
{"id":2491,"date":"2013-06-17T00:00:00","date_gmt":"2013-06-17T00:00:00","guid":{"rendered":"http:\/\/otava.test\/encryption-webinar-part-2-focus-on-software\/"},"modified":"2013-06-17T00:00:00","modified_gmt":"2013-06-17T00:00:00","slug":"encryption-webinar-part-2-focus-on-software","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/","title":{"rendered":"Encryption Webinar, Part 2: Focus on Software"},"content":{"rendered":"<p id=\"docs-internal-guid-51bcfc6e-527b-f90a-08a5-3ab8b50f2624\" dir=\"ltr\">Online Tech\u2019s month-long, in-depth look at encryption continues at 2 p.m. Tuesday, June 18, with the free informational and technical webinar <em><a href=\"https:\/\/onlinetech.com\/events\/encryption-at-the-software-level-linux-and-windows\">Encryption at the Software Level: Linux and Windows<\/a>.<\/em><\/p>\n<p dir=\"ltr\">The webinar is a follow-up to <a href=\"https:\/\/onlinetech.com\/events\/encryption-perspective-on-privacy-security-a-compliance\">the June 11 presentation<\/a> on the value of encryption for <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA<\/a><a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">, PCI<\/a> and other regulatory frameworks, and a precursor to <a href=\"https:\/\/onlinetech.com\/events\/encryption-at-the-hardware-and-storage-level\">a hardware and storage-focused<\/a> webinar scheduled for June 25.<\/p>\n<p dir=\"ltr\">Join a pair of security experts for a discussion on encryption at various levels of both Linux and Windows software application code.<\/p>\n<p dir=\"ltr\">Online Tech\u2019s own Farooq Ahmed will handle the Windows portion of the webinar. The company\u2019s software development manager says he\u2019s always been a fan of Microsoft, which is why he joined the .Net development shift more than a decade ago.<\/p>\n<p dir=\"ltr\">Ahmed built OTPortal, Online Tech\u2019s feature-rich dashboard that delivers on-demand access to server monitoring, management and customer support.<\/p>\n<p dir=\"ltr\">\u201cMy specialty is architecture,\u201d Ahmed said. \u201cSecuring data definitely comes with that.\u201d<\/p>\n<p dir=\"ltr\">Online Tech will welcome a guest co-host \u2013 Mark Stanislav from <a href=\"https:\/\/www.duosecurity.com\/\">Duo Security<\/a> \u2013 to handle the Linux portion of the presentation. His career has focused on Linux architecture in small businesses, academia, startups and corporate environments.<\/p>\n<p dir=\"ltr\">Stanislav started building his information security expertise years ago while working for a web hosting provider that \u201chad a lot of people breaking in and doing illegal stuff.\u201d<\/p>\n<p dir=\"ltr\">\u201cSecurity was built into my job role, and it kind of took off from there,\u201d says Stanislav, who now holds the title \u2018Security Evangelist\u2019 at Duo.<\/p>\n<p dir=\"ltr\">Together, Ahmed and Stanislav will discuss how performance, backup, security, and available resources may suggest very different encryption implementations. They\u2019ll explore the variety of places encryption can be used to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ.<\/p>\n<p dir=\"ltr\">Register for the webinar <a href=\"https:\/\/onlinetech.com\/events\/encryption-at-the-software-level-linux-and-windows\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online Tech\u2019s month-long, in-depth look at encryption continues at 2 p.m. Tuesday, June 18, with the free informational and technical webinar Encryption at the Software Level: Linux and Windows. The webinar is a follow-up to the June 11 presentation on the value of encryption for HIPAA, PCI and other regulatory frameworks, and a precursor to a hardware and storage-focused webinar scheduled for June 25. Join a pair of security experts for a discussion on encryption at various levels of both Linux and Windows software application code. Online Tech\u2019s own Farooq Ahmed will handle the Windows portion of the webinar. The company\u2019s software development manager says he\u2019s always been a fan of Microsoft, which is why he joined the .Net development shift more than a decade ago. Ahmed built OTPortal, Online Tech\u2019s feature-rich dashboard that delivers on-demand access to server monitoring, management and customer support. \u201cMy specialty is architecture,\u201d Ahmed said. \u201cSecuring data definitely comes with that.\u201d Online Tech will welcome a guest co-host \u2013 Mark Stanislav from Duo Security \u2013 to handle the Linux portion of the presentation. His career has focused on Linux architecture in small businesses, academia, startups and corporate environments. Stanislav started building his information security expertise&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2491","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Encryption Webinar, Part 2: Focus on Software | OTAVA<\/title>\n<meta name=\"description\" content=\"How encryption can be used to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encryption Webinar, Part 2: Focus on Software\" \/>\n<meta property=\"og:description\" content=\"How encryption can be used to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-17T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Encryption Webinar, Part 2: Focus on Software\",\"datePublished\":\"2013-06-17T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/\"},\"wordCount\":309,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/\",\"url\":\"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/\",\"name\":\"Encryption Webinar, Part 2: Focus on Software | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2013-06-17T00:00:00+00:00\",\"description\":\"How encryption can be used to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption Webinar, Part 2: Focus on Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encryption Webinar, Part 2: Focus on Software | OTAVA","description":"How encryption can be used to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/","og_locale":"en_US","og_type":"article","og_title":"Encryption Webinar, Part 2: Focus on Software","og_description":"How encryption can be used to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method.","og_url":"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/","og_site_name":"OTAVA","article_published_time":"2013-06-17T00:00:00+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Encryption Webinar, Part 2: Focus on Software","datePublished":"2013-06-17T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/"},"wordCount":309,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/","url":"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/","name":"Encryption Webinar, Part 2: Focus on Software | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2013-06-17T00:00:00+00:00","description":"How encryption can be used to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/encryption-webinar-part-2-focus-on-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Encryption Webinar, Part 2: Focus on Software"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2491"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2491\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2491"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}