SlideShare a Scribd company logo
Achieving	Data	Privacy	Compliance		
in	Postgres	or	Greenplum	
April	20,	2018	
Les	McMonagle	(CISSP,	CISA,	ITIL)	
VP	of	Security	Strategy	
BlueTalon	
	
Data	Protec=on	versus	Data	Access	Control	.	.	.		
What’s	the	difference	and	why	you	should	care
Agenda		
•  Data	Protec>on	versus	Data	Access	Control	–	What’s	the	Difference	?	
	
•  Why	are	these	applicable	to	GDPR,	HIPAA,	COPPA,	GLBA	and	other	Regs	
	
•  Generally	Accepted	Privacy	Principles	–	GDPR	is	not	so	new	.	.	.		
	
•  GeOng	Postgres	or	Greenplum	ready	for	processing	regulated	PII	
	
•  Q	&	A	
2
Session	Abstract	
3	
This	session	will	provide	a	deep	dive	into	the	difference	between	data	protec>on	and	data	access	control,	how	they	can	
work	together	in	a	layered	approach	to	data	security	and	when	you	need	more	of	one	versus	the	other.	The	informa>on	
provided	will	be	applicable	to	GDPR	compliance,	HIPAA,	HITECH,	Omnibus	Rule	compliance	or	the	hos>ng	and	processing	of	
any	sensi>ve	or	regulated	data	including	Personally	Iden>fiable	Informa>on	(PII),	Protected	Health	Informa>on	(PHI),	
Intellectual	Property	(IP)	and	other	Non-Public	Informa>on	(NPI).	Regula>ons	including	Gramm-Leach	Bliley	Act	(GLBA),	
Children’s	On-Line	Privacy	Protec>on	Rule	(COPPA)	and	other	government	or	industry	specific	regula>ons	also	add	data	
security	controls	requirements.	
	
Interna>onally	Accepted	Privacy	Principles	will	be	discussed	and	why	compliance	with	these	basic	fundamental	principles	is	
the	cornerstone	of	compliance	with	virtually	all	data	privacy	regula>ons.
	
A[endees	will	be[er	understand	what	to	do	to	ensure	their	Postgres	or	Greenplum	environment	is	ready	and	capable	of	
hos>ng	and	processing	any	sensi>ve	or	regulated	data	required	in	full	compliance	with	applicable	data	privacy	laws	and	
regula>ons.	The	session	will	include	a	Q&A	session	to	answer	specific	ques>ons	or	discuss	specific	use	cases	of	interest	or	
relevance	to	the	audience.
	
Date:		2018	April	20	10:50am	-	11:40					Dura=on:		50	min						Room:		Liberty	II-III					Conference:		PostgresConf	US	2018
Language:		English					Track:		Regulated	Industry	Summit								Difficulty:		Medium
Unified,	AQribute	Based	Access	Control	(ABAC)	
	
Versus		
	
Data	Protec=on	using	Encryp=on	and	Tokeniza=on	
Choosing	one	or	the	other	or	both
Typical	Security	Stack	and	Func=onality	
5	
Authen>ca>on For	security	admins	only
Masking Dynamic	masking	based	on	
any	User	or	Data	aQributes
Encryp>on Disk,	Volume,	File	Level	encryp=on	
and	UDF-based	field	level	encryp=on
Audit
Access	audi=ng	and	lineage	from	
capture	of	data	usage	
When	data	is	protected	or	unprotected
Authoriza>on
Row,	column,	filtering	&	aQribute	
based	policies	across	data	pla[orms
Typically	only	based	on	RBAC
Must	call	UDF
AQribute	Based	Access	Control Data	Protec=on	
Tools
Security	Func=onality
Data	Obfusca>on	tools,	some	others
For	security	admins	only
Seamless	interopera>on	only
The	Next	Evolu=on	of	Data	Access	Control	
6	
1st	Genera>on:	Rights	to	database	objects	granted	to	Users	(90’s)
2nd	Genera>on:	Rights	to	database	objects	granted	to	Roles	(RBAC)
•  Then	Role	membership	managed	in	shared	external	LDAP	directories	
3rd	Genera=on:	AQribute	Based	Access	Control	(ABAC)	
•  Complexity	and	granularity	requirements	exceeding	exis>ng	capabili>es	
•  Based	on	virtually	any	User	or	Data	A[ribute(s)
•  Centralized	management	and	control,	consistently	applied	rules
•  Layered	with	targeted	Data	Protec>on	(Disk,	Volume,	File,	Table,	Column	Level)
•  Overlapping	hierarchy	and	matrixed	access	rights	compliance	requirements
Gartner	Agrees:		Companies	will	insist	on	“centralized	management	pla[orms	
that	can	directly	control	data	security	policies	across	mul=ple	data	silos.”
Data	Protec=on	
•  Cri>cal	data	fields	protected	at-rest	
•  Independent	access	control	to	
protected	fields	
•  Independent	audit	trail	of	access	to	
protected	data	fields	
•  Centralized	key	management		
•  Data	can	be	moved	in	protected	form	
(when	there	is	no	“T”	in	ETL)	
	
7	
•  Physical	data	model	changes	required	
•  Logical	data	model	changes	required	
•  For	ETL,	data	must	be	unprotected,	
transformed	and	protected	again	
•  Sensi>vity	to	original	Data	Type		
•  Significant	performance	impact	on	
any	full	column	opera>ons	
•  “Like”	or	“Range”	opera>ons	limited	
•  Access	control	and	audit	trail	on	
encrypted	or	tokenized	fields	only	
	
PROS:	 CONS:
Great	fit	when	data	protec=on	&	access	control	only	required	for	a	few	cri=cal	data	fields	(PCI-DSS)
Enterprise	Wide	AQribute	Based	Data	Access	Control	
•  Unified,	comprehensive,	centrally	
managed,	data	access	control	consistently	
applied	across	all	plalorms	
•  ABAC	using	any	user	or	data	a[ribute(s)	
•  No	changes	to	data/applica>on/client	
layer	
•  No	nega>ve	performance	impact	
•  Transparent	to	users	and	applica>ons	
•  Independent	tamper-proof	audit	trail	of	all	
access	to	data	
•  Lower	TCO	through	reduced	DBA	costs	
	
	 8	
•  Base	table	(at-rest)	data	in	the	clear	
•  Some	added	latency	to	queries	
	
	
	
PROS:	 CONS:
Typically	 the	 cornerstone	 of	 any	 enterprise	 wide	 data	 access	 control	 or	 data	 governance	
program
User	AQributes	
Values	
Role	 User	(0),	Supervisor	(1),	Admin	(2)	
Na>onality	 GBR,	USA,	GER,	FRA…	
Base	Office	 London,	Leeds,	Birmingham…	
AND	
groups	
<AD	groups>,	<RDBMS	stored	
groups>	
OR	groups	 <AD	groups>,	<RDBMS	stored	
groups>	
Access	Test	
All	of	the	following	access	control	rules	must	be	passed	for	access	to	be	granted	
Data	Classifica>on	
User	Role	MUST	BE		GREATER	THAN	OR	EQUAL	TO	Data	Permi[ed	Roles	
Permi[ed	Na>onality	
User	Na>onality	MUST	MATCH	ONE	OF	Data	Permi[ed	Na>onali>es	
Permi[ed	Base	Offices	
User’s	Base	Office	MUST	MATCH	ONE	OF	Data	Permi[ed	Loca>ons	
AND	groups	
The	user	MUST	MATCH	all	of	the	data	AND	groups	
OR	groups	
The	user	MUST	MATCH	at	least	one	data	OR	group	
Data	AQributes	
Values	
Permi[ed	Roles	 User	(0),	Supervisor	(1),	Admin	(2)	
Permi[ed	
Na>onali>es	
GBR,	USA,	GER,	FRA…	
Permi[ed	Loca>ons	 London,	Leeds,	Birmingham…	
AND	groups	 <AD	groups>,	<RDBMS	stored	
groups>	
OR	groups	 <AD	groups>,	<RDBMS	stored	
groups>	
Access	Control	Decision	
✓	 If	all	five	of	the	access	control	rules	are	met	then	access	to	the	item	is	granted	
✕	 If	any	one	of	the	five	access	control	rules	are	not	met	then	access	to	the	item	is	refused
Example	Complex,	Fine-Grained	Access	Control	Decision	
Details	
•  User	Role	to	Data	PermiQed	Roles	
•  Evaluated	in	the	following	logical	manner:	
•  IF	User	Role	=	Admin	(2)	THEN:	user	can	access	all	data	but	certain	fields	are	masked	
•  ELSE	IF	User	Role	=	Supervisor	(1)	THEN:	user	can	only	see	User	(0)	and	Supervisor	(1)	data	
	
•  User	Na>onality	to	Data	Permi[ed	Na>onali>es	
•  The	User’s	Na>onality	must	be	one	of	the	Data	Permi[ed	Na>onali>es	–	Label	Based,	Mandatory	Access	Control	(MAC)		
	
•  User	Base	Office	to	Data	Permi[ed	Loca>ons	
•  The	User’s	Base	Office	must	be	one	of	the	Data	Permi[ed	Loca>ons	
	
•  User	AND	groups	to	Data	AND	groups	
•  Evaluated	in	the	following	logical	manner:	
•  IF	Data	AND	groups	=	none	THEN:	the	Data	AND	groups	have	no	effect	on	user	data	access	
•  ELSE:	the	User’s	AND	groups	must	include	all	the	groups	listed	in	the	Data’s	AND	groups	
	
•  User	OR	groups	to	Data	OR	groups	
•  Evaluated	in	the	following	logical	manner:	
•  IF	Data	OR	groups	=	none	THEN:	the	Data	OR	groups	have	no	effect	on	user	data	access	
•  ELSE:	one	of	the	User’s	OR	groups	must	match	a	group	listed	in	the	Data’s	OR	groups
Why	seQle	for	one	when	you	can	use	both	(ABAC	&	
Protec=on)	
•  Independent	access	control	on	all	PII	
•  At-Rest	encryp>on	or	tokeniza>on	of	
cri>cal	fields	
•  Data	osen	remains	in	protected	form	
•  Maximum	protec>on	
•  Minimal	performance	impact	
•  Minimal	opera>onal	impact	
•  Minimized	risk	
•  Easily	manage	both	centrally	when	
properly	integrated		
	
	 11	
•  Added	data	security	sosware	costs	
•  Some	addi>onal	administra>on	
work	
PROS:	 CONS:
Powerful	combina=on	gaining	the	benefits	of	both	op=ons	and	elimina=ng	many	of	the	cons
Generally	Accepted	Privacy	Principles	
Global	Data	Privacy	Regula>on	Convergence
Long	standing,	interna=onally	accepted,	privacy	principles	include:		
1/3	
13	
Accountability:	
An	organiza>on	should	be	held	accountable	for	PII	under	its	control.
	
No=ce:	
No>ce	must	be	provided	to	the	Data	Subject	of	the	purpose	for	collec>ng	PII.
Data	Subject	must	be	no>fied	of	applicable	policies	(Consent,	Access,	Disclosure).
No>ce	must	be	provided	of	any	changes	to	the	applicable	privacy	policies	or	the	data	collected	is	used	for	any	
reason	other	than	the	originally	stated	purpose.
No>ce	must	be	provided	in	clear	and	conspicuous	language.
No>fica>on	should	be	sent	at	the	>me	of	collec>on	or	immediately	before.
		
Consent:	
Data	Subjects	must	be	informed	of,	and	explicitly	consent	to,	the	collec>on,	use	and	disclosure	of	sensi>ve	
informa>on.
The	Data	Subject	must	provide	informed	consent	to	the	collec>on	of	PII.
Consent	required	to	use	PII	for	purposes	other	than	those	originally	stated.
Data	Subjects	must	be	made	aware	of	the	consequences	of	denying	consent.
Long	standing,	interna=onally	accepted,	privacy	principles	include:			
2/3	
14	
Collec=on	Limita=on:	
Only	PII	relevant	to	the	iden>fied	purpose	may	be	collected.
Informa>on	must	be	collected	by	fair	and	lawful	means.
		
Use	Limita=on:	
PII	may	only	be	used	for	the	purposes	stated	at	the	>me	of	collec>on.
PII	is	retained	no	longer	than	necessary	to	complete	the	stated	purpose.
		
Disclosure:	
Consent	from	the	Data	Subject	is	required	to	disclose	informa>on	to	third	par>es.
Organiza>ons	must	ensure	that	any	third	par>es	comply	with	their	privacy	policies.
Informa>on	may	be	disclosed	if	required	by	law	or	for	health	and	safety	reasons.
		
Access	and	Correc=on:	
Data	Subjects	are	able	to	able	to	access	PII	an	organiza>on	maintains	on	them.
Data	Subjects	reques>ng	informa>on	must	supply	sufficient	proof	of	iden>ty.
Requested	PII	is	provided	clearly,	at	reasonable	cost	and	within	a	reasonable	>me.
If	denied	access,	Data	Subject	is	informed	of	reason,	op>ons	to	challenge	denial.
Data	Subjects	are	able	to	update	or	correct	PII	held	by	the	organiza>on.
Long	standing,	interna=onally	accepted,	privacy	principles	include:		
3/3	
15	
Security	and	Safeguards:	
Provide	safeguards	to	prevent	loss,	misuse,	unauthorized	access,	disclosure,	altera>on	and	destruc>on	of	PII.
Destroy	or	permanently	obfuscate	discarded	or	expired	data.		
		
Data	Quality:	
Organiza>ons	must	ensure	PII	is	accurate,	complete	and	up-to-date.
	
Enforcement:	
Implement	processes	to	ensure	compliance	with	the	privacy	policies.
Include	a	process	for	data	subjects	to	file	complaints	and	have	them	reviewed.
		
Openness:	
Ensure	privacy	policies	are	clearly	published	and	publicly	available.
Have	a	means	to	establish	the	existence,	nature	and	purpose	of	use,	of	PII.
HIPAA	Compliance	
HITECH,	Omnibus	Rule	and	the	HIPAA	18
HIPAA	18		-		All	encrypted/tokenized/obfuscated		=		Safe	Harbor	
17	
(A)  Names
	
(B)	All	geographic	subdivisions	smaller	than	a	state,	
including	street	address,	city,	county,	precinct,	ZIP	code
	
(C)	All	elements	of	dates	(except	year)	for	dates	that	are	
directly	related	to	an	individual,	including	birth	date,	etc.	
	
