New technologies for data protection that arm innovative businesses to win

When:  Apr 21, 2021 from 12:00 to 13:00 (PT)
Associated with  San Francisco Chapter

New technologies for data protection can arm innovative businesses to win in an ever-changing, increasingly competitive digital economy. ​Responsible businesses believe their customers and employees have a right to privacy—they value those relationships, after all. Unfortunately, success in safeguarding privacy, now and in the future, will not be guaranteed by a desire to do so. The myriad of regulations already enacted, compounded by the many others that are sure to come, only stress the need for businesses to protect the privacy of anyone and everyone whose personally identifiable information resides in corporate data. 

New techniques for data protection create opportunities to harness the sensitive data that is proven to be most effective in activating advanced analytics, machine learning, and AI. Homomorphic Encryption, which allows computations on encrypted data and Machine Learning are growing in popularity. We will discuss new Homomorphic Encryption algorithms that are secure from Quantum Computer-Based Attacks and machine-learning algorithm can be optimized for Quantum Computers. 

Privacy-preserving techniques for AI – such as differential privacy or k-anonymity can ensure privacy of an individual’s sensitive data while also reducing bias in AI algorithms. We will review International Privacy Standards including reversable methods and non-reversable one-methods and discuss how Differential privacy gives a formal guarantee that individual-level information about participants in the database is not leaked.

Data must move without hindrance through an enterprise’s many cloud-based databases and applications. Businesses need the cloud to place workloads in development containers. They need the cloud to tap AI and reinvent how they make decisions. The types of data that are most critical in driving innovation—with advanced analytics, machine learning, and AI—are those deemed most sensitive and must be safeguarded. A common concern with cloud hosting is the risk of vendor lock-in, and an inability to migrate to another cloud service provider when features or pricing changes. Firms often adopt a “best of breed” cloud approach and end up with several providers. Some customers understand the liabilities implied by a “shared security model” or simply do not trust their hosting vendors to have full control of critical components like security of data, user accounts and applications. So, most firms want to have full control of data security policies and encryption keys and are quite familiar with their on-premises encryption and key management systems, so they often prefer to leverage the same tool and skills across multiple clouds. We will discuss a centralized data security policy and encryption key management can leverage the same tool and skills across multiple clouds and for on-premises systems. 

With machine learning models and data in Trusted Execution Environments (TEE) and the confidence that sensitive data is protected, businesses can quickly extract value, apply insights in real time, and predict outcomes that accelerate growth and “You don’t want me to know what stocks you’re trading, and I don’t want you to know the algorithm.” Operating on clear text information inside a TEE can also increase the speed compared to operating on homomorphically encryption data and provide scalability that is close to what you expect in cloud environment. We will discuss how you can shield machine learning models and data in TEE.

Event Image

Sponsors