Maintaining Your Pervasive Encryption Environment
				Project and Program: 
Enterprise Data Center, 
Security and Compliance
				Tags: 
Proceedings, 
SHARE Phoenix 2019, 
2019
		
		
		
			
		Join this session to discuss best practices for maintaining your pervasive encryption environment. Do you have a key archival policy? Do you have a key backup policy? Do you have a key validity policy? Do you have a key rotation policy? Does your data set retention policy line up with your key retention policy?-Eysha Shirrine Powers-IBM
		
		
		
		
		
		
	
 Back to Proceedings File Library