(D)	Telephone	numbers
	
(L)	Vehicle	iden>fiers,	serial	numbers,	license	plate	#’s
	
(E)	Fax	numbers
	
(M)	Device	iden>fiers	and	serial	numbers
	
(F)	Email	addresses
	
(N)	Web	Universal	Resource	Locators	(URLs)
(G)	Social	security	numbers
	
(O)	Internet	Protocol	(IP)	addresses
	
(H)	Medical	record	numbers
	
(P)	Biometric	iden>fiers,	including	finger	and	voice	prints
	
(I)	Health	plan	beneficiary	numbers
	
(Q)	Full-face	photographs	and	any	comparable	images
	
(J)	Account	numbers
	
(R)	Any	other	unique	iden>fying	#,	characteris>c,	or	code
	
(K)	Cer>ficate/license	numbers
Refer	to	reference	document:	
HIPAA	18	FIELDS	FOR	SAFE	HARBOR	OR	EXPERT	DETERMINATION
HIPAA		-	Safe	Harbor			versus			Expert	Determina=on	
18	
De-iden>fied	health	informa>on	u>lizing	these	methods	is	no	longer	PHI	
not	protected	by	the	Privacy	Rule	because	it	does	not	fall	within	the	defini>on	of	PHI		
Replicability 	 	Consistently	occur	in	rela>on	to	an	individual		(Blood	Glucose	level				vs				DOB)
	
Data	Source	Availability 	How	prevalent	is	the	data	in	other	loca>ons	/	sources	(Lab	results				vs				Name,	Address)
	
Dis=nguishability	 	Extent	the	data	can	uniquely	iden>fy	an	individual	
	 	 	(Age/Gender/3	Digit	Zip	–	0.04%			vs			DOB/Gender/5	Digit	Zip	–	50%)
	
Assess	Risk 	 	Combined	Risk	of	Iden>fica>on	based	on	the	above	3	characteris>cs		(Low			vs			High)
h[ps://www.hhs.gov/hipaa/for-professionals/privacy/special-topics/de-iden>fica>on/	
Refer	to	the	following	URL	for	more	details:
COPPA	Compliance	
Children’s	Online	Privacy	and	Protec>on	Act	(COPPA)	
More	specific,	globally	enforced,	access	control	requirements
Strict	rules	governing	access	to	PII	on	minors	
20	
•  Federal	and	State	specific	rules	(eg.	Maine	considers	a	minor	anyone	under	18	vs	13)
	
•  Interna>onal	rules	(GDPR),	PIPEDA	(Canada)	and	many	other	countries
	
•  Collec>on	and	maintenance	of	parental	permission
	
•  Mrs.	Fields	Cookies	fined	for	collec>ng	addresses	of	minors	without	parental	permission
	
•  Must	require	and	track	age	and	permission	info	for	all	minors
	
•  More	limi>ng	rules	on	exactly	what	data	can	be	collected	and	for	what	purposes
Unified	Data	Access	Control	and	GDPR
Unique	GDPR	Regulatory	Compliance	Challenges	
22	
GDPR	is	the	farthest	reaching	impac[ul	regula=on	ever	created		
	88	pages	with	99	specific	compliance	requirements
	
Quickly	becoming	the	global	standard	for	data	privacy	and	access	control
	
Data	Residency	(Physical,	Logical	loca=on)
	
Achieving	Anonymisa=on	or	Pseudonymisa=on	
	
FUD	Factor	-	AQen=on	Gegng	Financial	Penal=es
	
Convergence	of	Generally	Accepted	Privacy	Principles	
	on	Consent,	Data	Reten>on,	Use,	Disclosure,	Access	Control,	Accountability,	Destruc>on
Unified	Data	Access	Control	Applicability	For	GDPR	
Compliance	
23	
•  Fine-Grained,	Consistently	Applied,	Global,	Local	and	Context	Sensi=ve	Data	Access	Controls	
•  Ability	to	manage	RLS	and	CLS	by	genera>ng	dynamic	views	based	on	virtually	any	User	or	Data	a[ributes.	
•  Ability	to	define	and	manage	separate	Data	Domains	and	External	AQribute	Domains	
•  Data	access	control	rules	can	be	defined	and	applied	globally	or	locally	to	different	Data	Domains.
•  A[ribute	Domains	are	internally,	or	externally,	managed	authorita>ve	source(s)	for	a[ribute	informa>on.
•  Independent,	Tamper-Proof	Audit	Trail	of	All	Data	Access	–	No	need	for	DAM	products	
•  Independent	accountability	and	audit	trail	of	all	access	to	GDPR	data	on	all	plalorms.		
•  Consent	Preferences,	Tracking/Management	of	Opt-In,	Opt-Out	&	Right-to-be-ForgoQen	Choices	
•  Majority	of	data	fields	on	some	systems	are	dedicated	to	tracking	Data	Subject	preferences.
•  Reduced	DBA,	System	Admin	and	Equivalent	Labor	Costs		
•  Eliminate	cost	of	maintaining	thousands	of	sta>c	security	Views	and	associated	View	logic	on	all	plalorms.
•  Reduced	Risk	of	a	Data	Breach	or	Unauthorized	Access	to	PII	
•  Centrally	managed,	consistently	and	automa>cally	applied,	unified	data	access	controls	on	all	plalorms.	
•  Ability	to	Provide	CLS	and	RLS	on	Pla[orms	with	No	Other	Op=on(s)	
•  Many	new,	less	mature	or	open	source	data	repositories	provide	only	limited	CLS	or	RLS	capabili>es.	
All	with	minimal	opera=onal	impact	&	liQle	or	no	measurable	performance	impact
GDPR	Ar=cles	Where	ABAC	&	Encryp=on	Play	A	Significant	Role	
24	
Ar=cle	3:	Territorial	Scope:	
Ar=cle	6:	Lawfulness	of	Processing:
Ar=cle	7:	Condi=ons	for	Consent:
Ar=cle	8:	Condi=ons	applicable	to	child's	consent	in	rela=on	to	informa=on	society	services:
Ar=cle	9:	Processing	of	special	categories	of	personal	data:
Ar=cle	10:	Processing	of	personal	data	rela=ng	to	criminal	convic=ons	and	offences:
Ar=cle	11:	Processing	which	does	not	require	iden=fica=on:
Ar=cle	24:	Responsibility	of	the	controller:
Ar=cle	25:	Data	protec=on	by	design	and	by	default:
Ar=cle	28:	Processor:
Ar=cle	30:	Records	of	processing	ac=vi=es:
Ar=cle	32:	Security	of	processing:
Ar=cle	45:	Transfers	on	the	basis	of	an	adequacy	decision:
Ar=cle	46:	Transfers	subject	to	appropriate	safeguards:
Ar=cle	47:	Binding	corporate	rules:
Ar=cle	48:	Transfers	or	disclosures	not	authorised	by	Union	law:
Ar=cle	49:	Deroga=ons	for	specific	situa=ons:
.	.	.	and	playing	a	par=al	role	in	16	others	with	including:	12,	13,	14,	15,	18,	26,	33,	35,	39,	40,	41,	42,	44,	58,	77,	
83
GDPR	Compliance	Summary	
25	
Unified	data	access	control	capability,	and	A[ribute	Based	Access	Control	(ABAC)	are	
Powerful	tool(s)	in	achieving	compliance	with	GDPR,	HIPAA	and	other	current	and	emerging	data	privacy	regula>ons.			
	
