Loading…
Attending this event?
THE BEST IBM i & POWER SYSTEMS EDUCATION.When you come to POWERUp, you’ll be able to customize your experience. Choose from 300 sessions, covering over 20 areas of IT, when you plan your schedule. Visit the largest Expo of its kind and meet the experts behind the solutions. Attend social events to meet renowned speakers and peers alike. This conference is structured to give you the pure education and professional connections needed to best enhance your career. Are you ready to POWERUp?

Exhibitor Hall: https://www.expocad.com/host/fx/common/s24/exfx.html

Exhibitor Hall Map Here 
Wednesday, May 22 • 10:30am - 11:30am
216: Test Data Management : Are You Compliant?

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

When it comes to testing, training, or even disaster testing, often real data is used. This may be the entire set of tables of production or a subset, but it's real data. Real private personal information. With the European GDPR or the CCPA out of California, protecting this data is now more than keeping a hacker away. It's about protecting the bottom line and away from fines. This is where you need to use anonymization to mask your data so that it's usable and masked.

Learning Objectives:
1) Are you compliant with PII policies?
2) Is your data exposed in non-production environments.
3) Do you know the difference in anonymization and pseudoanonymization.
4) Data Extraction
5) Using temporary environments

Speakers
avatar for Alan Ashley

Alan Ashley

Presales Consultant for DevOps for IBMi, Arcad Software
When it comes to describing someone, even yourself, it can be difficult. This time it's easy. I grew up on the AS400, through iSeries, and into the IBM i world. Started on a model B50 (I know it was a B model) where the disk drive needed two persons to replace and now in the DevSecOps... Read More →


Wednesday May 22, 2024 10:30am - 11:30am CDT
Meeting Room 201A 1508 Houston St, Fort Worth, TX 76102
  Security
  • Session Level Intermediate
  • Audience If you are an application owner, security admin, or an auditor, then understanding the possible expose in non-production environments is key. This session will cover those questions and answers to protect those environments.