Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to De-Identify Apache Kafka Data Streams Ameesh Divatia, CEO, Baffle and Syl Yelle, VP, Baffle Apache Kafka is a powerful platform for streaming data in real time for multiple use cases, including data analysis downstream. However, putting sensi... 3 months ago | 38 mins De-identifying Cloud Data Pipelines: Approaches, Best Practices, and Learnings Ameesh Divatia, CEO, Baffle and Syl Yelle, Head of Sales, Baffle Cloud-based data lakes and data stores provide tremendous business value for next-gen analytics, machine learning and artificial intelligence, as well... 5 months ago | 44 mins De-risking the recruitment process with digital identity Carl Dawson - Commercial Director A look at how professional online identity verification services can play a role in de-risking the remote recruitment or employment cycle. Enabling gr... 10 months ago | 19 mins Identification AML5 : les nouvelles règles des parcours client à distance Hélène Roizin - Experte digitalisation; Clément Noel - Business Développer Digital Banking La directive AML5 prévoit des modifications et de nouvelles mesures de vigilance pour les différentes sociétés du marché. Ces mesures touchent différe... 1 year ago | 34 mins Ask Me Anything: De-Identification Techniques and Q&A With Privitar Experts Kish Galappatti Interested in adopting data privacy techniques more widely, but not sure which techniques are best in each context? Want to know more about how to mak... 2 years ago | 27 mins How To De-classify Data and Rethink Transfer of Data between US and EU Ulf Mattsson, Chief Security Strategist, Protegrity Companies need immediate rethink on transfer data to the United States since the Privacy Shield transatlantic pact is declared invalid. The Court of J... 2 years ago | 47 mins Quelles solutions digitales pour la reprise progressive de votre activité ? Salesforce France Lors de notre précédent webinaire du 4 mai, nous vous avons présenté une solution simple, flexible et rapide de mise en oeuvre, vous permettant de sui... 1 year ago | 43 mins Controlling Data Leakage from AWS S3 and Cloud Storage Harold Byun, VP Products There has been no shortage of data leakage scenarios from AWS S3 due to mis-configured security controls. In many of these cases, sensitive data and... 1 year ago | 46 mins De-identifying Data in Snowflake and Amazon Redshift Harold Byun, VP Products Industry analysts estimate that 75% of the world's data is projected to move to cloud and cloud analytics platforms such as Snowflake and Amazon Redsh... 1 year ago | 51 mins De-identifying Data in Snowflake and Amazon Redshift Harold Byun, VP Products Industry analysts estimate that 75% of the world's data is projected to move to cloud and cloud analytics platforms such as Snowflake and Amazon Redsh... 1 year ago | 51 mins Load more