SlideShare une entreprise Scribd logo
1  sur  64
Ulf Mattsson, CTO

Protegrity
What Is Tokenization
      on the Node ?


2
3
Teradata and Protegrity
    • Strategic partnership since 2004

    • Advocated solution for data protection on Teradata Databases

    • Proven parallel and scalable data protection for Teradata MPP platforms

    • Collaboration on forward-looking roadmaps
       – New and advanced data protection options
       – Integration with new Teradata Database features
       – Seamless operation on large data warehouse systems

    • World-class customers



4
Protegrity Data Protection for Teradata
    • A comprehensive data protection solution for Teradata
      Databases
       – Provides additional separation of duties through a separate
         Security Manager interface for creation and maintenance of
         security policies
       – Includes a patented key management system for secure key
         generation and protection of keys when stored
       – Supports multiple data protection options including strong
         encryption and tokenization
       – Supports multiple cryptographic algorithms and key strengths
       – Automates the process of converting clear text data to cipher text


5
Protegrity Data Protection for Teradata
    • A comprehensive data protection solution for Teradata
      Databases
       – Provides additional access controls to protect sensitive information
         (even DBC can not see unencrypted data unless specifically authorized
         by the Security Manager)
       – Includes additional auditing separate from database audit logs (such as
         the Access Log)
       – Designed to fully exploit Teradata Database parallelism and scalability
       – Enterprise-wide solution that works with most major databases and
         operating systems (not just Teradata)




6
Select Protegrity Customers


    Select Protegrity Customers




7
Data Breaches Gone Mad - Learn how to Secure your Data
    Warehouse Straight Away!




                                              www.protegrity.com

8
Who Are The
    Hackers and What
     Are They Doing?
9
Some of you have already met Yuri.




               Source: http://www.youtube.com/user/ProtegrityUSA
 10
10
Last year he and his “anonymous”
      friends hacked AT&T.




               Source: http://www.youtube.com/user/ProtegrityUSA
 11
11
This year they hacked Sony and bought
BMW M5s.




         Source: http://www.youtube.com/user/ProtegrityUSA
•   Data including
         passwords and personal
         details were stored in
         clear text

     •   Attacks were not
         coordinated and not
         advanced

     •   Majority of attacks
         were SQL Injection
         dumps and Distributed
         Denial of Service (DDoS)

13
Next month Yuri plans to hit a major
     telco with the keys provided by a
     disgruntled employee.




              Source: http://www.youtube.com/user/ProtegrityUSA
14
Then Yuri is going to buy a private
     jet.




               Source: http://www.youtube.com/user/ProtegrityUSA
15
Hospitality
                 Retail
     Financial Services
          Government
         Tech Services
        Manufacturing
        Transportation
                 Media
           Healthcare
     Business Services

                                              0               10               20          30   40   50 %
     *: Number of breaches

     Source: 2011 Data Breach Investigations Report, Verizon Business RISK team and USSS


16
Source: Trustwave Global Security Report 2011
17
So how does Yuri do it?




               Source: http://www.youtube.com/user/ProtegrityUSA
18
Hacking
        Malware
        Physical
           Error
         Misuse
          Social

                                     0              20               40               60   80   100   %
     *: Number of records

     Source: 2011 Data Breach Investigations Report, Verizon Business RISK team and USSS



19
“Usually, I just
     need one
     disgruntled
     employee.
     Just one.”




                Source: http://www.youtube.com/user/ProtegrityUSA
20
•   Attackers stole information about SecurID
         two-factor authentication
     •   60 different types of customized malware
     •   Advanced Persistent Threat (APT) malware
         tied to a network in Shanghai
     •   A tool written by a Chinese hacker 10 years
         ago



21
Third party fraud detection
          Notified by law enforcement
      Reported by customer/partner…
               Unusual system behavior
                    Reported by employee
        Internal security audit or scan
                   Internal fraud detection
     Brag or blackmail by perpetrator
      Third party monitoring service

                                                               0          10           20   30   40   50 %
     *: Number of breaches

     Source: 2011 Data Breach Investigations Report, Verizon Business RISK team and USSS



22
Why Should
      I Care?
23
•    Some issues have stayed constant:
             •     Threat landscape continues to gain sophistication
             •     Attackers will always be a step ahead of the defenders

        •    Different motivation, methods and tools today:
             •     We are fighting highly organized, well-funded
                   crime syndicates and nations
             •     Move from detective to preventative controls needed


     Source: Forrester and http://www.csoonline.com/article/602313/the-changing-threat-landscape?page=2




24
How Can We Secure
      The Sensitive Data
            Flow?


25
We Need To Protect The Data Flow




      : Enforcement point

                    Unprotected sensitive information:   Protected sensitive information
26
What Has Industry
           Done
     To Protect Itself?

27
What is Cost Effective Data Protection?

                                             Firewalls
        Encryption/Tokenization for data at rest
               Anti-virus & anti-malware solution
                     Encryption for data in motion
                     Access governance systems
       Identity & access management systems
     Correlation or event management systems
                 Web application firewalls (WAF)                                          WAF
                     Endpoint encryption solution
            Data loss prevention systems (DLP)                                      DLP
      Intrusion detection or prevention systems
     Database scanning and monitoring (DAM)                           DAM
                         ID & credentialing system

                                                            0   10   20   30   40   50    60   70   80   90 %
     Source: PCI DSS Compliance Survey, Ponemon Institute
28
Can New Data Security Help Creativity?
          Risk
                                                          Traditional
          High –                                            Access
                                                            Control
                         Old and flawed:
                          Minimal access                                      New:
                         levels so people                                   Creativity
                          can only carry                                    Happens
                           out their jobs                                  At the edge

           Low -

                                            Data Tokens
                                                                                    Access
                          I                                           I           Right Level
                        Low                                         High
     Source: InformationWeek Aug 15, 2011
29
What has Industry
          Done To
     Protect Databases?


