By submitting, you agree to our privacy policy.


Subjects Covered:

  • What is Cryptography Inventory?
  • Why make a Cryptography Inventory?
  • How Cryptography Goes Wrong
  • Exploitable Crypto Deployment Errors
  • Can a cryptography inventory help in mitigating these risks?
  • Can a cryptography inventory aid migration to public cloud?

This recording is from a live training session held recently in Paris. For privacy, the faces and voices of the attendees have been removed.