SlideShare uma empresa Scribd logo
1 de 32
© 2017 Delphix. All Rights Reserved. Private and Confidential.© 2017 Delphix. All Rights Reserved. Private and Confidential.
Gary Hallam | Global Channel Enablement, Delphix
GDPR Fast Start
March 28, 2018
© 2017 Delphix. All Rights Reserved. Private and Confidential.
1 GDPR Key Articles and Security Controls
2 Non-Production Data
3 Virtualisation
4 Profiling
5 Masking & Tokenization
6 Self-Service
7 Replication
8 Summary & Case Studies
Agenda
2
© 2017 Delphix. All Rights Reserved. Private and Confidential. 3
Personal Data
“
‘personal data’ means any information relating to an identified or identifiable
natural person (‘data subject’); an identifiable natural person is one who can
be identified, directly or indirectly, in particular by reference to an identifier
such as a name, an identification number, location data, an online
identifier or to one or more factors specific to the physical,
physiological, genetic, mental, economic, cultural or social identity of
that natural person
”
- Article 4
© 2017 Delphix. All Rights Reserved. Private and Confidential.
Key Articles of GDPR
4
BREACH
NOTIFICATION
Responsibilities
PROTECTION
OFFICER
CONSENT
RIGHT TO BE
FORGOTTEN
PROFILING
PROTECTION
CROSS BORDER
TRANSFERS
The key articles of GDPR require that
personal data is managed and protected
effectively and enshrines that protection in
law with significant penalties if those laws
are broken.
Article 33 Article 37, 38 & 39 Article 7
Article 45 & 45 Article 22 Article 17
© 2017 Delphix. All Rights Reserved. Private and Confidential.
Security Controls
There exist 2 controls that allow you to
be exempt and/or relaxed from GDPR
responsibilities. Anonymization &
Pseudonymization.
© 2017 Delphix. All Rights Reserved. Private and Confidential. 6
Pseudonymization
“The principles of data protection should
apply to any information concerning an
identified or identifiable natural
person…..principles of data protection
should therefore not apply to
anonymous information, namely
information which does not relate to an
identified or identifiable natural person or to
personal data rendered anonymous in
such a manner that the data subject is
not or no longer identifiable. This
Regulation does not therefore concern the
processing of such anonymous information”
Anonymization
“‘pseudonymisation’ means the processing
of personal data in such a manner that the
personal data can no longer be
attributed to a specific data subject
without the use of additional
information, provided that such additional
information is kept separately and is
subject to technical and organisational
measures to ensure that the personal data
are not attributed to an identified or
identifiable natural person”
© 2017 Delphix. All Rights Reserved. Private and Confidential.© 2017 Delphix. All Rights Reserved. Private and Confidential. 7
© 2017 Delphix. All Rights Reserved. Private and Confidential.
Non-Production Data Represents a Major Hidden Risk
NON-PRODUCTION (80%)
PRODUCTION DATA (20%)
» Is constantly growing
» Entails multiple types of repositories
» Is often less protected by security and
governance measures
» Contains data subject to GDPR
Non-Production Data:
8
© 2017 Delphix. All Rights Reserved. Private and Confidential.
A Comprehensive Approach to Non-Prod Data Security
SECURE
APPLY automatic or
custom masking with
consistency,
repeatability
DISCOVER
IDENTIFY sensitive
data and create an
enterprise-wide risk
profile
DELIVER
DISTRIBUTE secure
data to non-production
environments in
minutes
9
© 2017 Delphix. All Rights Reserved. Private and Confidential.
Delphix Dynamic Data Platform
Deliver masked data in just minutes
Application
s
File
s
Database
s
Rich APIs
DD
Controls
Self
Service
Datapod
s
On-
Prem
Any
Server
Private
Cloud
Public
Cloud
Sync
Compress
Provision
Profiling
Compliance
Policy
Masking
Distribute
Audit &
Report
Manage
VIRTUALIZE SECURE MANAGE
DBA
10
© 2017 Delphix. All Rights Reserved. Private and Confidential.
How Virtualisation enables a Fast Start
Sync
Compress
Provision
Replicate
VIRTUALIZE
11
• Easy to deploy
– Import a Virtual Machine
• Reduced infrastructure requirements (storage)
• Parallelised Environments
– Testing a masked database on multiple applications
– Out of band masking – no “please wait whilst we mask your
system”
• Masking for purpose and ad hoc masking
© 2017 Delphix. All Rights Reserved. Private and Confidential.
