SlideShare a Scribd company logo
How financial
organizations can use
synthetic data to
overcome data inertia
Statice webinar
Visit our website to
access the recording
of this presentation
Benjamin Nolan
Head of Business Development at Statice
Working with Statice's partners to help them overcome their data
access and privacy challenges with privacy-preserving synthetic data.
Speakers
Sven Guhr
Associate Director at Sopra Steria
Working on the topics of data analytics & artificial intelligence for
many years, advising leading financials organizations.
2
Synthetic data to
produce anonymized
data that will fuel
data-driven
use-cases
Applications for
privacy-preserving
synthetic data in the
financial industry
The challenges of
data-driven
innovation & the
competitive costs of
data inertia
Agenda
I. II
.
III.
3
The challenges of data-driven innovation
& the competitive costs of data inertia
4
Data fuels operational efficiency, personalized customer experiences and
product development.
Why is data so important?
“Customer intelligence will be the most important predictor
of revenue growth and profitability [...]”
Machine learning applications, and cloud infrastructures are gaining in
popularity. Both require greater data access and agility.
Data protection regulations in Europe
What prevents companies from accessing and using data?
“between 40 and 90 percent of banks’ workloads globally
could move to the cloud in a decade. [...] However, personally
sensitive data and trading data have not moved.”
Legacy systems with proprietary formats or siloed IT infrastructures
Data is too expensive to obtain, or its quality isn’t sufficient.
Data processing becomes a financial and business burden because it’s
resources intensive.
What is the cost to companies?
Teams lack the data agility required to innovate
Data is too expensive to obtain, or its quality isn’t sufficient.
“Companies arming their workers with data see a 32%
"significant increase" in product or service quality.”
So what’s the status quo?
8
Problem? Personally Identifying Information
9
The first step to protect data usually is to pseudonymize it
10
But data still contains information not unique to you:
"quasi-identifiers"
11
Sweeney, Latanya. Weaving Technology and Policy Together to Maintain Confidentiality. Journal of Law, Medicine
and Ethics, Vol. 25 1997, p. 98-110
Illustration: Massachusetts Governor leak
Medical data Voter list
12
Fingerprint-like information
• On its own, a fingerprint seems cryptic
• Around 100 minutiae in a fingerprint
• Experts declare a fingerprint match if 12 minutiae match
• Precise identification is possible if fingerprints are indexed and
queryable
13
Narayanan A, Shmatikov V. Robust de-anonymization of large sparse datasets. InSecurity and
Privacy, 2008. SP 2008. IEEE Symposium on 2008 May 18 (pp. 111-125). IEEE.
Illustration: Netflix Movie Preferences
14
Ratings of only 4-5
films made it
possible to
successfully identify
a large number of
users.
Take-away: Pseudonymization is not enough
15
● Pseudonymization is not sufficient
● Do not assume anything about the attack scenario
● Auxiliary dataset may contain Personally Identifiable
Information
16
But that would leave us with few to no data elements
17
“This regulation does not therefore concern
the processing of such anonymous
information, including for statistical or
research purposes.”
GDPR Recital 26
The best way to protect data, is to ensure strong safeguards
such as anonymization
A synthetic data generator to produce
anonymized data that will fuel
data-driven use-cases
18
What are we talking about?
19
What this might look like
20
What’s different about privacy-preserving synthetic data?
21
Data utility & data
privacy
Deep generative
models
Differential
privacy
+
Ability to use the data
What are the benefits of using it?
Greater data agility
Reduced corporate and financial risks.
22
Applications for privacy-preserving
synthetic data in the financial industry
23
Application: Next Stage of Anti Financial Crime
24
Application: Cross-border ML
● Production financial data is difficult to access and can’t be shared
across borders.
● In multinational organizations, data teams and specific subject matter
experts are not always where the data is.
● Synthetic data provides quick access to relevant data for development
and testing, reducing staffing costs, and accelerating development
speed.
25
Application: Personalized data-based services
26
Application: Supporting Innovation with Sandboxing
“...we have been exploring the concept of a digital sandbox.
This will enhance some existing features of our innovation
services [...] providing innovative firms access to high
quality synthetic data sets to be able to test and develop
proofs of concept in a digital testing environment.”
27
www.statice.ai
Visit our website for more
information on our product.

