05-16-13 | Blog Post

Encryption at the Software Level: Linux and Windows

Blog Posts

Encryption’s the name of the game these days, whether it’s at the software, hardware or storage level. And it’s an industry best practice for organizations that need to meet HIPAA and PCI compliance. We’ve got three webinars lined up for the month of June with IT security professionals to help educate you and take your questions about encryption.

For the first one of the series, join Chris Heuman, Practice Leader for RISC Management and Consulting for a discussion on the value of encryption for HIPAA, PCI and many other regulatory frameworks and the successful components of a data security program that integrates encryption. Find out how you can sign up online for Encryption – Perspective on Privacy, Security & Compliance.

The second in the encryption webinar series features Mark Stanislav, Security Evangelist at Duo Security as he discusses encryption for Linux, and Farooq Ahmed, Software Development Manager of Online Tech who will cover encryption for Windows.

Title: Encryption at the Software Level: Linux and Windows
When: Tuesday, June 18, 2013 @2PM ET
Description: Join Farooq Ahmed, Software Development Manager for Online Tech and Mark Stanislav, Security Evangelist for Duo Security, for an informative webinar on encryption at the software level for Linux and Windows.  Farooq and Mark will discuss how encryption can be applied at various levels, from the software application code.

Impacts on performance, backup, security, and available resources may suggest very different encryption implementations. This webinar explores the variety of places where encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ.

Mark StanislavMark Stanislav, Security Evangelist, Duo Security
Mark Stanislav is the Security Evangelist for Duo Security, an Ann Arbor-based startup focused on two-factor authentication and mobile security. With a career spanning over a decade, Mark has worked within small business, academia, startup, and corporate environments, primarily focused on Linux architecture, information security, and web application development.

Mark earned his Bachelor of Science Degree in Networking & IT Administration and his Master of Science Degree in Technology Studies, focused on Information Assurance, both from Eastern Michigan University. Mark also holds his CISSP, Security+, Linux+, and CCSK certifications.

Farooq_AhmedFarooq Ahmed, Software Development Manager, Online Tech
Farooq Ahmed is Online Tech’s Software Development Manager and is the Chief Architect of OTPortal, Online Tech’s feature-rich dashboard which delivers on-demand access to server monitoring, management and customer support 24×7.

His career spans more than 14 years with analysis, design and .Net development with VB.Net and C#. Farooq has designed components for online payment systems and the banking industry. Farooq earned a Master’s in Computer Science from the University of Karachi.

Stay tuned for info on our third encryption webinar! And read more about encryption in:

Federal Health IT Budget Increases by 28 Percent: Encryption, Mobile Security & EHR Safety
The proposed federal fiscal 2014 budget calls for a 28 percent increase to support further development of health IT initiatives while taking over where HITECH funding stops (ending in fiscal year 2013). The Office for Civil Rights’ (ONC) funding will … Continue reading →

2013 State of HIPAA Encryption & Authentication for Healthcare
According to the Healthcare Information Security Today report, 2013 Outlook: Survey Offers Update on Safeguarding Patient Information, most healthcare organizations believe that encryption would greatly improve their data security. Forty-one percent plan to encrypt all mobile devices and removable media, … Continue reading →

Encrypting Data to Meet HIPAA Compliance
To address the question of whether or not to use data encryption when it comes to meeting HIPAA compliance and keeping patient health information (PHI) protected, let’s revisit the Health Insurance Portability and Accountability Act of 1996 (HIPAA): … Continue reading →

Overwhelmed by cloud chaos?
We’re cloud experts, so you don’t have to be.

© 2024 OTAVA® All Rights Reserved