85 episodes

Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.

Security Insider - Podcast Edition Townsend Security

    • Technology
    • 4.3, 14 Ratings

Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.

    State of Encryption Key Management - 2020

    State of Encryption Key Management - 2020

    By many, encryption is considered the hardest part of data security, and key management the hardest part of encryption. As such, it is far too common to see businesses not properly storing their encryption keys - for example, keeping them in a database in the clear or even burned into their application’s code. This podcast discusses the latest trends and perspectives around encryption key management and how to better protect your data.

    Join Patrick Townsend, Founder and CEO of Townsend Security, as he discusses the current state of encryption key management, databases/applications that natively support encryption key management, meeting evolving compliance requirements, and how to save money with encryption key management.

    • 25 min
    Don’t Forget FIPS and Other Fundamental Key Management Features

    Don’t Forget FIPS and Other Fundamental Key Management Features

    Over the last several years, encryption key management has attained “essential infrastructure” status. When done properly, key management can protect encrypted data - and in the event of a data breach, can even provide a company with an exemption for a breach notification.

    Download this podcast to learn about:

    - What enterprises should look for in an encryption key manager

    - The importance of standards (FIPS 140-2, PCI DSS validation, etc.)

    - Meeting data security compliance (PCI DSS, GDPR, HIPAA, etc.) requirements with encryption key management

    - KMS (Key Management Server) vs. KMS (Key Management Service)

    • 22 min
    Protecting Data with vSphere & vSAN Encryption

    Protecting Data with vSphere & vSAN Encryption

    VMware virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that have previously been impossible for organizations constrained within a traditional IT data center world. With vSphere version 6.5 and vSAN version 6.6 VMware customers now have the ability to encrypt VMware managed virtual machines and virtual disk.

    Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about how to protect data in VMware with encryption and key management.


    Download this podcast to learn about:
    - vSphere and vSAN encryption
    - Deploying multiple, redundant key servers as a part of the KMS Cluster configuration
    - Meeting compliance regulations and security best practices (PCI DSS, GDPR, etc.)

    • 16 min
    GDPR, Encryption, & Right of Erasure

    GDPR, Encryption, & Right of Erasure

    The European General Data Protection Regulation (GDPR) is radically transforming the information technology space. Organizations of all sizes and types, and cloud service providers large and small, must adjust to the notion that people now fully own information about themselves.

    Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about how to use encryption and key management to help meet GDPR, the right of erasure, also known as the right to be forgotten, and how to avoid bad key management practices which will result in GDPR compliance failures.

    Download this podcast to learn about:
    - Data security requirements of GDPR
    - Right of erasure (also known as "the right to be forgotten")
    - Meeting GDPR with encryption and key management
    - The importance of standards and best practices

    • 22 min
    IBM i, Two Factor Authentication, and PCI DSS

    IBM i, Two Factor Authentication, and PCI DSS

    PCI DSS requiress two factor authentication (also known as multifactor authentication) - something you know and something you have. For IBM i users, this usually means a password and an authentication code provided to a token or mobile device. However, tokens are expensive and are frequently lost - and SMS messages to mobile devices have become a deprecated method.

    Join Patrick Townsend, Founder and CEO of Townsend Security, as he discusses the PCI recommendations, how to meet 2FA compliance requirements with a mobile based solution, and how Townsend Security is helping IBM i users meet the latest two factor authentication compliance requirements.

    Download this podcast to learn about:
    - PCI DSS and NIST requirements for two factor authentication

    - Protecting critical data on the IBM i with two factor authentication

    - Mobile based authentication with Twilio's Authy

    - Introduction to Alliance Two Factor Authentication

    • 15 min
    Big Data, MongoDB, & Encryption

    Big Data, MongoDB, & Encryption

    It is difficult to say big data without instantly thinking about MongoDB. As enterprises adopt MongoDB, they also bring security concerns with them. Depending on their business, they may have multiple government (HIPAA, GDPR, FFIEC, etc.) or business (PCI DSS, etc) security regulatory standards with which they need to comply.

    Join Patrick Townsend, Founder and CEO of Townsend Security, as he talks about leveraging the WiredTiger storage engine, achieving a strong security posture with key management, and how to easily begin encrypting data in MongoDB Enterprise.

    Download this podcast to learn about:
    - Encryption using the WiredTiger storage engine - no need to buy 3rd party encryption!

    - Easily generate a master encryption key and begin encrypting database keys using native command line operations

    - Meeting compliance requirements (PCI DSS, HIPAA, GDPR, etc.)

    - The importance of KMIP

    • 19 min

Customer Reviews

4.3 out of 5
14 Ratings

14 Ratings

Roberts RN BSN ,

HIPAA Compliance and Business Associates Cloud Service Providers and More

I enjoyed the podcast: HIPAA, HITRUST, Security and their Relationships. One point that cannot be emphasized enough: If a Business Associate is not complaint with HIPAA regulations, the Covered Entity could be fined and/or penalized right along with the Vendor. If a Covered Entity is fined, depending on the reason, the Vendor could be fined and/or penalized as well. This fact that may be new to many in the Healthcare Vendor world. Any questions? Shoot me a Tweet @rn_solutions!

Top Podcasts In Technology

Listeners Also Subscribed To