SlideShare a Scribd company logo
1 of 16
Download to read offline
www.solid8.co.za | info@solid8.co.za
TRUST IN A
DIGITAL WORLD
P a t r i c k D e v i n e
( P a t r i c k @ s o l i d 8 . c o . z a )
# D F A 2 0 2 2 C o n f e r e n c e
Trust in a Digital
World
• Agenda
1. Trust in a Digital World
2. Assessing your Adversary
3. Data-Centric Security
• Encryption
• Tokenisation
• Confidential Computing
4. Conclusion
Data is the digital version of what makes us
human. All our families’ health records,
personal family incidents, where we holiday,
what we eat and drink, our detailed
financial records, subscriptions to what we
read and consume, our political and
religious affiliations, whom we associate
with, and where we drive.
Organisations store our digital lives on-
premises, in multiple locations,
transforming and re-architecting for
multi-cloud and multi-geographic for
ongoing data science-driven algorithms
for both historical and real-time
analytics and decision making.
How to protect this data?
Data is shared and accessed both legally and illegally
What is Digital Trust?
https://www.statista.com/
Assessing your Adversaries
Methodology
Doctrine
Organisation
Training
Materials
Leadership &
Education
Personnel
Facilities
1=Low; 5=high
DOTMLPF Methodology pronounced ‘dot-mil-p-f’
https://www.theguardian.com/world/2022/sep/18/russia-military-underperforming-ukraine
Assessing your Adversaries
Methodology
Doctrine 4
Organisation 3
Training 1
Materials 3
Leadership &
Education
2
Personnel 2
Facilities 3
https://www.theguardian.com/world/2022/sep/18/russia-military-underperforming-ukraine
DOTMLPF Methodology pronounced ‘dot-mil-p-f’
1=Low; 5=high
Assessing your Adversaries
Methodology
Doctrine 4 3
Organisation 3 4
Training 1 4
Materials 3 3
Leadership &
Education
2 4
Personnel 2 4
Facilities 3 3
https://www.theguardian.com/world/2022/sep/18/russia-military-underperforming-ukraine
DOTMLPF Methodology pronounced ‘dot-mil-p-f’
1=Low; 5=high
Assessing your Adversaries
Methodology
Doctrine 4 3 4
Organisation 3 4 4
Training 1 4 4
Materials 3 3 4
Leadership &
Education
2 4 4
Personnel 2 4 4
Facilities 3 3 4
https://www.theguardian.com/world/2022/sep/18/russia-military-underperforming-ukraine
DOTMLPF Methodology pronounced ‘dot-mil-p-f’
1=Low; 5=high
Data-Centric Security
VIP Customers
John
Smith
• Update data subject record and references to found PII
• Files, transactions, database records, log files, etc.
• Data subject relationship(s) with company
• PII shared with 3rd parties
Produce Master Catalog, Data Lineage, and Data Flow
Data Location, Quality, Accuracy, Duplicates, Copies
Data-Centric Security - Legacy Approach to Encryption Has Gaps
Data at rest
encryption
Column or
Table or File
encryption
Transport
Encryption
(TLS)
Application,
Access rules,
Firewalls
People,
Endpoints,
DLP Traditional security is not end to end.
• Security gaps exist across data at rest, in motion, in
use – that are regularly exploited*.
• ‘Data at rest’ is disk, file, or database encryption
• ‘Data in motion’ is Transport Layer Security (TLS)
• ‘Data in use’ and the transformation of ‘data at rest’
to ‘data in motion’ is NOT protected
*https://www.verizon.com/business/resources/reports/dbir/
GAP
GAP
GAP
GAP
GAP
GAP
Re-Encrypt
De-Crypt
Re-Encrypt
De-Crypt
Re-Encrypt
De-Crypt
Re-Encrypt
De-Crypt
Replace live data
in apps, data
stores, files
Create shared or
one-time data sets
for analytics
Classical
encryption
requires app &
schema changes
Available Options: Stateless Tokenization, Advanced Format-Preserving Encryption, Format Preserving Hashing
Data-Centric Security – Securing Data End to End
Format Preserving Tokenisation (FPT)
Examples of data
protection, access
with FPT
Name: John Smith
Address: 924 Eastland Street, Chicago, IL, 60007
RSAID: 8901275041086
Email: jsmith@corp.com
SUBID: N88880925
DOB: 27 – 01 - 1989
Name: Uhea Pmwun
Address: 580 Qeugbnjw Xowrt, Lwidlew, UP, 82423
RSAID: 89219835632937
Email: kowipy@glor.com
SUBID: N2783904
DOB: 15 – 15 - 1969
Name: John Smith
Address: 924 Eastland Street, Chicago, IL, 60007
RSAID: 2198356381086
Email: jsmith@corp.com
SUBID: N2783904
DOB: 27 – 01 - 1989
Live data converted
to secured* form –
data stays protected
Dynamic access and masking or
partial access for permitted users.
* Protected data can preserve referential integrity, or be fully randomized, pre-padded to adjust
length, prefixed or postfixed with meta data labels – flexible.
Confidential Computing
Threats to applications and data hosted in Cloud Infrastructure:
• Nation States – massive resources and time scales
• ‘Regular’ Attackers – for profit, chaos & fun
• Insider Threats – malicious insiders, application code bugs, mistakes, Root/Administrator access
• Subpoenas from Governments
Confidential Computing Consortium created via The Linux Foundation
• Trusted Execution Environment (TEE) – Isolated hardware-based runtime environment that enables data confidentiality, data and code integrity
• Enclave – a security feature within the TEE that creates a barrier that blocks ALL unauthorised users from ANY access to memory, application code, or data
Efforts are underway to Virtualise Confidential Computing Creation, Management, Portability
• Reduce the Attack Surface – Isolated protection from vulnerabilities that exist outside of hardened workloads
• Hardened Security – Access the latest, hardware-based security in the Intel, AMD & Arm CPUs.
• Any Applications – Scalable, flexible, and secure for any application – ‘Lift & Shift’
• Simple Deployments – Rapidly secure workloads
Conclusions
All the major cloud providers have developed Confidential Computing Capabilities that provide:
• Internally baked high-speed hardware-based encryption
• Hardware-based roots of trust
• Isolating data and application code physically
• Key Management
• As a new technology, there are challenges related to conflicting definitions and responsibilities of making it a reality
• When/if ‘privacy concerns’ become a strong business driver, Confidential Computing may become an obvious choice
• Linux Foundation Report: Confidential computing market to reach $54 billion in 2026
https://www.zdnet.com/article/linux-foundation-confidential-computing-market-to-reach-54-billion-in-2026/
Source: IDC Report ‘Secure Innovation Requires Confidential Computing’ – accessible from the link below:
https://info.anjuna.io/white-paper-secure-innovation-requires-confidential-computing-register.html
THANK YOU
1 0 0 8 S a x b y A v e , E l d o r a i g n e ,
C e n t u r i o n , G a u t e n g , 0 1 5 7
i n f o @ s o l i d 8 . c o . z a
PAT R I C K D E V I N E
+ 2 7 ( 0 ) 8 3 6 5 7 8 7 7 8
S I M O N E S A N TA N A
+ 2 7 ( 0 ) 8 3 2 0 0 5 0 0 9