30
How Did Data Security Evolve?
       Year                                 Event
                 Memory Data Tokenization introduced as a fully distributed
       2010
                                           model
               Centralized Data Tokenization introduced with hosted payment
                                           service
                DTP (Data Type Preserving encryption) used by in commercial
       2005
                                         databases
                             Attack on SHA-1 hash announced
                                    DES was withdrawn
              AES (Advance Encryption Standard) accepted as a FIPS-approved
       2001
                                         algorithm
       1988             IBM AS/400 used tokenization in shadow files
       1975       DES (Data Encryption Standard) draft submitted by IBM
      1900 BC                    Cryptography used in Egypt

31
How Can We Limit Changes to Applications?
                     Intrusiveness (to Applications and Databases)




                                                                                Encryption
                                                                                Standard
                   Hashing -     !@#$%a^///&*B()..,,,gft_+!@4#$2%p^&*

       Strong Encryption -       !@#$%a^.,mhu7/////&*B()_+!@

                     Alpha -     aVdSaH 1F4hJ 1D3a
        Encoding




                                                                Tokenizing or
                   Numeric -     666666 777777 8888              Formatted
                                                                 Encryption
                     Partial -   123456 777777 1234

            Clear Text Data -    123456 123456 1234
                                                                                Data
                                                        I
                                                                                Length
                                                     Original
32
What Is The Next Step
      In Data Protection?

       The Promise Of A
         Better World
33
Replace Sensitive Data With Fake Data




                                               Data
                              Random number   Token




34
Replace Sensitive Data With Data Tokens




     Tokenization                                          De-tokenization




                          Applications & Databases



                      Unprotected sensitive information:
       : Data Token    Protected sensitive information:
35
Yuri Hates Tokens!



36
What is Tokenization and What is the Benefit?
     • Tokenization
        – Tokenization is process that replaces sensitive data in systems with inert
          data called tokens which have no value to the thief
        – Tokens resemble the original data in data type and length
     • Benefit
        – Greatly improved transparency to systems and processes that need to be
          protected
     • Result
        –   Reduced remediation
        –   Reduced need for key management
        –   Reduce the points of attacks
        –   Reduce the PCI DSS audit costs for retail scenarios



37
Tokens For PCI,
        PII & PHI


38
Tokens Can Be More Flexible Than Encryption

     Type of Data     Input                              Token                        Comment

                                                    Token Properties
     Credit Card      3872 3789 1620 3675                8278 2789 2990 2789          Numeric

     Medical ID       29M2009ID                          497HF390D                    Alpha-Numeric

     Date             10/30/1955                         12/25/2034                   Date

     E-mail Address   ulf.mattsson@protegrity.com        empo.snaugs@svtiensnni.snk   Alpha Numeric, delimiters
                                                                                      in input preserved
     SSN Delimiters   075-67-2278                        287-38-2567                  Numeric, delimiters in
                                                                                      input
     Credit Card      3872 3789 1620 3675                8278 2789 2990 3675          Numeric, Last 4 digits
                                                                                      exposed




39
What Is The Impact
      On Performance
      And Scalability


40
Speed of Different Protection Methods
     Transactions per second (16 digits)

     10 000 000 -

      1 000 000 -

       100 000 -

         10 000 -

          1 000 -

            100 -        I                                 I                      I        I
                                       I
                       Basic        Format              Data             AES CBC        Modern
                       Data        Preserving           Type             Encryption      Data
                    Tokenization   Encryption       Preservation          Standard    Tokenization

                                                      Encryption

41                                    *: Speed will depend on the configuration
Security of Different Protection Methods
      Security
       Level

         High




         Low


                      I             I                   I                      I        I
                    Basic        Format              Data             AES CBC        Modern
                    Data        Preserving           Type             Encryption      Data
                 Tokenization   Encryption       Preservation          Standard    Tokenization

                                                   Encryption

42                                 *: Speed will depend on the configuration
Data Protection Methods


     The next step in data protection; Tokenization


     Data Protection Methods           Performance   Storage   Security    Transparency

     System without data protection

     Monitoring + Blocking + Masking

     Data Type Preservation

     Strong Encryption

     Tokenization

     Hashing




                                          Best                            Worst


43
How does
     Tokenization on
     Teradata Work?

44
The Bottleneck when Using Old Basic Tokenization
                                 Large footprint becomes larger
        Clique                   Replication becomes more complex
                                 Solution may be unmanageable and expensive
           Node
                         AMP    Token Server
                         AMP
            Protegrity
              Agent
                         AMP

                         AMP




           Node
                         AMP

                         AMP
            Protegrity
              Agent
                         AMP

                         AMP


                                Credit Card    Social Security   Passport
                                Number         Number            Number


45
Modern Tokenization for Teradata Architecture
                                           Small footprint
      Clique                               Small static token tables
                                           High availability
        Node
                                           High scalability
                      Tokenization   AMP

                       Operations          High performance
         Protegrity                  AMP
           Agent                           No replication required
                                     AMP

                                     AMP
                                           No chance of collisions



        Node
                      Tokenization   AMP


         Protegrity
                       Operations    AMP
           Agent
                                     AMP

                                     AMP




46
The World’s
     Smallest & Fastest
         Tokenizer


47
Performance Comparison

      • Basic Tokenization
         – 5 tokens per second (outsourced)
         – 5000 tokens per second (in-house)


