How Encryption Works

Loading Events
This event has passed.

 

Please join us for our February webinar:

How Encryption Works

 

Date: Thursday, February 25, 2021

Time: 12pm MT/2pm ET – 1pm MT/3pm ET

Length: 1 hour

Encryption is a powerful security tool that can protect confidential data, stop hackers from breaking in, and verify the identity of remote users. But how does this mysterious technology work? We’ll explain the basic concepts of encryption in a way that anyone can understand, and demystify common technologies like web site encryption, hard drive encryption, certificate-based authentication, digital signing, and more. Along the way, we’ll learn about the ways that hackers bypass and break encryption, and the key steps you can take to use it most effectively. As a bonus, we’ll learn about how cryptocurrency works, since it uses the same technology! After watching this talk, you’ll understand how encryption works, why it sometimes doesn’t, and what you can do to protect your organization.

Speaker:

Sherri Davidoff is the CEO of LMG Security and the author of the recently released book “Data Breaches.” As a recognized expert in cybersecurity and data breach response, Sherri has been called a “security badass” by The New York Times. She has conducted cybersecurity training for many distinguished organizations, including the Department of Defense, the American Bar Association, FFIEC/FDIC, and many more. She is a faculty member at the Pacific Coast Banking School, and an instructor for Black Hat, where she teaches her “Data Breaches” course. She is also the co-author of Network Forensics: Tracking Hackers Through Cyberspace (Prentice Hall, 2012), a noted security text in the private sector and a college textbook for many cybersecurity courses. Sherri is a GIAC-certified forensic examiner (GCFA) and penetration tester (GPEN), and holds her degree in Computer Science and Electrical Engineering from MIT. She has also been featured as the protagonist in the book, Breaking and Entering: The Extraordinary Story of a Hacker Called “Alien”.