More Related Content

What's hot

IBM Big Data Platform Nov 2012
IBM Big Data Platform Nov 2012IBM Big Data Platform Nov 2012
IBM Big Data Platform Nov 2012
Swiss Big Data User Group
 
Simon Thomas - Big Data: New Opportunity, New Risk
Simon Thomas - Big Data: New Opportunity, New RiskSimon Thomas - Big Data: New Opportunity, New Risk
Simon Thomas - Big Data: New Opportunity, New Risk
Hoi Lan Leong
 
Data Virtualization: Fulfilling The Digital Transformation Requirement In Ban...
Data Virtualization: Fulfilling The Digital Transformation Requirement In Ban...Data Virtualization: Fulfilling The Digital Transformation Requirement In Ban...
Data Virtualization: Fulfilling The Digital Transformation Requirement In Ban...
Denodo
 
Big data
Big dataBig data
Big data
Ami Redwan Haq
 
Importance of Big data for your Business
Importance of Big data for your BusinessImportance of Big data for your Business
Importance of Big data for your Business
azuyo.com
 
Big Data: Trends, Applications and Potentials
Big Data: Trends, Applications and PotentialsBig Data: Trends, Applications and Potentials
Big Data: Trends, Applications and Potentials
Charles Mok
 
Big Data_Analytics - Stick Man Presentation
Big Data_Analytics - Stick Man PresentationBig Data_Analytics - Stick Man Presentation
Big Data_Analytics - Stick Man PresentationAlan Taylor
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
Mudit Mangal
 
What is big data ? | Big Data Applications
What is big data ? | Big Data ApplicationsWhat is big data ? | Big Data Applications
What is big data ? | Big Data Applications
ShilpaKrishna6
 
Digital Transformation: How to Build an Analytics-Driven Culture
Digital Transformation: How to Build an Analytics-Driven CultureDigital Transformation: How to Build an Analytics-Driven Culture
Digital Transformation: How to Build an Analytics-Driven Culture
Alexander Loth
 
Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...
Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...
Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...
Matt Stubbs
 
Technology Innovation Trends In Insurance | Navdeep Arora
Technology Innovation Trends In Insurance | Navdeep Arora Technology Innovation Trends In Insurance | Navdeep Arora
Technology Innovation Trends In Insurance | Navdeep Arora
Navdeep Arora
 
Protecting Sensitive Personal Data in the Enterprise
Protecting Sensitive Personal Data in the EnterpriseProtecting Sensitive Personal Data in the Enterprise
Protecting Sensitive Personal Data in the Enterprise
Tata Consultancy Services
 
Neo4j Aura Enterprise
Neo4j Aura EnterpriseNeo4j Aura Enterprise
Neo4j Aura Enterprise
Neo4j
 
Turning Big Data to Business Advantage
Turning Big Data to Business AdvantageTurning Big Data to Business Advantage
Turning Big Data to Business Advantage
Teradata Aster
 
Fraud and Risk in Big Data
Fraud and Risk in Big DataFraud and Risk in Big Data
Fraud and Risk in Big Data
Umma Khatuna Jannat
 
Top Ten Big Data Trends in Finance
Top Ten Big Data Trends in FinanceTop Ten Big Data Trends in Finance
Top Ten Big Data Trends in Finance
PromptCloud
 
Blockchain - "Hype, Reality and Promise" - ISG Digital Business Summit, 2018
Blockchain - "Hype, Reality and Promise" - ISG Digital Business Summit, 2018 Blockchain - "Hype, Reality and Promise" - ISG Digital Business Summit, 2018
Blockchain - "Hype, Reality and Promise" - ISG Digital Business Summit, 2018
Alex Manders
 
The data value map for GDPR - How to extract Business Value from your GDPR Pr...
The data value map for GDPR - How to extract Business Value from your GDPR Pr...The data value map for GDPR - How to extract Business Value from your GDPR Pr...
The data value map for GDPR - How to extract Business Value from your GDPR Pr...
Ken O'Connor
 

What's hot (20)

IBM Big Data Platform Nov 2012
IBM Big Data Platform Nov 2012IBM Big Data Platform Nov 2012
IBM Big Data Platform Nov 2012
 
Simon Thomas - Big Data: New Opportunity, New Risk
Simon Thomas - Big Data: New Opportunity, New RiskSimon Thomas - Big Data: New Opportunity, New Risk
Simon Thomas - Big Data: New Opportunity, New Risk
 
Data Virtualization: Fulfilling The Digital Transformation Requirement In Ban...
Data Virtualization: Fulfilling The Digital Transformation Requirement In Ban...Data Virtualization: Fulfilling The Digital Transformation Requirement In Ban...
Data Virtualization: Fulfilling The Digital Transformation Requirement In Ban...
 
