SlideShare a Scribd company logo
1 of 1
Thought Leaders in Big Data: Ulf Mattsson, CTO of Protegrity (Part 4)
By Sramana Mitra, One Million by One Million Blog
Ulf Mattsson: We’ve seen studies talking about how Big Data analytics can revolutionize the
way the Internet did many years ago. I’ve seen figures saying that 63% are using it to
enhance customer relationships, 58% are using these capabilities to redefine the product and
product development, and 56% are using it to change their operations. These create a lot of
opportunities but, at the same time, open up privacy issues. According to recent reports and
studies, 51% are saying that security is the most important issue. The monetization of data and
data breaches are driving the need for security.
Most of Big Data is based on Hadoop and Hadoop is introducing new system layers for security.
Traditional security approaches are not working because they are typically based on some kind
of control in-boxing or choke point. You need to know where the data is. If you box it in and
build walls around the it, Big Data will not work because Big Data is based on data moving
around between the different nodes. It’s very high performance so you cannot use your
traditional parameters of security. So, you to address not just the issue of Big Data where you
have the new security approach but also the data flow.
What is recognized as a big issue recently by Gartner is that we actually have different silos in
the enterprise. We have different islands of legacy systems that are feeding data into Big Data.
You have enterprise warehouses that are using the data from Big Data. It’s again about the data
flow. Gartner is pointing to breaching the silos as a cryptic way to solve the security problem
going forward. When they talk about breaching these silos, they are referring to an enterprise
policy. Your security policy would, on an enterprise level, control it from a single point instead
of point solutions for each silo.
These enterprise policies should then be automatically enforced on these different silos and
platforms. We use the term “bridging the gap” for this where you can actually be compliant and
protect privacy, and at the same time use the data. With traditional security approaches, you tend
to lock down the data and then the data will not be available for analysis. You need to use
another approach.
What Gartner is also acknowledging is that you need to think about the granularity. If you have a
more granular way to protect different data and different feeds, then you can adjust the
protection. You get the balance between security and utility. You actually can use your data for
analytics and still be compliant and have control over the protection.
This segment is part 4 in the series : Thought Leaders in Big Data: Ulf Mattsson, CTO of
Protegrity

More Related Content

What's hot

Big Data: Are you ready for it? Can you handle it?
Big Data: Are you ready for it? Can you handle it? Big Data: Are you ready for it? Can you handle it?
Big Data: Are you ready for it? Can you handle it? ScaleFocus
 
Operar con alertas, dashboards customizados y cronología
Operar con alertas, dashboards customizados y cronologíaOperar con alertas, dashboards customizados y cronología
Operar con alertas, dashboards customizados y cronologíaElasticsearch
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compuANIL247048
 
Discovery of rest at data
Discovery of rest at dataDiscovery of rest at data
Discovery of rest at dataSanjeev Solanki
 
Conferencia principal: Evolución y visión de Elastic Security
Conferencia principal: Evolución y visión de Elastic SecurityConferencia principal: Evolución y visión de Elastic Security
Conferencia principal: Evolución y visión de Elastic SecurityElasticsearch
 
Cognitive analytics
Cognitive analyticsCognitive analytics
Cognitive analyticsAjay Koomar
 
Exploring New Methods for Protecting and Distributing Confidential Research ...
Exploring New Methods for Protecting and Distributing Confidential Research ...Exploring New Methods for Protecting and Distributing Confidential Research ...
Exploring New Methods for Protecting and Distributing Confidential Research ...Bryan Beecher
 
The Importance of Backup and Disaster Recovery
The Importance of Backup and Disaster RecoveryThe Importance of Backup and Disaster Recovery
The Importance of Backup and Disaster RecoveryNetEnrich, Inc.
 