More Related Content

Similar to Trust in a Digital World

Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsAbbie Hosta
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Denodo
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Net-Centric Data Strategy
Net-Centric Data StrategyNet-Centric Data Strategy
Net-Centric Data StrategyDaniel Risacher
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage PresentationMike Spaulding
 
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Edge Pereira
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionGianmarco Ferri
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPFidelis Cybersecurity
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxalex hincapie
 
Data Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak namData Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak namPT Datacomm Diangraha
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Peter GEELEN ✔
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...Ulf Mattsson
 

Similar to Trust in a Digital World (20)

Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Net-Centric Data Strategy
Net-Centric Data StrategyNet-Centric Data Strategy
Net-Centric Data Strategy
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Data Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak namData Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak nam
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 

More from itnewsafrica

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...itnewsafrica
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...itnewsafrica
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omniitnewsafrica
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023itnewsafrica
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retailitnewsafrica
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...itnewsafrica
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...itnewsafrica
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...itnewsafrica
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcareitnewsafrica
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcareitnewsafrica
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...itnewsafrica
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platformitnewsafrica
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Betteritnewsafrica
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...itnewsafrica
 

More from itnewsafrica (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omni
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retail
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcare
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcare
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platform
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Better
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
 

Recently uploaded

Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)Basil Achie
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfakankshagupta7348026
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation TrackSBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation TrackSebastiano Panichella
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 

Recently uploaded (20)

Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdf
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation TrackSBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 

