Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Leadership and ManagementSecurity & Business Resilience

Gaining business advantage through privacy engineering

By Katharina Koerner
cyber security
March 29, 2022

Going digital is right at the top of the organizational agenda, providing the foundation to increase efficiency, reduce cost and drive an enriched user experience through real-time fulfilment. Digital technologies can provide organizations with a platform to understand more about their users than ever before, unlocking the value of personal data.

However, organizations face complex challenges while grappling with the digital journey. How do business leaders find the right balance between leveraging personal data for insight-based decision-making and maintaining privacy, security and ethics?

What strategic privacy decisions should security leaders while trying to maintain this balance? And importantly, how can organizations leverage technology to ensure consistent application in a cost-effective manner at scale?

Invest in privacy engineering skills

Technology continues to evolve, with processing speeds doubling every few years and innovative technologies emerging to meet ever-changing user expectations and demands. This fast-paced change is causing a seismic shift in privacy expectations of users and regulators. It is a constant challenge for organizations to ensure they are evolving their privacy by design practices to meet expectations.

What might have been an appropriate safeguard for the effective protection of personal data yesterday may be outdated tomorrow. When it comes to building privacy into business IT systems, data protection regulations such as the EU’s GDPR refer to state-of-the-art as the guiding light for appropriate technical design choices.

In general, state-of-the-art is reached when existing scientific knowledge and research is brought to market maturity, and when possible, references international standards. Often, state-of-the-art technology is expensive and complex to deploy across an organization’s digital IT landscapes.

Therefore, it’s imperative for organizations to acquire the right privacy engineering skills as a business imperative. To meet technology-based privacy needs in 2022, it will be essential for companies to invest in their workforce. To gain a competitive advantage, companies should provide support, resources and training for security professionals and privacy engineers to implement state-of-the-art privacy practices into business IT systems.

Leverage privacy-enhancing technologies

Privacy-enhancing technologies are moving up the maturity curve, among them differential privacy, federated learning, multiparty computation, homomorphic encryption and synthetic data. Their effectiveness within the realm of “trustworthy” or “ethical artificial intelligence (AI)” goes hand in hand with increased public funding supporting further development and standardization efforts. Still, a lot of work needs to be done to define clear use cases and provide off-the-shelf solutions for implementation. In addition, regulators are expected to opine on open legal questions, for example, via the upcoming review of the European Data Protection Board’s guidelines on anonymization techniques. Hopes are high that those cutting-edge techniques will help with questions around issues such as international data transfers and cross-border medical research.

Big Tech, including Apple, Google, Facebook and Microsoft, are spearheading the adoption of privacy-enhancing technologies. A prominent example of privacy-enhancing technologies is differential privacy. With its mathematical definition of privacy, it offers one of the strongest guarantees of privacy available. To get an intuitive understanding, imagine a poll where respondents flip a coin before answering. If the result is “heads,” a random answer (heads or tails) would be recorded instead of the true answer. Later, the introduced errors (noise) get removed from the dataset. Depending on how much noise is added, the balance between privacy and utility of the disclosed information is navigated. Eventually, statistical patterns of a dataset can be identified while maintaining “plausible deniability” about the information of the individuals who are included in the analysis.

Modern cryptography is groundbreaking as well. Going beyond protecting data in transit or at rest, homomorphic encryption and multi-party computation are about protecting data in use. Previously unimaginable, these technologies allow computation to be performed directly on encrypted data without previous decryption. Because of this, they can support joint analysis of data provided by multiple parties without revealing the parties’ individual data inputs. For example, this can be used in medical research. Two separate databases can be used to identify confounding factors for the survival of patients without the need to exchange patient data to perform the data analysis. Being creative when exploring how privacy enhancing technologies can unlock new business operations will be worth the time and effort.

Utilize privacy governance to tackle new challenges

Lastly, there will be new developments and laws in 2022 which will impact the technology engineering landscape. Innovative solutions for identity and access management, changes in the AdTech ecosystem, privacy/preserving machine learning trends and new AI regulations entail novel opportunities and challenges for privacy. On top of trendsetting AI regulations like the EU Artificial Intelligence Act, complex sectoral regulations for e-commerce, health technology or the cloud should be anticipated.

In addition, the complexity of these developments calls for close cross-disciplinary collaboration, streamlining internal standards and related processes. The key will be effective communication between different business functions and aligning data-value generation, responsible use of data in AI and privacy by-design in AI systems. Organizations will need to enable and leverage the expertise of security and privacy teams to establish the right balance of privacy and trust while maximizing data utility.

KEYWORDS: data collection data privacy digital transformation encryption enterprise cyber security user-based design

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Katharina koerner

Katharina Koerner leads IAPP’s Privacy Engineering Section, bringing together engineers, data scientists, UX designers and other technologists working to build privacy into products and services. Her research and engagement focuses on the intersection of privacy and technology as well as privacy standards aimed at helping privacy professionals bridge legal, technical, business and design needs.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • hands reach for data

    Data privacy: Human right and business advantage

    See More
  • IP Feature

    Gaining Value Through IP Access Control Upgrades

    See More
  • Compression Advantage Is Business Advantage, Too

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!