Ulf Mattsson
103
Abonné
Personal Information
Entreprise/Lieu de travail
Greater New York City Area, ct United States
Profession
Chief Security Strategist at Protegrity
Secteur d’activité
Technology / Software / Internet
Site Web
www.linkedin.com/in/umattsson/
À propos
Chief Security Strategist at Protegrity, previously Head of Innovation at TokenEx, Chief Technology Officer at Atlantic BT, and earlier CTO at Compliance Engineering. Ulf was the CTO and a founder of Protegrity Technology. He invented the Protegrity Vaultless Tokenization and created the initial architecture of Protegrity's security technology.
At Protegrity he serves as a catalyst for innovation with an active role in shaping the product roadmap and strategy. Ulf works in industry standards bodies, has an active role in forming strategic partnerships and alliances across the industry, and represents Protegrity at C-level meetings with customers and prospects.
Mots-clés
compliance
tokenization
encryption
gdpr security compliance eu regulations
pci
security
ccpa
privacy
big data
cloud
isaca
pii
hipaa
pci dss
data security
phi
tokenization vs encryption vs masking
information security
nist
issa
gdpr
cloud computing
iso standard
oracle
homomorphic encryption
blockchain
database
data protection
ulf mattsson
machine learning
analytics
risk management
ai
eu gdpr compliance
iot
data
verizon
privacy laws
database security
regulations
cyber security
cloud gateways for regulatory
target
risk
privacy shield and schrems ii when gdpr apply to d
gdpr and ccpa
devops
what is tokenization in blockchain?
tokenization on blockchain is a steady trend of 20
gartner
quantum computing
masking
securing fintech - threats
ffiec
myths and realities of data security and complianc
discovery
data breach
breach
data security to protect pci
databases
ibm
zero trust
smpc
65% of the world’s population will have its person
regtech
azure
aws
pandemic
coronavirus
dataops
all to the new event programming. infosecurity
cobit
practical risk management for the multi cloud
data discovery and cloud - cloud-based ml applicat
what happens if a company that handles tokenizatio
no country has a solid regulation for cryptocurren
some problems need to be solved before we can succ
tokenized it and created its digital representatio
we took an asset
diamonds and company stocks to real estate. thus
and rsa security (dell). mr. mattsson is a also ad
microsoft
casb
what i learned from rsac 2019
web design and development
bitcoin
iso
gdpr roadmap how to measure cybersecurity prepared
attacks
europe
eu
compliance fintech
saas
cyber attack
ciso
private or hybrid cloud
trust
governance
conference
nyc
india
brighttalk
data flow
teradata
cacs
hitech
new york metro
boston
share
unicode
jun 29 new privacy technologies for unicode and in
jun 15 privacy in the cloud at financial instituti
book
security\
screms
may 6 - evolving international privacy regulations
qubit-conference-new-york-2021
cpra
evolving international privacy regulations and cro
japanese
utf-16
utf-8
data encryption and tokenization for international
zta
standards and regulations general data protectio
convergence of data privacy principles
health
ml
privacy preserving computing and secure multi-part
and we will discuss use cases in financial service
do not share common policies
but they do not integrate
privacy and identity access management products ar
and information sharing. data is spreading across
such as the cloud
masking and privacy preservation in analytics and
anonymization
data residency and privacy issues. we will discuss
but none universally cover all use cases. we will
and commercial business opportunity. several priva
regulatory compliance
and we will discuss how business prioritization ca
but so too are the business and financial risks in
digital transformation and the opportunities to us
(by zoom)
use cases and how to control sensitive personal da
the new pci dss version 4 and new international da
but so too are the business and financial risks as
standards and regulations on a common set of funda
according to gartner. there is a convergence of da
up from 10% today
and all 50 u.s. states and territories sued over t
the us consumer financial protection bureau (cfpb)
which often leads to impulsive decisions to deprio
organizations are focused on cost optimization
in the shadow of the global pandemic and the assoc
mlm
gdr
nov 4 what is tokenization in blockchain - ulf mat
differential privacy
agenda blockchain what is blockchain? blockchain t
and compliance
explore challenges of managing and protecting data
protecting data privacy in analytics and machine l
balance
g
brighttalk webinar - how to de-classify data and r
healthcare
aug 25 isaca houston how to de-classify data and
amazon
google
jul 29 isaca atlanta - practical data security and
i uploaded the slide deck from my jul 25 webinar a
security and privacy risks - on premise and cloud
jul 16 isaca london - data protection
privacy preserving computing and secure multi part
api
evolving regulations are changing the way we think
google adwords
hsm
key management
salesforce
multicloud
issa atlanta - emerging application and data prote
new regulations and the evolving cybersecurity tec
secupi
bigid
protivity
anonos
iapp
how to protect privacy sensitive data that is coll
what i learned at rsac 2020
how to go from waterfall app dev to secure agile d
waterfall is based on the concept of sequential so
how to add security in dataops and devops jan 18 2
ponemon
the emerging pci dss and nist standards jan 20 202
a practical data privacy and security approach to
what i learned at the infosecurity isaca north ame
dev
immersive learning and leadership networks.
