Back to Blog Lobby

Start With Value: A Pragmatic Guide to Launching PETs Projects

PETs in Practice: How J.P. Morgan Puts Privacy-Enhancing Technologies into Production

Most Privacy-Enhancing Technologies (PETs) projects don’t fail because the math is flawed. They fail because they get stuck answering a deceptively simple question from the business:

“So what?”

When the pitch for PETs begins and ends with “privacy,” it often fails to gain traction. This isn’t because privacy is unimportant, but because most organizations already have established methods for managing it: legal agreements, data minimization, de-identification, and trusted third-party intermediaries.

This creates a trap. PETs are perceived as a more complex version of an existing workaround, rather than what they truly are: a vehicle for unlocking business outcomes that are otherwise blocked by risk, regulation, or competitive friction.

To move PETs from a research curiosity to a production priority, the conversation must start where the business lives: value.

A Key Lesson: Privacy is a Feature, Not the Pitch

In a recent webinar on the use of PETs in real-world projects, Antigoni Polychroniadou of J.P.Morgan made a critical point: when teams already have a solution like a trusted third party, a pitch centered on “privacy” is insufficient to justify change. The business will naturally respond with a list of legitimate concerns:

  • “We have a process for this already.”
  • “The current solution works well enough.”
  • “This sounds too complex and slow.”
  • “Is it worth the risk of changing what we do today?”

She offered a perfect example: banks pooling “bad beneficiary” lists to combat fraud. In theory, PETs allow these banks to find overlaps without revealing their proprietary lists. In practice, many already use a third-party vendor for this function.

So, what is the compelling argument for PETs?

It isn’t “better privacy.” It’s better outcomes.

Polychroniadou’s point is that if banks don’t fully trust the intermediary, they may be holding back their most sensitive or recent data. With the mathematical guarantees of PETs, they can contribute more complete datasets with greater confidence. This improves the quality of the shared intelligence and, ultimately, leads to more effective fraud detection for everyone.

The pitch transforms from risk mitigation to value creation: PETs increase participation and improve data quality because trust is no longer the limiting factor.

A Go-to-Market Framework for PETs Projects: Enabler vs. Displacer

A clear way to structure this value-first approach is to determine whether PETs will serve as an enabler for a new process or a displacer of an existing one.

1. If the Problem is Currently Unsolved

Here, PETs act as an Enabler, making a new type of collaboration possible. The business case should quantify what new capability is being unlocked.

Key questions to answer:

  • What valuable analysis or product can we launch that is impossible today?
  • What is the estimated worth of this new capability?
  • What is the cost of inaction or maintaining the status quo?

A prime example is a secure auction or matching system where participants will not join if their sensitive intent is exposed. PETs enable the market to exist in the first place.

2. If the Problem is “Solved” with a Trusted Third Party

Here, PETs act as a Displacer, offering a superior alternative. The business case must demonstrate that the existing solution is leaving value, security, or efficiency on the table.

Key questions to answer:

  • Where are our results being degraded because participants are holding back data?
  • What are the explicit and hidden costs (vendor fees, audit overhead, risk exposure) of the current trust model?
  • What new partnerships or use cases become viable if data never has to be exposed?

In both scenarios, privacy is an essential feature, but the engine driving the project forward is tangible business value.

Business Value Drivers for PETs Projects

When PETs projects gain internal traction, they almost always map to one of these core value propositions:

  1. Revenue Enablement: Launching a new product, partner ecosystem, or data monetization strategy that was previously blocked by privacy or security concerns.
  2. Improved Outcomes Through Broader Participation: The “more data, less fear” effect. This leads to better fraud detection, more accurate risk modeling, or higher-performing federated machine learning.
  3. Accelerated Time-to-Value: Using PETs as a standardized, repeatable pattern for collaboration to collapse months of legal, security, and data-sharing negotiations into weeks.
  4. Meaningful Risk and Liability Reduction: Moving beyond vague “privacy risk” to address concrete concerns like eliminating central data honeypots, reducing the blast radius of a potential breach, and establishing a provably compliant audit posture.
  5. Cost Displacement: Directly replacing or reducing the costs associated with trusted third-party vendors, manual data preparation, and compliance overhead.

