Encrypting is easy. Doing it right is not.
BitLocker is built into Windows—but if you think just turning it on is enough, think again. In this deep-dive session, Sami Laiho reveals the most common mistakes organizations make when deploying BitLocker—and how attackers exploit them.
You’ll learn how to configure BitLocker securely and correctly, avoid key exposure, and harden against real-world threats. This session cuts through the myths and delivers the clear guidance you need to protect data, devices, and recovery paths.
Whether you're deploying BitLocker for the first time or reviewing an existing setup, you’ll leave with a hardened, tested, and field-proven blueprint.
This is BitLocker done right—from boot to breach resilience.
You will learn:
- The critical security configurations required for a hardened and enterprise-grade BitLocker deployment.
- How to protect encryption keys and recovery mechanisms from exposure, abuse, or theft.
- Practical insights into defending against real-world attack scenarios, including device theft, firmware attacks, and bypass techniques.