      • Modern Tokenization
         – 200,000 tokens per second (Protegrity)
             • Single commodity server with 10 connections.
             • Will grow linearly with additional servers and/or connections
         – 9,000,000+ tokenizations per second (Protegrity /Teradata)




48
What Is The
      Customer
     Experience?


49
Tokenization Case Studies

       Customer 1: Extensive enterprise End-to-End credit card data           protection
       switching to Protegrity Tokenization
        •   Performance Challenge: Initial tokenization
        •   Vendor Lock-In: What if we want to switch payment processor?
        •   Performance Challenge: Operational tokenization (SLAs)
       Customer 2: Desired single vendor to provide data protection including
             tokenization
        •   Combined use of tokenization and encryption
        •   Looking to expand tokens beyond CCN to PII
       Customer 3: Reduce compliance cost. 50 million Credit Cards, 700 million daily
       transactions
        •   Performance Challenge: Initial tokenization
        •   End-to-End Tokens: Started with the EDW and expanding to stores



50
Case Study – Large Chain Store

       Faster PCI audit
       •   Half that time
       •   Qualified Security Assessors had no issues with the effective segmentation provided by
           Tokenization


       Lower maintenance cost
       •   Do not have to apply all 12 requirements of PCI DSS
           to every system


       Better security
       •   Ability to eliminate several business processes such as generating daily reports for data
           requests and access


       Strong performance
       •   Rapid processing rate for initial tokenization
       •   Sub-second transaction SLA


51
How does Protegrity
      on Teradata Work?



52
Protegrity Data Protection for Teradata
                                      Clique
       Enterprise Security
       Administrator (ESA)                                                     Policy Enforcement
                                          Node                                        Agent
                                                                                   (UDF / UDT)




                                                       Data Protection
                             Audit Logs   Log Proxy                      AMP
                                           Server




                                                         Operations
              Policy                                                     AMP
                             Policy       Deployment
            Management                      Server
                                                                         AMP    Protected Data
                                             PEP
                                            Server
                                                                         AMP



               Key
            Management

                                          Node


                                                       Data Protection
                                                                         AMP




                                                         Operations
               Audit                                                     AMP
            Management
                                                                         AMP

                                             PEP
                                            Server                       AMP




53
Protegrity in the ETL Process
          Sources      Transformation                           Targets

             SQL
            Server




                                                                       Protegrity Policy Role Based
             DB2




                                                                             Access Control
                         ETL Platform                                                                 Original Value
                           Informatica
                                                                                                      No Access


                                            Teradata Load
                           Data Stage


                                              Processes
                                                            Teradata                                  Token
            AS/400
                         • Cleansing                                                                  Mask
                         • Integration                         EDW
                         • Transformation                                                             Hash
                                                                                                      Test Data
           Mainframe




            Oracle



54
Data Masking is
      Not Effective


55
Data Masking is Not Secure
      Risk
                      Data at rest                     Data display
                       Masking                          Masking
     High –

                       Exposure:                          Exposure:
                                                         Data in clear
                       Data is only
                                                        before masking
                       obfuscated




     Low -
                                      Data Tokens
                                                                         System
                   I              I             I              I          Type
              Test / dev     Integration     Trouble       Production
                               testing      shooting
56
Who Is
     Protegrity?


57
Why Protegrity?
     • Protegrity’s Tokenization allows compliance across:
         – PCI
         – PII
         – PHI
     • Innovative: Pushing data protection with industry leading innovation such
        as out patented database protection system and the Protegrity
        Tokenization
     • Proven: Proven platform currently protects the worlds largest companies
     • Experienced: Experienced staff will be there with support along the way
        to complete data protection

58
How To Securing The Sensitive Data Flow
                                     Secure
                                    Collection   POS   e-commerce Branch
                                      Audit
                      Secure          Log
                     Distribution                                          Tokenization
                        Policy
                                                                            Database
                                                                            Protector

       Security
     Administrator                                                         Application
                                                                            Protector


                                                                           File System
                                                                            Protector




59
How Will This
     Improve My Life?


60
Why Tokenization?

       1.   No masking needed
       2.   No encryption/decryption when using
       3.   No key management across enterprise




61
Why Modern Tokenization?

       1.   Better – small footprint
       2.   Faster – high performance
       3.   Lower total cost of ownership




62
Tokenization Differentiators

                                Basic Tokenization               Modern Tokenization
     Footprint            Large, Expanding            Small, Static

     High Availability,   Complex, expensive          No replication required
     Disaster Recovery    replication required

     Distribution         Practically impossible to   Easy to deploy at different geographically
                          distribute geographically   distributed locations

     Reliability          Prone to collisions         No collisions

     Performance,         Will adversely impact       Little or no latency. Fastest industry
     Latency, and         performance & scalability   tokenization
     Scalability

     Extendibility        Practically impossible      Unlimited Tokenization Capability

63
Thank you!
           Q&A
     ulf.mattsson@protegrity.com


         Got Tokens?
        Meet Yuri at the
     Protegrity booth #201
64

Contenu connexe

Tendances

IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewnazeer325
 
Serverless Design Patterns for Rethinking Traditional Enterprise Application ...
Serverless Design Patterns for Rethinking Traditional Enterprise Application ...Serverless Design Patterns for Rethinking Traditional Enterprise Application ...
Serverless Design Patterns for Rethinking Traditional Enterprise Application ...Amazon Web Services
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security StrategyCapgemini
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptxMoshe Ferber
 
アサヒのデータ活用基盤を支えるデータ仮想化技術
アサヒのデータ活用基盤を支えるデータ仮想化技術アサヒのデータ活用基盤を支えるデータ仮想化技術
アサヒのデータ活用基盤を支えるデータ仮想化技術Denodo
 