How “Actionable” Profiling enables a Fast Start
12
• Ability to examine your data to locate sensitive data
• Customisable Profiles using Regular Expressions
• Build application, compliance-rule, language, department specific
profiles
• Run profiles against multiple data sources
• Profile matches suggest masking algorithms
• Re-profile data to maintain compliance
Profiling
Compliance
Policy
Masking
SECURE
© 2017 Delphix. All Rights Reserved. Private and Confidential.
Profiling – How to build portable profile rules
15
• Out of the box profiles help to identify sensitive
data
– Data level profiling
– Meta-data level profiling
• Ideally a Profile Set should yield all sensitive
data accurately
• Customisable to prevent false positives and
false negatives
• Subject Matter and Security Experts need to
qualify
• Additionally secure data can be found using
data discovery techniques – for instance,
columns with high distinct value count.
© 2017 Delphix. All Rights Reserved. Private and Confidential.
• Intelligent: Solution that can identify sensitive
data and know how to mask it. Feature: Pre-built
accelerator pack for standard SAP tables.
• Speed: High performance masking solution.
Feature: Database level masking for only
transparent tables. No support for pool/cluster.
• Referential Integrity: Referential integrity across
different database types and applications.
Feature: Data Source agnostic algorithms.
A high performance out of the box masking
solution that can work alongside masking of
other data sources.
An Example of a Portable Profile Rule
Delphix SAP Masking
16
for
SAP
© 2017 Delphix. All Rights Reserved. Private and Confidential.© 2017 Delphix. All Rights Reserved. Private and Confidential.
“You’re Masking UI
is very nice but we
have thousands of
databases to
protect.”
17
© 2017 Delphix. All Rights Reserved. Private and Confidential.
Introducing the Masking API
18
• The Delphix Masking API allows you to build
and run your masking rule-sets and profile-
sets programmatically.
• Automatically profile an entire database estate,
for instance by supplying a list of databases
and connection strings.
• An API Client user interface allows novices to
learn, execute and build the commands
needed to automate masking.
• Allows you to implement on-the-fly masking*
https://bit.ly/2pHa4Sd
© 2017 Delphix. All Rights Reserved. Private and Confidential.
Masking
Masking should be a one way process to
prevent re-identification of data – in this
way data can be anonymised. The data
subject may be inferred from other data,
hence the masking should be
comprehensive and approved.
© 2017 Delphix. All Rights Reserved. Private and Confidential.
• Mask across all data sources
– Leveraging the same rules/algorithms
– Key fields can be masked
– Automatic drop and re-build constraints
• Deterministic Masking
– Same masking across all data types
– Removes the need for detailed data analysis
• Secure Lookups
– Simplify masking process
– Secure and irreversible
– Patented technology
• No Code / Low Code Approach
Keeping It Simple
Keeps it Fast
✓ REALISTIC ✓ IRREVERSIBLE ✓ REPEATABLE
✓ REFERENTIAL
INTEGRITY
20
© 2017 Delphix. All Rights Reserved. Private and Confidential.
Out of the Box Algorithms
Used to build custom algorithms
1.
2.
3.
4.
5.
6.
7.
8.
21
© 2017 Delphix. All Rights Reserved. Private and Confidential.
Pre and Post Script Processing
Provides additional complex masking capability
• In order to cater for more complex
requirements Delphix provides a facility
to add scripts before and after a
Ruleset has run.
22
© 2017 Delphix. All Rights Reserved. Private and Confidential.
Custom Algorithms
Can be developed, subject to approvals
• Bespoke algorithms may be created
using Pentaho Data Integration
• This is a gated development that
requires approvals
– Prevents duplicating algorithms
– Ensures sensible algorithms are
created in-line with best practices.
23
© 2017 Delphix. All Rights Reserved. Private and Confidential.
• Tokenization provides the
ability to re-identify data.
• Good for psuedonymisation
• Useful for sharing data for
processing and then re-
identifying once processing is
complete
• Less secure than masking as
this data can be reversed
• Helpful where full masking
across the enterprise cannot
be completed.
Tokenization
© 2017 Delphix. All Rights Reserved. Private and Confidential.
Data Pods
Self Service for testing Masked Data
25
DATA OPERATORS
