skip to content



Monday 30th November 2020

Digital Catapult

United Kingdom


Companies have been repeatedly told that data is one of their most valuable commodities, but realising the full value of that data may require re-mixing, comparison, or computation against data held by others.  Unfortunately, sharing data is one of the hardest things for companies to do, because of the perceived commercial and legal risks. Even within a single organisation, sharing data can be considered to create large security or privacy risks.

The last few years have seen the emergence of technologies which allow for the secure collection, sharing, processing, and storage of data without the downsides of reducing privacy of users, or compromising corporate security. These Privacy Enhancing Technologies (PETs) have the capacity to make data sharing both safe and effective. These technologies form the basis of various new ways of doing business, with many being highlighted in recent Gartner reports as opening up new ways of exploiting data.

Now is the time to look further at case studies, models and demonstrators that show such techniques can perform what at first sight seems impossible: to process data without seeing it. The technology is so counterintuitive, and opens up such new ways of working, that we have identified a need to facilitate a greater understanding of these technologies amongst end-users, without them necessarily needing to know exactly “how” it works. This event will look to do this by featuring presentations from experts who are deploying this technology, as well as presentations on applications from end-user perspectives.

Aims and Objectives

Developed with academic partners and in collaboration with the Digital Catapult, this workshop recognises the need to help business and industry find effective ways to utilise these new privacy enhancing technologies.

Session 1, in the morning, will feature talks from experts from companies developing these technologies. The talks will highlight PETs which enable the value in data to be unlocked; without needing to compromise on the privacy or security of the said data. The technologies will examine across a range of potential application domains, from inter- to intra- company security.

  • Fully Homomorphic Encryption schemes (FHE) – a form of encryption which allows computations on encrypted data.
  • Multiparty computation (MPC) – A sub-field of cryptography which has been applied to many use cases with potential applications in long-term shared data governance. Current deployed applications ranging from data sharing within organisations through to securing an organizations internal infrastructure..
  • Zero knowledge proofs (ZK proofs) – a cryptographic technology that allows one party to prove a statement to another, without the need to reveal the actual values being proven. Such technology forms the basis of many new applications in distributed ledgers/blockchain.

Session 2, in the afternoon, will include end-user talks followed by a wrap-up and panel discussion. These will highlight real use cases of employment of these technologies, as well as other promising new applications. Examples include:

  • The United Nations Privacy Preserving Techniques Task Team from the BigData UN Global Working Group will discuss their work on a secure data policy framework.
  • In the financial sector for instance, PETs can facilitate the sharing of information about money laundering and financial crime concerns, while remaining compliant with data security laws.
  • In the cryptocurrency space such PETs can speed up transaction times, and provide greater security for token exchanges.

This event will be of interest to anyone in business and industry who has a need to share and/or process data securely, as well as those focused on corporate CyberSecurity.

A provisional programme is now available.

Registration and Venue

To register and for further information, please follow the registration link in the left hand panel.

The workshop will take place at the Digital Catapult in London. Please see the webpage for further information about the venue.

Working with Digitial Catapult

Co-Host and Catapult (each a “Host”) are co-hosting this event, and each Host is individually (not jointly) a Controller.  Each Host is individually responsible to you for how that Host respectively stores, uses and processes your personal data in accordance with that Host’s privacy policy. One Host is not responsible to you for the other Host’s storage, use or processing of your data.  Actions taken by one Host (e.g. deleting personal data) will be independent of the other Host. If you need to make a data request, please make such request directly to the relevant Host(s).  Each Host’s privacy policy can be found at Co-Host: and Catapult [].
The Co-Host and/or the Catapult may take photographs and/or video at the event, which will be used in general promotional material recording or relating to the event, including use with websites, emails, social media and tangible literature.  If you have any concerns relating to this, please contact the events coordinator at the Event.
In Partnership with