S08_Microsoft 365 E5 Compliance による内部不正対策の実践 [Microsoft Japan Digital Days]
S08_Microsoft 365 E5 Compliance による内部不正対策の実践 [Microsoft Japan Digital Days]S08_Microsoft 365 E5 Compliance による内部不正対策の実践 [Microsoft Japan Digital Days]
S08_Microsoft 365 E5 Compliance による内部不正対策の実践 [Microsoft Japan Digital Days]日本マイクロソフト株式会社
 
仕組みがわかるActive Directory
仕組みがわかるActive Directory仕組みがわかるActive Directory
仕組みがわかるActive DirectorySuguru Kunii
 
Secured API Acceleration with Engineers from Amazon CloudFront and Slack
Secured API Acceleration with Engineers from Amazon CloudFront and SlackSecured API Acceleration with Engineers from Amazon CloudFront and Slack
Secured API Acceleration with Engineers from Amazon CloudFront and SlackAmazon Web Services
 
What is two factor or multi-factor authentication
What is two factor or multi-factor authenticationWhat is two factor or multi-factor authentication
What is two factor or multi-factor authenticationJack Forbes
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 
EMC Vipr srm-technical Deep dive
EMC Vipr srm-technical Deep diveEMC Vipr srm-technical Deep dive
EMC Vipr srm-technical Deep divesolarisyougood
 
202205 AWS Black Belt Online Seminar Amazon VPC IP Address Manager (IPAM)
202205 AWS Black Belt Online Seminar Amazon VPC IP Address Manager (IPAM)202205 AWS Black Belt Online Seminar Amazon VPC IP Address Manager (IPAM)
202205 AWS Black Belt Online Seminar Amazon VPC IP Address Manager (IPAM)Amazon Web Services Japan
 
Optimize the Value of Your Mainframe
Optimize the Value of Your MainframeOptimize the Value of Your Mainframe
Optimize the Value of Your MainframePrecisely
 
ログ管理のベストプラクティス
ログ管理のベストプラクティスログ管理のベストプラクティス
ログ管理のベストプラクティスAkihiro Kuwano
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security OverviewAlert Logic
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security OverviewAllen Brokken
 
20명 규모의 팀에서 Vault 사용하기
20명 규모의 팀에서 Vault 사용하기20명 규모의 팀에서 Vault 사용하기
20명 규모의 팀에서 Vault 사용하기Doyoon Kim
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
20190828 AWS Black Belt Online Seminar Amazon Aurora with PostgreSQL Compatib...
20190828 AWS Black Belt Online Seminar Amazon Aurora with PostgreSQL Compatib...20190828 AWS Black Belt Online Seminar Amazon Aurora with PostgreSQL Compatib...
20190828 AWS Black Belt Online Seminar Amazon Aurora with PostgreSQL Compatib...Amazon Web Services Japan
 

Tendances (20)

IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overview
 
Serverless Design Patterns for Rethinking Traditional Enterprise Application ...
Serverless Design Patterns for Rethinking Traditional Enterprise Application ...Serverless Design Patterns for Rethinking Traditional Enterprise Application ...
Serverless Design Patterns for Rethinking Traditional Enterprise Application ...
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
アサヒのデータ活用基盤を支えるデータ仮想化技術
アサヒのデータ活用基盤を支えるデータ仮想化技術アサヒのデータ活用基盤を支えるデータ仮想化技術
アサヒのデータ活用基盤を支えるデータ仮想化技術
 
S08_Microsoft 365 E5 Compliance による内部不正対策の実践 [Microsoft Japan Digital Days]
S08_Microsoft 365 E5 Compliance による内部不正対策の実践 [Microsoft Japan Digital Days]S08_Microsoft 365 E5 Compliance による内部不正対策の実践 [Microsoft Japan Digital Days]
S08_Microsoft 365 E5 Compliance による内部不正対策の実践 [Microsoft Japan Digital Days]
 
仕組みがわかるActive Directory
仕組みがわかるActive Directory仕組みがわかるActive Directory
仕組みがわかるActive Directory
 
Secured API Acceleration with Engineers from Amazon CloudFront and Slack
Secured API Acceleration with Engineers from Amazon CloudFront and SlackSecured API Acceleration with Engineers from Amazon CloudFront and Slack
Secured API Acceleration with Engineers from Amazon CloudFront and Slack
 
What is two factor or multi-factor authentication
What is two factor or multi-factor authenticationWhat is two factor or multi-factor authentication
What is two factor or multi-factor authentication
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
EMC Vipr srm-technical Deep dive
EMC Vipr srm-technical Deep diveEMC Vipr srm-technical Deep dive
EMC Vipr srm-technical Deep dive
 
202205 AWS Black Belt Online Seminar Amazon VPC IP Address Manager (IPAM)
202205 AWS Black Belt Online Seminar Amazon VPC IP Address Manager (IPAM)202205 AWS Black Belt Online Seminar Amazon VPC IP Address Manager (IPAM)
202205 AWS Black Belt Online Seminar Amazon VPC IP Address Manager (IPAM)
 
Optimize the Value of Your Mainframe
Optimize the Value of Your MainframeOptimize the Value of Your Mainframe
Optimize the Value of Your Mainframe
 
ログ管理のベストプラクティス
ログ管理のベストプラクティスログ管理のベストプラクティス
ログ管理のベストプラクティス
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
20명 규모의 팀에서 Vault 사용하기
20명 규모의 팀에서 Vault 사용하기20명 규모의 팀에서 Vault 사용하기
20명 규모의 팀에서 Vault 사용하기
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
20190828 AWS Black Belt Online Seminar Amazon Aurora with PostgreSQL Compatib...
20190828 AWS Black Belt Online Seminar Amazon Aurora with PostgreSQL Compatib...20190828 AWS Black Belt Online Seminar Amazon Aurora with PostgreSQL Compatib...
20190828 AWS Black Belt Online Seminar Amazon Aurora with PostgreSQL Compatib...
 

