Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Cybersecurity vs. Tokenization

RSA Conference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the debate surrounding tokenization as a data protection method and its impact on cybersecurity in this 42-minute conference talk from RSA Conference. Delve into the who, what, where, when, how, and why of using tokens, led by Sandra Lambert, CEO of Lambert & Associates. Examine various tokenization environments, detokenization methods, and cryptographic approaches including encryption, MAC, random, and table methods. Gain insights into EMV payment tokenization and non-payment tokenization applications. Learn to apply the knowledge gained and draw conclusions about the effectiveness of tokenization in enhancing or potentially hindering cybersecurity efforts.

Syllabus

Intro
Cybersecurity vs. Tokenization - Agenda
Who Wants Tokenization and Where?
When Can It Be Used?
What is Detokenization? Encryption Method
What is Detokenization? MAC Method
What is Detokenization? Table Method
EMV Payment Tokenization
Non-Payment Tokenization
Tokenization Environments: Internal
Tokenization Environments: Multiple
Tokenization Isolation
Cryptography: Encryption Method
Cryptography: MAC Method
Cryptography: Random Method
Cryptography: Table Method
Apply What You've Learned Today...
Conclusions
References

Taught by

RSA Conference

Reviews

Start your review of Cybersecurity vs. Tokenization

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.