SlideShare a Scribd company logo
Thought Leaders in Big Data: Ulf Mattsson, CTO of Protegrity (Part 5)
By Sramana Mitra, One Million by One Million Blog
Sramana Mitra: What is the status of that capability in the Big Data industry today to be
able to achieve that balance between protection, privacy, and analytics?
Ulf Mattsson: Larger companies and companies providing Big Data distributions like Cloudera
and Hortonworks are actually involving third-party security companies like Protegrity to fill the
security gaps. For example, Protegrity has partnerships with Cloudera, Hortonworks, IBM,
Infosphere, Teradata, and other companies to satisfy these new types of security requirements.
Sramana Mitra: Are you built in to the Hortonworks and Cloudera architecture?
Ulf Mattsson: Yes, we are. It’s a very nice way to work at a small company. They provide their
added value through Hadoop. Then, we put security on top of that distribution.
Sramana Mitra: I have one question that is built out of what you said here. There is this
Holy Grail of personalization in pretty much every domain, some more than others. E-
commerce is a domain where personalization could have a big impact on how consumers
interact with an e-commerce store, but there are all sorts of personalization implications in
a variety of domains. Of course, there is the trade-off between how much data you’re
willing to share, how much data are you willing to let people use to personalize your
offering. If you give them that data, what else are they allowed to do with that data? What
is your impression of this debate? How do you foresee this unraveling?
Ulf Mattsson: Privacy is basically a sharing policy. It will require security. You need the
security functionality and capabilities to be able to protect privacy. Privacy is based on a policy
that you then can enforce and make sure that only the right people get that data. They shouldn’t
get all data. It should be granular. Access should be based on the business need to see that data.
An attacker that is hacking the system should not be able to see that data. If you look at some of
the recent breaches at Target, they lost 70 million personal records. That should never happen.
As you were saying, there’s a balance between how much data do I want to share and what
would I get back in value and customization personalization.
Sramana Mitra: And how do I, as a consumer, restrict what the merchant can do with my
data? I want personalization so I’m disclosing a lot of data, but I don’t necessarily want
them to do whatever they want to do with that data. How do I control that?
Ulf Mattsson: I think there are two layers. We have seen examples where data is stolen and used
for identity theft. That decides how much I want to trust my data with my favorite vendors. I
think the right way forward is to have consent. If I opt out to some of it, I would not get that
personalization. The foundation, I think, is you need to have data security. You need to have real
data-centric security so you can enforce that type of policy and you can trust that the data will
not be misused. That’s my view. It comes down to a data-centric security foundation and a policy
that is controlling and monitoring what is happening with the data.
Sramana Mitra: It was a great discussion. Thank you for your time.

More Related Content

Viewers also liked

презентация1
презентация1презентация1
презентация1Zuzya
 
Tv crime drama csi
Tv crime drama  csiTv crime drama  csi
Tv crime drama csi
gulliverg
 
Evaluation q4
Evaluation q4Evaluation q4
Evaluation q4
nctcmedia12
 
102(1)期末暨(2)期初校務會議紀錄
102(1)期末暨(2)期初校務會議紀錄102(1)期末暨(2)期初校務會議紀錄
102(1)期末暨(2)期初校務會議紀錄Chi Hsiang Chan
 
G6 m2-d-lesson 19-t
G6 m2-d-lesson 19-tG6 m2-d-lesson 19-t
G6 m2-d-lesson 19-tmlabuski
 
Caso 2, IDE 9713984 Maribel Reyes
Caso 2,  IDE 9713984 Maribel ReyesCaso 2,  IDE 9713984 Maribel Reyes
Caso 2, IDE 9713984 Maribel ReyesMaribel Reyes
 
phonetics and phonology
phonetics and phonologyphonetics and phonology
phonetics and phonologyCarlos Cely
 
Calling on the Name of the Lord
Calling on the Name of the LordCalling on the Name of the Lord
Calling on the Name of the LordDevin Roush
 
Presentación1
Presentación1Presentación1
Presentación1charlyjot
 
Zorba The Greek (Hu)
Zorba The Greek (Hu)Zorba The Greek (Hu)
Zorba The Greek (Hu)
Kapitán József
 
My evaluation
My evaluationMy evaluation
My evaluation
gulliverg
 
Thirst
ThirstThirst
Yaocomaco native americans
Yaocomaco native americansYaocomaco native americans
Yaocomaco native americansjoey2013
 
James whales
James whalesJames whales
James whalesopiuchus4
 
Games Unit Final
Games Unit FinalGames Unit Final
Games Unit Finalmarcus_vang
 
Presentaciones digitales
Presentaciones digitalesPresentaciones digitales
Presentaciones digitales
aldopoblano_tareas
 

Viewers also liked (20)

презентация1
презентация1презентация1
презентация1
 
Tv crime drama csi
Tv crime drama  csiTv crime drama  csi
Tv crime drama csi
 
Evaluation q4
Evaluation q4Evaluation q4
Evaluation q4
 
102(1)期末暨(2)期初校務會議紀錄
102(1)期末暨(2)期初校務會議紀錄102(1)期末暨(2)期初校務會議紀錄
102(1)期末暨(2)期初校務會議紀錄
 
