Model threats clearly
Frame realistic re-identification risks using context, attacker assumptions, and auxiliary data.
Hands-on technical workshop
Learn how to reduce re-identification risk while preserving analytical utility with concrete methods, labs, and risk-based decision frameworks.
Designed for practitioners who work with sensitive or regulated data and need practical anonymization decisions they can defend.
One full day, hands-on, with guided labs.
Capacity: 36 participants (24 in-person + 12 online).
By the end of the workshop, participants can choose methods based on risk, utility, and implementation constraints.
Frame realistic re-identification risks using context, attacker assumptions, and auxiliary data.
Use k-anonymity, l-diversity, and t-closeness with awareness of strengths and common pitfalls.
Understand differential privacy concepts and practical synthetic data tradeoffs.
Compare anonymization options with utility metrics and documented risk decisions.
Detailed timing and prerequisites are listed on the Agenda page.
Scope, definitions, legal context, and threat modeling fundamentals.
Classical privacy models and utility/risk evaluation methods.
Notebook-based anonymization tasks with guided checks and peer review.
Operational rollout patterns, governance checkpoints, and next steps.
Clear terminology is essential before discussing methods or legal expectations.
Educational content only, not legal advice.