2026-03-13 –, Breakout
The assume breach point of view has become the norm for security professionals, recognizing that incidents are bound to happen sooner or later. But what about breaches that go beyond the typical security threats exploited by malicious outsiders? In this talk, we will dive into privacy breaches, from major well-published scandals to smaller, barely mentioned cases, showing the impact of weak privacy design and how these breaches could have been avoided.
Through these high profile privacy incidents, we will derive actionable learning that you can integrate into your current security practices, ensuring your products will be both secure and privacy-respecting.
Privacy tends to be this vague and abstract topic, typically associated with legal compliance. It is not!
Don’t expect a boring lecture about privacy awareness, but an entertaining overview of real-life cases and scenarios. We’ll rant together about the consequences of poor product design, the crazy need to collect as much data as we can, and the use of AI for the sake of using AI. And, we’ll tackle some privacy misconceptions while doing so. You’ll even step away with some actionable take-aways to embed privacy in your security practices.
Dr. Kim Wuyts is a leading privacy engineer with close to 20 years of experience in security and privacy. Before joining PwC as Manager Cyber & Privacy, Kim was a senior researcher at KU Leuven where she led the development and extension of LINDDUN, a popular privacy threat modeling framework. Her mission is to raise privacy awareness and get organizations to embrace privacy engineering best practices. She is a guest lecturer, experienced speaker, trainer, and invited keynote at international privacy and security conferences such as OWASP Global AppSec, RSA, Troopers, CPDP, and IAPP DPC.
Kim is also a co-author of the Threat Modeling Manifesto, and program co-chair of the International Workshop on Privacy Engineering (IWPE).
