Attacking and Defending Full Disk Encryption

Preview:

DESCRIPTION

One of your company's laptops was just stolen.  You know that there was sensitive information on the machine.  You also know that full disk encryption was deployed.  Is your data safe?  Can you prove it? Many organizations are flocking to full disk encryption as a solution to their data security requirements.  Unfortunately, many of these installations view the deployment of full disk encryption as a panacea for any and all security concerns for their laptop fleets.  All too often, these systems are neither properly configured nor adequately tested. In this talk, Tom will analyze the challenges associated with both attacking and defending systems protected with full disk encryption.  Many of the examples provided will draw from Tom's personal experience, including a case where a fully encrypted and powered down system was able to be fully compromised as part of a penetration test.

Citation preview

Recommended