Successful project proposals typically focus on one primary and one secondary value driver. Pitching all five at once can dilute the message and appear unfocused.

How to Get PETs Projects Approved Inside the Enterprise

  1. Identify a Business Problem with Executive Visibility. Look for areas where the business is already feeling pain: repeated blockers in partnerships, tightening regulatory constraints, or reliance on a costly “trust broker.” A project without a pre-existing pain point risks being seen as a research exercise.
  2. Formulate the “Value Hypothesis” in a Single Sentence. This statement should be about the business outcome, not the technology. For example: “We can reduce fraud losses by X% by increasing cross-bank match coverage without exposing customer lists.”
  3. Quantify the Upside with Credible, Directional Metrics. Precision isn’t necessary at the outset; credibility is. Use simple, understandable figures related to dollars (revenue gained, costs saved), time (months of delay removed), or participation (increase in data contribution or partners).
  4. Prototype the “Proof of Value,” Not the “Proof of Cryptography.” Many teams err by focusing pilot projects on proving the PETs work. Instead, prove the workflow works. Demonstrate that partners are willing to participate and that the output is valuable enough to justify the effort.
  5. Select the PETs Stack Based on the Validated Use Case. Secure computation has costs. The specific technique should be chosen only after the value has been established. Whether you need FHE, MPC, federated learning, differential privacy, or a trusted execution environment depends entirely on the problem you’ve proven is worth solving.

PETs Project Use Case: Cross-Bank Credit Risk Modeling in Financial Services

One of the most compelling PETs projects in financial services focuses on cross-bank credit risk modeling, an area where collaboration is valuable but traditional data sharing is effectively impossible.

Banks, lenders, and financial institutions each hold partial insight into credit exposure, default patterns, and early warning indicators. During periods of economic volatility, this fragmentation leads to delayed responses, conservative modeling assumptions, and inefficient capital allocation.

In theory, collaborative modeling would significantly improve outcomes. In practice, sharing loan-level or counterparty data across institutions introduces unacceptable regulatory, commercial, and reputational risk.

The “Solved” Approach: Trusted Third Parties and Aggregation

Today, most institutions address this challenge through:

  • Aggregated or anonymized reporting
  • Periodic regulatory disclosures
  • Industry utilities or trusted third-party intermediaries

While compliant, these approaches degrade value. Data is summarized, delayed, or selectively contributed, resulting in models that lack precision and timeliness.

From a business perspective, this is a classic example of a PETs project opportunity hidden inside an apparently “solved” problem.

How Privacy-Enhancing Technologies (PETs) Enable a Better Outcome

With Privacy-Enhancing Technologies (PETs), financial institutions can jointly train credit risk or stress-testing models without exposing raw data, portfolios, or customer information.

Each participant computes locally on its own sensitive data. Only cryptographically protected outputs are shared for collaborative analysis. No centralized dataset is created, and no party gains visibility into another’s inputs.

The result is a fundamentally different trust model.

Business Value: Why This PETs Project Gets Approved

This PETs project delivers measurable business outcomes:

  • Improved model accuracy through broader and more current data contribution
  • Earlier detection of systemic credit risk across institutions
  • Better capital allocation decisions driven by higher-quality signals
  • Reduced regulatory and compliance exposure without expanding data-sharing obligations

Because participants no longer need to rely on contractual trust alone, they are willing to contribute more complete and timely data. The quality of collaboration improves, and so do the results.

What This Teaches About Successful PETs Projects

This use case highlights a recurring pattern across successful PETs projects:

They do not win by promising “better privacy.”
They win by enabling better decisions, faster collaboration, and higher-quality outcomes.

Privacy-Enhancing Technologies are a mechanism for unlocking business value that existing trust models suppress.

The Critical Shift in Perspective

PETs projects fail when they are framed as a privacy upgrade, a security initiative, or a research experiment.

They succeed when they are championed as a revenue enabler, an ecosystem unlock, or a strategy for making new and valuable collaborations possible.

The fastest path to production isn’t teaching the organization about cryptography. It’s showing them what they stand to gain. Once the business value is undeniable, the organization will find the time, budget, and patience required for the technology.

That is how PETs projects move from theory to reality.

Watch the full webinar here.

Sign up for more knowledge and insights from our experts