Controlling Privacy and the Use of Data Assets - Volume 1
eBook - ePub

Controlling Privacy and the Use of Data Assets - Volume 1

Who Owns the New Oil?

Ulf Mattsson

Share book
  1. 312 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Controlling Privacy and the Use of Data Assets - Volume 1

Who Owns the New Oil?

Ulf Mattsson

Book details
Book preview
Table of contents
Citations

About This Book

" Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability."

  • Jim Ambrosini, CISSP, CRISC, Cybersecurity Consultant and Virtual CISO


" Ulf Mattsson lays out not just the rationale for accountable data governance, he provides clear strategies and tactics that every business leader should know and put into practice. As individuals, citizens and employees, we should all take heart that following his sound thinking can provide us all with a better future."

  • Richard Purcell, CEO Corporate Privacy Groupand former Microsoft Chief Privacy Officer


Many security experts excel at working with traditional technologies but fall apart in utilizing newer data privacy techniques to balance compliance requirements and the business utility of data. This book will help readers grow out of a siloed mentality and into an enterprise risk management approach to regulatory compliance and technical roles, including technical data privacy and security issues.

The book uses practical lessons learned in applying real-life concepts and tools to help security leaders and their teams craft and implement strategies. These projects deal with a variety of use cases and data types. A common goal is to find the right balance between compliance, privacy requirements, and the business utility of data.

This book reviews how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. It positions techniques like pseudonymization, anonymization, tokenization, homomorphic encryption, dynamic masking, and more. Topics include

  • Trends and Evolution


  • Best Practices, Roadmap, and Vision


  • Zero Trust Architecture


  • Applications, Privacy by Design, and APIs


  • Machine Learning and Analytics


  • Secure Multiparty Computing


  • Blockchain and Data Lineage


  • Hybrid Cloud, CASB, and SASE


  • HSM, TPM, and Trusted Execution Environments


  • Internet of Things


  • Quantum Computing


  • And much more!


Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on β€œCancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Controlling Privacy and the Use of Data Assets - Volume 1 an online PDF/ePUB?
Yes, you can access Controlling Privacy and the Use of Data Assets - Volume 1 by Ulf Mattsson in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.

Information

Publisher
CRC Press
Year
2022
ISBN
9781000599985
Edition
1

Index

A

  • ABAC, 54, 121–126, 132
  • Access, 6, 9, 20, 25, 32, 41–42, 45–46, 53–54, 58–60, 63–67, 69, 89, 94–95, 101, 103, 106, 108, 111–112, 117–134, 137, 139, 148, 156, 158, 183, 188, 190–191, 195, 197, 200–202, 204–205, 207–209, 212, 215, 217, 221, 229, 233–234, 240, 244–246, 255, 259–260, 267–269, 276, 278, 292–293, 295–299, 301–302, 304
  • Access Control, 54, 58–60, 64, 108, 117, 119–121, 123, 125–126, 128, 132–134, 139, 148, 195, 233, 268, 276, 292–293, 295
  • Access control models, 117, 120, 125
  • Accountable, 7, 59, 244
  • Actuarial, 295
  • Addition, 28, 77–78, 80–82, 84–85, 103, 112, 122, 159, 239, 301, 303
  • Advanced Encryption, 76, 90–92, 218, 295
  • Advanced Persistent, 189, 295
  • Advanced Threat, 295
  • AES, 28, 65, 75–77, 79–80, 85, 90–92, 94, 218, 224, 226–228, 295
  • Agile, 140–141
  • AI, xxiv, xxvi, 7, 25–27, 29–30, 33, 43, 45, 48, 50, 60, 70, 84, 105–106, 114, 153–166, 168–170, 173, 185, 191, 218–223, 227, 237, 249, 280–281, 283–287, 289
  • Alert, 38, 225, 295
  • algorithms, 27–28, 76–78...

Table of contents