• Secure
• Virtualize with compression
• Automate
• Replicate
• View and Manage test &
copy data environments
across users
DATA CONSUMERS
• Bookmark
• Version
• Refresh
• Restore
• Branch
• Share
Personal Secure Portable DynamicLightweight
© 2017 Delphix. All Rights Reserved. Private and Confidential.
Mask virtual copy
one time
Repeatable and Secure Data Delivery
Mask once, deliver many
26
Production
Source
DEV
QA
• Provision a complete, virtual copy of production
• Automatically discover and mask sensitive data
• Distribute multiple masked copies packaged in data pods
• Provide testers with self-service control
• Easily refresh data copies
Distribute secure
copies in minutes
© 2017 Delphix. All Rights Reserved. Private and Confidential.
CLOUD
Enable Secure Dev/Test in Hybrid Cloud Architectures
27
ON-PREMISE
Production
Source
DEV
QA• Synchronize with on-prem source
• Compress and mask data
• Replicate secure data to cloud-based instance
• Provision data pods to consumers
© 2017 Delphix. All Rights Reserved. Private and Confidential.
Delphix Dynamic Data Platform and GDPR
Ease “Cross Border Transfer” restrictions using
pseudonymisation and anonymization
Protection of live production data
Satisfy “Right to Be Forgotten” requirements for non-
production
Breach notification support*
Secure personal data in both cloud and on-premises data
through pseudonymisation and anonymization
* though profiling can help to identify what information is lost
© 2017 Delphix. All Rights Reserved. Private and Confidential.
The Best Part
Self-Service Access to a Masked & Test Data Library
Production/Source Masking & Manipulation Project Data Library
Secure
Subset
Add
Synthetic
Collect production data
 Masking Factory
 Masked for purpose
 Audit & QA
 Refresh Re-Certify
Files
Databases
Secure and manipulate Provision, bookmark, store
Masked,
full copy
Prod +
Synth
10%
subset
5%
subset
Full copy
Prod +
Synth
 Centralised
 Controlled
 Secured
 Audited
 Personalised
 Version Controlled
 Instant Access
 No downtime refresh
RELPICATED SDD
© 2017 Delphix. All Rights Reserved. Private and Confidential.
Benefits of Integrated Data Masking and Data Delivery
30
Provide
SELF SERVICE
Protect data
EVERYWHERE
your business operates
• Implement data masking in on-prem, cloud, or hybrid environments
• Broad support for multiple platforms, databases, and file systems
• Replicate and synchronise data to where you need it
• Automatically discover, protect, and audit sensitive data
• Mask once, then deliver secure data everywhere in just minutes
• Reduced storage requirements across your whole non-production estate
• Eliminate wait time for secure data
• Give data consumers self-service control to refresh, rewind, share, and branch data
• Maintain a single source or record for when, where, and how data is masked
Make data masking
EFFICIENT
for data consumers
© 2017 Delphix. All Rights Reserved. Private and Confidential.
Select Delphix Customers
31
Financial Healthcare TelecomManufacturingRetailTechnology
© 2017 Delphix. All Rights Reserved. Private and Confidential.
• Requirements to achieve compliance with GDPR
• Sensitive customer information hindered ability to share data
with offshore Infosys testing teams
• Complex, outsourced data operations slowed environment
provisioning for core business processes testing (e.g. order
to cash)
Case Study: Increasing testing agility
and ensuring GDPR compliance
SELF-SERVICE
data control for offshore
Infosys testing teams
GDPR COMPLIANCE
by masking EU citizens’
confidential data across
Oracle, SQL Server, z/OS
DATA DELIVERY IN
MINUTES
instead of two weeks
TOP 5 LOGISTICS
FIRM IN Europe
32
© 2017 Delphix. All Rights Reserved. Private and Confidential.
• Requirements to achieve compliance with GDPR
• Sensitive customer information hindered ability to deliver
data for QA teams
• Unable to identify and anonymize sensitive data across
incredibly complex and large SAP Applications, while
ensuring applications remain functional
Case Study: Ensuring GDPR
compliance of SAP Applications
SENSITIVE DATA
IDENTIFICATION
across 100,000+ SAP tables
using pre-built Delphix
Profiler in minutes
GDPR COMPLIANCE
by masking EU citizens’
confidential data across
SAP Applications
DATA DELIVERY IN
MINUTES
instead of weeks
TOP 5 IT SERVICE
FIRM IN Europe
33
© 2017 Delphix. All Rights Reserved. Private and Confidential.
QUESTIONS?
gary.hallam@delphix.com

