CSAIChaptersEventsBlog

Working Group

Privacy

The Privacy Working Group advocates Privacy Enhancing Technologies (PETs), providing commentary and guidance about legislation, standards and frameworks. This group consolidates best practices from a variety of PETs and provides thought leadership about hybrid implementations that leverage multiple technologies.
View Current Projects
The Privacy Working Group advances PETs and engineering practices that protect sensitive data throughout its entire lifecycle, and especially during processing, where it is most vulnerable. The group focuses on privacy-by-design technologies that enable secure analytics, collaboration, and data-driven innovation without exposing data, such as Confidential Computing, Differential Privacy Engineering (DPE), Fully Homomorphic Encryption (FHE), Secure Multi-Party Computation (SMPC), Trusted Execution Environments (TEEs), and Zero Knowledge Proofs (ZKP).

Through research and collaboration, this group promotes practical approaches for integrating strong privacy protections into modern cloud environments. Its mission is to provide a hub and central community resource for best practices, as well as guidance on incorporating multiple PETS into the cloud’s privacy lifecycles, by making specialist knowledge publically accessible.

Working Group Leadership

Josh Buker
Josh Buker

Josh Buker

Research Analyst, CSA

Ryan Gifford
Ryan Gifford

Ryan Gifford

Senior Research Analyst, CSA

Working Group Co-Chairs

Mark Bower
Mark Bower

Mark Bower

VP, Product Management at Anjuna

Mark Bower has two decades of experience at leading security companies in the U.S., Australia, U.K., and Germany. He is a noted expert in data protection, data privacy, and information risk reduction. Before joining Anjuna, where he owns product strategy for advanced confidential computing, he headed product and business strategy for Comforte AG, Voltage Security (acquired by HPE) and the Atalla HSM business at Hewlett Packard Enterprise. ...

Read more

Daniella Alpher
Daniella Alpher

Daniella Alpher

Lattica.ai

Daniella Alpher is an experienced tech marketer who specializes in strategy, branding and content marketing. Before focusing on marketing for cybersecurity and AI, she worked as a television producer at ABC News in New York, where she produced news segments for Good Morning America. Daniella has led marketing at CoolaData, Iguazio, DeepKeep, RevealSecurity and PeerSpot. She holds an MBA from INSEAD.

Read more

Joseph Wilson
Joseph Wilson

Joseph Wilson

Joseph Wilson is co-Chair for the Cloud Security Alliance's (CSA's) Fully Homomorphic Encryption (FHE) Working Group (WG), which was formed to address industrial deployment and adoption of FHE and to help the industry navigate this branch of Privacy Enhancing Technologies. He holds a PhD in Theoretical Physics from the University of Leeds, and an MPhys in Experimental Physics from the University of York. He is currently Head of Strategic In...

Read more

Steve Foster
Steve Foster

Steve Foster

Publications in ReviewOpen Until
Comparing FHE and Other PETsApr 17, 2026
MLOps Threat ModelApr 17, 2026
View all
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Virtual Meetings

Attend our next meeting. You can just listen in to decide if this group is a good for you or you can choose to actively participate. During these calls we discuss current projects, and well as share ideas for new projects. This is a good way to meet the other members of the group. You can view all research meetings here.

Apr

15

Wed, April 15, 9:00am - 10:00am PDT
CSA Privacy - FHE Workstream
See details
This is a recurring call for the CSA Privacy Working Group, focusing specifically on the Fully Homomorphic Encryption topic.

Join the call using this zoom link: https://csaurl.org/privacy-call

Apr

21

Tue, April 21, 10:00am - 10:55am PDT
CSA Privacy - Confidential Computing Workstream
See details
This is a recurring call for the CSA Privacy Working Group, focusing specifically on the confidential computing topic.

Join the call using this zoom link: https://csaurl.org/privacy-call

Apr

29

Wed, April 29, 9:00am - 10:00am PDT
CSA Privacy - FHE Workstream
See details
This is a recurring call for the CSA Privacy Working Group, focusing specifically on the Fully Homomorphic Encryption topic.

Join the call using this zoom link: https://csaurl.org/privacy-call

May

5

Tue, May 5, 10:00am - 10:55am PDT
CSA Privacy - Confidential Computing Workstream
See details
This is a recurring call for the CSA Privacy Working Group, focusing specifically on the confidential computing topic.

Join the call using this zoom link: https://csaurl.org/privacy-call

May

13

Wed, May 13, 9:00am - 10:00am PDT
CSA Privacy - FHE Workstream
See details
This is a recurring call for the CSA Privacy Working Group, focusing specifically on the Fully Homomorphic Encryption topic.

Join the call using this zoom link: https://csaurl.org/privacy-call

May

19

Tue, May 19, 10:00am - 10:55am PDT
CSA Privacy - Confidential Computing Workstream
See details
This is a recurring call for the CSA Privacy Working Group, focusing specifically on the confidential computing topic.

Join the call using this zoom link: https://csaurl.org/privacy-call

May

27

Wed, May 27, 9:00am - 10:00am PDT
CSA Privacy - FHE Workstream
See details
This is a recurring call for the CSA Privacy Working Group, focusing specifically on the Fully Homomorphic Encryption topic.

Join the call using this zoom link: https://csaurl.org/privacy-call

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

Comparing FHE and Other PETs

Open Until: 04/17/2026

Privacy-enhancing technologies offer a broad spectrum of solutions for challenges related to data confidentiality. However,...

MLOps Threat Model

Open Until: 04/17/2026

This paper sets the foundation for how we can apply the threat modelling practice of DevSecOps to MLOps.Please revi...