media
will build on its strengths in industry exposition
which entered the north american conference arena
and latest developments related to the csx trainin
certification preparation sessions
expert workshop series
reed exhibition’s immersive event series staged wo
infosecurity isaca north america expo and conferen
abac
dac
rbac
including xacml and alfa.
claims-based access control (cbac) and key standar
policy-based access control (pbac)
data discovery
context-aware and risk-intelligent access control.
dac and rbac. we will present the "next generatio
the bad and the ugly of role based access control.
we will discuss the good
emerging pci dss v4 data security and privacy for
blockchain and tokenization in blockchain.
advanced pii / pi data discovery and data protecti
what i learned at issa international summit 2019 n
in public or private cloud.
or when being processed and the operational need f
when being transmitted
” which is quite reasonable but sadly unhelpful. m
such a simple question is rather difficult to answ
a common question is how to choose data protection
verizon data breach investigations report (dbir) a
this session will take a practical approach to it
and privacy-preserving computation.
and better understand their customers. the new ver
streamline internal processes
improve the customer experience
which enables organizations to extract real busine
the new norms of data privacy require proactive da
etc. in other words
where it goes internally and externally
which systems process it
where they get it from
but are missing the focus on data. the good news i
which are foundational
but many are still trying to figure out how to com
and disclose data in public cloud. businesses have
process
store
emerging application and data protection for multi
including: - waf – web application firewalls - sie
2018. we will cover how many security solutions w
according to 452 research
cloud will increase by 157% and on-premises ’tradi
organizations and investors. cloud transformation
how should we prepare for this new brave world whe
and in public and private clouds - the llatest dev
tokenization and encryption - new data protection
the need for advanced identity and data protection
and the breach epidemic growing
organizations becoming more mobile
with sensitive data residing everywhere
and to find or develop the best therapy for that i
and cloud related? can machine learning algorithms
deep learning
is directly related to pattern recognition and com
an approach and set of technologies that use artif
machine learning platforms are one of the fastest
blockchain and tokenization in blockchain. in this
451
machine learning and quantum computing technologie
hewlett-packard
and cybersecurity consulting. mr. mattsson is an
security operation center
managed security service
web application firewalls
cloud application security brokers
in the areas of application and database security.
he worked 20 years at ibm's research and developme
and earlier chief technology officer at compliance
was previously chief technology officer at atlanti
a cloud-based data security company
mr. mattsson is currently the head of innovation a
innovation
the need for application and data protection solut
with sensitive data residing everywhere and the br
homomorphric
rsa
and in public and private clouds - ulf mattsson ma
data protection on-premises
ansi x9
applications
emerging application and data protection for cloud
estonia
tokenex
jericho forum
software development
development
architecture
next generation data protection and security for o
cryptocurrency
iama infragard atlanta - ulf mattsson - cloud secu
government
open data
iot - attacks and solutions
iot - attacks and solutions aug 24.pptx
user experience
while only 7% said it isn’t a top priority.
54 % reported that gdpr readiness is the highest p
gdpr is top priority in us over half of us multina
gdpr security compliance
gdpr action plan - do you have a roadmap for eu gd
host
data for eu citiz
integrate security into devops - secdevops
secdevops
cyber risk management in 2017 - challenges & recom
malware
banking
tokenization and encryption with more than 45 pate
cloud security
inventor in the areas of mobile payment
challenges
best practices
• breaches
cyber threat
blind spots
isaca new delhi india - privacy and big data
new delhi
delhi
isaca journal - bridging the gap between access a
isaca global journal - choosing the most appropri
we urgently need a data-centric strategy to protec
mobile and on-premises. the rapid rise of cloud d
recent breaches demonstrate the urgent need to sec
companies have good reason to be concerned. the bi
or used in third party saas applications
storage and applications has led to unease among a
usa
fisma
and discuss how we should re-think our security ap
ulf mattsson will highlight current trends in the
ulf mattsson - where data security and value of da
protect
retail
merchant
data-centric
security key to digital business success
value of data
monetization
data value
2014
ny metro
practical advice
regulatory
gateway
computing
problems
concerns issues
breach investigation
investigations
crime
nyoug
future
isaca presentation on how innovation can bridge th
us
privacy legislation
out
outsourcing
off-shoring
cross-border
sensitive data
bigdata
hadoop
mobile
pc dss
payment
mastercard
cso
db2
e2ee
atlanta
enterprise
los angeles
cost effective
protegrity
texas
dallas
dc
washington
national capital
nca
new york
dss
Tout plus
- Présentations
- Documents
- Infographies