Hi [[ session.user.profile.firstName ]]

Tokenize Your Data in AWS RDS with AWS KMS

More and more customers are putting data in the cloud and leveraging database platform-as-a-service (DB PaaS) solutions such as AWS RDS to store their critical business information and customer data. DB PaaS provides a graceful and simple database management solution for enterprises while also enabling the flexibility of cloud infrastructure.

This webinar is part of the Baffle weekly webinar series and will provide an overview of different techniques that can be used for protecting data in the cloud. Within the context of modern data privacy laws and compliance regulations, customers may be faced with requirements to ensure protection of specific data types in their operational environments.

Many existing tokenization and data protection methods can be challenging to implement and may not function well with cloud native services such as containers and microservices or key management services (like AWS KMS or secrets managers). Furthermore, certain techniques require application code modification or have a dependency on installing an agent on a database which will not work with DB PaaS.

Attend this webinar to learn about different tokenization and data encryption techniques and see how you can stand up a demo of Baffle's Data Protection Services in conjunction with AWS RDS and AWS KMS in a matter of minutes. See how data can be easily de-identified or tokenized for your AWS RDS environment to mitigate the risks of data leakage and breaches.

Join this webinar and learn about the following:

- How the shared responsibility model applies to your data
- Key differences between different tokenization and de-identification methods
- Architectural models for a data protection service layer
- How to easily set up and configure a data protection service without any code changes
- Methods for integrating with AWS RDS Postgres, MySQL, Microsoft SQL Server
- How to integrate and use AWS KMS and other key management solutions
Recorded Sep 3 2020 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Harold Byun, VP Products
Presentation preview: Tokenize Your Data in AWS RDS with AWS KMS

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cloud Data Risk: How to Better Protect Your Data in the Cloud Recorded: Sep 22 2020 48 mins
    Harold Byun, VP Products
    Over one billion records have been leaked from cloud IaaS in spite of an increased focus on cloud security. At the same time, organizations continue to put more and more data into the cloud to accelerate their responsiveness and improve IT agility. This push and pull of speed and flexibility vs. security has created significant gaps in the threat model for data in the cloud.

    Consequently, data breaches and leaks continue unabated and many security teams fail to recognize fundamental gaps in the security model. This webinar provides an overview of a new threat model for data and helps identify key risks to data security that may be commonly misunderstood or overlooked. The session will cover key tenets of modern data privacy regulations within the context of security controls that are currently available and can be operationalized to improve your company's security posture.

    Attend this webinar and learn about the following:

    - How the shared responsibility model applies to your data
    - A new data threat model for cloud and why breaches continue to occur
    - Critical gaps in security controls and how to address them
    - Review of data privacy regulations and key considerations for your business
    - Best practices for securing data for cloud native environments
  • Tokenize Your Data in AWS RDS with AWS KMS Recorded: Sep 17 2020 46 mins
    Harold Byun, VP Products
    More and more customers are putting data in the cloud and leveraging database platform-as-a-service (DB PaaS) solutions such as AWS RDS to store their critical business information and customer data. DB PaaS provides a graceful and simple database management solution for enterprises while also enabling the flexibility of cloud infrastructure.

    This webinar is part of the Baffle weekly webinar series and will provide an overview of different techniques that can be used for protecting data in the cloud. Within the context of modern data privacy laws and compliance regulations, customers may be faced with requirements to ensure protection of specific data types in their operational environments.

    Many existing tokenization and data protection methods can be challenging to implement and may not function well with cloud native services such as containers and microservices or key management services (like AWS KMS or secrets managers). Furthermore, certain techniques require application code modification or have a dependency on installing an agent on a database which will not work with DB PaaS.

    Attend this webinar to learn about different tokenization and data encryption techniques and see how you can stand up a demo of Baffle's Data Protection Services in conjunction with AWS RDS and AWS KMS in a matter of minutes. See how data can be easily de-identified or tokenized for your AWS RDS environment to mitigate the risks of data leakage and breaches.