Mais conteúdo relacionado

Mais procurados

Jason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEAJason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEAVeritas Technologies LLC
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlCipherCloud
 
Cloud Visibility & Cloud Data Loss Prevention Approaches
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention ApproachesCipherCloud
 
Herding Pets and Cattle: Extending Foundational Controls Into the Cloud
Herding Pets and Cattle: Extending Foundational Controls Into the CloudHerding Pets and Cattle: Extending Foundational Controls Into the Cloud
Herding Pets and Cattle: Extending Foundational Controls Into the CloudTripwire
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Kenneth de Brucq
 
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...Veritas Technologies LLC
 
C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud securityVladimir Jirasek
 
Confessions of a CIO
Confessions of a CIOConfessions of a CIO
Confessions of a CIODelphix
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsPuneet Kukreja
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – DataFujitsu Middle East
 
BITGLASS - DATA BREACH DISCOVERY DATASHEET
BITGLASS - DATA BREACH DISCOVERY DATASHEETBITGLASS - DATA BREACH DISCOVERY DATASHEET
BITGLASS - DATA BREACH DISCOVERY DATASHEETEdgar Alejandro Villegas
 
Le soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPRLe soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPRJürgen Ambrosi
 
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...Amazon Web Services
 
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityForcepoint LLC
 
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesForcepoint LLC
 
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterMaintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterForcepoint LLC
 
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San JoseMoshe Ferber
 
Making the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data VisibilityMaking the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data Visibilitydianadvo
 

Mais procurados (20)

Jason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEAJason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEA
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
 
Cloud Visibility & Cloud Data Loss Prevention Approaches
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention Approaches
 
Herding Pets and Cattle: Extending Foundational Controls Into the Cloud
Herding Pets and Cattle: Extending Foundational Controls Into the CloudHerding Pets and Cattle: Extending Foundational Controls Into the Cloud
Herding Pets and Cattle: Extending Foundational Controls Into the Cloud
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
 
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
 
C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud security
 
Confessions of a CIO
Confessions of a CIOConfessions of a CIO
Confessions of a CIO
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
 
Hadoop and Big Data Security
Hadoop and Big Data SecurityHadoop and Big Data Security
Hadoop and Big Data Security
 
BITGLASS - DATA BREACH DISCOVERY DATASHEET
BITGLASS - DATA BREACH DISCOVERY DATASHEETBITGLASS - DATA BREACH DISCOVERY DATASHEET
BITGLASS - DATA BREACH DISCOVERY DATASHEET
 
Le soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPRLe soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPR
 
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
 
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
 
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
 
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterMaintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
 
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
 
Making the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data VisibilityMaking the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data Visibility
 

Semelhante a GDPR Fast Start

Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPFidelis Cybersecurity
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
DevOps + DataOps = Digital Transformation
DevOps + DataOps = Digital Transformation DevOps + DataOps = Digital Transformation
DevOps + DataOps = Digital Transformation Delphix
 
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesWebinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesDataStax
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...BigDataEverywhere
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud SecurityLora O'Haver
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Kal BO
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, RubrikVMUG IT
 
DataOps in Financial Services: enable higher-quality test ing + lower levels ...
DataOps in Financial Services: enable higher-quality test ing + lower levels ...DataOps in Financial Services: enable higher-quality test ing + lower levels ...
DataOps in Financial Services: enable higher-quality test ing + lower levels ...Ugo Pollio
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Denodo
 
Empowering Agile Development with Containers
Empowering Agile Development with ContainersEmpowering Agile Development with Containers
Empowering Agile Development with ContainersKellyn Pot'Vin-Gorman
 
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Netskope
 
Data Breaches: Protecting Your Database from the Evening News
Data Breaches: Protecting Your Database from the Evening NewsData Breaches: Protecting Your Database from the Evening News
Data Breaches: Protecting Your Database from the Evening NewsSolarWinds
 
Intel boubker el mouttahid
Intel boubker el mouttahidIntel boubker el mouttahid
Intel boubker el mouttahidBigDataExpo
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2Bitglass
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to ComplianceSecurity Innovation
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and EthicsHPCC Systems
 
The Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubThe Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubDataWorks Summit
 
The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014Cloudera, Inc.
 
Seeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the DataSeeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the DataCloudera, Inc.
 

Semelhante a GDPR Fast Start (20)

Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
DevOps + DataOps = Digital Transformation
DevOps + DataOps = Digital Transformation DevOps + DataOps = Digital Transformation
DevOps + DataOps = Digital Transformation
 
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesWebinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
DataOps in Financial Services: enable higher-quality test ing + lower levels ...
DataOps in Financial Services: enable higher-quality test ing + lower levels ...DataOps in Financial Services: enable higher-quality test ing + lower levels ...
DataOps in Financial Services: enable higher-quality test ing + lower levels ...
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
 
Empowering Agile Development with Containers
Empowering Agile Development with ContainersEmpowering Agile Development with Containers
Empowering Agile Development with Containers
 
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
 
Data Breaches: Protecting Your Database from the Evening News
Data Breaches: Protecting Your Database from the Evening NewsData Breaches: Protecting Your Database from the Evening News
Data Breaches: Protecting Your Database from the Evening News
 
Intel boubker el mouttahid
Intel boubker el mouttahidIntel boubker el mouttahid
Intel boubker el mouttahid
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and Ethics
 
The Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubThe Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data Hub
 
The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014
 
Seeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the DataSeeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the Data
 

Mais de Delphix

Fast Data Flow Is the Secret to Accelerating Digital Transformation
Fast Data Flow Is the Secret to Accelerating Digital TransformationFast Data Flow Is the Secret to Accelerating Digital Transformation
Fast Data Flow Is the Secret to Accelerating Digital TransformationDelphix
 
Data Agility for Enterprise DevOps Adoption
Data Agility for Enterprise DevOps AdoptionData Agility for Enterprise DevOps Adoption
Data Agility for Enterprise DevOps AdoptionDelphix
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Delphix
 
