Ulf Mattsson – Författare
Visar alla böcker från författaren Ulf Mattsson. Handla med fri frakt och snabb leverans.
8 produkter
8 produkter
Controlling Privacy and the Use of Data Assets - Volume 1
Who Owns the New Oil?
Inbunden, Engelska, 2022
875 kr
Skickas inom 10-15 vardagar
"Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability." Jim Ambrosini, CISSP, CRISC, Cybersecurity Consultant and Virtual CISO"Ulf Mattsson lays out not just the rationale for accountable data governance, he provides clear strategies and tactics that every business leader should know and put into practice. As individuals, citizens and employees, we should all take heart that following his sound thinking can provide us all with a better future." Richard Purcell, CEO Corporate Privacy Group and former Microsoft Chief Privacy OfficerMany security experts excel at working with traditional technologies but fall apart in utilizing newer data privacy techniques to balance compliance requirements and the business utility of data. This book will help readers grow out of a siloed mentality and into an enterprise risk management approach to regulatory compliance and technical roles, including technical data privacy and security issues. The book uses practical lessons learned in applying real-life concepts and tools to help security leaders and their teams craft and implement strategies. These projects deal with a variety of use cases and data types. A common goal is to find the right balance between compliance, privacy requirements, and the business utility of data.This book reviews how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. It positions techniques like pseudonymization, anonymization, tokenization, homomorphic encryption, dynamic masking, and more. Topics include Trends and Evolution Best Practices, Roadmap, and Vision Zero Trust Architecture Applications, Privacy by Design, and APIs Machine Learning and Analytics Secure Multiparty Computing Blockchain and Data Lineage Hybrid Cloud, CASB, and SASE HSM, TPM, and Trusted Execution Environments Internet of Things Quantum Computing And much more!
Controlling Privacy and the Use of Data Assets - Volume 1
Who Owns the New Oil?
Häftad, Engelska, 2022
595 kr
Skickas inom 10-15 vardagar
"Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability." Jim Ambrosini, CISSP, CRISC, Cybersecurity Consultant and Virtual CISO"Ulf Mattsson lays out not just the rationale for accountable data governance, he provides clear strategies and tactics that every business leader should know and put into practice. As individuals, citizens and employees, we should all take heart that following his sound thinking can provide us all with a better future." Richard Purcell, CEO Corporate Privacy Group and former Microsoft Chief Privacy OfficerMany security experts excel at working with traditional technologies but fall apart in utilizing newer data privacy techniques to balance compliance requirements and the business utility of data. This book will help readers grow out of a siloed mentality and into an enterprise risk management approach to regulatory compliance and technical roles, including technical data privacy and security issues. The book uses practical lessons learned in applying real-life concepts and tools to help security leaders and their teams craft and implement strategies. These projects deal with a variety of use cases and data types. A common goal is to find the right balance between compliance, privacy requirements, and the business utility of data.This book reviews how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. It positions techniques like pseudonymization, anonymization, tokenization, homomorphic encryption, dynamic masking, and more. Topics include Trends and Evolution Best Practices, Roadmap, and Vision Zero Trust Architecture Applications, Privacy by Design, and APIs Machine Learning and Analytics Secure Multiparty Computing Blockchain and Data Lineage Hybrid Cloud, CASB, and SASE HSM, TPM, and Trusted Execution Environments Internet of Things Quantum Computing And much more!
Controlling Privacy and the Use of Data Assets - Volume 2
What is the New World Currency – Data or Trust?