    Join this webinar and learn about the following:

    - How the shared responsibility model applies to your data
    - Key differences between different tokenization and de-identification methods
    - Architectural models for a data protection service layer
    - How to easily set up and configure a data protection service without any code changes
    - Methods for integrating with AWS RDS Postgres, MySQL, Microsoft SQL Server
    - How to integrate and use AWS KMS and other key management solutions
  • Tokenize Your Data in AWS RDS with AWS KMS Recorded: Sep 3 2020 52 mins
    Harold Byun, VP Products
    More and more customers are putting data in the cloud and leveraging database platform-as-a-service (DB PaaS) solutions such as AWS RDS to store their critical business information and customer data. DB PaaS provides a graceful and simple database management solution for enterprises while also enabling the flexibility of cloud infrastructure.

    This webinar is part of the Baffle weekly webinar series and will provide an overview of different techniques that can be used for protecting data in the cloud. Within the context of modern data privacy laws and compliance regulations, customers may be faced with requirements to ensure protection of specific data types in their operational environments.

    Many existing tokenization and data protection methods can be challenging to implement and may not function well with cloud native services such as containers and microservices or key management services (like AWS KMS or secrets managers). Furthermore, certain techniques require application code modification or have a dependency on installing an agent on a database which will not work with DB PaaS.

    Attend this webinar to learn about different tokenization and data encryption techniques and see how you can stand up a demo of Baffle's Data Protection Services in conjunction with AWS RDS and AWS KMS in a matter of minutes. See how data can be easily de-identified or tokenized for your AWS RDS environment to mitigate the risks of data leakage and breaches.

    Join this webinar and learn about the following:

    - How the shared responsibility model applies to your data
    - Key differences between different tokenization and de-identification methods
    - Architectural models for a data protection service layer
    - How to easily set up and configure a data protection service without any code changes
    - Methods for integrating with AWS RDS Postgres, MySQL, Microsoft SQL Server
    - How to integrate and use AWS KMS and other key management solutions
  • De-identify and Secure Your Data Analytics Pipeline Recorded: Jul 29 2020 49 mins
    Harold Byun, VP Products
    Multiple businesses continue to establish cloud-based data lakes for analytics, machine learning and artificial intelligence use cases. The flexibility of the cloud allows for an easier spin-up of resources and facilitates a faster data delivery model for the business.

    However, within the context of modern data privacy laws and compliance regulations, a significant challenge remains around how to de-identify data while still allowing for advanced analytics to occur to meet the demands of your organization's need to extract value from the personal data it collects.

    Many of methods for de-identification require additional development or altering the data pipeline and as a result either slow down the use of cloud-based analytics or leave data potentially exposed. Further, de-identification represents only part of the challenge as new methods to access and warehouse data can limit scenarios where authorized re-identification or analysis of data may be required.

    Attend this webinar to learn how data can be easily de-identified or tokenized as part of your data pipeline engineering. Learn how you can establish an S3 cloud data lake fully de-identified and use AWS Athena to easily access and run analytics on data sets for authorized users.

    This session will provide a review of some key data security gaps related to a data analytics pipeline, and provide a live demonstration of de-identifying data on the fly during a migration, as well as subsequent data analysis via AWS Athena.

    Join this webinar and learn about the following:

    - Common data security gaps for data sources in S3
    - Key differences between existing cloud storage encryption methods and de-identification processes
    - Methods for de-identification, tokenization and encryption of data
    - Architecture models to support a de-identified data pipeline
    - Methods to allow for simplified analysis of data in a cloud data lake
  • Controlling Data Leakage from AWS S3 and Cloud Storage Recorded: Jun 9 2020 47 mins
    Harold Byun, VP Products
    There has been no shortage of data leakage scenarios from AWS S3 due to mis-configured security controls.
    In many of these cases, sensitive data and PII have been exposed and that is partly due to the fact that S3 often gets used as a data source for data warehousing and analytics pipelines.

    As a result, many organizations are looking for ways to de-identify data flowing into S3 or other cloud storage to protect information as it gets consumed by popular analytics platforms such as Snowflake, AWS Redshift, Athena or data lake platforms. Many of these methods require additional development or altering the data pipeline and as a result either slow down the use of cloud-based analytics or leave data potentially exposed.