Data	privacy	regula=ons	impose	data	privacy	protec=on	requirements,	based	on	a	range	of	data	and	user	
aQributes.		
	
Centrally	managed	ABAC	enables	organiza>ons	to	easily	and	efficiently	map	these	constantly	changing	data	privacy	
requirements	to	actual	policy-based,	technical	controls	governing	access	to	the	sensi>ve	or	regulated	data.		
	
Rules	are	managed	in	a	single	loca=on	and	applied	consistently	across	a	wide	range	of	data	storage	plalorms.	
	
Market	demand	for	this	type	of	data-centric	protec=on	and	access	control	is	clear	according	to	Gartner.	
	
Managing	mul=ple	disparate,	proprietary	solu=ons	has	become	unmanageable.	
	
Centrally	managed	ABAC	enables	cross-border	data	flows,	leveraging	of	new,	cost-effec=ve,	data	hos=ng	solu=ons,	
and	broader,	more	open,	access	to	PII	in	full	compliance	with	GDPR.	
GDPR	WILL	impact	any	company	with	European	Opera=ons	or	Customers
Specific	GDPR	Compliance	Checklist	and	Ac=on	
Items	
Basic	steps	any	organiza>on	should	follow
Data	Discovery	
27	
Iden>fy	all	GDPR	regulated	Personally	Iden>fiable	Informa>on	(PII). 	
AWS-RDS AWS-RDS
Iden=fy	each	data	repository	in	scope	for	GDPR	compliance	and	how	it	is	accessed
Impala
Evaluate	/	Define	adequate	Pseudonymisa=on	and	Anonymisa=on	
28	
FName	 LName	 SSN	 Address	 City	 State	 Country	 Phone	 Email	 DOB	
Robert	 Jones	 333-22-9999	 123	3rd		Ave		East	 Atlanta	 GA	 USA	 616-829-8091	 robert@gmail.com	 57/12/29	
Carole	 Smith	 444-33-8888	 75	Weslield	Drive	 Regina	 SK	 Canada	 306-240-2241	 csmith@telus.com	 60/01/11	
Timothy	 Dalton	 555-44-7777	 43	Harris	Road	 Portland	 ME	 USA	 207-442-1032	 td2@twc.com	 61/02/14	
George	 Jacobs	 666-55-6666	 70	Gartner	Road	 San	Diego	 CA	 USA	 858-694-4920	 gjacobs@ibm.com	 63/03/15	
Alice	 Winters	 777-66-5555	 1600	Penn	Ave	 Los	Angeles	 CA	 USA	 818-925-8888	 alicew@hp.com	 64/03/17	
Cynthia	 Smith	 888-77-4444	 7172	Coach	Hill	Road	 Sea[le		 WA	 USA	 206-423-5479	 c.smith@uw.edu	 67/05/18	
Mary	 Magden	 999-88-3333	 83	Evergreen	Rise	 Calgary	 AB	 Canada	 403-240-7094	 marym3@shaw.ca	 69/07/21	
Michael	 Jordon	 111-99-2222	 1048	26th	Street	 New	York	 NY	 USA	 212-430-1627	 airj@knicks.com	 72/09/23	
John	 Roche	 222-00-1111	 427	Main	Street	 Denver	 CO	 USA	 303-942-1836	 jr@hughes.com	 73/11/25	
Lynne	 Evans	 333-11-0000	 396	Detroit	Lane	 Dearborn	 MI	 USA	 810-563-6249	 LynneE@ford.com	 75/12/26
Evaluate	/	Define	adequate	Pseudonymisa=on	and	Anonymisa=on	
29	
Which	fields	must	be	removed	or	masked	to	achieve	Pseudonymisa/on	.	.	.	
FName	 LName	 SSN	 Address	 City	 State	 Country	 Phone	 Email	 DOB	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 Atlanta	 GA	 USA	 616-999-9999	 XXXXX@gmail.com	 57/11/11	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 Regina	 SK	 Canada	 306-999-9999	 XXXXX@telus.com	 60/11/11	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 Portland	 ME	 USA	 207-999-9999	 XXXXX@TWC.com	 61/11/11	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 San	Diego	 CA	 USA	 858-999-9999	 XXXXX@ibm.com	 63/11/11	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 Los	Angeles	 CA	 USA	 818-999-9999	 XXXXX@hp.com	 64/11/11	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 Sea[le		 WA	 USA	 206-999-9999	 XXXXX@UW.edu	 67/11/11	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 Calgary	 AB	 Canada	 403-999-9999	 XXXXX@shaw.ca	 69/11/11	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 New	York	 NY	 USA	 212-999-9999	 XXXXX@Knicks.com	 72/11/11	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 Denver	 CO	 USA	 303-999-9999	 XXXXX@hughes.com	 73/11/11	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 Dearborn	 MI	 USA	 810-999-9999	 XXXXX@ford.com	 75/11/11
Evaluate	/	Define	adequate	Pseudonymisa=on	and	Anonymisa=on	
30	
Which	fields	must	be	removed	or	masked	to	achieve	Anonymisa/on	.	.	.	
Analysis/Scoring	should	follow	defensible	generally	accepted	method	or	process
FName	 LName	 SSN	 Address	 City	 State	 Country	 Phone	 Email	 DOB	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 XXXXXXXX	 GA	 USA	 616-999-9999	 XXXXX@XXXXX.com	 11/11/11	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 XXXXXXXX	 SK	 Canada	 306-999-9999	 XXXXX@XXXXX.com	 11/11/11	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 XXXXXXXX	 ME	 USA	 207-999-9999	 XXXXX@XXXXX.com	 11/11/11	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 XXXXXXXX	 CA	 USA	 858-999-9999	 XXXXX@XXXXX.com	 11/11/11	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 XXXXXXXX	 CA	 USA	 818-999-9999	 XXXXX@XXXXX.com	 11/11/11	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 XXXXXXXX	 WA	 USA	 206-999-9999	 XXXXX@XXXXX.edu	 11/11/11	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 XXXXXXXX	 AB	 Canada	 403-999-9999	 XXXXX@XXXXX.ca	 11/11/11	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 XXXXXXXX	 NY	 USA	 212-999-9999	 XXXXX@XXXXX.com	 11/11/11	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 XXXXXXXX	 CO	 USA	 303-999-9999	 XXXXX@XXXXX.com	 11/11/11	
XXXXXXXX	 XXXXXXXXXX	 999-99-9999	 XXXXXXXXXXXXXXXXXX	 XXXXXXXX	 MI	 USA	 810-999-9999	 XXXXX@XXXXX.com	 11/11/11
GDPR	Scope	Reduc=on	
31	
Decide	which	data	sets	or	systems	can	be	taken	out	of	scope		
	
	.	.	.	through	advance,	on	ingest,	Anonymisa>on	of	base	table	data	
	
All	Base	Tables	in	data	repository	contain	only	Obfuscated	Data	
	
	
Sta>c	masking	of	PII	fields	on	ingest	to	keep	system	out	of	GDPR	scope		
	
	NOTE:	
				Anonymised	data	has	NO	GDPR	data	privacy	requirement
				Anonymised	data	is	NOT	subject	to	“Right-to-be-Forgo[en”	rule
	
By	defini=on,	Anonymised	data	cannot	be	associated	with	a	Data	Subject
When	GDPR	regulated	data	must	be	accessed	in	the	clear	
32	
•  Data	Owner	(Data	Controller)	dictates	/	authorizes	who	can	view	PII	in	the	clear
	
	
•  Data	Subjects	are	no=fied	of	collec=on,	use,	reten=on	and	sharing	of	their	data
	
	
•  Data	Subject’s	Consent	is	solicited,	collected	and	tracked
	
	
•  Decide	which	fields	must	be	dynamically	masked	at	run=me	for	all	other	authorized	users	/	applica=ons	
	
	
•  Will	likely	require	different	rules,	based	on	different	User	and	Data	AQributes	to	decide	which	fields	must	be	
obfuscated	or	masked	to	achieve	Pseudonymisa=on	or	Anonymisa=on	of	any	given	data	set	containing	PII.			
	
