Events

Upcoming Events

There are currently no upcoming events, please check back later.

Past Events

Strategies for Successful Privacy and Compliance Management Image

Strategies for Successful Privacy and Compliance Management

93% of organizations claim that regulatory compliance has significantly shifted their data security and privacy priorities, per the latest research. In addition, 75% of respondents believe that a regulatory compliance program is a competitive differentiator. However, effectively implementing data protection controls across the enterprise remains challenging for numerous technical and organizational reasons. In this webinar, EMA analyst and managing director Chris Steffen will join Baffle CEO Ameesh Divatia to share insights and best practices employed by leading organizations to not only accomplish strong privacy and compliance, but also achieve competitive differentiation as a result. Join this session to learn:
  • Findings from the latest compliance research
  • Data challenges - ownership, discovery, classification, policy enforcement
  • Effective strategies for data protection controls in hybrid cloud environments
  • Technology innovations to streamline privacy programs
  • Actionable plans you can start implementing today
Reserve Seat 

Webinar

Tuesday, August 30 @ 10:00 am PT

AWS re:Inforce 2022 Image

AWS re:Inforce 2022

Visit Baffle in Booth #1 in the Security Learning Hub. Meet our founders and data security experts. Learn:
  • How to protect your data at the field-level as it moves to the AWS cloud
  • Secure sensitive data as it streams into your data warehouse
  • How healthcare analytics providers are securing PHI in RDS
  • How a leading bank protects its data in the cloud
  • Get a live demo and ask us questions
Book a 1:1 Meeting  

Boston, MA

Tuesday, July 26 @ 7:00 am ET

RSA Conference 2022 Image

RSA Conference 2022

Attending RSA Conference this year? Meet our founders and data security experts. Book a meeting with us to learn:
  • How to protect your data at the field-level as it moves to the cloud
  • Secure sensitive data as it streams into your data warehouse
  • How a leading bank protects its data in Snowflake
  • How healthcare analytics providers are securing PHI in RDS
  • Get a live demo and ask us questions
June 7-8, 2022

Schedule a meeting now

San Francisco, CA

Tuesday, June 7

How to De-Identify Apache Kafka Data Streams Image

How to De-Identify Apache Kafka Data Streams

Apache Kafka is a powerful platform for streaming data in real time for multiple use cases, including data analysis downstream. However, putting sensitive data in the clear can create massive security and compliance issues. The challenge is that legacy data encryption methods are not sufficient as they do not allow control over who can see what data, and can also impede downstream data analytics and third party applications. Join this webinar to learn how modern data protection approaches and technologies can be used to easily de-identify and re-identify Kafka data streams to share sensitive information securely between internal and external audiences and data domains. We will discuss:
  • De-identification techniques and use cases
  • Using Single Message Transform (SMT) to tokenize sensitive data
  • Role-based data access control
  • Architecture, components, and flow
  • Demo of Kafka data de-identification
Register Now

Webinar

Tuesday, May 24 @ 10:00 am PT

De-identifying Cloud Data Pipelines: Approaches, Best Practices, and Learnings Image

De-identifying Cloud Data Pipelines: Approaches, Best Practices, and Learnings

Cloud-based data lakes and data stores provide tremendous business value for next-gen analytics, machine learning and artificial intelligence, as well as sharing data with partners. However, they also present a large challenge for protecting the exploding volume of sensitive data that is being collected and moved to cloud platforms such as Amazon Redshift and Snowflake. A critical protection measure is de-identifying sensitive data as it is being migrated from on-prem sources to the cloud and staged for use in downstream applications. There are various approaches and considerations based on your use cases. Modern data security platforms provide cutting-edge solutions that are easy to implement and address today’s threats and attack vectors more comprehensively. Join this webinar and learn about: * Data de-identification methods and architectures * Comparing modern data protection platforms versus database native encryption * Data masking, tokenization, field and record level encryption, and object/file encryption * No-code solutions that require no application modifications * Ensuring high performance and minimal downtime * Role-based access control for secure data access and sharing * Privacy-enhanced computation and analytics Register Now

Webinar

Thursday, March 17 @ 10:00 am PT

Implementing Data Privacy Controls for Amazon Redshift and Cloud Data Lakes Image

Implementing Data Privacy Controls for Amazon Redshift and Cloud Data Lakes

Many infrastructure and platform-as-a-service (PaaS) providers do a great job providing data warehouses and analytics solutions that offer agility and deliver fast results for business intelligence initiatives. In fact, industry analysts estimate that 75% of the world's data is projected to move to cloud and cloud-based analytics platforms such as Amazon Redshift. These providers also support several methods to make it easy to get your data into the cloud. But what do you do when you need to keep your data private or ensure compliance with privacy regulations? How do those requirements impact your data pipeline architecture and operations? And, once your data is "in cloud", how do you control access and implement stronger security controls? Attend this webinar to learn how data can be easily de-identified on-the-fly as part of your data pipeline process as it is staged for use in Amazon Redshift or cloud data lakes. Learn how you can establish a fully de-identified cloud data lake and use adaptive security controls to secure the data while allowing analytics to run on protected data sets for authorized users. Join this webinar and learn about the following: - Common data security gaps for data sources in cloud storage and Amazon S3 - How to avoid making more copies of your sensitive data during the pipeline process - Methods for de-identification, tokenization and encryption of data - Architecture models to support a de-identified data pipeline - Enabling secure computation on data in cloud-based analytics platforms Register Now!

Webinar

Tuesday, June 29 @ 11:00 am PST

Why you can’t stop data breaches? Image

Why you can’t stop data breaches?

This session will review common security control recommendations for data security and identify key gaps or misunderstandings in the threat model that often get overlooked. The session will also cover key tenets of modern data privacy regulations within the context of security controls that are currently available and how they can be operationalized to improve your company's security posture.   Register Now!

Webinar

Tuesday, December 8 @ 12:00 pm PST

Cloud Data Risk: How to Better Protect Your Data in the Cloud Image

Cloud Data Risk: How to Better Protect Your Data in the Cloud

This webinar provides an overview of a new threat model for data and helps identify key risks to data security that may be commonly misunderstood or overlooked. The session will cover key tenets of modern data privacy regulations within the context of security controls that are currently available and can be operationalized to improve your company's security posture. Register Now!

Webinar

Tuesday, September 22 @ 12:00 pm PST

Tokenize Your Data in AWS RDS with AWS KMS Image

Tokenize Your Data in AWS RDS with AWS KMS

Attend this webinar on Thursday, September 3 at 10am PST to learn about different tokenization and data encryption techniques and see how you can stand up a demo of Baffle's Data Protection Services in conjunction with AWS RDS and AWS KMS in a matter of minutes. See how data can be easily de-identified or tokenized for your AWS RDS environment to mitigate the risks of data leakage and breaches. Register Now!

Webinar

Thursday, September 3 @ 10:00 am PST

De-identify and Secure Your Data Analytics Pipeline Image

De-identify and Secure Your Data Analytics Pipeline

Attend this webinar to learn how data can be easily de-identified or tokenized as part of your data pipeline engineering. Learn how you can establish an S3 cloud data lake fully de-identified and use AWS Athena to easily access and run analytics on data sets for authorized users. This session will provide a review of some key data security gaps related to a data analytics pipeline, and provide a live demonstration of de-identifying data on the fly during a migration, as well as subsequent data analysis via AWS Athena. Watch Now!

Webinar

Wednesday, July 29 @ 10:00 am PST