- Health Sector
- Financial Sector
- Data Governance
- Legal Requirements
Privacy Enhancing Tech offers a secure way to use data, promising to unlock new use-cases. However, uncertainty around the legal status of data processed by PETs might impact their adoption. This session will explore the legal implications of using Privacy Enhancing Technology and how they impact key privacy principles such as: transparency, anonymisation, data transfers, etc.
Odvar A. Bjerkholt
Odvar is a Principal Data Lawyer at BT Group, supporting their ambitious digital transformation. This includes advising on AI use-cases, deployment of new technology and operational data management issues. Odvar has over 8 years of hands-on experience advising on complex and multi-jurisdictional privacy projects and has a strong interest in Privacy Enhancing Technology and is actively exploring new ways BT can use data in a secure way by leveraging new tools.
Meriem Bacoup-ouarem
In the modern world of data privacy regulations, it is no longer possible to join data sets collected from different sources for different purposes without a lawful basis such as explicit consent. This session will introduce the latest innovations in data collaboration, clean rooms and enablement strategies that leverage privacy-enhancing technologies to fast-track analytics programs.
Maurice Coyle
There is brewing curiosity about how advertising manages to break through the third-party problem despite privacy concerns. Discuss the significant risks that signal loss poses for both advertisers and publishers if ads cannot be shown on platforms. Explore how technology takes precedence over privacy concerns when new parties join conversations about advertising partnerships, even within large marketplaces like Magnite. Is the key to breaking through the third-party problem lie in a high enough financial incentive?
This panel discusses the importance of having all stakeholders on board, from legal compliance to security teams, to ensure the effective implementation of privacy-enhancing technologies. There must be an acknowledgement that technology obstacles are common in two-sided marketplaces, where one party may be more familiar with the technology involved than others, causing pilot projects to fail at early stages. In order to solve these problems, there needs to be a focus shift from technology implementation to enabling value across different functions. Learn more about the organisational hurdles for implementing PETs and how cross-functional collaboration can overcome them.
Jovan Powar
Jovan is a security and privacy researcher with the Alan Turing Institute’s FAIR programme, working on foundational and practical concerns around the responsible adoption of AI and PETs in the financial services industry. In his PhD (pending examination) at the University of Cambridge he worked on risk management frameworks for data privacy and socio-technical system modelling for data governance projects.
Joerg Steinhaus
Elli Papageorgiou
Elli is a privacy and data protection professional working in the technology and payments industry, with a strong academic background. She has been advising on various privacy topics including biometric authentication, digital identity, data analytics and anonymization. Currently working with Mastercard's Data and Services business unit providing privacy by design advice on innovative data solutions. Admitted to practice law in New York and Athens, Greece.
Cédric Wahl
An ambitious forward-thinker, Cédric has been working in the convergence space of Applied Maths, Distributed Computing and Finance for the last 25 years. Backed by a strong academic background in Applied Mathematics and Computer Sciences, he has built and led the exploit of large, distributed risk management compute systems for some of the most complex financial derivatives.
Leveraging his knowledge of cryptography and investment banking privacy issues, Cédric then moved onto founding Société Générale’s Blockchain Lab in 2015.
Now Co-Founder and CTO of Secretarium; a deep-tech trustless network start-up, committed to reshaping data ownership for the Web by providing privacy-preserving smart contract apps secured by PETs, he is driven by the desire to create a future where everyone controls their own data and can demonstrate honesty.
Enrico Bagli
Bringing a decade of experience in data-driven innovation, I specialize in steering projects at the crossroads of data science and finance. My commitment is to amplify the impact of digital transformation while exploring cutting-edge technologies. My primary objective is to assist my company and its customers in navigating the era of the AI revolution successfully.
As data becomes more valuable, it's important for data scientists to leverage privacy-enhancing technologies (PETs) while ensuring the integrity of their results through appropriate legal and governance frameworks, including audits. However, it's also crucial for PETs to be made more accessible to non-technical users. To make PETs work effectively, all players, from legal compliance to security teams, must come together. It's also important to focus less on technology and more on enabling value across different functions.
While the digitisation of information continues to grow, organisations must be strategic about preserving privacy. Regulations, governance, and policies are all at the forefront of standardising data collaboration practices. While they may differ by nation, industry, or even project type or scope, data-driven enterprise customers understand the importance of these standards. To stay on top of developments in the PETs landscape, it's important for data-driven enterprises to understand how it has changed, how it will evolve, and what the top priorities should be.
Joanne Biggadike
Antonio Rocha
John Bowman
John Bowman, joined IBM’s Chief Privacy Office in October 2022 with a primary mission to deliver client success and drive growth in IBM, including advising on enhancements to support regulatory compliance, helping to create a deployment framework, and commercialisation of select CPO assets. Previously, John was a Senior Principal in Promontory, a Business Unit of IBM Consulting, having joined the company in 2014. John’s client engagements included managing privacy change programmes, preparing applications for Binding Corporate Rules, helping organisations prepare for regulatory audits, and advising on issues of risk, compliance, and public policy. Prior to joining Promontory, John worked at the UK Ministry of Justice where he was Head of EU and International Data Protection Policy. In this role, he served as the UK government’s lead negotiator on the EU General Data Protection Regulation (GDPR). John served on the International Association of Privacy Professionals (IAPP) European Advisory Board 2019-2020 and has over 25 articles published on privacy-related topics.
Iker Perez Lopez
Are you curious about how privacy-enhancing technologies (PETs) can help enterprise data professionals? Explore the fundamentals of PETs and how they can benefit your organisation. You will learn how PETs are not a magic bullet, and they need to be combined to improve your company's data strategies. We will also compare different PETs to show you how to find the right solutions for your needs. By analysing the differences between PETs like FHE vs TEE or MPC vs FL, you'll be able to determine the best option for your organisation. We'll also examine how different combinations of PETs enable you to plan what's needed to succeed in your organization. The outcome will be an enhancement of your expertise in order to take your data strategy to new heights.
Nigel Smart
Smart received a BSc degree in mathematics from the University of Reading in 1989 and his PhD degree from the University of Kent at Canterbury in 1992. Smart proceeded to work as a research fellow at the University of Kent, the Erasmus University Rotterdam, and Cardiff University until 1995. From 1995 to 1997, he was a lecturer at the University of Kent, and then spent three years at Hewlett-Packard from 1997 to 2000. From 2000 to 2017 he was at the University of Bristol, where he founded the cryptology research group. From 2018 he has been based in the COSIC group at the Katholieke Universiteit Leuven.
Smart held a Royal Society Wolfson Merit Award (2008-2013), and two ERC Advanced Grant (2011-2016 and 2016-2021). He was a director of the International Association for Cryptologic Research (2012-2014), and was elected Vice President for the period 2014-2016. In 2016 he was named as a Fellow of the IACR.
Smart carries out research on a wide variety of topics in cryptography. Smart is known for his work in elliptic curve cryptography. He has also worked on pairing-based cryptography contributing a number of algorithms such as the SK-KEM and the Ate-pairing. His work with Gentry and Halevi on performing the first large calculation using Fully Homomorphic Encryption won the IBM Pat Goldberg Best Paper Award for 2012. In the last decade he has worked on making secure multiparty computation practical.
In addition to his three years at HP Laboratories, Smart was a founder of the startup Identum, which was bought by Trend Micro in 2008. In 2013 he formed, with Yehuda Lindell, Unbound Security, a company deploying products based on multi-party computations. He is also the co-founder, along with Kenny Paterson, of the Real World Cryptography conference series.