Accelerating Secure SAP Application Delivery
Accelerating Secure SAP Application Delivery Accelerating Secure SAP Application Delivery
Accelerating Secure SAP Application Delivery Delphix
 
90% of Enterprises are Using DataOps. Why Aren’t You?
90% of Enterprises are Using DataOps. Why Aren’t You?90% of Enterprises are Using DataOps. Why Aren’t You?
90% of Enterprises are Using DataOps. Why Aren’t You?Delphix
 
Simplify and Accelerate SQL Server Migration to Azure
Simplify and Accelerate SQL Server Migration to AzureSimplify and Accelerate SQL Server Migration to Azure
Simplify and Accelerate SQL Server Migration to AzureDelphix
 
Move and Secure Your Data
Move and Secure Your DataMove and Secure Your Data
Move and Secure Your DataDelphix
 
Let Data Flow: Removing the Latest DevOps Constraints with DataOps
Let Data Flow: Removing the Latest DevOps Constraints with DataOpsLet Data Flow: Removing the Latest DevOps Constraints with DataOps
Let Data Flow: Removing the Latest DevOps Constraints with DataOpsDelphix
 
Confessions of an IT Director
Confessions of an IT Director Confessions of an IT Director
Confessions of an IT Director Delphix
 
Confessions of the AppDev VP
Confessions of the AppDev VPConfessions of the AppDev VP
Confessions of the AppDev VPDelphix
 
Confessions of the Tester
Confessions of the TesterConfessions of the Tester
Confessions of the TesterDelphix
 
Confessions of a Developer
Confessions of a DeveloperConfessions of a Developer
Confessions of a DeveloperDelphix
 
Confessions of a DBA: “I always avoid requests from DevOps” and Other Admissions
Confessions of a DBA: “I always avoid requests from DevOps” and Other AdmissionsConfessions of a DBA: “I always avoid requests from DevOps” and Other Admissions
Confessions of a DBA: “I always avoid requests from DevOps” and Other AdmissionsDelphix
 
Solving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for HealthcareSolving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for HealthcareDelphix
 
Accelerate Design and Development of Data Projects Using AWS
Accelerate Design and Development of Data Projects Using AWSAccelerate Design and Development of Data Projects Using AWS
Accelerate Design and Development of Data Projects Using AWSDelphix
 
The Rise of DataOps: Making Big Data Bite Size with DataOps
The Rise of DataOps: Making Big Data Bite Size with DataOpsThe Rise of DataOps: Making Big Data Bite Size with DataOps
The Rise of DataOps: Making Big Data Bite Size with DataOpsDelphix
 
451 Research: Data Is the Key to Friction in DevOps
451 Research: Data Is the Key to Friction in DevOps451 Research: Data Is the Key to Friction in DevOps
451 Research: Data Is the Key to Friction in DevOpsDelphix
 
Platform for Cloud Migration — Accelerating and De-Risking your Cloud Journey
Platform for Cloud Migration — Accelerating and De-Risking your Cloud JourneyPlatform for Cloud Migration — Accelerating and De-Risking your Cloud Journey
Platform for Cloud Migration — Accelerating and De-Risking your Cloud JourneyDelphix
 
The Power of DataOps for Cloud and Digital Transformation
The Power of DataOps for Cloud and Digital Transformation The Power of DataOps for Cloud and Digital Transformation
The Power of DataOps for Cloud and Digital Transformation Delphix
 

Mais de Delphix (19)

Fast Data Flow Is the Secret to Accelerating Digital Transformation
Fast Data Flow Is the Secret to Accelerating Digital TransformationFast Data Flow Is the Secret to Accelerating Digital Transformation
Fast Data Flow Is the Secret to Accelerating Digital Transformation
 
Data Agility for Enterprise DevOps Adoption
Data Agility for Enterprise DevOps AdoptionData Agility for Enterprise DevOps Adoption
Data Agility for Enterprise DevOps Adoption
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
 
Accelerating Secure SAP Application Delivery
Accelerating Secure SAP Application Delivery Accelerating Secure SAP Application Delivery
Accelerating Secure SAP Application Delivery
 
90% of Enterprises are Using DataOps. Why Aren’t You?
90% of Enterprises are Using DataOps. Why Aren’t You?90% of Enterprises are Using DataOps. Why Aren’t You?
90% of Enterprises are Using DataOps. Why Aren’t You?
 