Review	&	Gain	Approval	from	Data	Protec=on	Officer	(DPO)	for	all	data	access	rules
Other	GDPR	data	processing	and	management	best	prac=ces	
33	
Decide	on	method(s)	for	tracking	Data	Subject	preferences	
	(opt-in,	opt-out),	right	to	be	forgo[en,	contact	method(s),	etc.
			
Establish	single	authorita>ve	source	as	system	of	record		
		(Trusted	A[ribute	Domain	Source)
	
Define	global	policy	(rules)	for	GDPR	compliance
	
Define	any	addi>onal	local	system	or	applica>on	policy	(rules)	for	GDPR	compliance		
	
Incorporate	preference	tracking	/	management	in	data	access	rules	
	This	can	osen	require	as	many	fields	as	the	data	itself.
Gegng	Postgres	or	Greenplum	ready	for	processing	regulated	PII	
34	
Data	Discovery.		Iden>fy	all	regulated	Personally	Iden>fiable	Informa>on	(PII).	
	Whether	each	plalorm	is	in	various	regulatory	compliance	scope	or	not
	
Evaluate	each	data	set	to	define	adequate	level	of	Pseudonymisa=on	and	Anonymisa=on.		
Which	fields	must	be	removed	or	masked	to	achieve	Anonymisa>on	ro	Pseudonymisa>on..			
Analysis/Scoring	should	follow	defensible	generally	accepted	method	or	process.
	
Decide	which	data	sets	or	systems	can	be	taken	out	of	scope	through	Anonymisa>on	of	base	table	data.
	Using	sta>c	masking	of	enough	PII	fields	on	ingest	to	keep	system	out	of	scope	for	GDPR.		
	Anonymised	data	has	NO	GDPR	data	privacy	requirement.
	
Decide	which	fields	must	be	dynamically	masked	at	run=me	when	Anonymisa=on	is	not	an	op=on.			
	
Decide	on	method(s)	for	tracking	Data	Subject	preferences	(opt-in,	opt-out)	and	right	to	be	forgoQen.			
	Single	authorita>ve	source	or	system	of	record	is	best.	
	
Define	global	policy	(rules)	for	GDPR	compliance.		
	
Incorporate	preference	tracking	/	management.		
	This	can	osen	require	as	many	fields	as	the	data	itself.
BlueTalon®	&	Pivotal	Greenplum	Partnership
BlueTalon	&	Greenplum	Partnership	
36	
Partnership	founded	on	core	BlueTalon	role	in	Greemplum	Security	
Ecosystem
•  BlueTalon	provides	Fine-Grained	Data	Access	Control	to	Greenplum
•  BlueTalon	Unified	Data	Access	Control	Enables	Data	Mobility 		
Important	Joint	Customer	Success	with	large	global	Manufacturer	Finance	Datalake	
•  Leverages	BlueTalon	for	Secure	Greenplum
•  $Millions	saved	through	BlueTalon	Enabling	Dynamic	Views
Significant	Ac>vity	with	Secure	Data	Lakes	involving	Greenplum	plalorm
•  Telecoms	 	
•  Large	US	Airport
•  Interna>onal	Banks
•  Retailers
BlueTalon	&	Pivotal	Partnership:		Greenplum	Security	Play	
37	
Enhanced	Security	Ecosystem
		-	Announced	Greenplum	Partner	Summit	(Dec	‘17)
		-	Debut	in	Greenplum	Sales	Kickoff	(Feb’18)
		-	Presenta>ons	at	Postgres	Conf	(April	‘18)
BlueTalon	Complements	Security	Ecosystem
		-	Enables	Unified	Data	Access	Control	(cross	plalorm)
		-	Interopera>on	with	Encryp>on	Vendors
ABAC	vs	Data	Protec=on,	GDPR	and	HIPAA	Reference	Informa=on	
38	
REGULATION	(EU)	2016/679	OF	THE	EUROPEAN	PARLIAMENT	AND	OF	THE	COUNCIL	of	27	April	2016	
on	the	protec>on	of	natural	persons	with	regard	to	the	processing	of	personal	data	and	on	the	free	
movement	of	such	data,	and	repealing	Direc>ve	95/46/EC	(General	Data	Protec>on	Regula>on).
	
GDPR	Regula>on	–	Final	Version		
h[p://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679	
	
Gartner	Annual	Market	Guide	for	Data	Centric	Audit	and	Protec>on	(DCAP)	Report	–	March	2017
h[ps://www.gartner.com/doc/3645326/market-guide-datacentric-audit-protec>on	
	
BlueTalon	Whitepapers,	Product	Data	Sheets	and	GDPR	Lexicon	/	Glossary	
	
h[p://bluetalon.com/resources/			.	.	.		
	