Similaire à Tokenization on the Node - Data Protection for Security and Compliance

ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonUlf Mattsson
 
Ulf mattsson webinar jun 7 2012 slideshare version
Ulf mattsson webinar jun 7 2012   slideshare versionUlf mattsson webinar jun 7 2012   slideshare version
Ulf mattsson webinar jun 7 2012 slideshare versionUlf Mattsson
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data securityUlf Mattsson
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect stormUlf Mattsson
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Ulf Mattsson
 
ISACA New York Metro April 30 2012
ISACA New York Metro April 30 2012ISACA New York Metro April 30 2012
ISACA New York Metro April 30 2012Ulf Mattsson
 
Choosing the Right Data Security Solution
Choosing the Right Data Security SolutionChoosing the Right Data Security Solution
Choosing the Right Data Security SolutionProtegrity
 
Issa chicago next generation tokenization ulf mattsson apr 2011
Issa chicago next generation tokenization ulf mattsson   apr 2011Issa chicago next generation tokenization ulf mattsson   apr 2011
Issa chicago next generation tokenization ulf mattsson apr 2011Ulf Mattsson
 
Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011 Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011 Ulf Mattsson
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...Andris Soroka
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloudUlf Mattsson
 
Cacs na isaca session 414 ulf mattsson may 10 final
Cacs na isaca session 414 ulf mattsson may 10 finalCacs na isaca session 414 ulf mattsson may 10 final
Cacs na isaca session 414 ulf mattsson may 10 finalUlf Mattsson
 
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
ISACA Los Angeles  2010   Compliance - Ulf MattssonISACA Los Angeles  2010   Compliance - Ulf Mattsson
ISACA Los Angeles 2010 Compliance - Ulf MattssonUlf Mattsson
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel VelascoJuanMiguelVelascoWeb
 

Similaire à Tokenization on the Node - Data Protection for Security and Compliance (20)

ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
Ulf mattsson webinar jun 7 2012 slideshare version
Ulf mattsson webinar jun 7 2012   slideshare versionUlf mattsson webinar jun 7 2012   slideshare version
Ulf mattsson webinar jun 7 2012 slideshare version
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data security
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
 
ISACA New York Metro April 30 2012
ISACA New York Metro April 30 2012ISACA New York Metro April 30 2012
ISACA New York Metro April 30 2012
 
Choosing the Right Data Security Solution
Choosing the Right Data Security SolutionChoosing the Right Data Security Solution
Choosing the Right Data Security Solution
 
Issa chicago next generation tokenization ulf mattsson apr 2011
Issa chicago next generation tokenization ulf mattsson   apr 2011Issa chicago next generation tokenization ulf mattsson   apr 2011
Issa chicago next generation tokenization ulf mattsson apr 2011
 
Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011 Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
Cacs na isaca session 414 ulf mattsson may 10 final
Cacs na isaca session 414 ulf mattsson may 10 finalCacs na isaca session 414 ulf mattsson may 10 final
Cacs na isaca session 414 ulf mattsson may 10 final
 
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
ISACA Los Angeles  2010   Compliance - Ulf MattssonISACA Los Angeles  2010   Compliance - Ulf Mattsson
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 

Plus de Ulf Mattsson

Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...Ulf Mattsson
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...Ulf Mattsson
 
Qubit conference-new-york-2021
Qubit conference-new-york-2021Qubit conference-new-york-2021
Qubit conference-new-york-2021Ulf Mattsson
 
Secure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use casesSecure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use casesUlf Mattsson
 
Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Ulf Mattsson
 
Data encryption and tokenization for international unicode
Data encryption and tokenization for international unicodeData encryption and tokenization for international unicode
Data encryption and tokenization for international unicodeUlf Mattsson
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchainUlf Mattsson
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protectionUlf Mattsson
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsUlf Mattsson
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaUlf Mattsson
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKUlf Mattsson
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsUlf Mattsson
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonUlf Mattsson
 
Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAUlf Mattsson
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?Ulf Mattsson
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2bUlf Mattsson
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020Ulf Mattsson
 

Plus de Ulf Mattsson (20)

Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
Book
BookBook
Book
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...
 
Qubit conference-new-york-2021
Qubit conference-new-york-2021Qubit conference-new-york-2021
Qubit conference-new-york-2021
 
Secure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use casesSecure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use cases
 
Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...
 
Data encryption and tokenization for international unicode
Data encryption and tokenization for international unicodeData encryption and tokenization for international unicode
Data encryption and tokenization for international unicode
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protection
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS London
 
Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACA
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 

Dernier

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 

Dernier (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Tokenization on the Node - Data Protection for Security and Compliance

