| Page 705 | Kisaco Research

As data becomes more valuable, it's important for data scientists to leverage privacy-enhancing technologies (PETs) while ensuring the integrity of their results through appropriate legal and governance frameworks, including audits. However, it's also crucial for PETs to be made more accessible to non-technical users. To make PETs work effectively, all players, from legal compliance to security teams, must come together. It's also important to focus less on technology and more on enabling value across different functions.

While the digitisation of information continues to grow, organisations must be strategic about preserving privacy. Regulations, governance, and policies are all at the forefront of standardising data collaboration practices. While they may differ by nation, industry, or even project type or scope, data-driven enterprise customers understand the importance of these standards. To stay on top of developments in the PETs landscape, it's important for data-driven enterprises to understand how it has changed, how it will evolve, and what the top priorities should be.

Moderator

Author:

Joanne Biggadike

Deputy Head of Data UK
DUAL Group

Joanne Biggadike

Deputy Head of Data UK
DUAL Group

Author:

Antonio Rocha

Data Protection Expert
Council of Europe

Antonio Rocha

Data Protection Expert
Council of Europe

Author:

John Bowman

Chief Privacy Office - AI Ethics Market Strategy Lead
IBM

John Bowman, joined IBM’s Chief Privacy Office in October 2022 with a primary mission to deliver client success and drive growth in IBM, including advising on enhancements to support regulatory compliance, helping to create a deployment framework, and commercialisation of select CPO assets.  Previously, John was a Senior Principal in Promontory, a Business Unit of IBM Consulting, having joined the company in 2014. John’s client engagements included managing privacy change programmes, preparing applications for Binding Corporate Rules, helping organisations prepare for regulatory audits, and advising on issues of risk, compliance, and public policy. Prior to joining Promontory, John worked at the UK Ministry of Justice where he was Head of EU and International Data Protection Policy. In this role, he served as the UK government’s lead negotiator on the EU General Data Protection Regulation (GDPR). John served on the International Association of Privacy Professionals (IAPP) European Advisory Board 2019-2020 and has over 25 articles published on privacy-related topics.

John Bowman

Chief Privacy Office - AI Ethics Market Strategy Lead
IBM

John Bowman, joined IBM’s Chief Privacy Office in October 2022 with a primary mission to deliver client success and drive growth in IBM, including advising on enhancements to support regulatory compliance, helping to create a deployment framework, and commercialisation of select CPO assets.  Previously, John was a Senior Principal in Promontory, a Business Unit of IBM Consulting, having joined the company in 2014. John’s client engagements included managing privacy change programmes, preparing applications for Binding Corporate Rules, helping organisations prepare for regulatory audits, and advising on issues of risk, compliance, and public policy. Prior to joining Promontory, John worked at the UK Ministry of Justice where he was Head of EU and International Data Protection Policy. In this role, he served as the UK government’s lead negotiator on the EU General Data Protection Regulation (GDPR). John served on the International Association of Privacy Professionals (IAPP) European Advisory Board 2019-2020 and has over 25 articles published on privacy-related topics.

Author:

Iker Perez Lopez

Principal Research Scientist
Featurespace

Iker Perez Lopez

Principal Research Scientist
Featurespace

Are you curious about how privacy-enhancing technologies (PETs) can help enterprise data professionals? Explore the fundamentals of PETs and how they can benefit your organisation. You will learn how PETs are not a magic bullet, and they need to be combined to improve your company's data strategies. We will also compare different PETs to show you how to find the right solutions for your needs. By analysing the differences between PETs like FHE vs TEE or MPC vs FL, you'll be able to determine the best option for your organisation. We'll also examine how different combinations of PETs enable you to plan what's needed to succeed in your organization. The outcome will be an enhancement of your expertise in order to take your data strategy to new heights.

