Chief Security Strategist Protegrity Westport, Connecticut, United States
New technologies for data protection can arm innovative businesses to win in an ever-changing, increasingly competitive digital economy. Attendees will learn how security policy and encryption key management can leverage the same tools and skills across multiple clouds and for on-premises systems. They will learn how new techniques for data protection create opportunities to harness sensitive data by using differential privacy and K-anonymity, pseudonymization and anonymization, and synthetic data.
We will discuss how to use zero trust architecture, zero-knowledge proofs and private set intersection. Additionally, we'll discuss how to use privacy-preserving analytics, use cases in machine learning, secure multi-party computation and homomorphic encryption. Finally, expect to hear about trusted execution environments and post-quantum cryptography.
Learning Objectives:
Understand how security policy and encryption key management can leverage the same tools and skills across multiple clouds and for on-premises systems.
Demonstrate how to use new techniques for protecting sensitive data across multiple clouds and on-premises systems, including the use of zero trust architecture, zero-knowledge proofs and private set intersection.
Demonstrate how new techniques for data protection create new opportunities with protected data by using differential privacy, pseudonymization and anonymization, and synthetic data, including the use of privacy-preserving analytics, use cases in machine learning, secure multi-party computation and homomorphic encryption.