  • 2. What Is Tokenization on the Node ? 2
  • 3. 3
  • 4. Teradata and Protegrity • Strategic partnership since 2004 • Advocated solution for data protection on Teradata Databases • Proven parallel and scalable data protection for Teradata MPP platforms • Collaboration on forward-looking roadmaps – New and advanced data protection options – Integration with new Teradata Database features – Seamless operation on large data warehouse systems • World-class customers 4
  • 5. Protegrity Data Protection for Teradata • A comprehensive data protection solution for Teradata Databases – Provides additional separation of duties through a separate Security Manager interface for creation and maintenance of security policies – Includes a patented key management system for secure key generation and protection of keys when stored – Supports multiple data protection options including strong encryption and tokenization – Supports multiple cryptographic algorithms and key strengths – Automates the process of converting clear text data to cipher text 5
  • 6. Protegrity Data Protection for Teradata • A comprehensive data protection solution for Teradata Databases – Provides additional access controls to protect sensitive information (even DBC can not see unencrypted data unless specifically authorized by the Security Manager) – Includes additional auditing separate from database audit logs (such as the Access Log) – Designed to fully exploit Teradata Database parallelism and scalability – Enterprise-wide solution that works with most major databases and operating systems (not just Teradata) 6
  • 7. Select Protegrity Customers Select Protegrity Customers 7
  • 8. Data Breaches Gone Mad - Learn how to Secure your Data Warehouse Straight Away! www.protegrity.com 8
  • 9. Who Are The Hackers and What Are They Doing? 9
  • 10. Some of you have already met Yuri. Source: http://www.youtube.com/user/ProtegrityUSA 10 10
  • 11. Last year he and his “anonymous” friends hacked AT&T. Source: http://www.youtube.com/user/ProtegrityUSA 11 11
  • 12. This year they hacked Sony and bought BMW M5s. Source: http://www.youtube.com/user/ProtegrityUSA
  • 13. Data including passwords and personal details were stored in clear text • Attacks were not coordinated and not advanced • Majority of attacks were SQL Injection dumps and Distributed Denial of Service (DDoS) 13
  • 14. Next month Yuri plans to hit a major telco with the keys provided by a disgruntled employee. Source: http://www.youtube.com/user/ProtegrityUSA 14
  • 15. Then Yuri is going to buy a private jet. Source: http://www.youtube.com/user/ProtegrityUSA 15
  • 16. Hospitality Retail Financial Services Government Tech Services Manufacturing Transportation Media Healthcare Business Services 0 10 20 30 40 50 % *: Number of breaches Source: 2011 Data Breach Investigations Report, Verizon Business RISK team and USSS 16
  • 17. Source: Trustwave Global Security Report 2011 17
  • 18. So how does Yuri do it? Source: http://www.youtube.com/user/ProtegrityUSA 18
  • 19. Hacking Malware Physical Error Misuse Social 0 20 40 60 80 100 % *: Number of records Source: 2011 Data Breach Investigations Report, Verizon Business RISK team and USSS 19
  • 20. “Usually, I just need one disgruntled employee. Just one.” Source: http://www.youtube.com/user/ProtegrityUSA 20
  • 21. Attackers stole information about SecurID two-factor authentication • 60 different types of customized malware • Advanced Persistent Threat (APT) malware tied to a network in Shanghai • A tool written by a Chinese hacker 10 years ago 21
  • 22. Third party fraud detection Notified by law enforcement Reported by customer/partner… Unusual system behavior Reported by employee Internal security audit or scan Internal fraud detection Brag or blackmail by perpetrator Third party monitoring service 0 10 20 30 40 50 % *: Number of breaches Source: 2011 Data Breach Investigations Report, Verizon Business RISK team and USSS 22
  • 23. Why Should I Care? 23
  • 24. Some issues have stayed constant: • Threat landscape continues to gain sophistication • Attackers will always be a step ahead of the defenders • Different motivation, methods and tools today: • We are fighting highly organized, well-funded crime syndicates and nations • Move from detective to preventative controls needed Source: Forrester and http://www.csoonline.com/article/602313/the-changing-threat-landscape?page=2 24
  • 25. How Can We Secure The Sensitive Data Flow? 25
  • 26. We Need To Protect The Data Flow : Enforcement point Unprotected sensitive information: Protected sensitive information 26
  • 27. What Has Industry Done To Protect Itself? 27
  • 28. What is Cost Effective Data Protection? Firewalls Encryption/Tokenization for data at rest Anti-virus & anti-malware solution Encryption for data in motion Access governance systems Identity & access management systems Correlation or event management systems Web application firewalls (WAF) WAF Endpoint encryption solution Data loss prevention systems (DLP) DLP Intrusion detection or prevention systems Database scanning and monitoring (DAM) DAM ID & credentialing system 0 10 20 30 40 50 60 70 80 90 % Source: PCI DSS Compliance Survey, Ponemon Institute 28
  • 29. Can New Data Security Help Creativity? Risk Traditional High – Access Control Old and flawed: Minimal access New: levels so people Creativity can only carry Happens out their jobs At the edge Low - Data Tokens Access I I Right Level Low High Source: InformationWeek Aug 15, 2011 29
  • 30. What has Industry Done To Protect Databases? 30
  • 31. How Did Data Security Evolve? Year Event Memory Data Tokenization introduced as a fully distributed 2010 model Centralized Data Tokenization introduced with hosted payment service DTP (Data Type Preserving encryption) used by in commercial 2005 databases Attack on SHA-1 hash announced DES was withdrawn AES (Advance Encryption Standard) accepted as a FIPS-approved 2001 algorithm 1988 IBM AS/400 used tokenization in shadow files 1975 DES (Data Encryption Standard) draft submitted by IBM 1900 BC Cryptography used in Egypt 31
  • 32. How Can We Limit Changes to Applications? Intrusiveness (to Applications and Databases) Encryption Standard Hashing - !@#$%a^///&*B()..,,,gft_+!@4#$2%p^&* Strong Encryption - !@#$%a^.,mhu7/////&*B()_+!@ Alpha - aVdSaH 1F4hJ 1D3a Encoding Tokenizing or Numeric - 666666 777777 8888 Formatted Encryption Partial - 123456 777777 1234 Clear Text Data - 123456 123456 1234 Data I Length Original 32
  • 33. What Is The Next Step In Data Protection? The Promise Of A Better World 33
  • 34. Replace Sensitive Data With Fake Data Data Random number Token 34
  • 35. Replace Sensitive Data With Data Tokens Tokenization De-tokenization Applications & Databases Unprotected sensitive information: : Data Token Protected sensitive information: 35
