Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Leadership and ManagementSecurity & Business Resilience

Gaining business advantage through privacy engineering

By Katharina Koerner
cyber security
March 29, 2022

Going digital is right at the top of the organizational agenda, providing the foundation to increase efficiency, reduce cost and drive an enriched user experience through real-time fulfilment. Digital technologies can provide organizations with a platform to understand more about their users than ever before, unlocking the value of personal data.

However, organizations face complex challenges while grappling with the digital journey. How do business leaders find the right balance between leveraging personal data for insight-based decision-making and maintaining privacy, security and ethics?

What strategic privacy decisions should security leaders while trying to maintain this balance? And importantly, how can organizations leverage technology to ensure consistent application in a cost-effective manner at scale?

Invest in privacy engineering skills

Technology continues to evolve, with processing speeds doubling every few years and innovative technologies emerging to meet ever-changing user expectations and demands. This fast-paced change is causing a seismic shift in privacy expectations of users and regulators. It is a constant challenge for organizations to ensure they are evolving their privacy by design practices to meet expectations.

What might have been an appropriate safeguard for the effective protection of personal data yesterday may be outdated tomorrow. When it comes to building privacy into business IT systems, data protection regulations such as the EU’s GDPR refer to state-of-the-art as the guiding light for appropriate technical design choices.

In general, state-of-the-art is reached when existing scientific knowledge and research is brought to market maturity, and when possible, references international standards. Often, state-of-the-art technology is expensive and complex to deploy across an organization’s digital IT landscapes.

Therefore, it’s imperative for organizations to acquire the right privacy engineering skills as a business imperative. To meet technology-based privacy needs in 2022, it will be essential for companies to invest in their workforce. To gain a competitive advantage, companies should provide support, resources and training for security professionals and privacy engineers to implement state-of-the-art privacy practices into business IT systems.

Leverage privacy-enhancing technologies

Privacy-enhancing technologies are moving up the maturity curve, among them differential privacy, federated learning, multiparty computation, homomorphic encryption and synthetic data. Their effectiveness within the realm of “trustworthy” or “ethical artificial intelligence (AI)” goes hand in hand with increased public funding supporting further development and standardization efforts. Still, a lot of work needs to be done to define clear use cases and provide off-the-shelf solutions for implementation. In addition, regulators are expected to opine on open legal questions, for example, via the upcoming review of the European Data Protection Board’s guidelines on anonymization techniques. Hopes are high that those cutting-edge techniques will help with questions around issues such as international data transfers and cross-border medical research.

Big Tech, including Apple, Google, Facebook and Microsoft, are spearheading the adoption of privacy-enhancing technologies. A prominent example of privacy-enhancing technologies is differential privacy. With its mathematical definition of privacy, it offers one of the strongest guarantees of privacy available. To get an intuitive understanding, imagine a poll where respondents flip a coin before answering. If the result is “heads,” a random answer (heads or tails) would be recorded instead of the true answer. Later, the introduced errors (noise) get removed from the dataset. Depending on how much noise is added, the balance between privacy and utility of the disclosed information is navigated. Eventually, statistical patterns of a dataset can be identified while maintaining “plausible deniability” about the information of the individuals who are included in the analysis.

Modern cryptography is groundbreaking as well. Going beyond protecting data in transit or at rest, homomorphic encryption and multi-party computation are about protecting data in use. Previously unimaginable, these technologies allow computation to be performed directly on encrypted data without previous decryption. Because of this, they can support joint analysis of data provided by multiple parties without revealing the parties’ individual data inputs. For example, this can be used in medical research. Two separate databases can be used to identify confounding factors for the survival of patients without the need to exchange patient data to perform the data analysis. Being creative when exploring how privacy enhancing technologies can unlock new business operations will be worth the time and effort.

Utilize privacy governance to tackle new challenges

Lastly, there will be new developments and laws in 2022 which will impact the technology engineering landscape. Innovative solutions for identity and access management, changes in the AdTech ecosystem, privacy/preserving machine learning trends and new AI regulations entail novel opportunities and challenges for privacy. On top of trendsetting AI regulations like the EU Artificial Intelligence Act, complex sectoral regulations for e-commerce, health technology or the cloud should be anticipated.

In addition, the complexity of these developments calls for close cross-disciplinary collaboration, streamlining internal standards and related processes. The key will be effective communication between different business functions and aligning data-value generation, responsible use of data in AI and privacy by-design in AI systems. Organizations will need to enable and leverage the expertise of security and privacy teams to establish the right balance of privacy and trust while maximizing data utility.

KEYWORDS: data collection data privacy digital transformation encryption enterprise cyber security user-based design

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Katharina koerner

Katharina Koerner leads IAPP’s Privacy Engineering Section, bringing together engineers, data scientists, UX designers and other technologists working to build privacy into products and services. Her research and engagement focuses on the intersection of privacy and technology as well as privacy standards aimed at helping privacy professionals bridge legal, technical, business and design needs.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • hands reach for data

    Data privacy: Human right and business advantage

    See More
  • Privacy 1

    Creating Risk-Aware Culture through Privacy by Design

    See More
  • cybersecurity

    Limiting business liabilities through a new era of protective intelligence

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing