Wednesday 

Room 2 

13:40 - 14:40 

(UTC+01

Talk (60 min)

I don't need privacy, I got confidentiality!

Debunking this and other persistent privacy myths is highly overdue. Privacy is important! But how can privacy be implemented in practice?

Privacy
Application Security
Culture
SDLC

In this presentation, we'll explore privacy engineering and discover how it can strengthen security. Privacy by design actually requires a very similar approach to security by design. This session will explore how privacy can be successfully integrated into security practices, such as threat modeling, while strengthening the security posture along the way.

Kim Wuyts

Dr. Kim Wuyts is a leading privacy engineering expert with over 15 years of experience in security and privacy. Before joining PwC Belgium as Manager Cyber & Privacy, Kim was a senior researcher at KU Leuven where she led the development and extension of LINDDUN, a popular privacy threat modeling framework.

Her mission is to raise privacy awareness and get organizations to embrace privacy engineering best practices. She is a guest lecturer, experienced speaker, and invited keynote at international privacy and security conferences such as OWASP Global AppSec, BruCon, RSA, Troopers, CPDP, APF and IAPP DPC. In the last few years, Kim has been delivering privacy awareness and privacy threat modeling training at many events, including academic guest lectures and corporate training.

Kim is also a co-author of the Threat Modeling Manifesto+Capabilities, program co-chair of the International Workshop on Privacy Engineering (IWPE), and a member of ENISA’s working group on Data Protection Engineering.