BlueTalon	GDPR	Compliance	Reference	Document	v8	-	FINAL	-	March	2018.docx	
BlueTalon	GDPR	Lexicon	Glossary	v1	Feb	2018.docx
HIPAA	18	FIELDS	FOR	SAFE	HARBOR	OR	EXPERT	DETERMINATION.docx	
Choosing	Between	Data	Protec>on	and	Unified	Data	Access	Control	v4.docx
Q	&	A		-	Open	Discussion	
Les	McMonagle	
VP	of	Security	Strategy
BlueTalon,	Inc.
Les@BlueTalon.com	
(617)	501-7144		Cell
Appendix	
Addi>onal	informa>on
BlueTalon®	Summary	and	Business	Benefits	
Business,	Delivery	and	Technology	Integra>on
Benefits	of	BlueTalon®	approach		
•  Coordinated	Across	Pla[orms	(Hadoop,	NoSQL	&	
SQL)	
⁃  Meta-data	of	tables,	files	and	rules	are	reusable	
⁃  Persistent	security	for	transient	Hadoop	clusters	
⁃  Centralized,	Consistently	Applied	Access	Control	
•  Transparent	Enforcement		
⁃  No	Changes	to	Data,	Applica=on	or	Client	Layers	
⁃  Minimal	performance	overhead	for	security	
•  Contextual	Audi>ng	
⁃  Tagged	with	policy,	role	and	ac>ons	
•  Granular	Authoriza=on	and	Access	Control		
⁃  Granular:	file,	row,	column,	cell,	sub-cell	
⁃  Decisions	based	on	business	data	
⁃  Any	User	or	Data	AQributes	Govern	Access	
•  Dynamic	masking		
⁃  Selec>ve	by	user	or	role	without	duplica>ng	data	
42	
Applica=ons	
C*	EPs
NoSQL	 Hadoop	
HDFS	Enforcement	Points	
SQL	EPs	
SQL	
SQL	EPs	
Policy		
Engine
Audit	
Engine	
Data	Security
Management	UI	
Info	Sec
Business	
users
Data	
Scien>sts
Developers
Data	users
Return	on	Investment	(ROI)	
43	
Performance	Impact	of	Security	Controls
Adding	Where	Predicate	–	30%	to	50%
Adding	Security	Table	Join	–	50%	to	100%
Data	encryp>on	and	decryp>on
Ac>vity	Log	data	collec>on	and	storage
Excessive	data	access	and	retrieval	overhead
Data	Security	Controls	Administra=on	Costs
Duplica>on	of	administra>ve	effort	on	each	data	repository
View	crea>on	and	maintenance	(100’s	or	1000’s	of	Views)
Eliminate	tedious	repe==ve	tasks
Lower	security	admin	costs,	lower	DBA	costs
Regulatory	and	Policy	Compliance	Audit	Costs	
Privacy	by	design	built	in
Simplify	audits	and	data	access	repor>ng	and	accountability	
Manage	all	access	rights	once	in	one	loca=on
Consistently	applied	rules
No	security	gaps
Single	integra>on	point	for	managing	all	data	access
Posi=ve	impact	on	performance
Add	minimal	(under	100ms???)	query	latency	only
No	changes	to	client,	applica>on	or	data	layers
Osen	shorter	query	execu>on	from	reduced	data	volumes
Gartner	Agrees:		Companies	will	insist	on	“centralized	management	pla[orms	
that	can	directly	control	data	security	policies	across	mul=ple	data	silos.”	
Managing	access	rights	independently	
on	each	pla[orm
Inconsistently	applied	rules
Security	gaps	and	oversights
Mul>ple	integra>on	points	for	centralized	User	Provisioning	
and	En>tlement	Management	applica>ons
Regulatory	and	Policy	Compliance	Audit	Costs	
Building	in	data	privacy	by	design	work	efforts	across	plalorms
SOX,	GDPR,	HIPAA,	ITAR	and	other	compliance	audits
Third	Party	Compliance	Audits	(SOX,	PCI,	HIPAA)
Centralized	management	of	security	eliminates	complexity		
44	
Gartner	Market	Guide	for	Data-Centric	Audit	and	Protec>on,	2017
“By	2020,	
data-centric	audit	and	protec/on	products	
will	replace	disparate	siloed	data	security	tools	
in	40%	of	large	enterprises…”	(up	from	5%	today)
Winner	
Audience	Favorite
Strata	Hadoop	2015	
Finalist	Start	Up	of	the	Year
InfoSec	Products	Guide’s	2016	
Global	Excellence	Awards
Dozen	Reasons	to	Recommend	BlueTalon	
1.  BlueTalon	is	cer>fied	with	Cloudera	
2.  Cloudera	+	BlueTalon	together	exceed	
func>onality	of	Hortonworks	+	Ranger		
3.  BlueTalon	scales	as	environment	grows	
4.  BlueTalon	works	across	the	Enterprise,	
not	limited	to	localized	
implementa>ons	
5.  BlueTalon	can	help	Cloudera	enter	into	
environments	with	mixed	Hadoop	and	
non-Hadoop	data	sources	
6.  Land	and	expand	in	mixed	
environments	
45	
8.  BlueTalon	is	simple	to	deploy,	integrates	
nicely	with	exis>ng	Authen>ca>on	and	
Encryp>on	technologies	
9.  BlueTalon	has	very	low	overhead	and	
may	actually	increase	database	query	
processing	performance	
10.  BlueTalon	provides	complete	visibility	
for	audi>ng	data	access		
11.  BlueTalon	reduces	duplica>on	of	data	
for	different	use	cases	and	audiences	
12.  BlueTalon	enables	dynamic	genera>on	
of	data	views	based	on	access	policy
Customer	Case	Study:	General	Electric’s	Finance	Data	Lake	
BlueTalon®
About	GE	and	Finance	Data	Lake	
•  GE	is	the	world’s	Digital	Industrial	Company,	transforming	industry	with	
sosware-defined	machines	and	solu>ons	that	are	connected,	
responsive	and	predic>ve.		
	
•  Finance	Data	Lake	-	Mul>-plalorm	environment	used	by	finance	teams	
of	different	GE	businesses	for	financial	repor>ng		
⁃  Storage	and	computa>on	in	RDBMS	(Greenplum)	and	Hadoop	(Hortonworks)	
⁃  Hosted	both	on-premises	and	in	cloud		
⁃  Land,	standardize	and	roll	up	repor>ng	on	data	from	50+	ERP	source	systems	
⁃  Standardized	model	contains	10,000+	tables	and	150,000+	columns	
⁃  Move	data	using	middleware,	ETL	(Tableau)	and	data	federa>on	tools	
⁃  Consume	data	using	COTS	(Tableau,	OBIEE)	or	custom	home-grown	apps	
⁃  Data	and	reports	from	the	lake	are	consumed	by	3,000+	End-Users
Requirements	&	Challenges	
•  Access	Control	Requirements		
⁃  End-User’s	finance	func>onal	area	(e.g.	Account	Payables)	or	the	business	they	belong	to	(e.g.	
Avia>on)	determines	their	access	to	subset	of	data	
⁃  data	as	landed	in	mirror	contains	restricted	columns	and	rows	that	must	be	excluded	from	access	
	
•  Challenge	#1:	Duplicated	effort	from	custom	views	and	database	grants	
⁃  Required	maintaining	~300	views	with	joins	to	security	tables	with	~10m	rows	
⁃  Required	duplica>ng	views	in	each	data	plalorm	with	slightly	different	syntax	
⁃  Required	maintaining	grants	on	views	for	End-User	that	accessed	the	data	
	
•  Challenge	#2:	Consistency	problem	from	duplicated	security	tables		
⁃  Change	management	required	making	updates	in	mul>ple	systems		
⁃  Incomplete	updates	led	to	inconsistent	access	to	same	data	in	different	plalorms		
	
•  Challenge	#3:	Performance	problems	from	joins	with	large	security	tables		
⁃  Same	queries	perform	differently	due	to	different	join	performance	on	different	plalorms	
⁃  Caching	security	tables	in	applica>ons	led	to	duplicated	controls	in	yet	another	system
How	BlueTalon®	Helped	
•  BlueTalon’s	solu>on		included		
⁃  Defini>on	of	policies	in	BlueTalon®	Policy	GUI		
⁃  Enforcement	of	policies	via	enforcement	points	on	Greenplum	and	Hive		
⁃  Dynamic	resolu>on	with	caching	of	user	a[ributes	by	Policy	Engine	
⁃  Authen>ca>on	via	Kerberos	on	Hadoop	and	OpenLDAP	on	Greenplum		
⁃  Automa>on	of	user	to	role	assignment	or	table	rule	crea>on	via	REST	API	
	