Inbunden, Engelska, 2023
931 kr
Skickas inom 10-15 vardagar
The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will position techniques like Data Integrity and Ledger and will provide practical lessons in Data Integrity, Trust, and data’s business utility.Based on a good understanding of new and old technologies, emerging trends, and a broad experience from many projects in this domain, this book will provide a unique context about the WHY (requirements and drivers), WHAT (what to do), and HOW (how to implement), as well as reviewing the current state and major forces representing challenges or driving change, what you should be trying to achieve and how you can do it, including discussions of different options. We will also discuss WHERE (in systems) and WHEN (roadmap). Unlike other general or academic texts, this book is being written to offer practical general advice, outline actionable strategies, and include templates for immediate use. It contains diagrams needed to describe the topics and Use Cases and presents current real-world issues and technological mitigation strategies. The inclusion of the risks to both owners and custodians provides a strong case for why people should care.This book reflects the perspective of a Chief Technology Officer (CTO) and Chief Security Strategist (CSS). The Author has worked in and with startups and some of the largest organizations in the world, and this book is intended for board members, senior decision-makers, and global government policy officials—CISOs, CSOs, CPOs, CTOs, auditors, consultants, investors, and other people interested in data privacy and security. The Author also embeds a business perspective, answering the question of why this an important topic for the board, audit committee, and senior management regarding achieving business objectives, strategies, and goals and applying the risk appetite and tolerance.The focus is on Technical Visionary Leaders, including CTO, Chief Data Officer, Chief Privacy Officer, EVP/SVP/VP of Technology, Analytics, Data Architect, Chief Information Officer, EVP/SVP/VP of I.T., Chief Information Security Officer (CISO), Chief Risk Officer, Chief Compliance Officer, Chief Security Officer (CSO), EVP/SVP/VP of Security, Risk Compliance, and Governance. It can also be interesting reading for privacy regulators, especially those in developed nations with specialist privacy oversight agencies (government departments) across their jurisdictions (e.g., federal and state levels).
Controlling Privacy and the Use of Data Assets - Volume 2
What is the New World Currency – Data or Trust?
Häftad, Engelska, 2023
637 kr
Skickas inom 10-15 vardagar
The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will position techniques like Data Integrity and Ledger and will provide practical lessons in Data Integrity, Trust, and data’s business utility.Based on a good understanding of new and old technologies, emerging trends, and a broad experience from many projects in this domain, this book will provide a unique context about the WHY (requirements and drivers), WHAT (what to do), and HOW (how to implement), as well as reviewing the current state and major forces representing challenges or driving change, what you should be trying to achieve and how you can do it, including discussions of different options. We will also discuss WHERE (in systems) and WHEN (roadmap). Unlike other general or academic texts, this book is being written to offer practical general advice, outline actionable strategies, and include templates for immediate use. It contains diagrams needed to describe the topics and Use Cases and presents current real-world issues and technological mitigation strategies. The inclusion of the risks to both owners and custodians provides a strong case for why people should care.This book reflects the perspective of a Chief Technology Officer (CTO) and Chief Security Strategist (CSS). The Author has worked in and with startups and some of the largest organizations in the world, and this book is intended for board members, senior decision-makers, and global government policy officials—CISOs, CSOs, CPOs, CTOs, auditors, consultants, investors, and other people interested in data privacy and security. The Author also embeds a business perspective, answering the question of why this an important topic for the board, audit committee, and senior management regarding achieving business objectives, strategies, and goals and applying the risk appetite and tolerance.The focus is on Technical Visionary Leaders, including CTO, Chief Data Officer, Chief Privacy Officer, EVP/SVP/VP of Technology, Analytics, Data Architect, Chief Information Officer, EVP/SVP/VP of I.T., Chief Information Security Officer (CISO), Chief Risk Officer, Chief Compliance Officer, Chief Security Officer (CSO), EVP/SVP/VP of Security, Risk Compliance, and Governance. It can also be interesting reading for privacy regulators, especially those in developed nations with specialist privacy oversight agencies (government departments) across their jurisdictions (e.g., federal and state levels).
2 120 kr
Skickas inom 10-15 vardagar
V1 - The book uses practical lessons learned in applying real-life concepts and tools to help security leaders and their teams craft and implement strategies. A common goal is to find the right balance between compliance, privacy requirements, and the business utility of data.V2 - The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. It will use practical lessons in Data Integrity, and Trust, and data's business utility. It is based on a good understanding and experience of new and old technologies, emerging trends, and a broad experience from many projects in this domain.
