This document discusses encryption techniques for securely transmitting data. It begins with an introduction to public key infrastructure (PKI) and how certificates are used with root certification authorities and subordinate certification authorities. It then provides recommendations for using Transport Layer Security (TLS) to encrypt network traffic, including enabling strong cipher suites and disabling weak ones like SSL 3.0. It also discusses using Internet Protocol Security (IPSec) for encryption. The document cautions that compliance with security standards does not guarantee security and that individual environments still require security policies and practices. It concludes by taking questions about any of the topics covered.