Secrets Management

Saturday, September 20, 2014, 3:00pm – 3:45pm
Presented by Chris Gorog
Located in Industry Training
In track Professional Training

This session will give an overview of the requirements for security control and management of the sensitive components required for successfully organizing critical infrastructure security. This expanded view of Cryptographic Key management includes linking the operational security in each ICS embedded device to: the design & manufacturing processes, secret (key) provisioning, supply logistics, integration & configuring, and business operations

Bookmark the permalink.