Author:

Nigel Smart

Professor
KU Leuven

Smart received a BSc degree in mathematics from the University of Reading in 1989 and his PhD degree from the University of Kent at Canterbury in 1992. Smart proceeded to work as a research fellow at the University of Kent, the Erasmus University Rotterdam, and Cardiff University until 1995. From 1995 to 1997, he was a lecturer at the University of Kent, and then spent three years at Hewlett-Packard from 1997 to 2000. From 2000 to 2017 he was at the University of Bristol, where he founded the cryptology research group. From 2018 he has been based in the COSIC group at the Katholieke Universiteit Leuven.

Smart held a Royal Society Wolfson Merit Award (2008-2013), and two ERC Advanced Grant (2011-2016 and 2016-2021). He was a director of the International Association for Cryptologic Research (2012-2014), and was elected Vice President for the period 2014-2016. In 2016 he was named as a Fellow of the IACR.

Smart carries out research on a wide variety of topics in cryptography. Smart is known for his work in elliptic curve cryptography. He has also worked on pairing-based cryptography contributing a number of algorithms such as the SK-KEM and the Ate-pairing. His work with Gentry and Halevi on performing the first large calculation using Fully Homomorphic Encryption won the IBM Pat Goldberg Best Paper Award for 2012. In the last decade he has worked on making secure multiparty computation practical.

In addition to his three years at HP Laboratories, Smart was a founder of the startup Identum, which was bought by Trend Micro in 2008. In 2013 he formed, with Yehuda Lindell, Unbound Security, a company deploying products based on multi-party computations. He is also the co-founder, along with Kenny Paterson, of the Real World Cryptography conference series.

Nigel Smart

Professor
KU Leuven

Smart received a BSc degree in mathematics from the University of Reading in 1989 and his PhD degree from the University of Kent at Canterbury in 1992. Smart proceeded to work as a research fellow at the University of Kent, the Erasmus University Rotterdam, and Cardiff University until 1995. From 1995 to 1997, he was a lecturer at the University of Kent, and then spent three years at Hewlett-Packard from 1997 to 2000. From 2000 to 2017 he was at the University of Bristol, where he founded the cryptology research group. From 2018 he has been based in the COSIC group at the Katholieke Universiteit Leuven.

Smart held a Royal Society Wolfson Merit Award (2008-2013), and two ERC Advanced Grant (2011-2016 and 2016-2021). He was a director of the International Association for Cryptologic Research (2012-2014), and was elected Vice President for the period 2014-2016. In 2016 he was named as a Fellow of the IACR.

Smart carries out research on a wide variety of topics in cryptography. Smart is known for his work in elliptic curve cryptography. He has also worked on pairing-based cryptography contributing a number of algorithms such as the SK-KEM and the Ate-pairing. His work with Gentry and Halevi on performing the first large calculation using Fully Homomorphic Encryption won the IBM Pat Goldberg Best Paper Award for 2012. In the last decade he has worked on making secure multiparty computation practical.

In addition to his three years at HP Laboratories, Smart was a founder of the startup Identum, which was bought by Trend Micro in 2008. In 2013 he formed, with Yehuda Lindell, Unbound Security, a company deploying products based on multi-party computations. He is also the co-founder, along with Kenny Paterson, of the Real World Cryptography conference series.

 

Annelie Wunsche

Partner
Maiwald

Annelie Wunsche

Partner
Maiwald

Annelie Wunsche

Partner
Maiwald
 

Eva Ehlich

Partner
Maiwald

Eva Ehlich

Partner
Maiwald

Eva Ehlich

Partner
Maiwald
 

Charles Tuffreau

Counsel
Allen & Overy

Charles Tuffreau

Counsel
Allen & Overy

Charles Tuffreau

Counsel
Allen & Overy
 

Marjan Noor

Partner
Allen & Overy

Marjan Noor

Partner
Allen & Overy

Marjan Noor

Partner
Allen & Overy
Nikesh Kumar Pahuja's Full Spotlight