Save My Seat
Thursday, April 23 at 12:00 p.m. CDT
Thursday, 23 April at 10:00 a.m. BST
Thursday, 23 April at 10:00 a.m. SGT
Not all data protection techniques are created equal, and the right choice depends on your environment, compliance requirements, and risk tolerance. Let’s ensure the one you choose checks all your boxes.
In this webinar, Perforce Delphix experts Ilker Taskaya and Hims Pawar will cut through the complexity and help you evaluate which approach (or combination of approaches) fits your organization best.
We’ll cover:
- The key data protection approaches — including anonymization, data masking, synthetic data, tokenization, and redaction.
- Where each approach shines and where they may fall short.
- How to combine techniques to strengthen your defenses against data breaches, regulatory noncompliance, and privacy violations.
The right strategy will help you conquer your data privacy and protection challenges. Take advantage of all these methods have to offer.
Presenters
Ilker Taskaya
Ilker Taskaya is a Field CTO at Perforce Delphix, specializing in data security solutions for the financial services and healthcare industry for the last ten years. He holds several patents in this field. Before Perforce, he consulted in data warehousing for financial services, insurance, and healthcare clients. Ilker began his career 20 years ago as a database analyst in the financial services sector.
Hims Pawar
Hims is one of the original developers of the Delphix Masking product, bringing decades of deep technical expertise and a strong foundation in data security and privacy engineering. He combines hands-on engineering experience with strategic insight to design and deliver enterprise-grade data protection solutions, with particular strength in data privacy by-design architectures.
In recent years, he has focused on cloud, security, and large-scale data transformation initiatives, helping organizations modernize their data platforms while ensuring compliance and safeguarding sensitive information. His work includes designing secure data architectures and enabling AI-ready data pipelines that allow enterprises to unlock the full value of their data securely and responsibly.