SlideShare a Scribd company logo
Thought Leaders in Big Data: Ulf Mattsson, CTO of Protegrity (Part 2)
By Sramana Mitra, One Million by One Million Blog
Sramana Mitra: Let’s take maybe three customers from three different segments. Let’s
double-click down on understanding how they’re using your technology.
Ulf Mattsson: I would like to mention that we do provide services in the architecture and data
flow, which is very important to be able to find the right solution in. Let’s take a large retailer.
This is a company that needed to be compliant to the payment card industry standard. It’s a $4
billion retail company operating in more than 30 States. They need to secure sensitive data in
several large databases restricting access from administrators and power users. They needed to
be compliant, track, and monitor all access to the sensitive data. That’s one example.
Sramana Mitra: What kind of card are we talking about? Is this credit card data of their
customers? What qualifies as sensitive data that needs this ultra-secure protection?
Ulf Mattsson: There’s a standard defined by credit card brands – all the large card brands. That
standard is called the Payment Card Industry Data Security Standard. Usually, it’s called
PCIDSS. That standard defines different areas that you need to comply with such as access
control, monitoring, and logging. The most challenging area is actually how to protect that data.
That is the most difficult area for many companies. The standard defines four different ways that
you can use to protect the data at cell level. The most effective way proves to be data
tokenization. Data tokenization is a way to replace the sensitive data with fake data. Some people
look at tokens as gaming chips or casino tokens so they are no longer sensitive. You can view
tokenization as bubble wrap. Like bubble wrap, you can actually see some aspects of the data, so
applications can actually work on the data but they do not see the full clear text. That’s part of
the standard. The standard also allows you to use encryption. The standard is encouraging
tokenization because it provides separation of duties and a higher level of usefulness.
If you go to a PII use case, we have a retailer that is selling beauty products. It’s a $10 billion
annual sales company with 3,600 stores in the United States. They have the challenge to protect
their personal data. They also need to protect payment data. They were audited by Visa at that
time and had to live up to a very high level of standard. That’s a typical situation where they are
also looking to protect the PII data. It goes beyond credit card data. That’s a typical trend that
you see in security today.
This segment is part 2 in the series : Thought Leaders in Big Data: Ulf Mattsson, CTO of
Protegrity

More Related Content

DOCX
6 ways reduce pci dss audit scope tokenizing cardholder data
PPTX
Blockchain Investment Opportunities
PDF
BigID Datasheet: CCPA Data Rights Automation
PDF
Dama Ireland slides - Data Trust event 9th June 2016
PDF
BigID Data Sheet: LGPD Compliance Automated
PPTX
DOA TOKENOMICS FOR BUSINESS.pptx
PDF
How Retirement Services Providers Can Tap Blockchain Thinking and Technology
PPT
Cardware Conference presentation on BIG DATA June 17-18 2014
6 ways reduce pci dss audit scope tokenizing cardholder data
Blockchain Investment Opportunities
BigID Datasheet: CCPA Data Rights Automation
Dama Ireland slides - Data Trust event 9th June 2016
BigID Data Sheet: LGPD Compliance Automated
DOA TOKENOMICS FOR BUSINESS.pptx
How Retirement Services Providers Can Tap Blockchain Thinking and Technology
Cardware Conference presentation on BIG DATA June 17-18 2014

What's hot (19)

PDF
Russian Data Center
PDF
Why is it critical for your enterprise to understand Blockchain technology an...
PDF
Reklaim Deck - March 2022
PDF
BigID DataSheet: Data Access Intelligence
PDF
BigID Virtual MDM Data Sheet
PDF
How AI and blockchain can help you earn a passive income
PPTX
5 Blockchain Trends Everyone Should Know About
PPT
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
PPTX
Collecting Social Media as Digital Evidence - PageFreezer Webinar
PDF
BigID Data Sheet HIPAA Data Security & Privacy
PDF
BigID Data Sheet: GDPR Compliance
PDF
figo at FinTech Startups MeetUp in Hamburg
PDF
BigID Data Sheet: Smart Data Labeling and Tagging
PDF
Applying Blockchain to the Media, Marketing & Insights Industries
PPTX
Data privacy & compliance considerations on using cloud services
PDF
BigID Data sheet: Consent Governance & Orchestration
PPTX
Bringing blockchain to retail
PDF
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
PDF
Blockchain the chain of trust and its potential / IBM
Russian Data Center
Why is it critical for your enterprise to understand Blockchain technology an...
Reklaim Deck - March 2022
BigID DataSheet: Data Access Intelligence
BigID Virtual MDM Data Sheet
How AI and blockchain can help you earn a passive income
5 Blockchain Trends Everyone Should Know About
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
Collecting Social Media as Digital Evidence - PageFreezer Webinar
BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet: GDPR Compliance
figo at FinTech Startups MeetUp in Hamburg
BigID Data Sheet: Smart Data Labeling and Tagging
Applying Blockchain to the Media, Marketing & Insights Industries
Data privacy & compliance considerations on using cloud services
BigID Data sheet: Consent Governance & Orchestration
Bringing blockchain to retail
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
Blockchain the chain of trust and its potential / IBM
Ad

