![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjE2MTc2NDU2.jpg)
IBM Z16![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjc1NzQ1Nzg1Mg.jpeg)
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjc1NzQ1Nzg1Mg.jpeg)
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjc1NzQ1Nzg1Mg.jpeg)
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjYxODMxNjg4Ng.png)
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjYxNDgyNTAw.jpg)
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjYxODMxNjg4Ng.png)
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjYxODMxNjg4Ng.png)
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjc1NzQ1Nzg1Mg.jpeg)
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjc1NzQ1Nzg1Mg.jpeg)
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjYxNDgyNTAw.jpg)
After a #databreach, will having pervasive encryption help a company get back to business?
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjc1NzQ1Nzg1Mg.jpeg)
Dominic Trott
(1/3) Poor key management may give malicious actors not only access to data, but also to encryption keys
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjc1NzQ1Nzg1Mg.jpeg)
Dominic Trott
(2/3) Loss of the keys means not only compromised data, but also genuine users may be locked out
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjc1NzQ1Nzg1Mg.jpeg)
Dominic Trott
(3/3) Pervasive encryption, including centralised key management, helps prevent this
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjYxODMxNjg4Ng.png)
Guillaume H⭕️areau
Sure, better protecting their data, is a like a quality insurance.
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjYxNDgyNTAw.jpg)
Adam Jollans
There's also the challenge of restoring trust in a company following a data breach - pervasive encryption can be part (but not all) of the solution here
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjYxODMxNjg4Ng.png)
Guillaume H⭕️areau
Moreover, #pervasiveEncryption and #GDPR – Controllers may not need to report breach to data subjet if the data was encrypted.
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjYxODMxNjg4Ng.png)
Guillaume H⭕️areau
@adamjollans Absolutly true, this is not the alpha and the omega, but part of the solution. It needs to be completed by others security measures
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjc1NzQ1Nzg1Mg.jpeg)
Dominic Trott
@GuillaumeIBM quite right - in fact reputational damage expected to be far more 'costly' than fines for non-compliance
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjc1NzQ1Nzg1Mg.jpeg)
Dominic Trott
@adamjollans this is why it is so important that boards are making decisions based on a proper understanding of the risk they face!
![](https://crowdspotsimages.s3-us-west-2.amazonaws.com/profile-images/dXNlcjp0d2l0dGVyOjYxNDgyNTAw.jpg)
Adam Jollans
and it's the Board members who will get the blame if there's a signficant data breach