1 444 kr
Skickas inom 10-15 vardagar
V1 - The book uses practical lessons learned in applying real-life concepts and tools to help security leaders and their teams craft and implement strategies. A common goal is to find the right balance between compliance, privacy requirements, and the business utility of data.V2 - The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. It will use practical lessons in Data Integrity, and Trust, and data's business utility. It is based on a good understanding and experience of new and old technologies, emerging trends, and a broad experience from many projects in this domain.
1 444 kr
Skickas inom 10-15 vardagar
"Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability."Jim Ambrosini, CISSP, CRISC, Cybersecurity Consultant and Virtual CISO"Ulf Mattsson lays out not just the rationale for accountable data governance, he provides clear strategies and tactics that every business leader should know and put into practice. As individuals, citizens and employees, we should all take heart that following his sound thinking can provide us all with a better future."Richard Purcell, CEO Corporate Privacy Group and former Microsoft Chief Privacy OfficerMany security experts excel at working with traditional technologies but fall apart in utilizing newer data privacy techniques to balance compliance requirements and the business utility of data. This book will help readers grow out of a siloed mentality and into an enterprise risk management approach to regulatory compliance and technical roles, including technical data privacy and security issues.These books use practical lessons learned in applying real-life concepts and tools to help security leaders and their teams craft and implement strategies. These projects deal with a variety of use cases and data types. A common goal is to find the right balance between compliance, privacy requirements, and the business utility of data.These books review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. It positions techniques like pseudonymization, anonymization, tokenization, homomorphic encryption, dynamic masking, and more.
1 658 kr
Skickas inom 10-15 vardagar
1st EditionSafeguarding the FutureSecurity and Privacy by Design for AI, Metaverse, Blockchain, and BeyondBy Alan TangEmerging technologies like AI, blockchain, and brain–computer interfaces bring immense opportunities—but also critical privacy and security challenges.Safeguarding the Future provides a holistic framework for integrating security and privacy into these cutting-edge innovations. With real-world case studies and regulatory insights, this book is an essential resource for leaders navigating the evolving digital landscape.https://www.routledge.com/Safeguarding-the-Future-Security-and-Privacy-by-Design-for-AI-Metaverse-Blockchain-and-Beyond/Tang/p/book/97810324877001st EditionPrivacy in PracticeEstablish and Operationalize a Holistic Data Privacy ProgramBy Alan TangPrivacy is more than just compliance—it’s a fundamental right. This book provides a practical framework for integrating privacy into business strategies, bridging legal requirements with operational execution. A must-read for privacy professionals, executives, and organizations looking to strengthen their privacy governance and compliance programs.https://www.routledge.com/Privacy-in-Practice-Establish-and-Operationalize-a-Holistic-Data-Privacy/Tang/p/book/97810321254731st EditionNavigating the Cyber MazeInsights and Humor on the Digital FrontierBy Matthias MuhlertCybersecurity is a serious topic, but it doesn’t have to be dry. Navigating the Cyber Maze blends expert insights with humor, breaking down complex security concepts in an engaging and accessible way. Covering topics from smart device security to quantum computing, this book makes cybersecurity practical, insightful, and fun.https://www.routledge.com/Navigating-the-Cyber-Maze-Insights-and-Humor-on-the-Digital-Frontier/Muhlert/p/book/97810329125541st EditionControlling Privacy and the Use of Data Assets - Volume 1Who Owns the New Oil?By Ulf MattssonData is the new oil—but who controls it? This book explores practical data protection strategies, including pseudonymization, homomorphic encryption, and zero-trust architectures. Designed for security professionals, regulators, and business leaders, this book provides insights into balancing privacy, security, and business needs.https://www.routledge.com/Controlling-Privacy-and-the-Use-of-Data-Assets---Volume-1-Who-Owns-the/Mattsson/p/book/97810320391381st EditionControlling Privacy and the Use of Data Assets - Volume 2What is the New World Currency – Data or Trust?By Ulf MattssonBuilding on Volume 1, this book examines data integrity, accountability, and governance. It provides practical risk mitigation strategies for privacy leaders, auditors, and global policymakers, helping organizations align privacy regulations with business strategies.https://www.routledge.com/Controlling-Privacy-and-the-Use-of-Data-Assets---Volume-2-What-is-the-New/Mattsson/p/book/9781032185187