Intervista: “VITA DA PRIVACYISTA” – Trentunesima puntata

By No tags Permalink

Il mio amico Luca Bolognini mi ha intervistato per la sua serie intitolata “Vita da Privacyista”. Ho discusso con lui con grande piacere di privacy e protezione dei dati, a tutto campo: dall'importanza di educare i bambini alla privacy alla necessità di introdurre nei curricula scolastici una gamification di queste materie, dalla mia ricerca all’Università di Maastricht ...

I’ve been appointed to the Commission’s Expert Group on B2B data sharing and cloud computing contracts

By No tags Permalink

Very happy to have been appointed as a member of the European Commission’s Expert Group on B2B data sharing and cloud computing contracts, co-managed by the Directorate-General for Communications, Networks, Content and Technology and the Directorate-General for Justice and Consumers. With this appointment, I will put my knowledge of cloud computing to the best use I ...

Serious Privacy Podcast appearance – “The fourth leg of ESG: a Privacy Framework”

I recently had the pleasure of being interviewed by Paul Breitbarth of Catawiki and Dr. K Royal of Outschool for the Serious Privacy podcast, check out the episode here! During the podcast we discuss my research on the topic of Data Protection as a Corporate Social Responsibility which aims to improve data protection and data security for a ...

Celebrating 11 years of ICTLC!

After 11 years, we are more motivated than ever to continue improving, determined to achieve ambitious goals, even more curious, and ready to push our boundaries! The enthusiasm of our colleagues is growing as we enter a phase of greater maturity, self-consciousness, and harmonious international and multidisciplinary expansion! At our semiannual party, Luca Bolognini and I discussed strategy, ...

Privacy Enhancing Technologies

I just finished a very interesting discussion with Mark Thompson (Director of Research and Insight, IAPP) and William Malcolm, (Director, Privacy Legal, Google) on Future trends in Privacy Enhancing Technologies (PET). During the conference, we discussed the intricacies of Differential Privacy, Federated Learning, Homomorphic Encryption, Synthetic Data, Trusted Enclaves, and the Privacy Sandbox, etc. But you may be ...

Happy Birthday, GDPR! Reflections on the potential for sustainable data processing to combat climate change

Each year I celebrate May 25th, the anniversary of the applicability of the General Data Protection Regulation (GDPR), by reflecting on the spirit of the Regulation and taking stock of its relevance in supporting democracy, fundamental rights, and the freedoms we hold so dear. This year, however, my thoughts have concentrated on another incredibly relevant ...

“ADVANCED CYBERSECURITY AND GLOBAL CYBERSECURITY STRATEGY” COURSE WEEK 6: Tutorial #7

Today marks the final tutorial in the “Advanced Cybersecurity and Global Cybersecurity Strategy” course at the European Centre on Privacy and Cybersecurity (ECPC)! The course has truly flown by!  Following Mika Lauhde’s lecture on cybersecurity and 5G networks, in today’s tutorial, students will briefly discuss the cybersecurity evolution of 2G, 3G, 4G and LTE networks, also touching on ...

“ADVANCED CYBERSECURITY AND GLOBAL CYBERSECURITY STRATEGY” COURSE WEEK 6: Cybersecurity and 5G networks

We’re kicking off the sixth and final week of the “Advanced Cybersecurity and Global Cybersecurity Strategy” course with a lecture from Mika Lauhde on Cybersecurity and 5G networks. Today our students of the Advanced Master in Privacy, Cybersecurity, Data Management and Leadership LLM at the European Centre on Privacy and Cybersecurity (ECPC) will take a deep ...

“ADVANCED CYBERSECURITY AND GLOBAL CYBERSECURITY STRATEGY” COURSE WEEK 5: Tutorial #6

It’s tutorial time! This afternoon Mika Lauhde will guide our students of the “Advanced Cybersecurity and Global Cybersecurity Strategy” course at the European Centre on Privacy and Cybersecurity (ECPC) in the weekly tutorial session.  During the tutorial, students will envision that they represent a European company purchasing an AI firewall to defend their critical infrastructure and assets. Accordingly, the ...