Trust in a Digital World

  • 1. www.solid8.co.za | info@solid8.co.za TRUST IN A DIGITAL WORLD P a t r i c k D e v i n e ( P a t r i c k @ s o l i d 8 . c o . z a ) # D F A 2 0 2 2 C o n f e r e n c e
  • 2. Trust in a Digital World • Agenda 1. Trust in a Digital World 2. Assessing your Adversary 3. Data-Centric Security • Encryption • Tokenisation • Confidential Computing 4. Conclusion
  • 3. Data is the digital version of what makes us human. All our families’ health records, personal family incidents, where we holiday, what we eat and drink, our detailed financial records, subscriptions to what we read and consume, our political and religious affiliations, whom we associate with, and where we drive. Organisations store our digital lives on- premises, in multiple locations, transforming and re-architecting for multi-cloud and multi-geographic for ongoing data science-driven algorithms for both historical and real-time analytics and decision making. How to protect this data? Data is shared and accessed both legally and illegally
  • 4. What is Digital Trust? https://www.statista.com/
  • 5. Assessing your Adversaries Methodology Doctrine Organisation Training Materials Leadership & Education Personnel Facilities 1=Low; 5=high DOTMLPF Methodology pronounced ‘dot-mil-p-f’ https://www.theguardian.com/world/2022/sep/18/russia-military-underperforming-ukraine
  • 6. Assessing your Adversaries Methodology Doctrine 4 Organisation 3 Training 1 Materials 3 Leadership & Education 2 Personnel 2 Facilities 3 https://www.theguardian.com/world/2022/sep/18/russia-military-underperforming-ukraine DOTMLPF Methodology pronounced ‘dot-mil-p-f’ 1=Low; 5=high
  • 7. Assessing your Adversaries Methodology Doctrine 4 3 Organisation 3 4 Training 1 4 Materials 3 3 Leadership & Education 2 4 Personnel 2 4 Facilities 3 3 https://www.theguardian.com/world/2022/sep/18/russia-military-underperforming-ukraine DOTMLPF Methodology pronounced ‘dot-mil-p-f’ 1=Low; 5=high
  • 8. Assessing your Adversaries Methodology Doctrine 4 3 4 Organisation 3 4 4 Training 1 4 4 Materials 3 3 4 Leadership & Education 2 4 4 Personnel 2 4 4 Facilities 3 3 4 https://www.theguardian.com/world/2022/sep/18/russia-military-underperforming-ukraine DOTMLPF Methodology pronounced ‘dot-mil-p-f’ 1=Low; 5=high
  • 10. VIP Customers John Smith • Update data subject record and references to found PII • Files, transactions, database records, log files, etc. • Data subject relationship(s) with company • PII shared with 3rd parties Produce Master Catalog, Data Lineage, and Data Flow Data Location, Quality, Accuracy, Duplicates, Copies
  • 11. Data-Centric Security - Legacy Approach to Encryption Has Gaps Data at rest encryption Column or Table or File encryption Transport Encryption (TLS) Application, Access rules, Firewalls People, Endpoints, DLP Traditional security is not end to end. • Security gaps exist across data at rest, in motion, in use – that are regularly exploited*. • ‘Data at rest’ is disk, file, or database encryption • ‘Data in motion’ is Transport Layer Security (TLS) • ‘Data in use’ and the transformation of ‘data at rest’ to ‘data in motion’ is NOT protected *https://www.verizon.com/business/resources/reports/dbir/ GAP GAP GAP GAP GAP GAP Re-Encrypt De-Crypt Re-Encrypt De-Crypt Re-Encrypt De-Crypt Re-Encrypt De-Crypt
  • 12. Replace live data in apps, data stores, files Create shared or one-time data sets for analytics Classical encryption requires app & schema changes Available Options: Stateless Tokenization, Advanced Format-Preserving Encryption, Format Preserving Hashing Data-Centric Security – Securing Data End to End
  • 13. Format Preserving Tokenisation (FPT) Examples of data protection, access with FPT Name: John Smith Address: 924 Eastland Street, Chicago, IL, 60007 RSAID: 8901275041086 Email: jsmith@corp.com SUBID: N88880925 DOB: 27 – 01 - 1989 Name: Uhea Pmwun Address: 580 Qeugbnjw Xowrt, Lwidlew, UP, 82423 RSAID: 89219835632937 Email: kowipy@glor.com SUBID: N2783904 DOB: 15 – 15 - 1969 Name: John Smith Address: 924 Eastland Street, Chicago, IL, 60007 RSAID: 2198356381086 Email: jsmith@corp.com SUBID: N2783904 DOB: 27 – 01 - 1989 Live data converted to secured* form – data stays protected Dynamic access and masking or partial access for permitted users. * Protected data can preserve referential integrity, or be fully randomized, pre-padded to adjust length, prefixed or postfixed with meta data labels – flexible.
  • 14. Confidential Computing Threats to applications and data hosted in Cloud Infrastructure: • Nation States – massive resources and time scales • ‘Regular’ Attackers – for profit, chaos & fun • Insider Threats – malicious insiders, application code bugs, mistakes, Root/Administrator access • Subpoenas from Governments Confidential Computing Consortium created via The Linux Foundation • Trusted Execution Environment (TEE) – Isolated hardware-based runtime environment that enables data confidentiality, data and code integrity • Enclave – a security feature within the TEE that creates a barrier that blocks ALL unauthorised users from ANY access to memory, application code, or data Efforts are underway to Virtualise Confidential Computing Creation, Management, Portability • Reduce the Attack Surface – Isolated protection from vulnerabilities that exist outside of hardened workloads • Hardened Security – Access the latest, hardware-based security in the Intel, AMD & Arm CPUs. • Any Applications – Scalable, flexible, and secure for any application – ‘Lift & Shift’ • Simple Deployments – Rapidly secure workloads
  • 15. Conclusions All the major cloud providers have developed Confidential Computing Capabilities that provide: • Internally baked high-speed hardware-based encryption • Hardware-based roots of trust • Isolating data and application code physically • Key Management • As a new technology, there are challenges related to conflicting definitions and responsibilities of making it a reality • When/if ‘privacy concerns’ become a strong business driver, Confidential Computing may become an obvious choice • Linux Foundation Report: Confidential computing market to reach $54 billion in 2026 https://www.zdnet.com/article/linux-foundation-confidential-computing-market-to-reach-54-billion-in-2026/ Source: IDC Report ‘Secure Innovation Requires Confidential Computing’ – accessible from the link below: https://info.anjuna.io/white-paper-secure-innovation-requires-confidential-computing-register.html
  • 16. THANK YOU 1 0 0 8 S a x b y A v e , E l d o r a i g n e , C e n t u r i o n , G a u t e n g , 0 1 5 7 i n f o @ s o l i d 8 . c o . z a PAT R I C K D E V I N E + 2 7 ( 0 ) 8 3 6 5 7 8 7 7 8 S I M O N E S A N TA N A + 2 7 ( 0 ) 8 3 2 0 0 5 0 0 9