    Attend this webinar to learn how data can be easily de-identified, tokenized or encrypted inside S3 objects to help prevent data leakage while still enabling analytics teams to leverage the scale of cloud infrastructure.

    This session will provide a review of some key data security gaps as they relate to cloud storage in general and AWS S3, and provide a live demonstration of de-identifying data on the fly during a migration.

    Join this webinar and learn about the following:

    - Common data security gaps for data sources in S3
    - Key differences between existing cloud storage encryption methods and de-identification processes
    - Methods for de-identification, tokenization and encryption of data
    - Architecture models to support a de-identified data pipeline
  • Encryption Simplified - Field Level Encryption for AWS RDS Recorded: May 20 2020 45 mins
    Harold Byun
    Learn more about how Baffle implements its "no code" encryption approach to protect data at the field or record level. This webinar will provide a walk-through of the solution's architecture and a barebones configuration walk-through to show you how you can easily protect your organization's data.
  • Implementing Record Level Encryption and BYOK for SaaS Recorded: May 6 2020 40 mins
    Harold Byun, VP of Product, Baffle
    As concerns over data privacy and pending regulations continue to mount, companies are searching for solutions to help protect their customers' data and ensure compliance. The cost of non-compliance with these regulations exceeds most initial estimates with penalties in the range of 10 - 20% of revenue.

    The challenge that companies face is that most existing solutions to enable data protection methods at the field or record level are difficult and costly to implement. Complicating the matter further is the so-called "right to be forgotten" requirement that is evident in more recent privacy regulations such as GDPR, which mandates tracking of data and deletion.

    Attend this webinar to learn how you can implement record level encryption with data shredding techniques in a simplified manner without modifying applications. Learn how multi-tenant SaaS providers are using tenant-specific BYOK encryption models to secure data, restrict entitlements in co-mingled data environments, and accelerate compliance.

    This session will provide a review of some security and operational challenges in multi-tenant and shared data environments along with a live demonstration of simplified record level encryption.

    Join this webinar and learn about the following:

    - Common security and operational challenges in SaaS and shared data environments
    - Architectural and design considerations for building a Bring Your Own Key (BYOK) service
    - How to enable a simplified record level encryption model to protect data
    - How to enable simplified data shredding to help ensure compliance
  • A Case Study on Threat Intel Sharing Across Multiple Parties Recorded: Mar 19 2020 39 mins
    Harold Byun, VP Products
    In the case of many security teams, there is a desire to share threat intelligence and fraud information across multiple parties. Some of the benefits of sharing this data are:

    - faster identification and confirmation of a given threat by participating security teams
    - less manual research and investigation by already stretched resources
    - a better view into frequency of a given threat or actor

    However, given the sensitive nature of this information and attribution, there's also a great deal of concern and resistance over sharing this information, who can access it and potential leakage.

    What if you could share this information without really "sharing" it? What if there was a method that allowed for confirmation of a given threat without attributing the information to a given party and without exposing data from any of the other participants?

    This webinar will provide an overview of threat intelligence sharing across multiple parties using privacy preserving analytics to secure the data, while still allowing organizations to query a shared data store.

    Join this webinar and learn about the following:

    - Common benefits of threat intel sharing
    - Privacy preserving analytics techniques to prevent data exposure in a shared data repository
    - Methods of data access control and entitlements to ensure confidentiality
    - Additional privacy preserving analytics use cases that facilitate secure data sharing
  • Data Privacy Simplified – Using Data-Centric Protection to Secure Your Data Recorded: Jan 23 2020 54 mins
    Harold Byun, VP Products, Baffle
    As concerns over data privacy and data theft continue to mount, companies are searching for solutions to help secure their customers' data and mitigate the risk of data theft, all without breaking business processes. The more recent data privacy regulations will significantly increase the cost of non-compliance and have the potential to stifle business intelligence and big data efforts as well.

