SlideShare ist ein Scribd-Unternehmen logo
1 von 43
Downloaden Sie, um offline zu lesen
What Is Differential Privacy and Why Does It Matter? 1
What Is Differential Privacy
and Why Does It Matter?
What Is Differential Privacy and Why Does It Matter? 2
In recent years, there’s been
an explosion in the amount of
personal data being collected.
What Is Differential Privacy and Why Does It Matter? 3
Data now flows from every
business transaction, and from our
mobile and social media activity.
What Is Differential Privacy and Why Does It Matter? 4
Increasingly, it flows from
the sensors embedded
into our daily lives, too.
What Is Differential Privacy and Why Does It Matter? 5
While all of this data opens the
door to a vast array of possibilities
to develop applied artificial
intelligence (AI) solutions…
What Is Differential Privacy and Why Does It Matter? 6
Collecting and managing
that data also creates
significant privacy risks.
What Is Differential Privacy and Why Does It Matter? 7
Fortunately, in a world where
the risks and costs associated
with privacy are on the rise,
differential privacy offers
a solution.
What Is Differential Privacy and Why Does It Matter? 88What Is Differential Privacy and Why Does It Matter?
So what exactly is
differential privacy?
What Is Differential Privacy and Why Does It Matter? 9
It’s a mathematical definition for the privacy loss
that results to individuals when their private
information is used to create AI solutions.
What Is Differential Privacy and Why Does It Matter? 1010What Is Differential Privacy and Why Does It Matter?
It measures how effective
particular techniques are at
protecting the privacy of
individuals within a larger dataset.
What Is Differential Privacy and Why Does It Matter? 11
One example is inserting
random noise into a dataset.
What Is Differential Privacy and Why Does It Matter? 12
This mathematical measurement of privacy
can be used to build trust with customers
so that they’re more willing to share data.
What Is Differential Privacy and Why Does It Matter? 13
That’s important because the
aggregation of data is critical for
many machine learning projects.
What Is Differential Privacy and Why Does It Matter? 14
After all, the more training
data you have, the better
your models will perform.
What Is Differential Privacy and Why Does It Matter? 1515What Is Differential Privacy and Why Does It Matter?
Data aggregation can also
solve the cold -start problem
for new customers.
What Is Differential Privacy and Why Does It Matter? 16
The cold-start problem is when
you have a new customer, but
don't yet have the data to
provide them insights.
What Is Differential Privacy and Why Does It Matter? 17
Differential privacy solves this by
enabling insights for new customers
using data from existing ones without
compromising their privacy.
What Is Differential Privacy and Why Does It Matter? 1818What Is Differential Privacy and Why Does It Matter?
And while differential privacy has
typically been the domain of big
technology companies like:
What Is Differential Privacy and Why Does It Matter? 1919What Is Differential Privacy and Why Does It Matter?
Today, smaller companies are
starting to follow their lead.
Read the case studies
What Is Differential Privacy and Why Does It Matter? 2020What Is Differential Privacy and Why Does It Matter?
So how does
differential privacy
work?
What Is Differential Privacy and Why Does It Matter? 21
A differentially private AI solution
may use techniques such as
injecting noise into a dataset to
protect individual privacy.
What Is Differential Privacy and Why Does It Matter? 2222What Is Differential Privacy and Why Does It Matter?
Differential privacy then provides
us a measure of how well that
noise is helping protect the privacy
of the individuals in that dataset.
What Is Differential Privacy and Why Does It Matter? 23
The end result is a differentially private
dataset or model that can’t be reverse-
engineered by an attacker.
What Is Differential Privacy and Why Does It Matter? 2424What Is Differential Privacy and Why Does It Matter?
And, while inserting random bits into
data doesn’t completely prevent
attempts to cross-reference that
data with other sources…
What Is Differential Privacy and Why Does It Matter? 25
It does make it virtually
impossible to identify specific
individuals with full certainty.
What Is Differential Privacy and Why Does It Matter? 2626What Is Differential Privacy and Why Does It Matter?
So if you want to implement
differential privacy,
how can you get started?
What Is Differential Privacy and Why Does It Matter? 27
First, consider the kind of
information you’re gathering.
What Is Differential Privacy and Why Does It Matter? 28
And then determine whether
you really need the data you’re
collecting or planning to collect.
What Is Differential Privacy and Why Does It Matter? 2929What Is Differential Privacy and Why Does It Matter?
Given the growing number of data
breaches and the rise of legislation
such as General Data Protection
Regulation (GDPR)…
What Is Differential Privacy and Why Does It Matter? 3030What Is Differential Privacy and Why Does It Matter?
If your company doesn’t
need to collect information
on individuals, you might want
to avoid doing so.
What Is Differential Privacy and Why Does It Matter? 31
Next, have your team look at what
tools are available to support your
adoption of differential privacy.
What Is Differential Privacy and Why Does It Matter? 3232What Is Differential Privacy and Why Does It Matter?
Depending on your project focus and
requirements, options may include:
1
Uber’s open source
tool that adds
differential privacy
for SQL queries.
https://github.com/uber/sql-differential-privacy
What Is Differential Privacy and Why Does It Matter? 3333What Is Differential Privacy and Why Does It Matter?
Google’s
differentially
private reporting
tool RAPPOR.
https://github.com/google/rappor
2
What Is Differential Privacy and Why Does It Matter? 3434What Is Differential Privacy and Why Does It Matter?
3
Immuta’s differential
privacy-enabled
data science
platform.
https://www.immuta.com
What Is Differential Privacy and Why Does It Matter? 3535What Is Differential Privacy and Why Does It Matter?
4
Georgian Partner’s own
differential privacy product
for machine learning.
https://georgianpartners.com/products
What Is Differential Privacy and Why Does It Matter? 36
Finally, differential privacy
is still an emerging area
of research.
What Is Differential Privacy and Why Does It Matter? 37
Continue to invest in talent, and hire
strong data scientists and people with
strong foundations in mathematics.
What Is Differential Privacy and Why Does It Matter? 3838What Is Differential Privacy and Why Does It Matter?
Implementing differential privacy
successfully in your company will be
less about the lines
of code needed…
What Is Differential Privacy and Why Does It Matter? 3939What Is Differential Privacy and Why Does It Matter?
And more about
understanding and applying
complex
mathematics.
What Is Differential Privacy and Why Does It Matter? 40
The bottom line is that
differential privacy is an
important technique in
helping protect against
privacy loss.
What Is Differential Privacy and Why Does It Matter? 41
Adopting it early will generate
cumulative benefits over time as you
build greater levels of trust with your
customers compared to your
competitors.
What Is Differential Privacy and Why Does It Matter? 4242What Is Differential Privacy and Why Does It Matter?
For that reason, every business
dealing with data needs to invest in
understanding and adopting
this important technology.
What Is Differential Privacy and Why Does It Matter? 4343What Is Differential Privacy and Why Does It Matter?
To learn more,
download the
Download
CEO’s Guide
to Differential
Privacy

