Personal Information
Organization / Workplace
Greater New York City Area, ct United States
Occupation
Chief Security Strategist at Protegrity
Industry
Technology / Software / Internet
Website
About
Chief Security Strategist at Protegrity, previously Head of Innovation at TokenEx, Chief Technology Officer at Atlantic BT, and earlier CTO at Compliance Engineering. Ulf was the CTO and a founder of Protegrity Technology. He invented the Protegrity Vaultless Tokenization and created the initial architecture of Protegrity's security technology.
At Protegrity he serves as a catalyst for innovation with an active role in shaping the product roadmap and strategy. Ulf works in industry standards bodies, has an active role in forming strategic partnerships and alliances across the industry, and represents Protegrity at C-level meetings with customers and prospects.
Contact Details
Tags
compliance
tokenization
encryption
pci
gdpr security compliance eu regulations
security
ccpa
privacy
big data
cloud
isaca
pii
hipaa
pci dss
data security
phi
issa
information security
nist
tokenization vs encryption vs masking
gdpr
cloud computing
oracle
iso standard
ulf mattsson
homomorphic encryption
data protection
blockchain
database
machine learning
risk management
analytics
data
privacy laws
ai
database security
iot
eu gdpr compliance
verizon
risk
cloud gateways for regulatory
target
regulations
cyber security
securing fintech - threats
ffiec
ibm
privacy shield and schrems ii when gdpr apply to d
myths and realities of data security and complianc
data security to protect pci
discovery
what is tokenization in blockchain?
breach
data breach
devops
gartner
tokenization on blockchain is a steady trend of 20
databases
quantum computing
masking
gdpr and ccpa
conference
dataops
eu
governance
diamonds and company stocks to real estate. thus
we took an asset
tokenized it and created its digital representatio
trust
some problems need to be solved before we can succ
and rsa security (dell). mr. mattsson is a also ad
no country has a solid regulation for cryptocurren
all to the new event programming. infosecurity
microsoft
gdpr roadmap how to measure cybersecurity prepared
what happens if a company that handles tokenizatio
what i learned from rsac 2019
casb
private or hybrid cloud
attacks
iso
bitcoin
ciso
web design and development
cyber attack
data discovery and cloud - cloud-based ml applicat
compliance fintech
europe
saas
practical risk management for the multi cloud
cobit
share
boston
zero trust
smpc
new york metro
hitech
cacs
teradata
65% of the worlds population will have its person
data flow
brighttalk
india
regtech
nyc
azure
aws
coronavirus
pandemic
cost effective
los angeles
ny metro
enterprise
atlanta
e2ee
computing
open data
iot - attacks and solutions
db2
iot - attacks and solutions aug 24.pptx
user experience
problems
2014
while only 7% said it isnt a top priority.
cso
54 % reported that gdpr readiness is the highest p
gdpr is top priority in us over half of us multina
mastercard
payment
gdpr security compliance
gdpr action plan - do you have a roadmap for eu gd
pc dss
concerns issues
mobile
ansi x9
practical advice
applications
dss
new york
emerging application and data protection for cloud
estonia
nca
tokenex
jericho forum
national capital
software development
development
architecture
next generation data protection and security for o
washington
cryptocurrency
dc
dallas
texas
iama infragard atlanta - ulf mattsson - cloud secu
regulatory
protegrity
gateway
government
host
future
isaca new delhi india - privacy and big data
new delhi
delhi
isaca journal - bridging the gap between access a
isaca global journal - choosing the most appropri
nyoug
we urgently need a data-centric strategy to protec
mobile and on-premises. the rapid rise of cloud d
recent breaches demonstrate the urgent need to sec
breach investigation
companies have good reason to be concerned. the bi
or used in third party saas applications
storage and applications has led to unease among a
value of data
usa
investigations
fisma
and discuss how we should re-think our security ap
ulf mattsson will highlight current trends in the
security key to digital business success
ulf mattsson - where data security and value of da
protect
retail
merchant
data-centric
data for eu citiz
hadoop
bigdata
integrate security into devops - secdevops
secdevops
cyber risk management in 2017 - challenges & recom
malware
banking
data value
sensitive data
cross-border
tokenization and encryption with more than 45 pate
cloud security
inventor in the areas of mobile payment
challenges
off-shoring
outsourcing
best practices
out
breaches
monetization
privacy legislation
cyber threat
blind spots
us
isaca presentation on how innovation can bridge th
crime
api
privacy preserving computing and secure multi part
jul 16 isaca london - data protection
security and privacy risks - on premise and cloud
i uploaded the slide deck from my jul 25 webinar a
jul 29 isaca atlanta - practical data security and
google
amazon
aug 25 isaca houston how to de-classify data and
healthcare
brighttalk webinar - how to de-classify data and r
g
balance
protecting data privacy in analytics and machine l
explore challenges of managing and protecting data
and compliance
agenda blockchain what is blockchain? blockchain t
differential privacy
nov 4 what is tokenization in blockchain - ulf mat
gdr
mlm
in the shadow of the global pandemic and the assoc
what i learned at the infosecurity isaca north ame
a practical data privacy and security approach to
the emerging pci dss and nist standards jan 20 202