    The challenge that companies face is implementing the appropriate data level security without adversely impacting the business while still facilitating ways to leverage and monetize information. Historically, achieving this type of balance was impossible and methods to appropriately secure data often broke applications or made data useless for analytics.

    Modern approaches to privacy preserving analytics are now available to easily protect your data for compliance, yet still allow for data processing on information without ever violating data privacy. Attend this webinar to learn how you can perform analytics and share data while still ensuring the appropriate level of data security and privacy.

    This session will provide a review of various data-centric protection methods (data masking, tokenization, BYOK, field and record level encryption) including privacy preserving analytics and how they can be easily implemented to protect information in the cloud and on-premise.

    Join this webinar and learn about the following:

    - Key requirements of recent data privacy regulations and compliance strategies
    - Common threat models that unknowingly leave data exposed to data theft
    - Various data-centric protection methods that can help mitigate data security risks
    - Privacy preserving analytics use cases that can
  • Critical Steps to Manage CCPA Compliance and Risk in 2020 Recorded: Dec 17 2019 78 mins
    Panelists: K Royal, TrustArc; Ilia Sotnikov, Netwrix, Dr. Else van der Berg, Datawallet; and Harold Byun, Baffle.
    The California Consumer Privacy Act of 2018 (CCPA) is arguably the most expansive privacy law in U.S. history and will become enforceable in just a matter of months. The CCPA introduces new privacy rights for consumers and will force companies that conduct business in the State of California to implement structural changes to their privacy programs.

    The new rights given to California consumers are similar to the rights provided in the European Union’s General Data Protection Regulation (GDPR). The CCPA also subjects non-compliant businesses to expensive fines, class-action lawsuits, and injunctions.

    On this webinar, we will examine the impact of the CCPA, answer your burning questions, uncover the CCPA’s nuances, and address its ambiguities and challenges. We will also include strategies for creating compliance programs in the midst of the unknowns, and a strategic action plan for businesses to become compliant.

    Learning objectives are to gain insights on:

    •Identify which companies are impacted by the CCPA and what rights it gives to consumers.
    •Analyze the differences between the CCPA and the GDPR.
    •Develop a plan to become CCPA compliant.
    •Estimate the costs and benefits of achieving CCPA compliance.
  • CCPA Data Privacy Compliance Simplified Recorded: Nov 21 2019 40 mins
    Harold Byun, VP Products
    Considered one of the strongest data privacy laws in the United States, the California Consumer Privacy Act (CCPA) is set to go into effect on January 1, 2020.

    Many organizations will struggle to comply and will need to examine their data collection, handling and monetization practices.

    Attend this webinar to learn about new techniques that allow for data minimization to simplify the compliance effort with minimal impact to the business. Review technologies that allow for confidential computing and privacy preserving analytics to facilitate data analytics and insights without impacting business operations.

    Join this webinar and learn the following:

    - Review key CCPA compliance criteria
    - Understand new consumer rights and protection guidelines
    - How to take steps to perform data minimization to help with compliance
    - Gain an understanding of privacy preserving analytics to help secure data for the business
  • Encryption Simplified - A Walk-Through of Baffle Data-Centric Protection Recorded: Nov 6 2019 46 mins
    Harold Byun
    Learn more about how Baffle implements its "no code" encryption approach to protect data at the field or record level. This webinar will provide a walk-through of the solution's architecture and a barebones configuration walk-through to show you how you can easily protect your organization's data.
  • Implementing Record Level Encryption to Ensure Data Privacy for SaaS Recorded: Sep 17 2019 41 mins
    Harold Byun, VP of Product, Baffle
    As concerns over data privacy and pending regulations continue to mount, companies are searching for solutions to help protect their customers' data and ensure compliance. The cost of non-compliance with these regulations exceeds most initial estimates with penalties in the range of 10 - 20% of revenue.

    The challenge that companies face is that most existing solutions to enable data protection methods at the field or record level are difficult and costly to implement. Complicating the matter further is the so-called "right to be forgotten" requirement that is evident in more recent privacy regulations such as GDPR, which mandates tracking of data and deletion.

