Pseudonymization vs. Encryption: Fight!

Logo
Presented by

Patrick Walsh

About this talk

The user data you hold is now toxic -- meaning the penalties for losing control of that data are now potentially very costly. Technical measures must be taken to protect the privacy of that user data, which means you probably need to adopt a PET. But what PET is appropriate? Join us as we discuss the limits of pseudonymization and the landscape of encryption options available. We’ll examine a few well-known companies that are using encryption to make privacy a first-class part of their product by embracing end-to-end encryption and customer held encryption keys. We’ll also touch on encryption techniques like secure multi-party computation, homomorphic encryption, and transform cryptography.
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (329)
Subscribers (33973)
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.