•  Benefits		
⁃  Eliminated	custom	views	in	different	plalorms	(Hive,	Greenplum)		
•  Replaced	~300	views	with	~20	simpler	policies	defined	in	one	place,	in	one	way	
•  Changes	to	policies	were	applied	consistently	across	plalorms		
⁃  Eliminated	duplica>on	of	security	tables	across	plalorms	
•  Replaced	with	single	source	lookup	from	Policy	Engine	
•  User	a[ribute	lookup	&	caching	eliminated	variability	from	join	performance	
⁃  Eliminated	the	need	to	add	pre-filters	in	applica>ons
How	BlueTalon	Helped:	Eliminated	duplica=on	of	security	
logic	
50	
Common	
Mirror
ETL	
GPDB					
EPs
Policy		
Engine
End-
Users
Hive	
EPs	
Atrribute	
Store
ERP
Sources	
Policy
Store
Policy
GUI/API	 LDAP	
Standard	
Model
Standard	
Model
Applica>ons
…	
Security	
user
How	BlueTalon	Helped:	Simplified	Fine-Grained	Access	
Control		
51	
By	Business	
By	Func>on
Data	CategoriesUser	Personas
Receivables
…	
Avia>on
…	
Restricted	Tables	and	Columns	(e.g.	bank	data),	
or	Rows	(e.g.	restricted	orgs)	
Democra>zed	Tables	(e.g.	reference	data)allow	read
Consump>on	Users
Authen>cated	Users
deny	read
Fact	Tables	
Accounts	Receivables	Tables
General	Ledger	Tables
…	
allow	read	with	filters	
on	company	codes
allow	read	with	filters	
on	account	ids
En>tlements
allow	read
deny	read	with	filters
on	restricted	rows

More Related Content

What's hot

May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...Ulf Mattsson
 
Building the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceBuilding the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceIndex Engines Inc.
 
A Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.CoinA Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.CoinFranco Coin
 
Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Ulf Mattsson
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
 
Practical steps to GDPR compliance
Practical steps to GDPR compliance Practical steps to GDPR compliance
Practical steps to GDPR compliance Jean-Michel Franco
 
GDPR Scotland 2017
GDPR Scotland 2017GDPR Scotland 2017
GDPR Scotland 2017Ray Bugg
 
Supporting GDPR Compliance through Data Classification
Supporting GDPR Compliance through Data ClassificationSupporting GDPR Compliance through Data Classification
Supporting GDPR Compliance through Data ClassificationIndex Engines Inc.
 
An Introduction to the General Data Protection Regulation (GDPR)
An Introduction to the General Data Protection Regulation (GDPR)An Introduction to the General Data Protection Regulation (GDPR)
An Introduction to the General Data Protection Regulation (GDPR)Bright
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
 
Tackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines WebinarTackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines WebinarIndex Engines Inc.
 
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceGeek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceIDERA Software
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository XeniT Solutions nv
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Frank Dawson
 
Doing Business in Europe? GDPR: What you need to know and do
Doing Business in Europe? GDPR: What you need to know and doDoing Business in Europe? GDPR: What you need to know and do
Doing Business in Europe? GDPR: What you need to know and doPatric Dahse
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityEQS Group
 

What's hot (20)

May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...
 
Building the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceBuilding the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR Compliance
 
A Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.CoinA Pratical Guide to GDPR - F.Coin
A Pratical Guide to GDPR - F.Coin
 
Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
 
Practical steps to GDPR compliance
Practical steps to GDPR compliance Practical steps to GDPR compliance
Practical steps to GDPR compliance
 
GDPR Scotland 2017
GDPR Scotland 2017GDPR Scotland 2017
GDPR Scotland 2017
 
Supporting GDPR Compliance through Data Classification
Supporting GDPR Compliance through Data ClassificationSupporting GDPR Compliance through Data Classification
Supporting GDPR Compliance through Data Classification
 
An Introduction to the General Data Protection Regulation (GDPR)
An Introduction to the General Data Protection Regulation (GDPR)An Introduction to the General Data Protection Regulation (GDPR)
An Introduction to the General Data Protection Regulation (GDPR)
 
GDPR: What does it mean for your business?
GDPR: What does it mean for your business?GDPR: What does it mean for your business?
GDPR: What does it mean for your business?
 
GDPR: What does it mean for your business?
GDPR: What does it mean for your business?GDPR: What does it mean for your business?
GDPR: What does it mean for your business?
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
Tackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines WebinarTackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines Webinar
 
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceGeek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
 
GDPR: 3 Months On | Guest Speaker: Data Protection Commissioners
GDPR: 3 Months On | Guest Speaker: Data Protection CommissionersGDPR: 3 Months On | Guest Speaker: Data Protection Commissioners
GDPR: 3 Months On | Guest Speaker: Data Protection Commissioners
 
Doing Business in Europe? GDPR: What you need to know and do
Doing Business in Europe? GDPR: What you need to know and doDoing Business in Europe? GDPR: What you need to know and do
Doing Business in Europe? GDPR: What you need to know and do
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A Security
 

Similar to Achieving data privacy compliance in postgres or greenplum - Greenplum Summit 2018

GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare IndustryEMMAIntl
 
GDPR webinar presentation | LawBite
GDPR webinar presentation | LawBiteGDPR webinar presentation | LawBite
GDPR webinar presentation | LawBiteClive Rich
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?Christiana Kozakou
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsUlf Mattsson
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementEryk Budi Pratama
 
Jisc GDPR conference
Jisc GDPR conferenceJisc GDPR conference
Jisc GDPR conferenceJisc
 
GDPR master class accountable research organisations (january 2018)
GDPR master class   accountable research organisations (january 2018)GDPR master class   accountable research organisations (january 2018)
GDPR master class accountable research organisations (january 2018)MRS
 
Bridging the Gap Between Privacy and Retention
Bridging the Gap Between Privacy and RetentionBridging the Gap Between Privacy and Retention
Bridging the Gap Between Privacy and RetentionInfoGoTo
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To ConsiderSymantec
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesOgilvy Consulting
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerCapgemini
 
NetSquared London - GDPR for charities
NetSquared London - GDPR for charitiesNetSquared London - GDPR for charities
NetSquared London - GDPR for charitiesTech Trust
 
GDPR: the Steps Event Planners Need to Follow
GDPR: the Steps Event Planners Need to FollowGDPR: the Steps Event Planners Need to Follow
GDPR: the Steps Event Planners Need to Followetouches
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 
GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaperJim Wilson
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...Harrison Clark Rickerbys
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 

Similar to Achieving data privacy compliance in postgres or greenplum - Greenplum Summit 2018 (20)

GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
 
GDPR webinar presentation | LawBite
GDPR webinar presentation | LawBiteGDPR webinar presentation | LawBite
GDPR webinar presentation | LawBite
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPR
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 
Jisc GDPR conference
Jisc GDPR conferenceJisc GDPR conference
Jisc GDPR conference
 
GDPR master class accountable research organisations (january 2018)
GDPR master class   accountable research organisations (january 2018)GDPR master class   accountable research organisations (january 2018)
GDPR master class accountable research organisations (january 2018)
 
Bridging the Gap Between Privacy and Retention
Bridging the Gap Between Privacy and RetentionBridging the Gap Between Privacy and Retention
Bridging the Gap Between Privacy and Retention
 
What does GDPR mean for your business?
What does GDPR mean for your business?What does GDPR mean for your business?
What does GDPR mean for your business?
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
NetSquared London - GDPR for charities
NetSquared London - GDPR for charitiesNetSquared London - GDPR for charities
NetSquared London - GDPR for charities
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
GDPR: the Steps Event Planners Need to Follow
GDPR: the Steps Event Planners Need to FollowGDPR: the Steps Event Planners Need to Follow
GDPR: the Steps Event Planners Need to Follow
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaper
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 