  • 37. What is Tokenization and What is the Benefit? • Tokenization – Tokenization is process that replaces sensitive data in systems with inert data called tokens which have no value to the thief – Tokens resemble the original data in data type and length • Benefit – Greatly improved transparency to systems and processes that need to be protected • Result – Reduced remediation – Reduced need for key management – Reduce the points of attacks – Reduce the PCI DSS audit costs for retail scenarios 37
  • 38. Tokens For PCI, PII & PHI 38
  • 39. Tokens Can Be More Flexible Than Encryption Type of Data Input Token Comment Token Properties Credit Card 3872 3789 1620 3675 8278 2789 2990 2789 Numeric Medical ID 29M2009ID 497HF390D Alpha-Numeric Date 10/30/1955 12/25/2034 Date E-mail Address ulf.mattsson@protegrity.com empo.snaugs@svtiensnni.snk Alpha Numeric, delimiters in input preserved SSN Delimiters 075-67-2278 287-38-2567 Numeric, delimiters in input Credit Card 3872 3789 1620 3675 8278 2789 2990 3675 Numeric, Last 4 digits exposed 39
  • 40. What Is The Impact On Performance And Scalability 40
  • 41. Speed of Different Protection Methods Transactions per second (16 digits) 10 000 000 - 1 000 000 - 100 000 - 10 000 - 1 000 - 100 - I I I I I Basic Format Data AES CBC Modern Data Preserving Type Encryption Data Tokenization Encryption Preservation Standard Tokenization Encryption 41 *: Speed will depend on the configuration
  • 42. Security of Different Protection Methods Security Level High Low I I I I I Basic Format Data AES CBC Modern Data Preserving Type Encryption Data Tokenization Encryption Preservation Standard Tokenization Encryption 42 *: Speed will depend on the configuration
  • 43. Data Protection Methods The next step in data protection; Tokenization Data Protection Methods Performance Storage Security Transparency System without data protection Monitoring + Blocking + Masking Data Type Preservation Strong Encryption Tokenization Hashing Best Worst 43
  • 44. How does Tokenization on Teradata Work? 44
  • 45. The Bottleneck when Using Old Basic Tokenization Large footprint becomes larger Clique Replication becomes more complex Solution may be unmanageable and expensive Node AMP Token Server AMP Protegrity Agent AMP AMP Node AMP AMP Protegrity Agent AMP AMP Credit Card Social Security Passport Number Number Number 45
  • 46. Modern Tokenization for Teradata Architecture Small footprint Clique Small static token tables High availability Node High scalability Tokenization AMP Operations High performance Protegrity AMP Agent No replication required AMP AMP No chance of collisions Node Tokenization AMP Protegrity Operations AMP Agent AMP AMP 46
  • 47. The World’s Smallest & Fastest Tokenizer 47
  • 48. Performance Comparison • Basic Tokenization – 5 tokens per second (outsourced) – 5000 tokens per second (in-house) • Modern Tokenization – 200,000 tokens per second (Protegrity) • Single commodity server with 10 connections. • Will grow linearly with additional servers and/or connections – 9,000,000+ tokenizations per second (Protegrity /Teradata) 48
  • 49. What Is The Customer Experience? 49
  • 50. Tokenization Case Studies Customer 1: Extensive enterprise End-to-End credit card data protection switching to Protegrity Tokenization • Performance Challenge: Initial tokenization • Vendor Lock-In: What if we want to switch payment processor? • Performance Challenge: Operational tokenization (SLAs) Customer 2: Desired single vendor to provide data protection including tokenization • Combined use of tokenization and encryption • Looking to expand tokens beyond CCN to PII Customer 3: Reduce compliance cost. 50 million Credit Cards, 700 million daily transactions • Performance Challenge: Initial tokenization • End-to-End Tokens: Started with the EDW and expanding to stores 50
  • 51. Case Study – Large Chain Store Faster PCI audit • Half that time • Qualified Security Assessors had no issues with the effective segmentation provided by Tokenization Lower maintenance cost • Do not have to apply all 12 requirements of PCI DSS to every system Better security • Ability to eliminate several business processes such as generating daily reports for data requests and access Strong performance • Rapid processing rate for initial tokenization • Sub-second transaction SLA 51
  • 52. How does Protegrity on Teradata Work? 52
  • 53. Protegrity Data Protection for Teradata Clique Enterprise Security Administrator (ESA) Policy Enforcement Node Agent (UDF / UDT) Data Protection Audit Logs Log Proxy AMP Server Operations Policy AMP Policy Deployment Management Server AMP Protected Data PEP Server AMP Key Management Node Data Protection AMP Operations Audit AMP Management AMP PEP Server AMP 53
  • 54. Protegrity in the ETL Process Sources Transformation Targets SQL Server Protegrity Policy Role Based DB2 Access Control ETL Platform Original Value Informatica No Access Teradata Load Data Stage Processes Teradata Token AS/400 • Cleansing Mask • Integration EDW • Transformation Hash Test Data Mainframe Oracle 54
  • 55. Data Masking is Not Effective 55
  • 56. Data Masking is Not Secure Risk Data at rest Data display Masking Masking High – Exposure: Exposure: Data in clear Data is only before masking obfuscated Low - Data Tokens System I I I I Type Test / dev Integration Trouble Production testing shooting 56
  • 57. Who Is Protegrity? 57
  • 58. Why Protegrity? • Protegrity’s Tokenization allows compliance across: – PCI – PII – PHI • Innovative: Pushing data protection with industry leading innovation such as out patented database protection system and the Protegrity Tokenization • Proven: Proven platform currently protects the worlds largest companies • Experienced: Experienced staff will be there with support along the way to complete data protection 58
  • 59. How To Securing The Sensitive Data Flow Secure Collection POS e-commerce Branch Audit Secure Log Distribution Tokenization Policy Database Protector Security Administrator Application Protector File System Protector 59
  • 60. How Will This Improve My Life? 60
  • 61. Why Tokenization? 1. No masking needed 2. No encryption/decryption when using 3. No key management across enterprise 61
  • 62. Why Modern Tokenization? 1. Better – small footprint 2. Faster – high performance 3. Lower total cost of ownership 62
  • 63. Tokenization Differentiators Basic Tokenization Modern Tokenization Footprint Large, Expanding Small, Static High Availability, Complex, expensive No replication required Disaster Recovery replication required Distribution Practically impossible to Easy to deploy at different geographically distribute geographically distributed locations Reliability Prone to collisions No collisions Performance, Will adversely impact Little or no latency. Fastest industry Latency, and performance & scalability tokenization Scalability Extendibility Practically impossible Unlimited Tokenization Capability 63
  • 64. Thank you! Q&A ulf.mattsson@protegrity.com Got Tokens? Meet Yuri at the Protegrity booth #201 64

