エピソード

  • Privacy Tradeoffs
    2024/04/24

    In this episode, we explored the complex topic of privacy trade-offs, delving into the reasons behind these challenges, real-world examples, and strategies for navigating them. Key highlights include:

    Why Do Privacy Trade-offs Occur?

    • Privacy trade-offs arise due to the tension between protecting individual privacy and achieving other important goals, such as security, convenience, or innovation.
    • The context in which a privacy trade-off occurs is crucial, as what might be acceptable in one situation may be unacceptable in another.

    Examples of Privacy Trade-offs

    1. Personalization vs. Privacy: The collection and use of personal data for personalized experiences can come at the expense of user privacy.

    2. Security vs. Privacy: Measures implemented for national security or public safety may infringe on individual privacy.

    3. Innovation vs. Privacy: The pursuit of technological innovation often involves the collection and analysis of large datasets, which can raise privacy concerns.

    It's important to separate innovation from the use of identifiable information, as this can often achieve goals without compromising individual privacy.

    Navigating Privacy Trade-offs

    • Prioritize the protection of individual privacy while still achieving other important goals.
    • Implement robust data governance frameworks, engage with stakeholders, and explore alternative solutions that minimize the impact on privacy.

    The Role of Privacy Engineers

    • Privacy engineers play a crucial role in identifying and recommending appropriate mitigations for privacy trade-offs.
    • They must possess a deep understanding of privacy principles, relevant laws and regulations, and the latest privacy-enhancing technologies.
    • Privacy engineers should conduct thorough privacy impact assessments, develop privacy-by-design strategies, and collaborate with cross-functional teams.

    Additional Resources

    For more information on privacy trade-offs, check out the panel summary from the MIT CSAIL publication: https://people.csail.mit.edu/rivest/pubs/WCGRW02.pdf

    Are you seeking to pivot to privacy engineering? Join our growing community at https://palshub.net/b/pivot.

    Looking for 1-on-1 coaching? Check out our offerings at https://palshub.net/b/coaching.

    続きを読む 一部表示
    7 分
  • Pivoting to Privacy Engineering with Precision
    2024/03/26

    Welcome to another insightful episode of PALS Parlor Podcast with your host, Amaka Ibeji, a Privacy Engineer. Today, we delve into the significant shift from cybersecurity to privacy engineering, a transformation that transcends mere career changes to embody a revolution in mindset.

    Key Takeaways:

    Tip 1: Differentiating Security and Privacy:

    • Security safeguards systems and data from unauthorized access, while Privacy governs the collection, use, and sharing of personal information.
    • Data Privacy empowers individuals to exercise their rights, crucial for trust and compliance in our data-driven world.

    Tip 2: Privacy By Design Principles:

    • Embedding privacy considerations into every product development stage is key.
    • The seven principles of Privacy By Design ensure proactive protection of user data.

    Tip 3: Leveraging Security Foundation:

    • Transitioning from cybersecurity to privacy engineering benefits from a shared goal of data protection.
    • Organizations can have security without privacy but not vice versa

    Tip 4: Mastering Privacy Threat Modeling:

    • Frameworks like LINDDUN and Plot4AI aid in identifying and mitigating privacy risks.
    • Episode two of the podcast offers a practical guide on Privacy Threat Modeling.

    Tip 5: Adopting System Thinking:

    • A systemic approach is essential for addressing complex privacy challenges.
    • Understanding how data flows through interconnected systems is crucial.

    Tip 6: Exploring Privacy-Enhancing Technologies (PETs):

    • Technologies like homomorphic encryption and differential privacy balance data utility with protection.
    • The PET market is rapidly growing, indicating the future of data privacy.

    Tip 7: Understanding Data Subject Rights:

    • Respecting individual privacy and complying with regulations necessitate understanding and upholding data subject rights.

    Tip 8: Collaborating with Privacy Lawyers:

    • Privacy lawyers provide valuable insights into navigating privacy nuances across jurisdictions.

    Tip 9: Certifications:

    • Certifications like IAPP CIPT, CIPP, or ISACA CDPSE demonstrate dedication and expertise in privacy engineering.

    Tip 10: Embracing Continuous Learning:

    • Committing to ongoing learning is crucial in staying abreast of developments in the dynamic field of privacy engineering.

    Conclusion:

    Transitioning to privacy engineering is not just a career move but a journey towards upholding individual privacy rights in the digital age.

    Let's be Pals, follow Amaka Ibeji - I write about Privacy Engineering, AI Governance, Leadership and Security.

    Until the next episode, continue exploring and embracing the world of privacy engineering with precision!

    続きを読む 一部表示
    6 分
  • Plausible Deniability ~ a privacy property
    2024/03/13

    Join us in today's episode as we delve into the captivating world of plausible deniability as a privacy property. Discover how this principle, initially perceived as encouraging dishonesty, actually empowers individuals to be honest and transparent without fear of repercussions.