Big Data Certification
Big Data CertificationBig Data Certification
Big Data CertificationExperfy
 
IntelAI TigerText
IntelAI TigerTextIntelAI TigerText
IntelAI TigerTextSrinu Adira
 
Aujas_Gartner_Dubai_v1_Nov15
Aujas_Gartner_Dubai_v1_Nov15Aujas_Gartner_Dubai_v1_Nov15
Aujas_Gartner_Dubai_v1_Nov15Sameer Shelke
 
Sqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl
 
STEALTHbits Sensitive Data Discovery Solutions
STEALTHbits Sensitive Data Discovery SolutionsSTEALTHbits Sensitive Data Discovery Solutions
STEALTHbits Sensitive Data Discovery SolutionsSTEALTHbits Technologies
 
2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft SolutionHarriet Schneider
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric SecurityWatchful Software
 
NexGenData
NexGenData NexGenData
NexGenData s_akelly
 
Elastic Security Solution Brief
Elastic Security Solution BriefElastic Security Solution Brief
Elastic Security Solution BriefJoseph DeFever
 

What's hot (19)

Big Data: Are you ready for it? Can you handle it?
Big Data: Are you ready for it? Can you handle it? Big Data: Are you ready for it? Can you handle it?
Big Data: Are you ready for it? Can you handle it?
 
Operar con alertas, dashboards customizados y cronología
Operar con alertas, dashboards customizados y cronologíaOperar con alertas, dashboards customizados y cronología
Operar con alertas, dashboards customizados y cronología
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compu
 
Discovery of rest at data
Discovery of rest at dataDiscovery of rest at data
Discovery of rest at data
 
Conferencia principal: Evolución y visión de Elastic Security
Conferencia principal: Evolución y visión de Elastic SecurityConferencia principal: Evolución y visión de Elastic Security
Conferencia principal: Evolución y visión de Elastic Security
 
Cognitive analytics
Cognitive analyticsCognitive analytics
Cognitive analytics
 
cli
clicli
cli
 
Exploring New Methods for Protecting and Distributing Confidential Research ...
Exploring New Methods for Protecting and Distributing Confidential Research ...Exploring New Methods for Protecting and Distributing Confidential Research ...
Exploring New Methods for Protecting and Distributing Confidential Research ...
 
The Importance of Backup and Disaster Recovery
The Importance of Backup and Disaster RecoveryThe Importance of Backup and Disaster Recovery
The Importance of Backup and Disaster Recovery
 
Big Data Certification
Big Data CertificationBig Data Certification
Big Data Certification
 
IntelAI TigerText
IntelAI TigerTextIntelAI TigerText
IntelAI TigerText
 
Aujas_Gartner_Dubai_v1_Nov15
Aujas_Gartner_Dubai_v1_Nov15Aujas_Gartner_Dubai_v1_Nov15
Aujas_Gartner_Dubai_v1_Nov15
 
Sqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch Webinar
 
STEALTHbits Sensitive Data Discovery Solutions
STEALTHbits Sensitive Data Discovery SolutionsSTEALTHbits Sensitive Data Discovery Solutions
STEALTHbits Sensitive Data Discovery Solutions
 
2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric Security
 
NexGenData
NexGenData NexGenData
NexGenData
 
Introduction to BigData
Introduction to BigData Introduction to BigData
Introduction to BigData
 
Elastic Security Solution Brief
Elastic Security Solution BriefElastic Security Solution Brief
Elastic Security Solution Brief
 

Viewers also liked

Inclusionary Zoning_McCarthy
Inclusionary Zoning_McCarthyInclusionary Zoning_McCarthy
Inclusionary Zoning_McCarthyLev McCarthy
 
Reporte de consultas médicas
Reporte de consultas médicasReporte de consultas médicas
Reporte de consultas médicassanluistalpa
 
L&D Summit VI Perry Timms - The Future of Work, learning and the HR profession
L&D Summit VI   Perry Timms - The Future of Work, learning and the HR professionL&D Summit VI   Perry Timms - The Future of Work, learning and the HR profession
L&D Summit VI Perry Timms - The Future of Work, learning and the HR professionITOLCEE
 
Requirements Maturity Model - Table
Requirements Maturity Model - TableRequirements Maturity Model - Table
Requirements Maturity Model - TableIAG Consulting
 
Bán căn hộ Carillon Quận Tân Bình
Bán căn hộ Carillon Quận Tân BìnhBán căn hộ Carillon Quận Tân Bình
Bán căn hộ Carillon Quận Tân Bìnhluongquocbao
 