Weitere ähnliche Inhalte

Was ist angesagt?

Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information SecurityDr Naim R Kidwai
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanismsRajapriya82
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyThoughtworks
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
Privacy in AI/ML Systems: Practical Challenges and Lessons Learned
Privacy in AI/ML Systems: Practical Challenges and Lessons LearnedPrivacy in AI/ML Systems: Practical Challenges and Lessons Learned
Privacy in AI/ML Systems: Practical Challenges and Lessons LearnedKrishnaram Kenthapadi
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full reportharpoo123143
 
secure file storage on cloud using hybrid Cryptography ppt.pptx
secure file storage on cloud using hybrid Cryptography  ppt.pptxsecure file storage on cloud using hybrid Cryptography  ppt.pptx
secure file storage on cloud using hybrid Cryptography ppt.pptxNishmithaHc
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information securitySyaiful Ahdan
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtNUS-ISS
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 

Was ist angesagt? (20)

Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
Deep learning and Healthcare
Deep learning and HealthcareDeep learning and Healthcare
Deep learning and Healthcare
 
Ch09
Ch09Ch09
Ch09
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Privacy in AI/ML Systems: Practical Challenges and Lessons Learned
Privacy in AI/ML Systems: Practical Challenges and Lessons LearnedPrivacy in AI/ML Systems: Practical Challenges and Lessons Learned
Privacy in AI/ML Systems: Practical Challenges and Lessons Learned
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
secure file storage on cloud using hybrid Cryptography ppt.pptx
secure file storage on cloud using hybrid Cryptography  ppt.pptxsecure file storage on cloud using hybrid Cryptography  ppt.pptx
secure file storage on cloud using hybrid Cryptography ppt.pptx
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cloud security
Cloud securityCloud security
Cloud security
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 

Ähnlich wie What is Differential Privacy?

Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellenceMudit Mangal
 
Vint big data research privacy technology and the law
Vint big data research privacy technology and the lawVint big data research privacy technology and the law
Vint big data research privacy technology and the lawKarlos Svoboda
 
Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...
Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...
Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...Rick Bouter
 
Sogeti big data research privacy technology and the law
Sogeti big data research privacy technology and the lawSogeti big data research privacy technology and the law
Sogeti big data research privacy technology and the lawYann SESE
 
Privacy as a Career
Privacy  as a CareerPrivacy  as a Career
Privacy as a CareerDaviesParker
 
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...TrustArc
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy ManagementTrustArc
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017Steve Mckee
 
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?TrustArc
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016Melissa Krasnow
 
For the Love of Big Data
For the Love of Big DataFor the Love of Big Data
For the Love of Big DataRobert Sutor
 
TrustArc Webinar: Privacy Management Made Simple
TrustArc Webinar: Privacy Management Made SimpleTrustArc Webinar: Privacy Management Made Simple
TrustArc Webinar: Privacy Management Made SimpleTrustArc
 
Introduction to Data Mining, Business Intelligence and Data Science
Introduction to Data Mining, Business Intelligence and Data ScienceIntroduction to Data Mining, Business Intelligence and Data Science
Introduction to Data Mining, Business Intelligence and Data ScienceIMC Institute
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 

Ähnlich wie What is Differential Privacy? (20)

Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
 
Vint big data research privacy technology and the law
Vint big data research privacy technology and the lawVint big data research privacy technology and the law
Vint big data research privacy technology and the law
 
Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...
Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...
Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...
 
Sogeti big data research privacy technology and the law
Sogeti big data research privacy technology and the lawSogeti big data research privacy technology and the law
Sogeti big data research privacy technology and the law
 
Privacy as a Career
Privacy  as a CareerPrivacy  as a Career
Privacy as a Career
 
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Why 4Segment
Why 4SegmentWhy 4Segment
Why 4Segment
 
Why 4Segments
Why 4SegmentsWhy 4Segments
Why 4Segments
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
For the Love of Big Data
For the Love of Big DataFor the Love of Big Data
For the Love of Big Data
 
TrustArc Webinar: Privacy Management Made Simple
TrustArc Webinar: Privacy Management Made SimpleTrustArc Webinar: Privacy Management Made Simple
TrustArc Webinar: Privacy Management Made Simple
 
DMA Data Protection 2014
DMA Data Protection 2014DMA Data Protection 2014
DMA Data Protection 2014
 
Introduction to Data Mining, Business Intelligence and Data Science
Introduction to Data Mining, Business Intelligence and Data ScienceIntroduction to Data Mining, Business Intelligence and Data Science
Introduction to Data Mining, Business Intelligence and Data Science
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 

Kürzlich hochgeladen

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Kürzlich hochgeladen (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

What is Differential Privacy?