Simplify and Accelerate SQL Server Migration to Azure
Simplify and Accelerate SQL Server Migration to AzureSimplify and Accelerate SQL Server Migration to Azure
Simplify and Accelerate SQL Server Migration to Azure
 
Move and Secure Your Data
Move and Secure Your DataMove and Secure Your Data
Move and Secure Your Data
 
Let Data Flow: Removing the Latest DevOps Constraints with DataOps
Let Data Flow: Removing the Latest DevOps Constraints with DataOpsLet Data Flow: Removing the Latest DevOps Constraints with DataOps
Let Data Flow: Removing the Latest DevOps Constraints with DataOps
 
Confessions of an IT Director
Confessions of an IT Director Confessions of an IT Director
Confessions of an IT Director
 
Confessions of the AppDev VP
Confessions of the AppDev VPConfessions of the AppDev VP
Confessions of the AppDev VP
 
Confessions of the Tester
Confessions of the TesterConfessions of the Tester
Confessions of the Tester
 
Confessions of a Developer
Confessions of a DeveloperConfessions of a Developer
Confessions of a Developer
 
Confessions of a DBA: “I always avoid requests from DevOps” and Other Admissions
Confessions of a DBA: “I always avoid requests from DevOps” and Other AdmissionsConfessions of a DBA: “I always avoid requests from DevOps” and Other Admissions
Confessions of a DBA: “I always avoid requests from DevOps” and Other Admissions
 
Solving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for HealthcareSolving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for Healthcare
 
Accelerate Design and Development of Data Projects Using AWS
Accelerate Design and Development of Data Projects Using AWSAccelerate Design and Development of Data Projects Using AWS
Accelerate Design and Development of Data Projects Using AWS
 
The Rise of DataOps: Making Big Data Bite Size with DataOps
The Rise of DataOps: Making Big Data Bite Size with DataOpsThe Rise of DataOps: Making Big Data Bite Size with DataOps
The Rise of DataOps: Making Big Data Bite Size with DataOps
 
451 Research: Data Is the Key to Friction in DevOps
451 Research: Data Is the Key to Friction in DevOps451 Research: Data Is the Key to Friction in DevOps
451 Research: Data Is the Key to Friction in DevOps
 
Platform for Cloud Migration — Accelerating and De-Risking your Cloud Journey
Platform for Cloud Migration — Accelerating and De-Risking your Cloud JourneyPlatform for Cloud Migration — Accelerating and De-Risking your Cloud Journey
Platform for Cloud Migration — Accelerating and De-Risking your Cloud Journey
 
The Power of DataOps for Cloud and Digital Transformation
The Power of DataOps for Cloud and Digital Transformation The Power of DataOps for Cloud and Digital Transformation
The Power of DataOps for Cloud and Digital Transformation
 

Último

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Último (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

