market Size Reach USD 127.1 Billion by 2032 Exhibiting CAGR at 13.3% WILMINGTON, DE, UNITED STATES, December 13, 2024 /⁨EINPresswire.com⁩/ -- According to the report, The Cyber Warfare Market Size Reach USD 127.1 Billion by 2032 Exhibiting CAGR at 1...

The Cyberwire Daily Briefing

"Fortinet confirms breach of customer data." Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.  Accessed on 15 September 2024, 1339 UTC. Content and Source:   https://thecyberwire.com/newsletters/daily-briefing/13/176 Please check link or scroll down to read your selections.  Thanks for joining us today. Russ Roberts (https://www.hawaiicybersecurityjournal.net). V13 | Issue 176 | 9.13.24 Daily Briefing for 09.13.24 Announcement Cloud Security in the Age of Generative AI. Artificial Intelligence is revolutionizing business, but it also introduces new risks. Join us on Wednesday, September 18th at 2pm EDT for a compelling live webinar on "Good vs. Evil: Cloud Security in the Age of Generative AI" with N2K CyberWire’s Dave Bittner and Sysdig’s Loris Degioanni.  Learn more and register now . Summary By the CyberWire staff At a glance. Fortinet confirms breach of customer data. Iran's Scarred Manticore deplo...

SecurityWeek Briefing

"New RAMBO attack allows air-gapped data theft." Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.  Accessed on 10 September 2024, 0035 UTC. Content and Source:  https://www.securityweek.com Please check link or scroll down to read your selections.  Thanks for joining us today. Russ Roberts (https://www.hawaiicybersecurityjournal.net).   Monday, September 9 , 2024 Are you worried about unmanaged devices and apps? LATEST CYBERSECURITY HEADLINES New RAMBO Attack Allows Air-Gapped Data Theft Predator Spyware Resurfaces With Fresh Infrastructure Google Pushes Rust in Legacy Firmware to Tackle Memory Safety Flaws 300,000 Impacted by Data Breach at Car Rental Firm Avis One Million US Kaspersky Customers Transferred to Pango’s UltraAV Two Indicted in US for Running Dark Web Marketplaces Offering Stolen Information Critical SonicWall Vulnerability Possibly Exploited in Ransomware Attacks CISA Breaks Silence on Controvers...