    Attend this webinar to learn how you can implement record level encryption with data shredding techniques in a simplified manner without modifying applications. Learn how multi-tenant SaaS providers are using tenant-specific encryption models to secure data, restrict entitlements in co-mingled data environments, and accelerate compliance.

    This session will provide a review of some security and operational challenges in multi-tenant and shared data environments along with a live demonstration of simplified record level encryption.

    Join this webinar and learn about the following:

    - Common security and operational challenges in SaaS and shared data environments
    - Architectural and design considerations for building a Bring Your Own Key (BYOK) service
    - How to enable a simplified record level encryption model to protect data
    - How to enable simplified data shredding to help ensure compliance
  • Preventing Data Leakage in Cloud Development Environments Recorded: Jun 27 2019 38 mins
    Harold Byun, VP of Product, Baffle
    A lot of companies have been using the cloud for test and development spin-ups to make dev instances available quickly for their application development teams.

    This enables organizations to "shift left" and develop faster, but also introduces increased security risks when production data or data snapshots are used in test dev environments. For example, there have been several widely publicized data exposures that have been left unattended or have been leaked due to cloud misconfigurations.

    Attend this webinar to learn how you can support development teams and secure production data in the cloud at the same time. This session will provide a live review of database migration services and simplified data protection options that help prevent the accidental data leakage from your test dev environments.

    Join this webinar and learn about the following:

    - Some common security gaps in test dev environments
    - How to simplify and secure the migration of production data to development environments
    - How to enable simplified masking of data so developers can do their work
  • Securing Data "IN" the Cloud Recorded: Apr 25 2019 38 mins
    Harold Byun, VP of Product, Baffle
    As the wave of cloud migration continues, many organizations still face open questions about responsibility and governance of their data or their customer's data. The shared responsibility model outlines that the responsibility for security is shared, but clearly calls out that customers are responsible for security of what is put "IN" the cloud.

    Attend this webinar to learn about how you can simplify protection and security of data IN cloud to accelerate your "lift and shift" and still ensure compliance. This session will provide a live review of the AWS database migration service and integration with AWS key management services.

    Join this webinar and learn about the following:

    - Common gaps in implementing the shared responsibility model
    - Simplifying encryption for applications and data migrating to AWS
    - Leveraging cloud key management services
    - Securing cloud native architectures, microservices and serverless
  • Homomorphic Encryption for Your Business: Fact, Fiction, and Hype Recorded: Sep 12 2018 38 mins
    Harold Byun, VP Products, Baffle
    In recent years, cryptographic researchers have theorized that secure computation — the ability to perform mathematical operations on encrypted data — was still decades from being realized in practice.

    This webinar will show how that timeline has been leapfrogged using a variety of cryptographic approaches to enable secure computation for real world applications today, which enable operations such as sort, search and mathematical computation. The session will provide an assessment of cryptographic techniques and live demonstrations to show how advanced encryption can protect your sensitive data without breaking application functionality for your business.

    Join this webinar to learn about the following:

    - Alternative cryptographic approaches that can enable secure computation
    - How to preserve application functionality to drive increased business user satisfaction
    - General performance impact and ranges for various techniques
    - Business use case scenarios that expose different methods to manage and secure data access
Advanced Data Protection - Make data breaches irrelevant
Baffle, the application data protection company, prevents data breaches by securing the end-to-end data access model for applications and databases. Using this method, the technology protects against some of the most recent high-profile attacks and vulnerabilities -including Spectre and Meltdown. With its patent-pending technology, Baffle is the only company that can enable encryption of data at-rest, in use, in memory and in the search index without impacting the application using AES encryption.

Baffle is also the first company to enable secure data processing on a commercial application and database to guarantee data protection. Baffle has raised $10.5 million of financing; its investors include True Ventures, Envision Ventures, ServiceNow Ventures [NYSE: NOW], Thomvest Ventures, Engineering Capital, and Industry Ventures.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Tokenize Your Data in AWS RDS with AWS KMS
  • Live at: Sep 3 2020 5:00 pm
  • Presented by: Harold Byun, VP Products
  • From:
Your email has been sent.
or close