More from VMware Tanzu

Spring into AI presented by Dan Vega 5/14
Spring into AI presented by Dan Vega 5/14Spring into AI presented by Dan Vega 5/14
Spring into AI presented by Dan Vega 5/14VMware Tanzu
 
What AI Means For Your Product Strategy And What To Do About It
What AI Means For Your Product Strategy And What To Do About ItWhat AI Means For Your Product Strategy And What To Do About It
What AI Means For Your Product Strategy And What To Do About ItVMware Tanzu
 
Make the Right Thing the Obvious Thing at Cardinal Health 2023
Make the Right Thing the Obvious Thing at Cardinal Health 2023Make the Right Thing the Obvious Thing at Cardinal Health 2023
Make the Right Thing the Obvious Thing at Cardinal Health 2023VMware Tanzu
 
Enhancing DevEx and Simplifying Operations at Scale
Enhancing DevEx and Simplifying Operations at ScaleEnhancing DevEx and Simplifying Operations at Scale
Enhancing DevEx and Simplifying Operations at ScaleVMware Tanzu
 
Spring Update | July 2023
Spring Update | July 2023Spring Update | July 2023
Spring Update | July 2023VMware Tanzu
 
Platforms, Platform Engineering, & Platform as a Product
Platforms, Platform Engineering, & Platform as a ProductPlatforms, Platform Engineering, & Platform as a Product
Platforms, Platform Engineering, & Platform as a ProductVMware Tanzu
 
Building Cloud Ready Apps
Building Cloud Ready AppsBuilding Cloud Ready Apps
Building Cloud Ready AppsVMware Tanzu
 
Spring Boot 3 And Beyond
Spring Boot 3 And BeyondSpring Boot 3 And Beyond
Spring Boot 3 And BeyondVMware Tanzu
 
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdf
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdfSpring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdf
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdfVMware Tanzu
 
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023VMware Tanzu
 
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023VMware Tanzu
 
tanzu_developer_connect.pptx
tanzu_developer_connect.pptxtanzu_developer_connect.pptx
tanzu_developer_connect.pptxVMware Tanzu
 
Tanzu Virtual Developer Connect Workshop - French
Tanzu Virtual Developer Connect Workshop - FrenchTanzu Virtual Developer Connect Workshop - French
Tanzu Virtual Developer Connect Workshop - FrenchVMware Tanzu
 
Tanzu Developer Connect Workshop - English
Tanzu Developer Connect Workshop - EnglishTanzu Developer Connect Workshop - English
Tanzu Developer Connect Workshop - EnglishVMware Tanzu
 
Virtual Developer Connect Workshop - English
Virtual Developer Connect Workshop - EnglishVirtual Developer Connect Workshop - English
Virtual Developer Connect Workshop - EnglishVMware Tanzu
 
Tanzu Developer Connect - French
Tanzu Developer Connect - FrenchTanzu Developer Connect - French
Tanzu Developer Connect - FrenchVMware Tanzu
 
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023VMware Tanzu
 
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring BootSpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring BootVMware Tanzu
 
SpringOne Tour: The Influential Software Engineer
SpringOne Tour: The Influential Software EngineerSpringOne Tour: The Influential Software Engineer
SpringOne Tour: The Influential Software EngineerVMware Tanzu
 
SpringOne Tour: Domain-Driven Design: Theory vs Practice
SpringOne Tour: Domain-Driven Design: Theory vs PracticeSpringOne Tour: Domain-Driven Design: Theory vs Practice
SpringOne Tour: Domain-Driven Design: Theory vs PracticeVMware Tanzu
 

More from VMware Tanzu (20)

Spring into AI presented by Dan Vega 5/14
Spring into AI presented by Dan Vega 5/14Spring into AI presented by Dan Vega 5/14
Spring into AI presented by Dan Vega 5/14
 
What AI Means For Your Product Strategy And What To Do About It
What AI Means For Your Product Strategy And What To Do About ItWhat AI Means For Your Product Strategy And What To Do About It
What AI Means For Your Product Strategy And What To Do About It
 
Make the Right Thing the Obvious Thing at Cardinal Health 2023
Make the Right Thing the Obvious Thing at Cardinal Health 2023Make the Right Thing the Obvious Thing at Cardinal Health 2023
Make the Right Thing the Obvious Thing at Cardinal Health 2023
 
Enhancing DevEx and Simplifying Operations at Scale
Enhancing DevEx and Simplifying Operations at ScaleEnhancing DevEx and Simplifying Operations at Scale
Enhancing DevEx and Simplifying Operations at Scale
 
Spring Update | July 2023
Spring Update | July 2023Spring Update | July 2023
Spring Update | July 2023
 
Platforms, Platform Engineering, & Platform as a Product
Platforms, Platform Engineering, & Platform as a ProductPlatforms, Platform Engineering, & Platform as a Product
Platforms, Platform Engineering, & Platform as a Product
 
Building Cloud Ready Apps
Building Cloud Ready AppsBuilding Cloud Ready Apps
Building Cloud Ready Apps
 
Spring Boot 3 And Beyond
Spring Boot 3 And BeyondSpring Boot 3 And Beyond
Spring Boot 3 And Beyond
 
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdf
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdfSpring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdf
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdf
 
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
 
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
 
tanzu_developer_connect.pptx
tanzu_developer_connect.pptxtanzu_developer_connect.pptx
tanzu_developer_connect.pptx
 
Tanzu Virtual Developer Connect Workshop - French
Tanzu Virtual Developer Connect Workshop - FrenchTanzu Virtual Developer Connect Workshop - French
Tanzu Virtual Developer Connect Workshop - French
 
Tanzu Developer Connect Workshop - English
Tanzu Developer Connect Workshop - EnglishTanzu Developer Connect Workshop - English
Tanzu Developer Connect Workshop - English
 
Virtual Developer Connect Workshop - English
Virtual Developer Connect Workshop - EnglishVirtual Developer Connect Workshop - English
Virtual Developer Connect Workshop - English
 
Tanzu Developer Connect - French
Tanzu Developer Connect - FrenchTanzu Developer Connect - French
Tanzu Developer Connect - French
 
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
 
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring BootSpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
 
SpringOne Tour: The Influential Software Engineer
SpringOne Tour: The Influential Software EngineerSpringOne Tour: The Influential Software Engineer
SpringOne Tour: The Influential Software Engineer
 
SpringOne Tour: Domain-Driven Design: Theory vs Practice
SpringOne Tour: Domain-Driven Design: Theory vs PracticeSpringOne Tour: Domain-Driven Design: Theory vs Practice
SpringOne Tour: Domain-Driven Design: Theory vs Practice
 

Recently uploaded

Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfOrtus Solutions, Corp
 
Studiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareStudiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareinfo611746
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...Alluxio, Inc.
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILNatan Silnitsky
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessWSO2
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAlluxio, Inc.
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEJelle | Nordend
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfmbmh111980
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Krakówbim.edu.pl
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesKrzysztofKkol1
 
Crafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM IntegrationCrafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM IntegrationWave PLM
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...rajkumar669520
 

Recently uploaded (20)

Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Studiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareStudiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting software
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning Framework
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Kraków
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Crafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM IntegrationCrafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM Integration
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
 

Achieving data privacy compliance in postgres or greenplum - Greenplum Summit 2018