There are currently no upcoming events, please check back later.
Implementing Data Privacy Controls for Amazon Redshift and Cloud Data Lakes
Many infrastructure and platform-as-a-service (PaaS) providers do a great job providing data warehouses and analytics solutions that offer agility and deliver fast results for business intelligence initiatives. In fact, industry analysts estimate that 75% of the world's data is projected to move to cloud and cloud-based analytics platforms such as Amazon Redshift.
These providers also support several methods to make it easy to get your data into the cloud. But what do you do when you need to keep your data private or ensure compliance with privacy regulations? How do those requirements impact your data pipeline architecture and operations? And, once your data is "in cloud", how do you control access and implement stronger security controls?
Attend this webinar to learn how data can be easily de-identified on-the-fly as part of your data pipeline process as it is staged for use in Amazon Redshift or cloud data lakes. Learn how you can establish a fully de-identified cloud data lake and use adaptive security controls to secure the data while allowing analytics to run on protected data sets for authorized users.
Join this webinar and learn about the following:
- Common data security gaps for data sources in cloud storage and Amazon S3
- How to avoid making more copies of your sensitive data during the pipeline process
- Methods for de-identification, tokenization and encryption of data
- Architecture models to support a de-identified data pipeline
- Enabling secure computation on data in cloud-based analytics platforms
Tuesday, June 29 @ 11:00 am PST
Why you can’t stop data breaches?
This session will review common security control recommendations for data security and identify key gaps or misunderstandings in the threat model that often get overlooked. The session will also cover key tenets of modern data privacy regulations within the context of security controls that are currently available and how they can be operationalized to improve your company's security posture.
Tuesday, December 8 @ 12:00 pm PST
Cloud Data Risk: How to Better Protect Your Data in the Cloud
This webinar provides an overview of a new threat model for data and helps identify key risks to data security that may be commonly misunderstood or overlooked. The session will cover key tenets of modern data privacy regulations within the context of security controls that are currently available and can be operationalized to improve your company's security posture. Register Now!
Tuesday, September 22 @ 12:00 pm PST
Tokenize Your Data in AWS RDS with AWS KMS
Attend this webinar on Thursday, September 3 at 10am PST to learn about different tokenization and data encryption techniques and see how you can stand up a demo of Baffle's Data Protection Services in conjunction with AWS RDS and AWS KMS in a matter of minutes. See how data can be easily de-identified or tokenized for your AWS RDS environment to mitigate the risks of data leakage and breaches.
Thursday, September 3 @ 10:00 am PST
De-identify and Secure Your Data Analytics Pipeline
Attend this webinar to learn how data can be easily de-identified or tokenized as part of your data pipeline engineering. Learn how you can establish an S3 cloud data lake fully de-identified and use AWS Athena to easily access and run analytics on data sets for authorized users.
This session will provide a review of some key data security gaps related to a data analytics pipeline, and provide a live demonstration of de-identifying data on the fly during a migration, as well as subsequent data analysis via AWS Athena.