In my presentation to SRMVCAS college students and IT professionals, I covered the critical topic of protecting confidential information by discussing the three states of data: data at rest, data in transit, and data in use. I emphasized the specific protection measures needed for each state and introduced essential data de-identification techniques like pseudonymization, anonymization, and generalization.
This presentation provided valuable insights into data protection, highlighting best practices that participants can apply in their respective fields. It served to bridge academic knowledge with practical implementation, equipping attendees with the understanding necessary to safeguard sensitive information in an increasingly digital world.