Skip to main content

Measuring the Effectiveness of Data Protection

How can we measure whether our data is truly protected? It starts with understanding risk—the probability of a negative event (e.g., breach, unauthorized inference) multiplied by the severity of that event.

We'll explore:

  • The different kinds of threats (insider, external, data broker)
  • Why simple controls can fall short
  • How we plan to measure protection, including the Anonymeter concept (linkability, singling out risk, inference).