Webinars

De-identifying Data in Snowflake and Amazon Redshift

Learn how data can be easily de-identified as part of your data pipeline as it is staged for use in Snowflake or Amazon Redshift.
View IconView Now

Why You Can’t Stop Data Breaches?

A review of risk and responsibility models will be provided along with an examination of how data distribution and cloud deployments can further exacerbate the challenge of securing data.
View IconView Now

Cloud Data Risk: How to Better Protect Your Data in the Cloud

This webinar provides an overview of a new threat model for data and helps identify key risks to data security that may be commonly misunderstood or overlooked.
View IconView Now

Tokenize Your Data in AWS RDS with AWS KMS

Learn about different tokenization and data encryption techniques and see how you can stand up a demo of Baffle's Data Protection Services in conjunction with AWS RDS and AWS KMS in a matter of minutes.
View IconView Now

De-identify and Secure Your Data Analytics Pipeline

Learn how you can establish an S3 cloud data lake fully de-identified and use AWS Athena to easily access and run analytics on data sets for authorized users.
View IconView Now

Controlling Data Leakage from AWS S3 and Cloud Storage

Learn how data can be easily de-identified, tokenized or encrypted inside S3 objects to help prevent data leakage while still enabling analytics teams to leverage the scale of cloud infrastructure.
View IconView Now

A Case Study on Threat Intel Sharing Across Multiple Parties

This webinar will provide an overview of threat intelligence sharing across multiple parties using privacy preserving analytics to secure the data, while still allowing organizations to query a shared data store.
View IconView Now

Data Privacy Simplified – Using Data-Centric Protection to Secure Your Data

Learn how you can perform analytics and share data while still ensuring the appropriate level of data security and privacy.
View IconView Now

Critical Steps to Manage CCPA Compliance and Risk in 2020

Examine the impact of the CCPA, answer your burning questions, uncover the CCPA’s nuances, and address its ambiguities and challenges.
View IconView Now

CCPA Data Privacy Compliance Simplified

Learn about new techniques that allow for data minimization to simplify the compliance effort with minimal impact to the business.
View IconView Now

Encryption Simplified – A Walk-Through of Baffle Data-Centric Protection

Learn more about how Baffle implements its "no code" encryption approach to protect data at the field or record level.
View IconView Now

Implementing Record Level Encryption to Ensure Data Privacy for SaaS

Learn how you can implement record level encryption with data shredding techniques in a simplified manner without modifying applications.
View IconView Now

Preventing Data Leakage in Cloud Development Environments

Learn how you can support development teams and secure production data in the cloud at the same time.
View IconView Now

Securing Data “IN” the Cloud

Learn about how you can simplify protection and security of data IN cloud to accelerate your "lift and shift" and still ensure compliance.
View IconView Now

Homomorphic Encryption for Your Business: Fact, Fiction, and Hype

The session will provide an assessment of cryptographic techniques and live demonstrations to show how advanced encryption can protect your sensitive data without breaking application functionality for your business.
View IconView Now