Notes de l'éditeur

  1. a storyNeuroscientists have found the brain gets bored easilypresentations include demonstrations, video clips, and other speakers. All of theelements are planned and collected well before the slides are created.
  2. a storyNeuroscientists have found the brain gets bored easilypresentations include demonstrations, video clips, and other speakers. All of theelements are planned and collected well before the slides are created.
  3. a storyNeuroscientists have found the brain gets bored easilypresentations include demonstrations, video clips, and other speakers. All of theelements are planned and collected well before the slides are created.
  4. a storyNeuroscientists have found the brain gets bored easilypresentations include demonstrations, video clips, and other speakers. All of theelements are planned and collected well before the slides are created.
  5. *Sixty-four percent of this center pertains to the direct and indirect costs associated with enabling security technologies.Table 1 summarizes the total, average, median, maximum and minimum compliance costs for each of the six activity centers defined in our cost framework in Part IV. Please note that these cost statistics are defined for a 12-month period. Data security represents the largest cost center for the benchmark sample, while policy represents the smallest.
  6. *Sixty-four percent of this center pertains to the direct and indirect costs associated with enabling security technologies.Table 1 summarizes the total, average, median, maximum and minimum compliance costs for each of the six activity centers defined in our cost framework in Part IV. Please note that these cost statistics are defined for a 12-month period. Data security represents the largest cost center for the benchmark sample, while policy represents the smallest.
  7. 40 "Risk management" is just another term for the cost-benefit tradeoff associated with any security decision.Protecting data according to risk enables organizations to determine their most significantsecurity exposures, target their budgets towards addressing the most critical issues,strengthen their security and compliance profile, and achieve the right balance betweenbusiness needs and security demands. As discussed earlier, a report by the Ponemon Institute, a privacy andinformation management research firm, found that data breach incidents cost $202 per compromisedrecord in 2008, with an average total per-incident costs of $6.65 million.All security spend figures produced by government and private research firms indicate that enterprisescan put strong security into place for about 10% the average cost of a breach. You can find the rightbalance between cost and security by doing a risk analysis.
  8. *Sixty-four percent of this center pertains to the direct and indirect costs associated with enabling security technologies.Table 1 summarizes the total, average, median, maximum and minimum compliance costs for each of the six activity centers defined in our cost framework in Part IV. Please note that these cost statistics are defined for a 12-month period. Data security represents the largest cost center for the benchmark sample, while policy represents the smallest.
  9. 40 "Risk management" is just another term for the cost-benefit tradeoff associated with any security decision.Protecting data according to risk enables organizations to determine their most significantsecurity exposures, target their budgets towards addressing the most critical issues,strengthen their security and compliance profile, and achieve the right balance betweenbusiness needs and security demands. As discussed earlier, a report by the Ponemon Institute, a privacy andinformation management research firm, found that data breach incidents cost $202 per compromisedrecord in 2008, with an average total per-incident costs of $6.65 million.All security spend figures produced by government and private research firms indicate that enterprisescan put strong security into place for about 10% the average cost of a breach. You can find the rightbalance between cost and security by doing a risk analysis.
  10. 40 "Risk management" is just another term for the cost-benefit tradeoff associated with any security decision.Protecting data according to risk enables organizations to determine their most significantsecurity exposures, target their budgets towards addressing the most critical issues,strengthen their security and compliance profile, and achieve the right balance betweenbusiness needs and security demands. As discussed earlier, a report by the Ponemon Institute, a privacy andinformation management research firm, found that data breach incidents cost $202 per compromisedrecord in 2008, with an average total per-incident costs of $6.65 million.All security spend figures produced by government and private research firms indicate that enterprisescan put strong security into place for about 10% the average cost of a breach. You can find the rightbalance between cost and security by doing a risk analysis.
  11. 40 "Risk management" is just another term for the cost-benefit tradeoff associated with any security decision.Protecting data according to risk enables organizations to determine their most significantsecurity exposures, target their budgets towards addressing the most critical issues,strengthen their security and compliance profile, and achieve the right balance betweenbusiness needs and security demands. As discussed earlier, a report by the Ponemon Institute, a privacy andinformation management research firm, found that data breach incidents cost $202 per compromisedrecord in 2008, with an average total per-incident costs of $6.65 million.All security spend figures produced by government and private research firms indicate that enterprisescan put strong security into place for about 10% the average cost of a breach. You can find the rightbalance between cost and security by doing a risk analysis.