Mingshen Sun
Safeguarding Sensitive Data Access At Scale with Privacy-Enhancing Technologies
#1about 1 minute
The challenge of data security in microservice architectures
Microservice architectures offer scalability but create data protection challenges as sensitive data flows freely between many services.
#2about 5 minutes
Understanding confidential computing and trusted execution environments
Confidential computing uses hardware-based trusted execution environments (TEEs) to isolate data and code during processing, providing verifiable proof through remote attestation.
#3about 4 minutes
Key challenges of applying PETs at scale
Implementing privacy-enhancing technologies at scale is difficult due to microservice flexibility, the need for fine-grained purpose limitation, and providing verifiable transparency.
#4about 5 minutes
A solution combining serverless and confidential computing
A proposed architecture uses serverless computing to isolate sensitive data logic within a trusted execution environment, combined with pseudonymization for end-to-end protection.
#5about 4 minutes
Enabling third-party verification with remote attestation
Remote attestation allows third parties to verify workloads, enabling trusted management of key services like KMS and attestation services for hardware-backed access control.
#6about 2 minutes
Summary of the data protection architecture
The solution combines serverless computing, end-to-end data protection, and third-party verification to secure sensitive data in microservices while preserving flexibility.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
07:07 MIN
Introducing a two-stage data clean room solution
TikTok's Privacy Innovation
04:26 MIN
Limitations of existing data privacy solutions
TikTok's Privacy Innovation
09:49 MIN
How trusted execution environments enable secure collaboration
TikTok's Privacy Innovation
18:57 MIN
Moving from perimeter defense to workload microsegmentation
You can’t hack what you can’t see
19:14 MIN
Addressing data privacy and security in AI systems
Graphs and RAGs Everywhere... But What Are They? - Andreas Kollegger - Neo4j
00:49 MIN
Understanding the challenges of secure data collaboration
TikTok's Privacy Innovation
25:02 MIN
Securing data with a zero-trust and in-VPC model
Tomorrow's cloud data platforms - fully managed database-as-a-service (DBaaS)
25:33 MIN
AI privacy concerns and prompt engineering
Coffee with Developers - Cassidy Williams -
Featured Partners
Related Videos
TikTok's Privacy Innovation
Mingshen Sun
This Machine Ends Data Breaches
Liz Moy
Beyond the Hype: Building Trustworthy and Reliable LLM Applications with Guardrails
Alex Soto
Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems
Adam Larter
GenAI Security: Navigating the Unseen Iceberg
Maish Saidel-Keesing
You can’t hack what you can’t see
Reto Kaeser
Prompt Injection, Poisoning & More: The Dark Side of LLMs
Keno Dreßel
Secure and Private AI - DeepMask
Hissan Usmani
From learning to earning
Jobs that call for the skills explored in this talk.



Cloud Solution Architect - Security
Microsoft
Intermediate
DNS
Azure
Linux
Data analysis
Microsoft Access
+3

Partner Cloud Solution Architect - Security
Microsoft Deutschland GmbH
€187-208K
Azure
Amazon Web Services (AWS)




