In the rush to reap the benefits from Big Data projects, organizations frequent forget the importance of securing and protecting their "Crown Jewels". From a security and privacy perspective, Big Data differs from traditional data and requires a different approach. At the same time, it shares many commonalities. Existing methodologies and preferred practices can easily be extended to support Big Data. This talk will describe how and why Big Data is different, the data security and privacy challenges, and a set of best practices and recommended technical controls that will help you to secure and protect your organization's Crown Jewels.
Cindy has over 30 years of IT experience including positions with Merrill Lynch, Informix, Sybase, FileTek, and IBM, where she has worked since 2001.
Sign in to add slides, notes or videos to this session