Главная
Study mode:
on
1
Intro
2
So is this a 'vendor session'...?
3
Goal
4
Why do we need to protect data? (1)
5
Where do data breaches come from?
6
Why do we need to protect data? (3)
7
Regulations have
8
There's lots of ways to protect data!
9
What is Data Masking?
10
Control available datasets
11
Static vs Dynamic Data Masking
12
So technically, is this masked?
13
What do we have to think about first?
14
We require Realism
15
4) words on realism
16
Data depends on Data
17
Perfect normalization is a dream
18
It needs to be fast!
19
BUT... We can't mask if we don't know what we have!
20
Understand your data
21
Catalog your data
22
Create a business-wide accepted taxonomy
23
Use THIS for your decisions
24
know how data moves
25
Now we know where the risk is. Let's protect it
26
Mask once and cascade
Description:
Discover strategies for creating an effective data masking plan to protect sensitive information in pre-production environments. Learn about the challenges and solutions in implementing data masking, understand the importance of data protection in the context of frequent data breaches, and explore various data protection methods. Gain insights into static and dynamic data masking techniques, the necessity of maintaining data realism, and the complexities of data dependencies. Understand the importance of data cataloging, creating a business-wide taxonomy, and mapping data movement to identify risk areas. Acquire knowledge on how to overcome traditional obstacles to data masking and develop a comprehensive strategy to ensure data security across your organization's environments.

Protect Your Data by Design - Creating a Data Masking Strategy

PASS Data Community Summit
Add to list
0:00 / 0:00