Skip to content

Avoiding Cybercrime: "Zero Knowledge” end2end Encryption Practices & Challenges

Photo of James Hunter
Hosted By
James H. and Vishwas M.
Avoiding Cybercrime: "Zero Knowledge” end2end Encryption Practices & Challenges

Details

Speaker: David Szabo, Senior VP of Tresorit

The speaker change was due to unexpected travel schedule change.

If you store data in the cloud today, there’s somebody out there who wants to hack you. WhatsApp and Viber recently turned on end2end encryption to protect their users’ chat sessions from the increasing amount of threat to identity and privacy. Did you know that identity theft runs as a free market on the dark web today, where anybody can buy stolen identity with money-back guarantee... yes, seriously. “Zero knowledge” is the next big thing: hated by governments, but the ultimate way to protect data without compromise. In this session, we’ll walk you through how “zero knowledge” encryption works in practice and what are the challenges ahead of us to make it usable.

Speakers Bio

David is Senior Vice President of Tresorit's platform business & product in San Francisco. He’s on a mission to empower developers to deliver unbreakable data privacy and security to their customers: https://tresorit.com/0_kit

To date, David spent a total of 18 years across 4 countries in engineering, UX and business leadership roles and launched his own Social Network Analysis startup, CX-Ray. He worked 12 years at Microsoft, in his most recent position was part of the core business development team that launched Microsoft's Azure developer cloud and established the largest partnership deals, such as the one with ServiceNow: http://finance.yahoo.com/news/servicenow-adds-microsoft-azure-cloud-120000546.html

CSA SV Chapter Meeting Presentation will cover:

• Analysis of data breaches

• Industry-standard security architectures to tackle breaches

• Client-side encryption Vs the industry standard “channel + at-rest encryption” and the risks the latter carry

• What is “zero knowledge” encryption?Examples of end2end encryption solutions in the market

• A reference architecture for “zero knowledge” encryption using Tresorit’s soon to be open-source SDK

• The complex key management that makes the architecture true “zero knowledge”

• A sample “zero knowledge” application and code for developers

Photo of CSA Silicon Valley: Cloud/ AI Governance & Security group
CSA Silicon Valley: Cloud/ AI Governance & Security
See more events