Pseudonymization vs. Encryption: Fight!

Logo
Presented by

Patrick Walsh

About this talk

The user data you hold is now toxic -- meaning the penalties for losing control of that data are now potentially very costly. Technical measures must be taken to protect the privacy of that user data, which means you probably need to adopt a PET. But what PET is appropriate? Join us as we discuss the limits of pseudonymization and the landscape of encryption options available. We’ll examine a few well-known companies that are using encryption to make privacy a first-class part of their product by embracing end-to-end encryption and customer held encryption keys. We’ll also touch on encryption techniques like secure multi-party computation, homomorphic encryption, and transform cryptography.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (107)
Subscribers (8023)
The Tech & Cyber Security Trends channel features experts and executives in and around the high tech, high growth sector to learn about new trends, market changes, and leadership tips. Join our channel.