Boletin no 3 puntuaciones
Boletin no 3 puntuacionesBoletin no 3 puntuaciones
Boletin no 3 puntuacionesCopa Capital
 
Presentation1 Intro To Computers Week 7
Presentation1 Intro To Computers Week 7Presentation1 Intro To Computers Week 7
Presentation1 Intro To Computers Week 7Ashley Bohannon
 
부평오피 마포오피 분당오피 역삼역오피걸 무료성인자료
부평오피 마포오피 분당오피 역삼역오피걸 무료성인자료부평오피 마포오피 분당오피 역삼역오피걸 무료성인자료
부평오피 마포오피 분당오피 역삼역오피걸 무료성인자료lycttidl2
 
Westech Power Point
Westech Power PointWestech Power Point
Westech Power PointWestech
 
Reportaje fotografico de la situación del puerto en Sevilla
Reportaje fotografico de la situación del puerto en SevillaReportaje fotografico de la situación del puerto en Sevilla
Reportaje fotografico de la situación del puerto en SevillaJuan Ignacio Zoido
 
Amazing Jeep Suspension
Amazing   Jeep SuspensionAmazing   Jeep Suspension
Amazing Jeep SuspensionHasan Yousuf
 
Ashiana mulberry sector-2 sohna gurgaon
Ashiana mulberry sector-2 sohna gurgaon Ashiana mulberry sector-2 sohna gurgaon
Ashiana mulberry sector-2 sohna gurgaon A L REALTY
 

Viewers also liked (17)

Inclusionary Zoning_McCarthy
Inclusionary Zoning_McCarthyInclusionary Zoning_McCarthy
Inclusionary Zoning_McCarthy
 
Reporte de consultas médicas
Reporte de consultas médicasReporte de consultas médicas
Reporte de consultas médicas
 
Imt 24
Imt 24Imt 24
Imt 24
 
L&D Summit VI Perry Timms - The Future of Work, learning and the HR profession
L&D Summit VI   Perry Timms - The Future of Work, learning and the HR professionL&D Summit VI   Perry Timms - The Future of Work, learning and the HR profession
L&D Summit VI Perry Timms - The Future of Work, learning and the HR profession
 
Programa conversatorio
Programa conversatorioPrograma conversatorio
Programa conversatorio
 
Ejanalisissust
EjanalisissustEjanalisissust
Ejanalisissust
 
Requirements Maturity Model - Table
Requirements Maturity Model - TableRequirements Maturity Model - Table
Requirements Maturity Model - Table
 
учительская
учительскаяучительская
учительская
 
KundiBCN
KundiBCNKundiBCN
KundiBCN
 
Bán căn hộ Carillon Quận Tân Bình
Bán căn hộ Carillon Quận Tân BìnhBán căn hộ Carillon Quận Tân Bình
Bán căn hộ Carillon Quận Tân Bình
 
Boletin no 3 puntuaciones
Boletin no 3 puntuacionesBoletin no 3 puntuaciones
Boletin no 3 puntuaciones
 
Presentation1 Intro To Computers Week 7
Presentation1 Intro To Computers Week 7Presentation1 Intro To Computers Week 7
Presentation1 Intro To Computers Week 7
 
부평오피 마포오피 분당오피 역삼역오피걸 무료성인자료
부평오피 마포오피 분당오피 역삼역오피걸 무료성인자료부평오피 마포오피 분당오피 역삼역오피걸 무료성인자료
부평오피 마포오피 분당오피 역삼역오피걸 무료성인자료
 
Westech Power Point
Westech Power PointWestech Power Point
Westech Power Point
 
Reportaje fotografico de la situación del puerto en Sevilla
Reportaje fotografico de la situación del puerto en SevillaReportaje fotografico de la situación del puerto en Sevilla
Reportaje fotografico de la situación del puerto en Sevilla
 
Amazing Jeep Suspension
Amazing   Jeep SuspensionAmazing   Jeep Suspension
Amazing Jeep Suspension
 