Big data
Big dataBig data
Big data
 
Importance of Big data for your Business
Importance of Big data for your BusinessImportance of Big data for your Business
Importance of Big data for your Business
 
Big Data: Trends, Applications and Potentials
Big Data: Trends, Applications and PotentialsBig Data: Trends, Applications and Potentials
Big Data: Trends, Applications and Potentials
 
Pres_Big Data for Finance_vsaini
Pres_Big Data for Finance_vsainiPres_Big Data for Finance_vsaini
Pres_Big Data for Finance_vsaini
 
Big Data_Analytics - Stick Man Presentation
Big Data_Analytics - Stick Man PresentationBig Data_Analytics - Stick Man Presentation
Big Data_Analytics - Stick Man Presentation
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
 
What is big data ? | Big Data Applications
What is big data ? | Big Data ApplicationsWhat is big data ? | Big Data Applications
What is big data ? | Big Data Applications
 
Digital Transformation: How to Build an Analytics-Driven Culture
Digital Transformation: How to Build an Analytics-Driven CultureDigital Transformation: How to Build an Analytics-Driven Culture
Digital Transformation: How to Build an Analytics-Driven Culture
 
Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...
Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...
Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...
 
Technology Innovation Trends In Insurance | Navdeep Arora
Technology Innovation Trends In Insurance | Navdeep Arora Technology Innovation Trends In Insurance | Navdeep Arora
Technology Innovation Trends In Insurance | Navdeep Arora
 
Protecting Sensitive Personal Data in the Enterprise
Protecting Sensitive Personal Data in the EnterpriseProtecting Sensitive Personal Data in the Enterprise
Protecting Sensitive Personal Data in the Enterprise
 
Neo4j Aura Enterprise
Neo4j Aura EnterpriseNeo4j Aura Enterprise
Neo4j Aura Enterprise
 
Turning Big Data to Business Advantage
Turning Big Data to Business AdvantageTurning Big Data to Business Advantage
Turning Big Data to Business Advantage
 
Fraud and Risk in Big Data
Fraud and Risk in Big DataFraud and Risk in Big Data
Fraud and Risk in Big Data
 
Top Ten Big Data Trends in Finance
Top Ten Big Data Trends in FinanceTop Ten Big Data Trends in Finance
Top Ten Big Data Trends in Finance
 
Blockchain - "Hype, Reality and Promise" - ISG Digital Business Summit, 2018
Blockchain - "Hype, Reality and Promise" - ISG Digital Business Summit, 2018 Blockchain - "Hype, Reality and Promise" - ISG Digital Business Summit, 2018
Blockchain - "Hype, Reality and Promise" - ISG Digital Business Summit, 2018
 
The data value map for GDPR - How to extract Business Value from your GDPR Pr...
The data value map for GDPR - How to extract Business Value from your GDPR Pr...The data value map for GDPR - How to extract Business Value from your GDPR Pr...
The data value map for GDPR - How to extract Business Value from your GDPR Pr...
 

Similar to How financial organizations can use synthetic data to overcome data inertia | Statice Webinar

Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
Ulf Mattsson
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
Velrada
 
Acumen insurance Data Warehouse
Acumen insurance Data WarehouseAcumen insurance Data Warehouse
Acumen insurance Data Warehouse
NIIT Technologies
 
-Enrichment - Unlocking the value of data for digital transformation - Big Da...
-Enrichment - Unlocking the value of data for digital transformation - Big Da...-Enrichment - Unlocking the value of data for digital transformation - Big Da...
-Enrichment - Unlocking the value of data for digital transformation - Big Da...
webwinkelvakdag
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
NetIQ
 
Analytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookAnalytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface look
Deloitte Canada
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
Puneet Kukreja
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Onyebuchi nosiri
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Onyebuchi nosiri
 
Looking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance DeadlineLooking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance Deadline
accenture
 
GWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox BlueGWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVA
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
Ulf Mattsson
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Enterprise Management Associates
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...
Ulf Mattsson
 
Big data analytics for life insurers
Big data analytics for life insurersBig data analytics for life insurers
Big data analytics for life insurers
dipak sahoo
 
Big_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_publishedBig_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_publishedShradha Verma
 
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
IT Support Engineer
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentationVincent Kwon
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...Eftychia Chalvatzi
 

Similar to How financial organizations can use synthetic data to overcome data inertia | Statice Webinar (20)

Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
Acumen insurance Data Warehouse
Acumen insurance Data WarehouseAcumen insurance Data Warehouse
Acumen insurance Data Warehouse
 
-Enrichment - Unlocking the value of data for digital transformation - Big Da...
-Enrichment - Unlocking the value of data for digital transformation - Big Da...-Enrichment - Unlocking the value of data for digital transformation - Big Da...
-Enrichment - Unlocking the value of data for digital transformation - Big Da...
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Analytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookAnalytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface look
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
 
Looking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance DeadlineLooking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance Deadline
 
GWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox BlueGWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...
 
