Главная
Study mode:
on
1
Intro
2
Cybersecurity vs. Tokenization - Agenda
3
Who Wants Tokenization and Where?
4
When Can It Be Used?
5
What is Detokenization? Encryption Method
6
What is Detokenization? MAC Method
7
What is Detokenization? Table Method
8
EMV Payment Tokenization
9
Non-Payment Tokenization
10
Tokenization Environments: Internal
11
Tokenization Environments: Multiple
12
Tokenization Isolation
13
Cryptography: Encryption Method
14
Cryptography: MAC Method
15
Cryptography: Random Method
16
Cryptography: Table Method
17
Apply What You've Learned Today...
18
Conclusions
19
References
Description:
Explore the debate surrounding tokenization as a data protection method and its impact on cybersecurity in this 42-minute conference talk from RSA Conference. Delve into the who, what, where, when, how, and why of using tokens, led by Sandra Lambert, CEO of Lambert & Associates. Examine various tokenization environments, detokenization methods, and cryptographic approaches including encryption, MAC, random, and table methods. Gain insights into EMV payment tokenization and non-payment tokenization applications. Learn to apply the knowledge gained and draw conclusions about the effectiveness of tokenization in enhancing or potentially hindering cybersecurity efforts.

Cybersecurity vs. Tokenization

RSA Conference
Add to list
0:00 / 0:00