Ashiana mulberry sector-2 sohna gurgaon
Ashiana mulberry sector-2 sohna gurgaon Ashiana mulberry sector-2 sohna gurgaon
Ashiana mulberry sector-2 sohna gurgaon
 

Similar to Thought leaders in big data ulf mattsson, cto of protegrity (part 4)

Big data security
Big data securityBig data security
Big data securityAnne ndolo
 
Big data security
Big data securityBig data security
Big data securityAnne ndolo
 
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...IT Support Engineer
 
Real callenges in big data security
Real callenges in big data securityReal callenges in big data security
Real callenges in big data securitybalasahebcomp
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellenceMudit Mangal
 
Isaca global journal - choosing the most appropriate data security solution ...
Isaca global journal  - choosing the most appropriate data security solution ...Isaca global journal  - choosing the most appropriate data security solution ...
Isaca global journal - choosing the most appropriate data security solution ...Ulf Mattsson
 
Data security to protect pci data flow ulf mattsson - insecure-mag-40
Data security to protect pci data flow   ulf mattsson - insecure-mag-40Data security to protect pci data flow   ulf mattsson - insecure-mag-40
Data security to protect pci data flow ulf mattsson - insecure-mag-40Ulf Mattsson
 
Security issues in big data
Security issues in big data Security issues in big data
Security issues in big data Shallote Dsouza
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceKim Cook
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods IJECEIAES
 
Harness the power of data
Harness the power of dataHarness the power of data
Harness the power of dataHarsha MV
 
Isaca journal - bridging the gap between access and security in big data...
Isaca journal  - bridging the gap between access and security in big data...Isaca journal  - bridging the gap between access and security in big data...
Isaca journal - bridging the gap between access and security in big data...Ulf Mattsson
 
Big Data & Analytics Trends 2016 Vin Malhotra
Big Data & Analytics Trends 2016 Vin MalhotraBig Data & Analytics Trends 2016 Vin Malhotra
Big Data & Analytics Trends 2016 Vin MalhotraVin Malhotra
 
Analytics Trends 20145 - Deloitte - us-da-analytics-analytics-trends-2015
Analytics Trends 20145 -  Deloitte - us-da-analytics-analytics-trends-2015Analytics Trends 20145 -  Deloitte - us-da-analytics-analytics-trends-2015
Analytics Trends 20145 - Deloitte - us-da-analytics-analytics-trends-2015Edgar Alejandro Villegas
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix LLC
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldNeil Raden
 
Big data (word file)
Big data  (word file)Big data  (word file)
Big data (word file)Shahbaz Anjam
 
Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl
 

Similar to Thought leaders in big data ulf mattsson, cto of protegrity (part 4) (20)

Big data security
Big data securityBig data security
Big data security
 
Big data security
Big data securityBig data security
Big data security
 
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
Real callenges in big data security
Real callenges in big data securityReal callenges in big data security
Real callenges in big data security
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
 
Isaca global journal - choosing the most appropriate data security solution ...
Isaca global journal  - choosing the most appropriate data security solution ...Isaca global journal  - choosing the most appropriate data security solution ...
Isaca global journal - choosing the most appropriate data security solution ...
 
Data security to protect pci data flow ulf mattsson - insecure-mag-40
Data security to protect pci data flow   ulf mattsson - insecure-mag-40Data security to protect pci data flow   ulf mattsson - insecure-mag-40
Data security to protect pci data flow ulf mattsson - insecure-mag-40
 
Big Data: 8 facts and 8 fictions
Big Data: 8 facts and 8 fictionsBig Data: 8 facts and 8 fictions
Big Data: 8 facts and 8 fictions
 
Security issues in big data
Security issues in big data Security issues in big data
Security issues in big data
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
 
Harness the power of data
Harness the power of dataHarness the power of data
Harness the power of data
 
Isaca journal - bridging the gap between access and security in big data...
Isaca journal  - bridging the gap between access and security in big data...Isaca journal  - bridging the gap between access and security in big data...
Isaca journal - bridging the gap between access and security in big data...
 