Viewers also liked (20)

PPT
Libernation
PPT
Dexter.1
DOCX
Questionnaire media
DOCX
My evaluation
PDF
103東光國中執行本土實察成果報告
PPTX
Recce shots
PDF
102學年特殊學生基本資料及案例輔導計畫紀錄
PPT
Polynomials
PPT
ESOS SI SON PROBLEMAS
PPTX
Props, locations and actors
PPT
Pitch analysis
PDF
Projeto pessoal 2009
DOCX
Tv advert detailed analysis your choice
PPS
Dc pictures
PDF
Technology 2
PPTX
Horror Genre Conventions
PPT
Capilano University Motto Motto Slideshow1
PDF
Doc280
PPT
Planning My Magazine
Libernation
Dexter.1
Questionnaire media
My evaluation
103東光國中執行本土實察成果報告
Recce shots
102學年特殊學生基本資料及案例輔導計畫紀錄
Polynomials
ESOS SI SON PROBLEMAS
Props, locations and actors
Pitch analysis
Projeto pessoal 2009
Tv advert detailed analysis your choice
Dc pictures
Technology 2
Horror Genre Conventions
Capilano University Motto Motto Slideshow1
Doc280
Planning My Magazine
Ad

Similar to Thought leaders in big data ulf mattsson, cto of protegrity (part 2) (20)

DOCX
Thought leaders in big data ulf mattsson, cto of protegrity (part 3)
PDF
Data security to protect pci data flow ulf mattsson - insecure-mag-40
DOCX
Thought leaders in big data ulf mattsson, cto of protegrity (part 5)
PDF
Isaca global journal - choosing the most appropriate data security solution ...
PDF
What I learned from RSAC 2019
PPTX
A practical data privacy and security approach to ffiec, gdpr and ccpa
PPTX
Jul 16 isaca london data protection, security and privacy risks - on premis...
PPTX
Safeguarding customer and financial data in analytics and machine learning
PDF
3 guiding priciples to improve data security
PDF
The good, the bad and the ugly of the target data breach
PPTX
Isaca atlanta - practical data security and privacy
PPTX
What i learned at gartner summit 2019
PPTX
Proven Practices to Protect Critical Data - DarkReading VTS Deck
PPTX
Getting More Value Out of Your Data
PPTX
ISSA Atlanta - Emerging application and data protection for multi cloud
PDF
Encrypt-Everything-eB.pdf
PPTX
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
PPTX
Emerging Data Privacy and Security for Cloud
PPT
Life After Compliance march 2010 v2
PPT
IBM Share Conference 2010, Boston, Ulf Mattsson
Thought leaders in big data ulf mattsson, cto of protegrity (part 3)
Data security to protect pci data flow ulf mattsson - insecure-mag-40
Thought leaders in big data ulf mattsson, cto of protegrity (part 5)
Isaca global journal - choosing the most appropriate data security solution ...
What I learned from RSAC 2019
A practical data privacy and security approach to ffiec, gdpr and ccpa
Jul 16 isaca london data protection, security and privacy risks - on premis...
Safeguarding customer and financial data in analytics and machine learning
3 guiding priciples to improve data security
The good, the bad and the ugly of the target data breach
Isaca atlanta - practical data security and privacy
What i learned at gartner summit 2019
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Getting More Value Out of Your Data
ISSA Atlanta - Emerging application and data protection for multi cloud
Encrypt-Everything-eB.pdf
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
Emerging Data Privacy and Security for Cloud
Life After Compliance march 2010 v2
IBM Share Conference 2010, Boston, Ulf Mattsson

More from Ulf Mattsson (20)