    We unravel the essence of plausible deniability - the ability to deny actions that cannot be confirmed or refuted by others. Explore scenarios where plausible deniability triumphs over non-repudiation, such as in applications used by whistleblowers to protect their safety.

    Dive into the distinction between plausible deniability and non-repudiation, where one provides undeniable evidence while the other maintains ambiguity. Learn how confidentiality shields sensitive information, while plausible deniability allows individuals to disavow knowledge or involvement in certain actions.

    Explore real-world use cases where plausible deniability shines, from whistleblower apps ensuring anonymity to voters safeguarding their privacy during elections.

    Don't miss this enlightening exploration of how privacy-enhancing technologies are reshaping the landscape of data protection and trust in our digital world. Join us on this journey through the realms of privacy, security, and empowerment.

    To Learn more:

    1. How Plausible Deniability can Protect your Data
    2. Duality Tech Blog on Differential Privacy
    3. https://people.cs.kuleuven.be/~kim.wuyts/LINDDUN/LINDDUN.pdf
    4. The Future of Privacy is Plausible Deniability - The Atlantic (Behind a Paywall)

    Let's be Pals, follow Amaka Ibeji - I write about Privacy Engineering, AI Governance, Leadership and Security.

    続きを読む 一部表示
    5 分
  • Privacy is a Wicked Problem with Bryan Lee
    2024/03/02

    This episode features a distinguished guest Bryan Lee, a Trusted Advisor and General Partner at Privatus Consulting, discussing Privacy Engineering and the concept of Privacy as a Wicked Problem.

    Bryan explains that this term originates from urban design theory in the 1960s, defining Wicked Problems are complex, ill-defined issues within interrelated systems with competing interests and means.

    He emphasizes the importance of using the 3-S approach in addressing privacy challenges.

    1. Systems thinking,
    2. Stakeholder engagement, and
    3. Satisficing.

    Bryan recommends understanding systems thinking, engaging with stakeholders effectively, and embracing satisficing to find satisfactory solutions in the realm of privacy engineering.

    To engage with Bryan Lee on his insights on privacy engineering, you can connect with him on LinkedIn or visit the Privatus Consulting website.

    To Learn more:

    1. Privacy is a Wicked Problem
    2. Book: System Thinking Made Simple - New Hope for Solving Wicked Problems by Derek Cabrera and Laura Cabrera

    Let's be Pals, follow Amaka Ibeji - I write about Privacy Engineering, AI Governance, Leadership and Security.

    続きを読む 一部表示
    9 分
  • Privacy Threat Modeling: A Practical Guide
    2024/02/24

    In this enlightening episode of the PALS Parlor Podcast, host Amaka Ibeji delves into the intricate world of privacy threat modeling. Listeners will gain insights into its basics, benefits, and best practices, empowering them to identify and mitigate potential privacy issues in their systems and applications effectively. Amaka breaks down complex concepts with ease, offering a step-by-step guide on performing privacy threat modeling that doesn’t require advanced technical skills but a strategic, data-conscious mindset. Tune in to explore real-world applications of this process and learn how to turn potential vulnerabilities into strengths by understanding business context, identifying threats, strategizing defense mechanisms, and continuously reflecting and iterating for improvement.

    To Learn more:
    1. LINDDUN.org
    2. PLOT4AI

    Let's be Pals, follow Amaka Ibeji - I write about Privacy Engineering, AI Governance, Leadership and Security.



    続きを読む 一部表示
    5 分
  • LINDDUN Framework with Kim Wuyts
    2024/02/16

    Our debut features none other than Kim Wuyts, the creative genius behind the trailblazing LINDDUN threat modelling framework. Listen in as she reveals the inspiration behind LINDDUN and shares tips on how to make the best use of this framework.

    LINDDUN stands for Linkability, Identifiability, Non-repudiation, Detectability, Disclosure of information, Unawareness, and Non-compliance.

    This framework is a privacy threat modeling methodology. It systematically identifies potential privacy threats in a system and provides strategies to mitigate them. It's like having a GPS for navigating the complex landscape of data privacy.

    Whether you're a startup or an established enterprise, LINDDUN can help you design systems that respect user privacy. It's not just about ticking regulatory boxes, it's about building trust with your customers.

    To Learn more:
    1. LINDDUN.org
    2. CIF Seminar - "LINDDUN GO: A lightweight approach to privacy threat modeling" featuring the insightful Kim Wuyts d719.short.gy/gQOtXb
    3. LINDDUN Threat Modeling d719.short.gy/uzJrpP
    4. The all-encompassing guide here: d719.short.gy/13qDRf

    Let's be Pals, follow Amaka Ibeji - I write about Privacy Engineering, AI Governance, Leadership and Security.

    続きを読む 一部表示
    7 分