Join us for a 30-minute webcast to look at the impact of cryptography failures.
In this session we’ll show you the different ways cryptography can be subverted by attackers, and look at real case studies of breaches for each risk. In each study we’ll examine the exact cause of the weakness in the way cryptography was deployed, and the consequences and impact for the company that was breached.
Case studies will include:
– Capital One: why didn’t their cloud encryption protect their data?
– Uber: how can a hardcoded credential cause a $150M fine?
– Equifax: what was the role of weak random numbers in the botched recovery?
This is part 1 of a two-part series. View Part 2.