Protect Your Data by Design - Creating a Data Masking Strategy

Protect Your Data by Design - Creating a Data Masking Strategy

PASS Data Community Summit via YouTube Direct link

Intro

1 of 26

1 of 26

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Protect Your Data by Design - Creating a Data Masking Strategy

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 So is this a 'vendor session'...?
  3. 3 Goal
  4. 4 Why do we need to protect data? (1)
  5. 5 Where do data breaches come from?
  6. 6 Why do we need to protect data? (3)
  7. 7 Regulations have
  8. 8 There's lots of ways to protect data!
  9. 9 What is Data Masking?
  10. 10 Control available datasets
  11. 11 Static vs Dynamic Data Masking
  12. 12 So technically, is this masked?
  13. 13 What do we have to think about first?
  14. 14 We require Realism
  15. 15 4) words on realism
  16. 16 Data depends on Data
  17. 17 Perfect normalization is a dream
  18. 18 It needs to be fast!
  19. 19 BUT... We can't mask if we don't know what we have!
  20. 20 Understand your data
  21. 21 Catalog your data
  22. 22 Create a business-wide accepted taxonomy
  23. 23 Use THIS for your decisions
  24. 24 know how data moves
  25. 25 Now we know where the risk is. Let's protect it
  26. 26 Mask once and cascade

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.