Big Data & Analytics Trends 2016 Vin Malhotra
Big Data & Analytics Trends 2016 Vin MalhotraBig Data & Analytics Trends 2016 Vin Malhotra
Big Data & Analytics Trends 2016 Vin Malhotra
 
Analytics Trends 20145 - Deloitte - us-da-analytics-analytics-trends-2015
Analytics Trends 20145 -  Deloitte - us-da-analytics-analytics-trends-2015Analytics Trends 20145 -  Deloitte - us-da-analytics-analytics-trends-2015
Analytics Trends 20145 - Deloitte - us-da-analytics-analytics-trends-2015
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid World
 
Big data (word file)
Big data  (word file)Big data  (word file)
Big data (word file)
 
Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use Case
 

More from Ulf Mattsson

Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...Ulf Mattsson
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...Ulf Mattsson
 
Qubit conference-new-york-2021
Qubit conference-new-york-2021Qubit conference-new-york-2021
Qubit conference-new-york-2021Ulf Mattsson
 
Secure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use casesSecure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use casesUlf Mattsson
 
Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Ulf Mattsson
 
Data encryption and tokenization for international unicode
Data encryption and tokenization for international unicodeData encryption and tokenization for international unicode
Data encryption and tokenization for international unicodeUlf Mattsson
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchainUlf Mattsson
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protectionUlf Mattsson
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsUlf Mattsson
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaUlf Mattsson
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKUlf Mattsson
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsUlf Mattsson
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonUlf Mattsson
 
Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAUlf Mattsson
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?Ulf Mattsson
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2bUlf Mattsson
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020Ulf Mattsson
 

More from Ulf Mattsson (20)

Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
Book
BookBook
Book
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...
 
Qubit conference-new-york-2021
Qubit conference-new-york-2021Qubit conference-new-york-2021
Qubit conference-new-york-2021
 
Secure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use casesSecure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use cases
 
Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...
 
Data encryption and tokenization for international unicode
Data encryption and tokenization for international unicodeData encryption and tokenization for international unicode
Data encryption and tokenization for international unicode
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protection
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS London
 
Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACA
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Thought leaders in big data ulf mattsson, cto of protegrity (part 4)

  • 1. Thought Leaders in Big Data: Ulf Mattsson, CTO of Protegrity (Part 4) By Sramana Mitra, One Million by One Million Blog Ulf Mattsson: We’ve seen studies talking about how Big Data analytics can revolutionize the way the Internet did many years ago. I’ve seen figures saying that 63% are using it to enhance customer relationships, 58% are using these capabilities to redefine the product and product development, and 56% are using it to change their operations. These create a lot of opportunities but, at the same time, open up privacy issues. According to recent reports and studies, 51% are saying that security is the most important issue. The monetization of data and data breaches are driving the need for security. Most of Big Data is based on Hadoop and Hadoop is introducing new system layers for security. Traditional security approaches are not working because they are typically based on some kind of control in-boxing or choke point. You need to know where the data is. If you box it in and build walls around the it, Big Data will not work because Big Data is based on data moving around between the different nodes. It’s very high performance so you cannot use your traditional parameters of security. So, you to address not just the issue of Big Data where you have the new security approach but also the data flow. What is recognized as a big issue recently by Gartner is that we actually have different silos in the enterprise. We have different islands of legacy systems that are feeding data into Big Data. You have enterprise warehouses that are using the data from Big Data. It’s again about the data flow. Gartner is pointing to breaching the silos as a cryptic way to solve the security problem going forward. When they talk about breaching these silos, they are referring to an enterprise policy. Your security policy would, on an enterprise level, control it from a single point instead of point solutions for each silo. These enterprise policies should then be automatically enforced on these different silos and platforms. We use the term “bridging the gap” for this where you can actually be compliant and protect privacy, and at the same time use the data. With traditional security approaches, you tend to lock down the data and then the data will not be available for analysis. You need to use another approach. What Gartner is also acknowledging is that you need to think about the granularity. If you have a more granular way to protect different data and different feeds, then you can adjust the protection. You get the balance between security and utility. You actually can use your data for analytics and still be compliant and have control over the protection. This segment is part 4 in the series : Thought Leaders in Big Data: Ulf Mattsson, CTO of Protegrity