  • 1. What Is Differential Privacy and Why Does It Matter? 1 What Is Differential Privacy and Why Does It Matter?
  • 2. What Is Differential Privacy and Why Does It Matter? 2 In recent years, there’s been an explosion in the amount of personal data being collected.
  • 3. What Is Differential Privacy and Why Does It Matter? 3 Data now flows from every business transaction, and from our mobile and social media activity.
  • 4. What Is Differential Privacy and Why Does It Matter? 4 Increasingly, it flows from the sensors embedded into our daily lives, too.
  • 5. What Is Differential Privacy and Why Does It Matter? 5 While all of this data opens the door to a vast array of possibilities to develop applied artificial intelligence (AI) solutions…
  • 6. What Is Differential Privacy and Why Does It Matter? 6 Collecting and managing that data also creates significant privacy risks.
  • 7. What Is Differential Privacy and Why Does It Matter? 7 Fortunately, in a world where the risks and costs associated with privacy are on the rise, differential privacy offers a solution.
  • 8. What Is Differential Privacy and Why Does It Matter? 88What Is Differential Privacy and Why Does It Matter? So what exactly is differential privacy?
  • 9. What Is Differential Privacy and Why Does It Matter? 9 It’s a mathematical definition for the privacy loss that results to individuals when their private information is used to create AI solutions.
  • 10. What Is Differential Privacy and Why Does It Matter? 1010What Is Differential Privacy and Why Does It Matter? It measures how effective particular techniques are at protecting the privacy of individuals within a larger dataset.
  • 11. What Is Differential Privacy and Why Does It Matter? 11 One example is inserting random noise into a dataset.
  • 12. What Is Differential Privacy and Why Does It Matter? 12 This mathematical measurement of privacy can be used to build trust with customers so that they’re more willing to share data.
  • 13. What Is Differential Privacy and Why Does It Matter? 13 That’s important because the aggregation of data is critical for many machine learning projects.
  • 14. What Is Differential Privacy and Why Does It Matter? 14 After all, the more training data you have, the better your models will perform.
  • 15. What Is Differential Privacy and Why Does It Matter? 1515What Is Differential Privacy and Why Does It Matter? Data aggregation can also solve the cold -start problem for new customers.
  • 16. What Is Differential Privacy and Why Does It Matter? 16 The cold-start problem is when you have a new customer, but don't yet have the data to provide them insights.
  • 17. What Is Differential Privacy and Why Does It Matter? 17 Differential privacy solves this by enabling insights for new customers using data from existing ones without compromising their privacy.
  • 18. What Is Differential Privacy and Why Does It Matter? 1818What Is Differential Privacy and Why Does It Matter? And while differential privacy has typically been the domain of big technology companies like:
  • 19. What Is Differential Privacy and Why Does It Matter? 1919What Is Differential Privacy and Why Does It Matter? Today, smaller companies are starting to follow their lead. Read the case studies
  • 20. What Is Differential Privacy and Why Does It Matter? 2020What Is Differential Privacy and Why Does It Matter? So how does differential privacy work?
  • 21. What Is Differential Privacy and Why Does It Matter? 21 A differentially private AI solution may use techniques such as injecting noise into a dataset to protect individual privacy.
  • 22. What Is Differential Privacy and Why Does It Matter? 2222What Is Differential Privacy and Why Does It Matter? Differential privacy then provides us a measure of how well that noise is helping protect the privacy of the individuals in that dataset.
  • 23. What Is Differential Privacy and Why Does It Matter? 23 The end result is a differentially private dataset or model that can’t be reverse- engineered by an attacker.
  • 24. What Is Differential Privacy and Why Does It Matter? 2424What Is Differential Privacy and Why Does It Matter? And, while inserting random bits into data doesn’t completely prevent attempts to cross-reference that data with other sources…
  • 25. What Is Differential Privacy and Why Does It Matter? 25 It does make it virtually impossible to identify specific individuals with full certainty.
  • 26. What Is Differential Privacy and Why Does It Matter? 2626What Is Differential Privacy and Why Does It Matter? So if you want to implement differential privacy, how can you get started?
  • 27. What Is Differential Privacy and Why Does It Matter? 27 First, consider the kind of information you’re gathering.
  • 28. What Is Differential Privacy and Why Does It Matter? 28 And then determine whether you really need the data you’re collecting or planning to collect.
  • 29. What Is Differential Privacy and Why Does It Matter? 2929What Is Differential Privacy and Why Does It Matter? Given the growing number of data breaches and the rise of legislation such as General Data Protection Regulation (GDPR)…
  • 30. What Is Differential Privacy and Why Does It Matter? 3030What Is Differential Privacy and Why Does It Matter? If your company doesn’t need to collect information on individuals, you might want to avoid doing so.
  • 31. What Is Differential Privacy and Why Does It Matter? 31 Next, have your team look at what tools are available to support your adoption of differential privacy.
  • 32. What Is Differential Privacy and Why Does It Matter? 3232What Is Differential Privacy and Why Does It Matter? Depending on your project focus and requirements, options may include: 1 Uber’s open source tool that adds differential privacy for SQL queries. https://github.com/uber/sql-differential-privacy
  • 33. What Is Differential Privacy and Why Does It Matter? 3333What Is Differential Privacy and Why Does It Matter? Google’s differentially private reporting tool RAPPOR. https://github.com/google/rappor 2
  • 34. What Is Differential Privacy and Why Does It Matter? 3434What Is Differential Privacy and Why Does It Matter? 3 Immuta’s differential privacy-enabled data science platform. https://www.immuta.com
  • 35. What Is Differential Privacy and Why Does It Matter? 3535What Is Differential Privacy and Why Does It Matter? 4 Georgian Partner’s own differential privacy product for machine learning. https://georgianpartners.com/products
  • 36. What Is Differential Privacy and Why Does It Matter? 36 Finally, differential privacy is still an emerging area of research.
  • 37. What Is Differential Privacy and Why Does It Matter? 37 Continue to invest in talent, and hire strong data scientists and people with strong foundations in mathematics.
  • 38. What Is Differential Privacy and Why Does It Matter? 3838What Is Differential Privacy and Why Does It Matter? Implementing differential privacy successfully in your company will be less about the lines of code needed…
  • 39. What Is Differential Privacy and Why Does It Matter? 3939What Is Differential Privacy and Why Does It Matter? And more about understanding and applying complex mathematics.
  • 40. What Is Differential Privacy and Why Does It Matter? 40 The bottom line is that differential privacy is an important technique in helping protect against privacy loss.
  • 41. What Is Differential Privacy and Why Does It Matter? 41 Adopting it early will generate cumulative benefits over time as you build greater levels of trust with your customers compared to your competitors.
  • 42. What Is Differential Privacy and Why Does It Matter? 4242What Is Differential Privacy and Why Does It Matter? For that reason, every business dealing with data needs to invest in understanding and adopting this important technology.
  • 43. What Is Differential Privacy and Why Does It Matter? 4343What Is Differential Privacy and Why Does It Matter? To learn more, download the Download CEO’s Guide to Differential Privacy