Главная
Study mode:
on
1
Intro
2
The surfing analogy
3
The history of big data
4
Sources of big data
5
The value of big data
6
Trends in big data
7
Technology
8
Hadoop
9
Sample Big Data Architecture
10
Data Lake vs Data Reservoir
11
Security Privacy Considerations
12
Privacy Ethics
13
Big Data Life Cycle
14
Privacy and Security
15
What is considered personal PII
16
Big Red Caution
17
Architecture
18
Security
19
Security Architecture
20
Data Flows
21
Privacy Security
22
Data Activity Monitoring
23
Guardium
24
Blocking
25
Data obfuscation
26
Redaction
27
Information Catalog
28
Keys to Success
29
Questions
Description:
Explore the security and privacy challenges of Big Data in this 38-minute LASCON conference talk. Learn why Big Data requires a different approach to protection compared to traditional data, while still sharing commonalities with existing methodologies. Discover best practices and recommended technical controls to secure your organization's valuable information assets. Gain insights into Big Data history, sources, value, and trends, as well as key technologies like Hadoop and Data Lake architectures. Understand the Big Data lifecycle, privacy ethics, and what constitutes personal information. Examine security architectures, data flows, and monitoring techniques. Delve into data obfuscation, redaction, and information cataloging strategies. Walk away with essential keys to success in securing and protecting your organization's Big Data projects.

Big Data, What's the Big Deal?

LASCON
Add to list