G6 m2-d-lesson 19-t
G6 m2-d-lesson 19-tG6 m2-d-lesson 19-t
G6 m2-d-lesson 19-t
 
Caso 2, IDE 9713984 Maribel Reyes
Caso 2,  IDE 9713984 Maribel ReyesCaso 2,  IDE 9713984 Maribel Reyes
Caso 2, IDE 9713984 Maribel Reyes
 
phonetics and phonology
phonetics and phonologyphonetics and phonology
phonetics and phonology
 
Calling on the Name of the Lord
Calling on the Name of the LordCalling on the Name of the Lord
Calling on the Name of the Lord
 
JG
JGJG
JG
 
Presentación1
Presentación1Presentación1
Presentación1
 
Zorba The Greek (Hu)
Zorba The Greek (Hu)Zorba The Greek (Hu)
Zorba The Greek (Hu)
 
Cd cover analysis 2
Cd cover analysis 2Cd cover analysis 2
Cd cover analysis 2
 
My evaluation
My evaluationMy evaluation
My evaluation
 
Thirst
ThirstThirst
Thirst
 
Yaocomaco native americans
Yaocomaco native americansYaocomaco native americans
Yaocomaco native americans
 
Hsoub
HsoubHsoub
Hsoub
 
James whales
James whalesJames whales
James whales
 
Games Unit Final
Games Unit FinalGames Unit Final
Games Unit Final
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Presentaciones digitales
Presentaciones digitalesPresentaciones digitales
Presentaciones digitales
 

Similar to Thought leaders in big data ulf mattsson, cto of protegrity (part 5)

Thought leaders in big data ulf mattsson, cto of protegrity (part 3)
Thought leaders in big data   ulf mattsson, cto of protegrity (part 3)Thought leaders in big data   ulf mattsson, cto of protegrity (part 3)
Thought leaders in big data ulf mattsson, cto of protegrity (part 3)
Ulf Mattsson
 
Thought leaders in big data ulf mattsson, cto of protegrity (part 2)
Thought leaders in big data   ulf mattsson, cto of protegrity (part 2)Thought leaders in big data   ulf mattsson, cto of protegrity (part 2)
Thought leaders in big data ulf mattsson, cto of protegrity (part 2)
Ulf Mattsson
 
Thought leaders in big data ulf mattsson, cto of protegrity (part 4)
Thought leaders in big data   ulf mattsson, cto of protegrity (part 4)Thought leaders in big data   ulf mattsson, cto of protegrity (part 4)
Thought leaders in big data ulf mattsson, cto of protegrity (part 4)
Ulf Mattsson
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider Attack
Susan Kennedy
 
Why Today’s Hybrid IT Complexity Makes 'as a Service' Security Essential
Why Today’s Hybrid IT Complexity Makes 'as a Service' Security EssentialWhy Today’s Hybrid IT Complexity Makes 'as a Service' Security Essential
Why Today’s Hybrid IT Complexity Makes 'as a Service' Security Essential
Dana Gardner
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
David X Martin
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
Mudit Mangal
 
Security personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docxSecurity personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docx
jeffreye3
 
Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...
Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...
Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...
Dana Gardner
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapDominic Vogel
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
AT Internet
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
jayceewong1
 
The Open Group Conference Panel Explores How the Big Data Era Now Challenges ...
The Open Group Conference Panel Explores How the Big Data Era Now Challenges ...The Open Group Conference Panel Explores How the Big Data Era Now Challenges ...
The Open Group Conference Panel Explores How the Big Data Era Now Challenges ...
Dana Gardner
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
Somerco Research
 
Impact of Insecure Communications
Impact of Insecure CommunicationsImpact of Insecure Communications
Impact of Insecure Communications
Kavika Roy
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
daniahendric
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
YounesChafi1
 
Preparing the ground - how can we make data open?
Preparing the ground - how can we make data open?Preparing the ground - how can we make data open?
Preparing the ground - how can we make data open?
Traveline
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
Ben Rothke
 

Similar to Thought leaders in big data ulf mattsson, cto of protegrity (part 5) (20)

Thought leaders in big data ulf mattsson, cto of protegrity (part 3)
Thought leaders in big data   ulf mattsson, cto of protegrity (part 3)Thought leaders in big data   ulf mattsson, cto of protegrity (part 3)
Thought leaders in big data ulf mattsson, cto of protegrity (part 3)
 
Thought leaders in big data ulf mattsson, cto of protegrity (part 2)
Thought leaders in big data   ulf mattsson, cto of protegrity (part 2)Thought leaders in big data   ulf mattsson, cto of protegrity (part 2)
Thought leaders in big data ulf mattsson, cto of protegrity (part 2)
 
Thought leaders in big data ulf mattsson, cto of protegrity (part 4)
Thought leaders in big data   ulf mattsson, cto of protegrity (part 4)Thought leaders in big data   ulf mattsson, cto of protegrity (part 4)
Thought leaders in big data ulf mattsson, cto of protegrity (part 4)
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider Attack
 
