Data De-identification: Protecting Privacy While Preserving Utility

Logo
Presented by

John Noltensmeyer, Head of Privacy and Compliance Solutions, TokenEx

About this talk

As organizations evaluate their de-identification and data minimization practices to satisfy an expanding landscape of regulatory obligations there are a number of factors to consider. Various technologies will be considered as part of a data-centric security strategy for de-identifying and securing sensitive information such as statistical tools, cryptographic solutions, suppression, pseudonymization, generalization, and randomization. Further, we will examine the capability of these technologies to preserve business utility within a Zero Trust data security model. Listen to this session and you will take away: • An understanding of the definition of de-identification as it relates to international and industry privacy regulations, including the difference between pseudonymization and anonymization • A strategy for balancing privacy and security concerns with business needs, such as evaluating and prioritizing risk • How various methods of de-identification can help meet the privacy requirements of applicable compliance obligations
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (787)
Subscribers (198324)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.