Identifying the correct PET(s) for the challenge | Kisaco Research

With a litany of technologies available, it is not enough to just identify potential use cases- it is vital to then apply the right technology or combination of technologies to the build a solution. This panel will discuss how to achieve the right mix and which challenges will be encountered along the way.

  • Collaborating with data science teams to ensure the technology delivers as promised and is stress tested in a variety of situations
  • Understanding what vendor offerings look like and effectively determining which potential provider is most appropriate
  • Discussing who needs to know what when it comes to the technical capability of PETs vs their business potential.
Speaker(s): 

Author:

Ryan Lasmaili

Co-Founder & CEO
Vaultree

Ryan has since childhood been fascinated by technology breakthroughs from space travel to EnviroTech, and in the last 12 years he has been involved with technology startups developing solutions to major problems. Ryan’s background is in financial mathematics with a passion for astrophysics and economics, having also worked in corporate environments in roles ranging from project manager to senior analyst, reporting to executives in listed multinationals. Ryan is always looking for ways to improve and apply his out of the box thinking to solving major cybersecurity problems with his biggest undertaking to date solving today’s and tomorrow’s data encryption & protection challenges.

 

Ryan Lasmaili

Co-Founder & CEO
Vaultree

Ryan has since childhood been fascinated by technology breakthroughs from space travel to EnviroTech, and in the last 12 years he has been involved with technology startups developing solutions to major problems. Ryan’s background is in financial mathematics with a passion for astrophysics and economics, having also worked in corporate environments in roles ranging from project manager to senior analyst, reporting to executives in listed multinationals. Ryan is always looking for ways to improve and apply his out of the box thinking to solving major cybersecurity problems with his biggest undertaking to date solving today’s and tomorrow’s data encryption & protection challenges.

 

Author:

James Robson

Data Protection Officer
What Works for Children's Social Care

James Robson

Data Protection Officer
What Works for Children's Social Care

Author:

Nigel Smart

Professor
KU Leuven

Smart received a BSc degree in mathematics from the University of Reading in 1989 and his PhD degree from the University of Kent at Canterbury in 1992. Smart proceeded to work as a research fellow at the University of Kent, the Erasmus University Rotterdam, and Cardiff University until 1995. From 1995 to 1997, he was a lecturer at the University of Kent, and then spent three years at Hewlett-Packard from 1997 to 2000. From 2000 to 2017 he was at the University of Bristol, where he founded the cryptology research group. From 2018 he has been based in the COSIC group at the Katholieke Universiteit Leuven.

Smart held a Royal Society Wolfson Merit Award (2008-2013), and two ERC Advanced Grant (2011-2016 and 2016-2021). He was a director of the International Association for Cryptologic Research (2012-2014), and was elected Vice President for the period 2014-2016. In 2016 he was named as a Fellow of the IACR.

Smart carries out research on a wide variety of topics in cryptography. Smart is known for his work in elliptic curve cryptography. He has also worked on pairing-based cryptography contributing a number of algorithms such as the SK-KEM and the Ate-pairing. His work with Gentry and Halevi on performing the first large calculation using Fully Homomorphic Encryption won the IBM Pat Goldberg Best Paper Award for 2012. In the last decade he has worked on making secure multiparty computation practical.

In addition to his three years at HP Laboratories, Smart was a founder of the startup Identum, which was bought by Trend Micro in 2008. In 2013 he formed, with Yehuda Lindell, Unbound Security, a company deploying products based on multi-party computations. He is also the co-founder, along with Kenny Paterson, of the Real World Cryptography conference series.

Nigel Smart

Professor
KU Leuven

Smart received a BSc degree in mathematics from the University of Reading in 1989 and his PhD degree from the University of Kent at Canterbury in 1992. Smart proceeded to work as a research fellow at the University of Kent, the Erasmus University Rotterdam, and Cardiff University until 1995. From 1995 to 1997, he was a lecturer at the University of Kent, and then spent three years at Hewlett-Packard from 1997 to 2000. From 2000 to 2017 he was at the University of Bristol, where he founded the cryptology research group. From 2018 he has been based in the COSIC group at the Katholieke Universiteit Leuven.

Smart held a Royal Society Wolfson Merit Award (2008-2013), and two ERC Advanced Grant (2011-2016 and 2016-2021). He was a director of the International Association for Cryptologic Research (2012-2014), and was elected Vice President for the period 2014-2016. In 2016 he was named as a Fellow of the IACR.

Smart carries out research on a wide variety of topics in cryptography. Smart is known for his work in elliptic curve cryptography. He has also worked on pairing-based cryptography contributing a number of algorithms such as the SK-KEM and the Ate-pairing. His work with Gentry and Halevi on performing the first large calculation using Fully Homomorphic Encryption won the IBM Pat Goldberg Best Paper Award for 2012. In the last decade he has worked on making secure multiparty computation practical.

In addition to his three years at HP Laboratories, Smart was a founder of the startup Identum, which was bought by Trend Micro in 2008. In 2013 he formed, with Yehuda Lindell, Unbound Security, a company deploying products based on multi-party computations. He is also the co-founder, along with Kenny Paterson, of the Real World Cryptography conference series.