Many security experts excel at working with traditional technologies but fall apart in utilizing newer data privacy techniques to balance compliance requirements and the business utility of data. This session will discuss how to grow out of a siloed mentality and into an enterprise risk management approach to regulatory compliance and technical roles, including technical data privacy and security issues. The session uses practical lessons learned in applying real-life concepts and tools to help security leaders and their teams craft and implement strategies. These projects deal with a variety of use cases and data types. A common goal is to find the right balance between compliance, privacy requirements, and the business utility of data. The session will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will position techniques like pseudonymization, anonymization, tokenization, homomorphic encryption, dynamic masking, and more. Topics include:
1. Zero Trust Architecture
4. Applications, Privacy by Design, and APIs
5. Machine Learning and Analytics
6. Secure Multi-party Computing
7. Web 3.0, Blockchain and Data Lineage
8. Hybrid Cloud, CASB, and SASE
Data is everywhere. Data growth has been expedited since the start of cloud and has been on fire since 2020 due to digital transformation. With all this growth, the risk of data exposure or breach has been increasing exponentially. In this session, the speaker will talk about how to simplify the problem and provide the order of the measures that can be taken to build reasonable security around the data.