Securing Enterprise Data with Hadoop : What Are Your Options?

Home » Securing Enterprise Data with Hadoop : What Are Your Options?

Securing Enterprise Data with Hadoop : What Are Your Options?

Hosted by Dj D.

Details

A key driver to getting Hadoop into production is to enable rapid time-to-insight for your company. Unfortunately, the realization that sensitive, regulated data— payments transactions, customer personally identifiable information (PII), and more—will be flowing unprotected into the Hadoop “data lake”, can present a big hurdle to implementation. Join us to understand architectural options for securing Hadoop data, illustrated by real-world use cases.

Agenda

• 6:00 – 6:30
– Registration/Dinner and Socializing

• 6:30 – 6:35
– Opening remarks, and housekeeping

• 6:35 – 7:35
– Securing Hadoop Data by Terence Spies
Support/Q&A – Luther Martin

Get the theory–learn from Terence Spies (Voltage CTO) how data-centric encryption and tokenization technologies enable successful Hadoop adoption, neutralize data breaches and answer privacy and regulatory concerns. Get clear on related standards. And understand how data-centric security fits with the latest authentication, authorization and audit controls in Hadoop.

• 7:35 – 7:45
– Bio Break

• 7:45 – 8:45 PM
– Use Cases for Data-centric Security in Hadoop by John Weald
Support/Q&A – Luther Martin

How it works–find out how Hadoop deployments are rolled out with data-centric protection in place. In this customer case-driven talk John Weald (Voltage VP, Engineering) presents technical and business specifics around 4 – 5 recent Hadoop deployments in pharma, healthcare insurance, telecommunications, and retail. Includes what you need to know, how to get started, what the deployments look like, and options for integration with Hive, Sqoop, MapReduce and other Hadoop specific interfaces, in these multi-platform Enterprise environments.

• 8:45 – 9:00
Networking & Q&A

Terence Spies
Terence Spies is Chief Technology Officer at Voltage Security (http://www.voltage.com/), and is a leading expert in encryption, tokenization and other data security approaches. Terence oversees the expansion of Voltage technology into new application areas such as Hadoop, cloud, payments and others where application data security is essential. Terence has over 19 years of security and systems software development experience, working with leading companies such as Microsoft, Asta Networks and others. At Voltage, Terence has led the development of Voltage Format Preserving Encryption (FPE), Voltage Stateless Secure Tokenization (SST) and Voltage Page-Integrated Encryption (PIE). Terence is active within the standards community and currently serves as chair of X9F1, the Cryptographic Tools group of X9 whose charter is to draft cryptographic algorithm standards for use in the financial industry. Terence is a frequent speaker at technology conferences and events. For instance, Terence delivered a talk entitled, “Taming Tokenization: The How’s, Why’s and Future of Data-level Security (http://www.infosec.co.uk/en/Sessions/4621/Taming-Tokenization-The-hows-whys-and-future-of-data-level-security)” at InfoSec Europe 2014 this past April.

John Weald

John Weald is the Vice President of Engineering. He brings to Voltage over 30 years of software engineering experience, the last 27 years in Silicon Valley. Since joining Voltage in 2006 John has overseen the product development of all product lines using agile Scrum to enable rapid product innovation providing unique business value to Voltage’s customers. Currently John manages all aspects of product development and Voltage SecureMail Cloud operations.

Luther Martin

Luther Martin is the Chief Security Architect of Voltage Security, Inc., and has worked in the information security industry for 26 years. The first 11 of these were doing what might be called “white hat hacking” for government and commercial clients; the balance have involved developing commercial information security products. He has seen hacking evolve from the recreational activity of a few dedicated hobbyists to the globe-spanning cybercrime business that we see today.

By | 2019-05-30T11:07:17+00:00 October 2nd, 2014|Events, Meetups|
CONTACT US