Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Leadership and ManagementSecurity & Business Resilience

Gaining business advantage through privacy engineering

By Katharina Koerner
cyber security
March 29, 2022

Going digital is right at the top of the organizational agenda, providing the foundation to increase efficiency, reduce cost and drive an enriched user experience through real-time fulfilment. Digital technologies can provide organizations with a platform to understand more about their users than ever before, unlocking the value of personal data.

However, organizations face complex challenges while grappling with the digital journey. How do business leaders find the right balance between leveraging personal data for insight-based decision-making and maintaining privacy, security and ethics?

What strategic privacy decisions should security leaders while trying to maintain this balance? And importantly, how can organizations leverage technology to ensure consistent application in a cost-effective manner at scale?

Invest in privacy engineering skills

Technology continues to evolve, with processing speeds doubling every few years and innovative technologies emerging to meet ever-changing user expectations and demands. This fast-paced change is causing a seismic shift in privacy expectations of users and regulators. It is a constant challenge for organizations to ensure they are evolving their privacy by design practices to meet expectations.

What might have been an appropriate safeguard for the effective protection of personal data yesterday may be outdated tomorrow. When it comes to building privacy into business IT systems, data protection regulations such as the EU’s GDPR refer to state-of-the-art as the guiding light for appropriate technical design choices.

In general, state-of-the-art is reached when existing scientific knowledge and research is brought to market maturity, and when possible, references international standards. Often, state-of-the-art technology is expensive and complex to deploy across an organization’s digital IT landscapes.

Therefore, it’s imperative for organizations to acquire the right privacy engineering skills as a business imperative. To meet technology-based privacy needs in 2022, it will be essential for companies to invest in their workforce. To gain a competitive advantage, companies should provide support, resources and training for security professionals and privacy engineers to implement state-of-the-art privacy practices into business IT systems.

Leverage privacy-enhancing technologies

Privacy-enhancing technologies are moving up the maturity curve, among them differential privacy, federated learning, multiparty computation, homomorphic encryption and synthetic data. Their effectiveness within the realm of “trustworthy” or “ethical artificial intelligence (AI)” goes hand in hand with increased public funding supporting further development and standardization efforts. Still, a lot of work needs to be done to define clear use cases and provide off-the-shelf solutions for implementation. In addition, regulators are expected to opine on open legal questions, for example, via the upcoming review of the European Data Protection Board’s guidelines on anonymization techniques. Hopes are high that those cutting-edge techniques will help with questions around issues such as international data transfers and cross-border medical research.

Big Tech, including Apple, Google, Facebook and Microsoft, are spearheading the adoption of privacy-enhancing technologies. A prominent example of privacy-enhancing technologies is differential privacy. With its mathematical definition of privacy, it offers one of the strongest guarantees of privacy available. To get an intuitive understanding, imagine a poll where respondents flip a coin before answering. If the result is “heads,” a random answer (heads or tails) would be recorded instead of the true answer. Later, the introduced errors (noise) get removed from the dataset. Depending on how much noise is added, the balance between privacy and utility of the disclosed information is navigated. Eventually, statistical patterns of a dataset can be identified while maintaining “plausible deniability” about the information of the individuals who are included in the analysis.

Modern cryptography is groundbreaking as well. Going beyond protecting data in transit or at rest, homomorphic encryption and multi-party computation are about protecting data in use. Previously unimaginable, these technologies allow computation to be performed directly on encrypted data without previous decryption. Because of this, they can support joint analysis of data provided by multiple parties without revealing the parties’ individual data inputs. For example, this can be used in medical research. Two separate databases can be used to identify confounding factors for the survival of patients without the need to exchange patient data to perform the data analysis. Being creative when exploring how privacy enhancing technologies can unlock new business operations will be worth the time and effort.

Utilize privacy governance to tackle new challenges

Lastly, there will be new developments and laws in 2022 which will impact the technology engineering landscape. Innovative solutions for identity and access management, changes in the AdTech ecosystem, privacy/preserving machine learning trends and new AI regulations entail novel opportunities and challenges for privacy. On top of trendsetting AI regulations like the EU Artificial Intelligence Act, complex sectoral regulations for e-commerce, health technology or the cloud should be anticipated.

In addition, the complexity of these developments calls for close cross-disciplinary collaboration, streamlining internal standards and related processes. The key will be effective communication between different business functions and aligning data-value generation, responsible use of data in AI and privacy by-design in AI systems. Organizations will need to enable and leverage the expertise of security and privacy teams to establish the right balance of privacy and trust while maximizing data utility.

KEYWORDS: data collection data privacy digital transformation encryption enterprise cyber security user-based design

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Katharina koerner

Katharina Koerner leads IAPP’s Privacy Engineering Section, bringing together engineers, data scientists, UX designers and other technologists working to build privacy into products and services. Her research and engagement focuses on the intersection of privacy and technology as well as privacy standards aimed at helping privacy professionals bridge legal, technical, business and design needs.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • hands reach for data

    Data privacy: Human right and business advantage

    See More
  • Gaining Value Through IP Access Control Upgrades

    See More
  • Compression Advantage Is Business Advantage, Too

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing