►
From YouTube: Keynote: Evolutions in data privacy: threats and opportunities -Kirsten A. Newcomer, Red Hat
Description
Keynote: Evolutions in data privacy: threats and opportunities -Kirsten A. Newcomer, Red Hat
Encryption is key for data confidentiality in cloud native solutions. This talk will focus on the future of encryption to ensure confidentiality while also enabling collaboration across data sets to advance solutions in areas such as health care. We’ll take a look at the opportunities that homomorphic encryption offers as well as the likely impact of post-quantum cryptography on securing data on cloud-native platforms and applications.
A
It's
great
to
be
here.
I
guess
I
could
take
this
off
hope
everybody's
doing
well,
keeping
safe
and
I've
noticed.
We
all
have
different
templates
for
our
talks
today.
So,
as
was
noted,
I'm
going
to
focus
a
bit
on
data
privacy,
threats
and
opportunities.
Today
this
particular
word
cloud
was
built
from
a
blog
from
the
uk
government.
A
A
A
It's
interesting
to
see
that
health
care
is
one
of
the
major
sources
of
breaches:
public
sector
nice.
That
financial
services
is
a
bit
smaller.
I
would
have
expected.
I
guess
they've
they've
been
doing
a
good
job
of
keeping
up
with
protections,
but
you
can
also
see
that
on
the
right-hand
side
of
the
slide
right,
the
areas
that
have
the
the
organizations
that
have
had
the
biggest
number
of
breaches,
including
linkedin,
which
I
imagine
many
of
us
here
today-
are
on
so
encrypting.
Data
continues
to
be
key.
A
Attestation
of
servers
and
environments
also
important
more
important
than
ever,
especially
when
data
is
at
the
edge,
which
is
more
and
more
so
right.
All
the
data
on
our
cell
phones,
mobile
phones
and
there's
progress
happening
that
our
community
is
helping
to
drive
open,
sls
ssl
three
is
out
fips
140-3
is
in
progress,
sig
store,
one
of
the
most.
A
Also
ai
and
ml,
can
help
when
it
comes
to
addressing
these
kinds
of
threats,
threats
against
data,
ai
and
ml
can
do
a
better
job
than
humans
at
identifying
patterns,
malware
patterns,
other
kinds
of
challenges
that
show
up
out
there.
They
can
predict
potential
attacks
by
identifying
trends
and,
at
the
same
time,
doing
all
of
this
requires
access
to
data.
A
A
project
that
might
be
interesting
kind
of
the
learn
more
links
are
scattered
throughout
this
deck.
As
I,
when
I
upload
things,
they'll
be
available
to
you,
opencep
complex
event.
Processing
is
a
project
that
is
available
for
contribution
evaluation.
Anybody
who's
interested
helps
to
do
things
that
can
be
leveraged
to
look
for
financial
fraud,
privacy
threats
things
along
those
lines.
A
A
This
is
a
type
of
encryption
that
enables
computations
on
data
without
decrypting
the
data
and
the
computation
results
remain
encrypted
as
well,
so
this
can
enable
privacy
of
the
data,
while
this
ai
and
ml
type
of
analysis
is
happening
on
the
data
can
allow
you
to
do
things
like
maintain
privacy
with
health
care
data.
Again
remember:
health
care
was
one
of
the
main
areas
of
attack
in
2021,
and
this
can
allow
for
a
more
granular
protection
of
that
health
care
data
as
well.
A
So
an
area
again,
that's
worth
investing
investigating
investing
in
lots
for
us
as
a
community
to
see
what
we
can
be
doing.
How
can
we
leverage
these
technologies
and,
at
the
same
time,
quantum
computing
is
coming
for
our
crypto
right,
so
it's
been
demonstrated
that
quantum
computing
can
break
some
of
our
existing
crypto
algorithms
within
10
seconds.
A
A
A
So,
given
the
short
time
we
have
today,
this
is
really
just
a
teaser
about
all
this
kind
of
information.
But
please,
especially
if
any
of
you
are
really
interested
in
crypto-
get
involved,
contribute
look
into
ai
and
ml
and
how
that
can
help
us
with
security
and
also
get
involved
in
post-crypto,
post-quantum,
cryptography
and
homomorphic
encryption
as
options
for
improving
data
protection.
Today,
thanks
so
much
for
your
time,.