Guidelines for Evaluating Differential Privacy Guarantees: NIST SP 800-226 | Damien Desfontaines

Channel:
Subscribers:
4,700
Published on ● Video Link: https://www.youtube.com/watch?v=5MHCHSzglbk



Category:
Guide
Duration: 41:11
41 views
1


Guidelines for Evaluating Differential Privacy Guarantees: NIST SP 800-226 | Differential Privacy and Its Potential in Protecting Sensitive Data | A Conversation with Damien Desfontaines | Redefining CyberSecurity Podcast with Sean Martin

Guest: Damien Desfontaines, Staff Scientist at Tumult Labs

On Linkedin | https://www.linkedin.com/in/desfontaines/

On Twitter | https://twitter.com/TedOnPrivacy

On Mastodon | https://hachyderm.io/@tedted

____________________________

Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]

On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin

____________________________

This Episode’s Sponsors

Imperva | https://itspm.ag/imperva277117988

Devo | https://itspm.ag/itspdvweb

___________________________

Episode Notes

This episode of Redefining CyberSecurity features a deep discussion between host, Sean Martin and guest, Damien Desfontaines on the topic of Differential Privacy (DP) and its implications in the field of cybersecurity. Damien, who currently works in a startup, Tumult Labs, primarily focuses on DP concepts and has rich prior experience from working in the anonymization team at Google. He shares key insights on how differential privacy — a tool to anonymize sensitive data can be effectively used by organizations to share or publish data safely, thus opening doors for new business opportunities.

They discuss how differential privacy is gradually becoming a standard practice for companies wanting to share more data without incurring additional privacy risk. Damien also sheds light on the forthcoming guidelines from NIST regarding DP, which will equip organizations with a concrete framework to evaluate DP claims. Despite the positive dimension, Damien also discusses the potential pitfalls in the differential privacy implementation and the need for solid data protection strategies.

The episode concludes with an interesting conversation about how technology and risk mitigation controls can pave way for more business opportunities in a secure manner.

Key insights:

Differential Privacy (DP) offers a mathematically proven methodology to anonymize sensitive data. It enables organizations to safely share or publish data, opening new business opportunities while adhering to privacy norms and standards.
The forthcoming guidelines from NIST will equip organizations with a concrete framework to evaluate DP claims, fine-tune their privacy governance, and promote data governance within their operations.
Implementing DP is complex and necessitates solid data protection strategies. Even with a strong mathematical foundation, the practical implementation of DP requires careful monitoring of potential vulnerabilities, illustrating the need for a holistic approach to data privacy.

___________________________

Watch this and other videos on ITSPmagazine's YouTube Channel

Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

📺 https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYqITSPmagazine YouTube Channel:

📺 https://www.youtube.com/@itspmagazine

Be sure to share and subscribe!

___________________________

Resources

Inspiring post: https://www.linkedin.com/feed/update/urn:li:activity:7140071119859957762/

Guidelines for Evaluating Differential Privacy Guarantees: https://csrc.nist.gov/pubs/sp/800/226/ipd

___________________________

To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:

https://www.itspmagazine.com/redefining-cybersecurity-podcast

Are you interested in sponsoring an ITSPmagazine Channel?

👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network




Other Videos By ITSPmagazine


2024-01-26Unraveling The Sapien Empire: A Deep Dive into Nathan Peter Ogloff's Post-Apocalyptic World Building
2024-01-26Looking Back to Move Forward: Threat Research Reflections on 2023 | An Imperva Brand Story with N...
2024-01-26Looking Back to Move Forward: Threat Research Reflections on 2023 with Nadav Avital, Imperva
2024-01-24Psychological Safety and Failing Right | A Conversation with Dr. Amy C. Edmondson | Leading Edge ...
2024-01-24Psychological Safety and Failing Right | Dr. Amy C. Edmondson | Astronaut Charlie Camarda Ph.D
2024-01-24Book | The Legal Tech Ecosystem: Innovation, Advancement & the Future of Law Practice | A convers...
2024-01-24Book | The Legal Tech Ecosystem Innovation, Advancement & the Future of Law Practice | Colin S. Levy
2024-01-24Leaning in on ISO 5338, ISO 27090/27091, and the OWASP AI Exchange to Build Secure AI Systems
2024-01-23Letting Go and Trusting Your Team | A Conversation with Tonia Dudley | The Soulful CXO Podcast wi...
2024-01-23Letting Go and Trusting Your Team | A Conversation with Tonia Dudley | The Soulful CXO Podcast
2024-01-22Guidelines for Evaluating Differential Privacy Guarantees: NIST SP 800-226 | Damien Desfontaines
2024-01-21Hallucinations - Fear and Loathing in Silicon Valley | Cyber Cognition Podcast with Hutch and Len...
2024-01-21Hallucinations - Fear and Loathing in Silicon Valley | Cyber Cognition Podcast with Hutch & Len Noe
2024-01-21A Literary Approach: The Novel Intersection of Fiction and Cybersecurity Storytelling | A Convers...
2024-01-21A Literary Approach: The Novel Intersection of Fiction and Cybersecurity Storytelling
2024-01-19THE FLYING TOWN | Stories Sotto Le Stelle Podcast | Short Stories For Children And The Young At H...
2024-01-18Mastering Boundaries: How to Create Space for Personal and Professional Growth | Woodrie Burich
2024-01-18CES 2024 Coverage | Embracing Change and Tech With A Purpose: A Post-Event Coverage of CES 2024 w...
2024-01-17Book | Tech For Good: Imagine Solving the World’s Greatest Challenges | A conversation with Autho...
2024-01-17Book | Tech For Good: Imagine Solving the World’s Greatest Challenges | Author Marga Hoek
2024-01-16THE STRAW HATS OF FLORENCE | Stories Sotto Le Stelle Podcast | Short Stories For Children And The...



Tags:
Differential Privacy
De-identification
Damien Desfontaines
Tumult Labs
Data Anonymization
Data Publication
Data Sharing
Privacy Guidelines
NIST
SP 800 226
Compliance Risk
Data Protection
Anonymization Techniques
Data Release
Data Governance
Privacy Governance
Data Collection
Cybersecurity
Business Opportunities
Data Security