GDPR Fast Start

  • 1. © 2017 Delphix. All Rights Reserved. Private and Confidential.© 2017 Delphix. All Rights Reserved. Private and Confidential. Gary Hallam | Global Channel Enablement, Delphix GDPR Fast Start March 28, 2018
  • 2. © 2017 Delphix. All Rights Reserved. Private and Confidential. 1 GDPR Key Articles and Security Controls 2 Non-Production Data 3 Virtualisation 4 Profiling 5 Masking & Tokenization 6 Self-Service 7 Replication 8 Summary & Case Studies Agenda 2
  • 3. © 2017 Delphix. All Rights Reserved. Private and Confidential. 3 Personal Data “ ‘personal data’ means any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person ” - Article 4
  • 4. © 2017 Delphix. All Rights Reserved. Private and Confidential. Key Articles of GDPR 4 BREACH NOTIFICATION Responsibilities PROTECTION OFFICER CONSENT RIGHT TO BE FORGOTTEN PROFILING PROTECTION CROSS BORDER TRANSFERS The key articles of GDPR require that personal data is managed and protected effectively and enshrines that protection in law with significant penalties if those laws are broken. Article 33 Article 37, 38 & 39 Article 7 Article 45 & 45 Article 22 Article 17
  • 5. © 2017 Delphix. All Rights Reserved. Private and Confidential. Security Controls There exist 2 controls that allow you to be exempt and/or relaxed from GDPR responsibilities. Anonymization & Pseudonymization.
  • 6. © 2017 Delphix. All Rights Reserved. Private and Confidential. 6 Pseudonymization “The principles of data protection should apply to any information concerning an identified or identifiable natural person…..principles of data protection should therefore not apply to anonymous information, namely information which does not relate to an identified or identifiable natural person or to personal data rendered anonymous in such a manner that the data subject is not or no longer identifiable. This Regulation does not therefore concern the processing of such anonymous information” Anonymization “‘pseudonymisation’ means the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organisational measures to ensure that the personal data are not attributed to an identified or identifiable natural person”
  • 7. © 2017 Delphix. All Rights Reserved. Private and Confidential.© 2017 Delphix. All Rights Reserved. Private and Confidential. 7
  • 8. © 2017 Delphix. All Rights Reserved. Private and Confidential. Non-Production Data Represents a Major Hidden Risk NON-PRODUCTION (80%) PRODUCTION DATA (20%) » Is constantly growing » Entails multiple types of repositories » Is often less protected by security and governance measures » Contains data subject to GDPR Non-Production Data: 8
  • 9. © 2017 Delphix. All Rights Reserved. Private and Confidential. A Comprehensive Approach to Non-Prod Data Security SECURE APPLY automatic or custom masking with consistency, repeatability DISCOVER IDENTIFY sensitive data and create an enterprise-wide risk profile DELIVER DISTRIBUTE secure data to non-production environments in minutes 9
  • 10. © 2017 Delphix. All Rights Reserved. Private and Confidential. Delphix Dynamic Data Platform Deliver masked data in just minutes Application s File s Database s Rich APIs DD Controls Self Service Datapod s On- Prem Any Server Private Cloud Public Cloud Sync Compress Provision Profiling Compliance Policy Masking Distribute Audit & Report Manage VIRTUALIZE SECURE MANAGE DBA 10
  • 11. © 2017 Delphix. All Rights Reserved. Private and Confidential. How Virtualisation enables a Fast Start Sync Compress Provision Replicate VIRTUALIZE 11 • Easy to deploy – Import a Virtual Machine • Reduced infrastructure requirements (storage) • Parallelised Environments – Testing a masked database on multiple applications – Out of band masking – no “please wait whilst we mask your system” • Masking for purpose and ad hoc masking
  • 12. © 2017 Delphix. All Rights Reserved. Private and Confidential. How “Actionable” Profiling enables a Fast Start 12 • Ability to examine your data to locate sensitive data • Customisable Profiles using Regular Expressions • Build application, compliance-rule, language, department specific profiles • Run profiles against multiple data sources • Profile matches suggest masking algorithms • Re-profile data to maintain compliance Profiling Compliance Policy Masking SECURE
  • 13. © 2017 Delphix. All Rights Reserved. Private and Confidential. Profiling – How to build portable profile rules 15 • Out of the box profiles help to identify sensitive data – Data level profiling – Meta-data level profiling • Ideally a Profile Set should yield all sensitive data accurately • Customisable to prevent false positives and false negatives • Subject Matter and Security Experts need to qualify • Additionally secure data can be found using data discovery techniques – for instance, columns with high distinct value count.
  • 14. © 2017 Delphix. All Rights Reserved. Private and Confidential. • Intelligent: Solution that can identify sensitive data and know how to mask it. Feature: Pre-built accelerator pack for standard SAP tables. • Speed: High performance masking solution. Feature: Database level masking for only transparent tables. No support for pool/cluster. • Referential Integrity: Referential integrity across different database types and applications. Feature: Data Source agnostic algorithms. A high performance out of the box masking solution that can work alongside masking of other data sources. An Example of a Portable Profile Rule Delphix SAP Masking 16 for SAP
  • 15. © 2017 Delphix. All Rights Reserved. Private and Confidential.© 2017 Delphix. All Rights Reserved. Private and Confidential. “You’re Masking UI is very nice but we have thousands of databases to protect.” 17
  • 16. © 2017 Delphix. All Rights Reserved. Private and Confidential. Introducing the Masking API 18 • The Delphix Masking API allows you to build and run your masking rule-sets and profile- sets programmatically. • Automatically profile an entire database estate, for instance by supplying a list of databases and connection strings. • An API Client user interface allows novices to learn, execute and build the commands needed to automate masking. • Allows you to implement on-the-fly masking* https://bit.ly/2pHa4Sd
  • 17. © 2017 Delphix. All Rights Reserved. Private and Confidential. Masking Masking should be a one way process to prevent re-identification of data – in this way data can be anonymised. The data subject may be inferred from other data, hence the masking should be comprehensive and approved.
