Security of IoT Data: Implementing Data-Centric Security and User Access Strategy

.

February 22, 2017 | 10:00 am–11:00 am
To get the full recording











    Why watch this?

    Learn how a data-centric security approach merges all security policies around the data, for full visibility and better control and how to deploy an IoT platform while minimizing data security and compliance risks.

    Why join the webinar:

    Large volumes of data are being collected by Internet of Things projects and related big data or new data initiatives. For scalability purposes, this data is often processed, stored, and accessed in hybrid data environments made of Hadoop, NoSQL systems, Spark, and even traditional RDBMS. Some data might be kept on-premises, some or all might be moved to the cloud.

    It’s still too easy for hackers to bypass perimeter defenses and steal valid user credentials that give them access to millions of records. Therefore, securing the data collected and controlling who has access to what–from development to production–can be a daunting task. It is also imperative to consider the impact on regulatory compliance as IoT projects can bring together data never aggregated before. Tackling this problem one data platform at a time will rapidly create chaos.

    This session will articulate how a data-centric security approach unifies all security policies around the data, for full visibility and better control. Pratik Verma from BlueTalon will provide a checklist to help you implement the best possible data security and user access control strategy. He will also describe how the BlueTalon security solution can be used in the context of the Predix platform to control and keep visibility over data access.

    You will learn:

    • Key considerations behind data security for next-gen and big data platforms
    • How to deploy an IoT platform while minimizing data security and compliance risks
    • Ways to centralize the creation of data security policies and enforce them locally on multiple data domains
    • How to implement a data-centric security approach as part of Predix

    Who should attend:

    Anyone responsible for securing data in IoT projects and/or big data environments or responsible for regulatory compliance on such project:

    • Senior leadership and heads of new data initiatives (big data, data lakes, IoT data)
    • Data, big data, or information architects
    • Security architects
    • Risk officers, information security or compliance officers

    Speaker bio:

    Pratik Verma is a scientist entrepreneur who founded BlueTalon to eliminate barriers to the use of data in order to accelerate innovation in data-intensive and privacy-intensive industries. Previously, he led an enterprise software company he co-founded to help corporate enterprises simplify data security at the organizational scale. Pratik holds a Ph.D. from Stanford University.

    To get the full recording