Big data analytics for life insurers
Big data analytics for life insurersBig data analytics for life insurers
Big data analytics for life insurers
 
Big_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_publishedBig_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_published
 
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

How financial organizations can use synthetic data to overcome data inertia | Statice Webinar

  • 1. How financial organizations can use synthetic data to overcome data inertia Statice webinar
  • 2. Visit our website to access the recording of this presentation
  • 3. Benjamin Nolan Head of Business Development at Statice Working with Statice's partners to help them overcome their data access and privacy challenges with privacy-preserving synthetic data. Speakers Sven Guhr Associate Director at Sopra Steria Working on the topics of data analytics & artificial intelligence for many years, advising leading financials organizations. 2
  • 4. Synthetic data to produce anonymized data that will fuel data-driven use-cases Applications for privacy-preserving synthetic data in the financial industry The challenges of data-driven innovation & the competitive costs of data inertia Agenda I. II . III. 3
  • 5. The challenges of data-driven innovation & the competitive costs of data inertia 4
  • 6. Data fuels operational efficiency, personalized customer experiences and product development. Why is data so important? “Customer intelligence will be the most important predictor of revenue growth and profitability [...]” Machine learning applications, and cloud infrastructures are gaining in popularity. Both require greater data access and agility.
  • 7. Data protection regulations in Europe What prevents companies from accessing and using data? “between 40 and 90 percent of banks’ workloads globally could move to the cloud in a decade. [...] However, personally sensitive data and trading data have not moved.” Legacy systems with proprietary formats or siloed IT infrastructures Data is too expensive to obtain, or its quality isn’t sufficient.
  • 8. Data processing becomes a financial and business burden because it’s resources intensive. What is the cost to companies? Teams lack the data agility required to innovate Data is too expensive to obtain, or its quality isn’t sufficient. “Companies arming their workers with data see a 32% "significant increase" in product or service quality.”
  • 9. So what’s the status quo? 8
  • 11. The first step to protect data usually is to pseudonymize it 10
  • 12. But data still contains information not unique to you: "quasi-identifiers" 11
  • 13. Sweeney, Latanya. Weaving Technology and Policy Together to Maintain Confidentiality. Journal of Law, Medicine and Ethics, Vol. 25 1997, p. 98-110 Illustration: Massachusetts Governor leak Medical data Voter list 12
  • 14. Fingerprint-like information • On its own, a fingerprint seems cryptic • Around 100 minutiae in a fingerprint • Experts declare a fingerprint match if 12 minutiae match • Precise identification is possible if fingerprints are indexed and queryable 13
  • 15. Narayanan A, Shmatikov V. Robust de-anonymization of large sparse datasets. InSecurity and Privacy, 2008. SP 2008. IEEE Symposium on 2008 May 18 (pp. 111-125). IEEE. Illustration: Netflix Movie Preferences 14 Ratings of only 4-5 films made it possible to successfully identify a large number of users.
  • 16. Take-away: Pseudonymization is not enough 15 ● Pseudonymization is not sufficient ● Do not assume anything about the attack scenario ● Auxiliary dataset may contain Personally Identifiable Information
  • 17. 16 But that would leave us with few to no data elements
  • 18. 17 “This regulation does not therefore concern the processing of such anonymous information, including for statistical or research purposes.” GDPR Recital 26 The best way to protect data, is to ensure strong safeguards such as anonymization
  • 19. A synthetic data generator to produce anonymized data that will fuel data-driven use-cases 18
  • 20. What are we talking about? 19
  • 21. What this might look like 20
  • 22. What’s different about privacy-preserving synthetic data? 21 Data utility & data privacy Deep generative models Differential privacy +
  • 23. Ability to use the data What are the benefits of using it? Greater data agility Reduced corporate and financial risks. 22
  • 24. Applications for privacy-preserving synthetic data in the financial industry 23
  • 25. Application: Next Stage of Anti Financial Crime 24
  • 26. Application: Cross-border ML ● Production financial data is difficult to access and can’t be shared across borders. ● In multinational organizations, data teams and specific subject matter experts are not always where the data is. ● Synthetic data provides quick access to relevant data for development and testing, reducing staffing costs, and accelerating development speed. 25
  • 28. Application: Supporting Innovation with Sandboxing “...we have been exploring the concept of a digital sandbox. This will enhance some existing features of our innovation services [...] providing innovative firms access to high quality synthetic data sets to be able to test and develop proofs of concept in a digital testing environment.” 27
  • 29. www.statice.ai Visit our website for more information on our product.