PPTX
Jun 29 new privacy technologies for unicode and international data standards ...
PPTX
Jun 15 privacy in the cloud at financial institutions at the object managemen...
PPTX
PPTX
May 6 evolving international privacy regulations and cross border data tran...
PPTX
Qubit conference-new-york-2021
PDF
Secure analytics and machine learning in cloud use cases
PPTX
Evolving international privacy regulations and cross border data transfer - g...
PDF
Data encryption and tokenization for international unicode
PPTX
The future of data security and blockchain
PPTX
New technologies for data protection
PPTX
GDPR and evolving international privacy regulations
PPTX
Privacy preserving computing and secure multi-party computation ISACA Atlanta
PPTX
Protecting data privacy in analytics and machine learning ISACA London UK
PPTX
New opportunities and business risks with evolving privacy regulations
PPTX
What is tokenization in blockchain - BCS London
PPTX
Protecting data privacy in analytics and machine learning - ISACA
PPTX
What is tokenization in blockchain?
PPTX
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
PPTX
Unlock the potential of data security 2020
PPTX
What is tokenization in blockchain?
Jun 29 new privacy technologies for unicode and international data standards ...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
May 6 evolving international privacy regulations and cross border data tran...
Qubit conference-new-york-2021
Secure analytics and machine learning in cloud use cases
Evolving international privacy regulations and cross border data transfer - g...
Data encryption and tokenization for international unicode
The future of data security and blockchain
New technologies for data protection
GDPR and evolving international privacy regulations
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Protecting data privacy in analytics and machine learning ISACA London UK
New opportunities and business risks with evolving privacy regulations
What is tokenization in blockchain - BCS London
Protecting data privacy in analytics and machine learning - ISACA
What is tokenization in blockchain?
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Unlock the potential of data security 2020
What is tokenization in blockchain?

Recently uploaded (20)

PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Cloud computing and distributed systems.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Electronic commerce courselecture one. Pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Approach and Philosophy of On baking technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
cuic standard and advanced reporting.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
KodekX | Application Modernization Development
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Cloud computing and distributed systems.
“AI and Expert System Decision Support & Business Intelligence Systems”
20250228 LYD VKU AI Blended-Learning.pptx
Unlocking AI with Model Context Protocol (MCP)
Agricultural_Statistics_at_a_Glance_2022_0.pdf
A Presentation on Artificial Intelligence
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Diabetes mellitus diagnosis method based random forest with bat algorithm
MYSQL Presentation for SQL database connectivity
Electronic commerce courselecture one. Pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Approach and Philosophy of On baking technology
Empathic Computing: Creating Shared Understanding
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KodekX | Application Modernization Development

Thought leaders in big data ulf mattsson, cto of protegrity (part 2)

  • 1. Thought Leaders in Big Data: Ulf Mattsson, CTO of Protegrity (Part 2) By Sramana Mitra, One Million by One Million Blog Sramana Mitra: Let’s take maybe three customers from three different segments. Let’s double-click down on understanding how they’re using your technology. Ulf Mattsson: I would like to mention that we do provide services in the architecture and data flow, which is very important to be able to find the right solution in. Let’s take a large retailer. This is a company that needed to be compliant to the payment card industry standard. It’s a $4 billion retail company operating in more than 30 States. They need to secure sensitive data in several large databases restricting access from administrators and power users. They needed to be compliant, track, and monitor all access to the sensitive data. That’s one example. Sramana Mitra: What kind of card are we talking about? Is this credit card data of their customers? What qualifies as sensitive data that needs this ultra-secure protection? Ulf Mattsson: There’s a standard defined by credit card brands – all the large card brands. That standard is called the Payment Card Industry Data Security Standard. Usually, it’s called PCIDSS. That standard defines different areas that you need to comply with such as access control, monitoring, and logging. The most challenging area is actually how to protect that data. That is the most difficult area for many companies. The standard defines four different ways that you can use to protect the data at cell level. The most effective way proves to be data tokenization. Data tokenization is a way to replace the sensitive data with fake data. Some people look at tokens as gaming chips or casino tokens so they are no longer sensitive. You can view tokenization as bubble wrap. Like bubble wrap, you can actually see some aspects of the data, so applications can actually work on the data but they do not see the full clear text. That’s part of the standard. The standard also allows you to use encryption. The standard is encouraging tokenization because it provides separation of duties and a higher level of usefulness. If you go to a PII use case, we have a retailer that is selling beauty products. It’s a $10 billion annual sales company with 3,600 stores in the United States. They have the challenge to protect their personal data. They also need to protect payment data. They were audited by Visa at that time and had to live up to a very high level of standard. That’s a typical situation where they are also looking to protect the PII data. It goes beyond credit card data. That’s a typical trend that you see in security today. This segment is part 2 in the series : Thought Leaders in Big Data: Ulf Mattsson, CTO of Protegrity