ponemon
how to add security in dataops and devops jan 18 2
waterfall is based on the concept of sequential so
how to go from waterfall app dev to secure agile d
what i learned at rsac 2020
how to protect privacy sensitive data that is coll
iapp
anonos
protivity
bigid
secupi
new regulations and the evolving cybersecurity tec
issa atlanta - emerging application and data prote
multicloud
salesforce
key management
hsm
google adwords
evolving regulations are changing the way we think
organizations are focused on cost optimization
but they do not integrate
do not share common policies
and we will discuss use cases in financial service
privacy preserving computing and secure multi-part
ml
health
convergence of data privacy principles
standards and regulations general data protectio
zta
data encryption and tokenization for international
utf-8
utf-16
japanese
evolving international privacy regulations and cro
cpra
qubit-conference-new-york-2021
may 6 - evolving international privacy regulations
screms
security\
book
jun 15 privacy in the cloud at financial instituti
jun 29 new privacy technologies for unicode and in
which often leads to impulsive decisions to deprio
the us consumer financial protection bureau (cfpb)
and all 50 u.s. states and territories sued over t
up from 10% today
according to gartner. there is a convergence of da
standards and regulations on a common set of funda
but so too are the business and financial risks as
the new pci dss version 4 and new international da
use cases and how to control sensitive personal da
(by zoom)
digital transformation and the opportunities to us
but so too are the business and financial risks in
and we will discuss how business prioritization ca
regulatory compliance
and commercial business opportunity. several priva
but none universally cover all use cases. we will
data residency and privacy issues. we will discuss
anonymization
masking and privacy preservation in analytics and
such as the cloud
and information sharing. data is spreading across
privacy and identity access management products ar
unicode
machine learning platforms are one of the fastest
an approach and set of technologies that use artif
is directly related to pattern recognition and com
deep learning
and cloud related? can machine learning algorithms
and to find or develop the best therapy for that i
with sensitive data residing everywhere
organizations becoming more mobile
and the breach epidemic growing
the need for advanced identity and data protection
tokenization and encryption - new data protection
and in public and private clouds - the llatest dev
how should we prepare for this new brave world whe
organizations and investors. cloud transformation
cloud will increase by 157% and on-premises tradi
according to 452 research
2018. we will cover how many security solutions w
including: - waf web application firewalls - sie
emerging application and data protection for multi
store
process
and disclose data in public cloud. businesses have
data protection on-premises
and in public and private clouds - ulf mattsson ma
rsa
homomorphric
with sensitive data residing everywhere and the br
the need for application and data protection solut
innovation
mr. mattsson is currently the head of innovation a
a cloud-based data security company
was previously chief technology officer at atlanti
and earlier chief technology officer at compliance
he worked 20 years at ibm's research and developme
in the areas of application and database security.
cloud application security brokers
web application firewalls
managed security service
security operation center
and cybersecurity consulting. mr. mattsson is an
hewlett-packard
machine learning and quantum computing technologie
451
blockchain and tokenization in blockchain. in this
but many are still trying to figure out how to com
blockchain and tokenization in blockchain.
emerging pci dss v4 data security and privacy for
we will discuss the good
the bad and the ugly of role based access control.
dac and rbac. we will present the "next generatio
context-aware and risk-intelligent access control.
data discovery
policy-based access control (pbac)
claims-based access control (cbac) and key standar
including xacml and alfa.
rbac
dac
abac
infosecurity isaca north america expo and conferen
reed exhibitions immersive event series staged wo
expert workshop series
certification preparation sessions
and latest developments related to the csx trainin
which entered the north american conference arena
will build on its strengths in industry exposition
media
immersive learning and leadership networks.
which are foundational
but are missing the focus on data. the good news i
where they get it from
which systems process it
where it goes internally and externally
etc. in other words
the new norms of data privacy require proactive da
which enables organizations to extract real busine
improve the customer experience
streamline internal processes
and better understand their customers. the new ver
and privacy-preserving computation.
this session will take a practical approach to it
verizon data breach investigations report (dbir) a
a common question is how to choose data protection
such a simple question is rather difficult to answ
which is quite reasonable but sadly unhelpful. m
when being transmitted
or when being processed and the operational need f
in public or private cloud.
what i learned at issa international summit 2019 n
advanced pii / pi data discovery and data protecti
dev
See more
Users being followed by Ulf Mattsson