Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the debate surrounding tokenization as a data protection method and its impact on cybersecurity in this 42-minute conference talk from RSA Conference. Delve into the who, what, where, when, how, and why of using tokens, led by Sandra Lambert, CEO of Lambert & Associates. Examine various tokenization environments, detokenization methods, and cryptographic approaches including encryption, MAC, random, and table methods. Gain insights into EMV payment tokenization and non-payment tokenization applications. Learn to apply the knowledge gained and draw conclusions about the effectiveness of tokenization in enhancing or potentially hindering cybersecurity efforts.
Syllabus
Intro
Cybersecurity vs. Tokenization - Agenda
Who Wants Tokenization and Where?
When Can It Be Used?
What is Detokenization? Encryption Method
What is Detokenization? MAC Method
What is Detokenization? Table Method
EMV Payment Tokenization
Non-Payment Tokenization
Tokenization Environments: Internal
Tokenization Environments: Multiple
Tokenization Isolation
Cryptography: Encryption Method
Cryptography: MAC Method
Cryptography: Random Method
Cryptography: Table Method
Apply What You've Learned Today...
Conclusions
References
Taught by
RSA Conference