Why Today’s Hybrid IT Complexity Makes 'as a Service' Security Essential
Why Today’s Hybrid IT Complexity Makes 'as a Service' Security EssentialWhy Today’s Hybrid IT Complexity Makes 'as a Service' Security Essential
Why Today’s Hybrid IT Complexity Makes 'as a Service' Security Essential
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
 
Security personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docxSecurity personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docx
 
Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...
Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...
Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
The Open Group Conference Panel Explores How the Big Data Era Now Challenges ...
The Open Group Conference Panel Explores How the Big Data Era Now Challenges ...The Open Group Conference Panel Explores How the Big Data Era Now Challenges ...
The Open Group Conference Panel Explores How the Big Data Era Now Challenges ...
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 
Impact of Insecure Communications
Impact of Insecure CommunicationsImpact of Insecure Communications
Impact of Insecure Communications
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 
Preparing the ground - how can we make data open?
Preparing the ground - how can we make data open?Preparing the ground - how can we make data open?
Preparing the ground - how can we make data open?
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 

More from Ulf Mattsson

Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...
Ulf Mattsson
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Ulf Mattsson
 
Book
BookBook
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...
Ulf Mattsson
 
Qubit conference-new-york-2021
Qubit conference-new-york-2021Qubit conference-new-york-2021
Qubit conference-new-york-2021
Ulf Mattsson
 
Secure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use casesSecure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use cases
Ulf Mattsson
 
Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...
Ulf Mattsson
 
Data encryption and tokenization for international unicode
Data encryption and tokenization for international unicodeData encryption and tokenization for international unicode
Data encryption and tokenization for international unicode
Ulf Mattsson
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
Ulf Mattsson
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protection
Ulf Mattsson
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
Ulf Mattsson
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Ulf Mattsson
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
Ulf Mattsson
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
Ulf Mattsson
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
Ulf Mattsson
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS London
Ulf Mattsson
 
Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACA
Ulf Mattsson
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
Ulf Mattsson
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Ulf Mattsson
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
Ulf Mattsson
 

More from Ulf Mattsson (20)

Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
Book
BookBook
Book
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...
 
Qubit conference-new-york-2021
Qubit conference-new-york-2021Qubit conference-new-york-2021
Qubit conference-new-york-2021
 
Secure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use casesSecure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use cases
 
Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...
 
Data encryption and tokenization for international unicode
Data encryption and tokenization for international unicodeData encryption and tokenization for international unicode
Data encryption and tokenization for international unicode
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protection
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS London
 
Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACA
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 

Recently uploaded

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Thought leaders in big data ulf mattsson, cto of protegrity (part 5)

  • 1. Thought Leaders in Big Data: Ulf Mattsson, CTO of Protegrity (Part 5) By Sramana Mitra, One Million by One Million Blog Sramana Mitra: What is the status of that capability in the Big Data industry today to be able to achieve that balance between protection, privacy, and analytics? Ulf Mattsson: Larger companies and companies providing Big Data distributions like Cloudera and Hortonworks are actually involving third-party security companies like Protegrity to fill the security gaps. For example, Protegrity has partnerships with Cloudera, Hortonworks, IBM, Infosphere, Teradata, and other companies to satisfy these new types of security requirements. Sramana Mitra: Are you built in to the Hortonworks and Cloudera architecture? Ulf Mattsson: Yes, we are. It’s a very nice way to work at a small company. They provide their added value through Hadoop. Then, we put security on top of that distribution. Sramana Mitra: I have one question that is built out of what you said here. There is this Holy Grail of personalization in pretty much every domain, some more than others. E- commerce is a domain where personalization could have a big impact on how consumers interact with an e-commerce store, but there are all sorts of personalization implications in a variety of domains. Of course, there is the trade-off between how much data you’re willing to share, how much data are you willing to let people use to personalize your offering. If you give them that data, what else are they allowed to do with that data? What is your impression of this debate? How do you foresee this unraveling? Ulf Mattsson: Privacy is basically a sharing policy. It will require security. You need the security functionality and capabilities to be able to protect privacy. Privacy is based on a policy that you then can enforce and make sure that only the right people get that data. They shouldn’t get all data. It should be granular. Access should be based on the business need to see that data. An attacker that is hacking the system should not be able to see that data. If you look at some of the recent breaches at Target, they lost 70 million personal records. That should never happen. As you were saying, there’s a balance between how much data do I want to share and what would I get back in value and customization personalization. Sramana Mitra: And how do I, as a consumer, restrict what the merchant can do with my data? I want personalization so I’m disclosing a lot of data, but I don’t necessarily want them to do whatever they want to do with that data. How do I control that? Ulf Mattsson: I think there are two layers. We have seen examples where data is stolen and used for identity theft. That decides how much I want to trust my data with my favorite vendors. I think the right way forward is to have consent. If I opt out to some of it, I would not get that personalization. The foundation, I think, is you need to have data security. You need to have real data-centric security so you can enforce that type of policy and you can trust that the data will not be misused. That’s my view. It comes down to a data-centric security foundation and a policy that is controlling and monitoring what is happening with the data.
  • 2. Sramana Mitra: It was a great discussion. Thank you for your time.