Venture Partner, Security Advisor Two Bear Capital, United States
This session will explore recent innovations that underlie secure, performant solutions answering the need to control data even when it is held, processed or transmitted by other parties. The techniques deployed are infrastructure-agnostic and compatible with cryptographically enforced role- and identity-based access controls, end-user privacy preservation, authorized data recovery, multiparty computation and collusion resistant operations. Complex constructs such as ephemeral blinding and personalized tokenization are now accessible through no-code, low-code and full-code integration models.
Learning Objectives:
Assess the risks associated with data traversing beyond the security service edge, as well as those associated with the corresponding parallels to granular internal access controls.
Describe the fundamentals of novel techniques enabling federated, distributed access control on externally held data.
Apply solutions across adoption models to materially reduce the likelihood of breaches and their adverse impacts.