• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Logic Central Academy

Technological Era Education and Training

  • Contact me
  • Home
  • About
  • Education and Training
    • Cyber Security Courses
      • Cyber Security Career Guidance Series
      • Security Management for Critical infrastructure Series
      • Secure Coding Series
      • Secure Testing Series
    • License Training Material
    • Mentoring
  • Consulting
  • Speaking
  • Categories
    • Business Management
    • Security Management
      • Data Lifecycle Management
      • Trust Management
      • Secrets Management
      • Supply Chain Management
    • Cyber Security
    • Critical Infrastructure
    • Self Help
    • Publications
    • Partners
    • Uncategorized
You are here: Home / Critical Infrastructure / Managing Cryptographic Keys for Critical Infrastructure

Managing Cryptographic Keys for Critical Infrastructure

July 17, 2014 by admin 3 Comments

Share:
LinkedIn0
Facebook0
Twitter0
Google+0

NetworkedTAchainVideo Introduction to my latest article on Fierce Smart Grid. Listen to see how my research path led me to Security Management as a practice.

The content for this article is on Fierce Smart Grid and lays the ground work for future topics on Secrets Management for Critical Infrastructure.

Article Link: Why critical infrastructure needs both asynchronous and synchronous components

For more content on the topic of cryptographic key management, check out this introduction video clip to “Secrets Management for critical Infrastructure” which was taken from my latest course on “Security Management for Critical Infrastructure”.

Filed Under: Critical Infrastructure, Secrets Management, Security Management

Reader Interactions

Comments

  1. prelatura says

    August 6, 2014 at 8:53 pm

    Do you mind if I quote a few of your posts as long as
    I provide credit and sources back to your website? My blog is in the exact same area of interest as yours and my users would certainly benefit from a lot
    of the information you present here. Please let me know if this
    okay with you. Many thanks!

    Reply
    • admin says

      August 7, 2014 at 12:36 pm

      Glad to see others working in the area, Lets connect by private message and determine the best path

      Reply
  2. 1900322757 says

    August 12, 2014 at 2:44 pm

    Wonderful post! We are linking to this great post on our website.
    Keep up the great writing.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Christopher Gorog Coffee With Chris Podcast, Listen or join candid talks with the Logic Central Academy Founder. Visit our Media Site.

Connect With Me Online

  • Email
  • Facebook
  • LinkedIn
  • YouTube

RECENT POSTS

  • (no title)
  • Cyber Security needs a Socio-Technological era solution
  • Exciting New High School Concept
  • A Call for Participation in IoT Cyber Research
  • CWC Cyber – Conversation with DHS’s Chuck Brooks

Copyright © 2023 · Genesis Framework · WordPress · Log in