Episode 46 — Choose privacy enhancing technologies that match threats, data, and architecture (Domain 4C-4 Privacy Enhancing Technologies)

This episode introduces privacy enhancing technologies as a toolbox that must be matched to a specific threat model, dataset, and system architecture, because “use a PET” is never a complete answer on CDPSE. You’ll learn what PETs are trying to achieve, such as limiting exposure during computation, reducing identifiability, or enabling analysis with reduced disclosure, and how to evaluate tradeoffs in performance, complexity, and evidence. We’ll discuss practical selection factors like who needs access to raw data, where processing occurs, what outputs are allowed, and what adversaries you are defending against, then apply those factors to scenarios like cross-team analytics, partner reporting, and sensitive attribute processing. You’ll also practice troubleshooting when PETs are proposed as marketing language rather than engineered controls, focusing on questions and evidence that prove the technology is correctly implemented and actually reduces risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 46 — Choose privacy enhancing technologies that match threats, data, and architecture (Domain 4C-4 Privacy Enhancing Technologies)
Broadcast by