  • 18. © 2017 Delphix. All Rights Reserved. Private and Confidential. • Mask across all data sources – Leveraging the same rules/algorithms – Key fields can be masked – Automatic drop and re-build constraints • Deterministic Masking – Same masking across all data types – Removes the need for detailed data analysis • Secure Lookups – Simplify masking process – Secure and irreversible – Patented technology • No Code / Low Code Approach Keeping It Simple Keeps it Fast ✓ REALISTIC ✓ IRREVERSIBLE ✓ REPEATABLE ✓ REFERENTIAL INTEGRITY 20
  • 19. © 2017 Delphix. All Rights Reserved. Private and Confidential. Out of the Box Algorithms Used to build custom algorithms 1. 2. 3. 4. 5. 6. 7. 8. 21
  • 20. © 2017 Delphix. All Rights Reserved. Private and Confidential. Pre and Post Script Processing Provides additional complex masking capability • In order to cater for more complex requirements Delphix provides a facility to add scripts before and after a Ruleset has run. 22
  • 21. © 2017 Delphix. All Rights Reserved. Private and Confidential. Custom Algorithms Can be developed, subject to approvals • Bespoke algorithms may be created using Pentaho Data Integration • This is a gated development that requires approvals – Prevents duplicating algorithms – Ensures sensible algorithms are created in-line with best practices. 23
  • 22. © 2017 Delphix. All Rights Reserved. Private and Confidential. • Tokenization provides the ability to re-identify data. • Good for psuedonymisation • Useful for sharing data for processing and then re- identifying once processing is complete • Less secure than masking as this data can be reversed • Helpful where full masking across the enterprise cannot be completed. Tokenization
  • 23. © 2017 Delphix. All Rights Reserved. Private and Confidential. Data Pods Self Service for testing Masked Data 25 DATA OPERATORS • Secure • Virtualize with compression • Automate • Replicate • View and Manage test & copy data environments across users DATA CONSUMERS • Bookmark • Version • Refresh • Restore • Branch • Share Personal Secure Portable DynamicLightweight
  • 24. © 2017 Delphix. All Rights Reserved. Private and Confidential. Mask virtual copy one time Repeatable and Secure Data Delivery Mask once, deliver many 26 Production Source DEV QA • Provision a complete, virtual copy of production • Automatically discover and mask sensitive data • Distribute multiple masked copies packaged in data pods • Provide testers with self-service control • Easily refresh data copies Distribute secure copies in minutes
  • 25. © 2017 Delphix. All Rights Reserved. Private and Confidential. CLOUD Enable Secure Dev/Test in Hybrid Cloud Architectures 27 ON-PREMISE Production Source DEV QA• Synchronize with on-prem source • Compress and mask data • Replicate secure data to cloud-based instance • Provision data pods to consumers
  • 26. © 2017 Delphix. All Rights Reserved. Private and Confidential. Delphix Dynamic Data Platform and GDPR Ease “Cross Border Transfer” restrictions using pseudonymisation and anonymization Protection of live production data Satisfy “Right to Be Forgotten” requirements for non- production Breach notification support* Secure personal data in both cloud and on-premises data through pseudonymisation and anonymization * though profiling can help to identify what information is lost
  • 27. © 2017 Delphix. All Rights Reserved. Private and Confidential. The Best Part Self-Service Access to a Masked & Test Data Library Production/Source Masking & Manipulation Project Data Library Secure Subset Add Synthetic Collect production data  Masking Factory  Masked for purpose  Audit & QA  Refresh Re-Certify Files Databases Secure and manipulate Provision, bookmark, store Masked, full copy Prod + Synth 10% subset 5% subset Full copy Prod + Synth  Centralised  Controlled  Secured  Audited  Personalised  Version Controlled  Instant Access  No downtime refresh RELPICATED SDD
  • 28. © 2017 Delphix. All Rights Reserved. Private and Confidential. Benefits of Integrated Data Masking and Data Delivery 30 Provide SELF SERVICE Protect data EVERYWHERE your business operates • Implement data masking in on-prem, cloud, or hybrid environments • Broad support for multiple platforms, databases, and file systems • Replicate and synchronise data to where you need it • Automatically discover, protect, and audit sensitive data • Mask once, then deliver secure data everywhere in just minutes • Reduced storage requirements across your whole non-production estate • Eliminate wait time for secure data • Give data consumers self-service control to refresh, rewind, share, and branch data • Maintain a single source or record for when, where, and how data is masked Make data masking EFFICIENT for data consumers
  • 29. © 2017 Delphix. All Rights Reserved. Private and Confidential. Select Delphix Customers 31 Financial Healthcare TelecomManufacturingRetailTechnology
  • 30. © 2017 Delphix. All Rights Reserved. Private and Confidential. • Requirements to achieve compliance with GDPR • Sensitive customer information hindered ability to share data with offshore Infosys testing teams • Complex, outsourced data operations slowed environment provisioning for core business processes testing (e.g. order to cash) Case Study: Increasing testing agility and ensuring GDPR compliance SELF-SERVICE data control for offshore Infosys testing teams GDPR COMPLIANCE by masking EU citizens’ confidential data across Oracle, SQL Server, z/OS DATA DELIVERY IN MINUTES instead of two weeks TOP 5 LOGISTICS FIRM IN Europe 32
  • 31. © 2017 Delphix. All Rights Reserved. Private and Confidential. • Requirements to achieve compliance with GDPR • Sensitive customer information hindered ability to deliver data for QA teams • Unable to identify and anonymize sensitive data across incredibly complex and large SAP Applications, while ensuring applications remain functional Case Study: Ensuring GDPR compliance of SAP Applications SENSITIVE DATA IDENTIFICATION across 100,000+ SAP tables using pre-built Delphix Profiler in minutes GDPR COMPLIANCE by masking EU citizens’ confidential data across SAP Applications DATA DELIVERY IN MINUTES instead of weeks TOP 5 IT SERVICE FIRM IN Europe 33
  • 32. © 2017 Delphix. All Rights Reserved. Private and Confidential. QUESTIONS? gary.hallam@delphix.com