Podcasts about data protection

  • 1,129PODCASTS
  • 3,497EPISODES
  • 34mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jun 26, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about data protection

Show all podcasts related to data protection

Latest podcast episodes about data protection

Serious Privacy
Almost too much to Handle - Week in privacy

Serious Privacy

Play Episode Listen Later Jun 26, 2025 40:09


Send us a textOn this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien of Reinbo Consulting, and Dr. K Royal connect on a week in privacy - almost too much to cover, so it's a little long. Mainly we talk about the UK Data Use and Access Bill, the third extension of TikTok's required sale, Meta deploying ads to Whatsapp, and noyb suing two data protection authorities over delayed investigation and enforcement. Lastly, big shoutout to Alexander White in his new appointment as Queensland's new privacy commissioner. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.

Accenture InfoSec Beat
InfoSec Beat: Careers in Information Security – Client Data Protection

Accenture InfoSec Beat

Play Episode Listen Later Jun 19, 2025 25:59


This episode of the InfoSec Beat podcast focuses on careers in information security. Accenture CISO Kris Burkhardt talks with Kyle Friedman, who leads Security Contracting and Request for Proposal Support for our Information Security Client Data Protection team. She ensures that we have the right provisions in our proposal responses and contracts to run engagements in a secure fashion that works for both Accenture and our clients. Learn about Kyle's unconventional start at Accenture, passion for client data protection, and ability to translate information security topics to people outside the field. Her career advice? Always listen and keep an open mind.

Serious Privacy
Data Makes the World Go Round (with Noël Luke)

Serious Privacy

Play Episode Listen Later Jun 18, 2025 33:07


Send us a textIt's been a while since we last talked about cross-border data transfers, but that does not mean that all issues have resolved themselves. And while the focus may still largely be on the EU-US relations for data transfers, the core developments actually relate to the Global Cross-Border Privacy Rules. Therefore, on this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien of Reinbo Consulting, and Dr. K Royal connect with Noël Luke, chief assurance officer at TrustArc. She joined TrustArc in 2015 and is responsible for overseeing and enhancing TrustArc's robust assurance programs, which include certifications under the Global and APEC cross-border privacy rules, as well as verifications under the respective Data Privacy Frameworks between the US and the EU, UK and Switzerland. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.

Regulation Tomorrow Podcast
Inside investigations: Episode 7 | Data privacy considerations in investigations

Regulation Tomorrow Podcast

Play Episode Listen Later Jun 18, 2025 23:55


In the seventh episode of our Inside Investigations podcast series, Jeremy Lua (Counsel, APAC Cybersecurity and Data Privacy, Singapore), Fiona Bundy-Clarke (Counsel, Data Protection and Technology, London), Ashley Kuempel (Partner, Regulations, Investigations, Security and Compliance, Austin), Rita Nader-Guéroult (Counsel, Investigations and Business Ethics Team, Paris) and Rongxin Huang (Partner, Shanghai Pacific Legal, Shanghai) delve into data privacy and security considerations in internal and regulatory investigations, particularly those with a cross-border element. Building upon our previous episode about common data sources and challenges in data collection, this episode explores the significant impact that data protection regulations—such as the EU / UK's GDPR—have on the necessary collection and processing of large volumes of personal data over the course of an investigation.

MacVoices Audio
MacVoices #25169: A Developers' Eye Perspective from MacPaw (1)

MacVoices Audio

Play Episode Listen Later Jun 16, 2025 34:38


Senior Software Engineer Serhii Popov and Product Manager Pavlo Haidamak, both of MacPaw, offer an inside look at how CleanMyMac is built with user trust, transparency, and security at the forefront. They discuss how evolving regulations like GDPR and Apple's system restrictions have changed the way software is developed, tested, and updated. The conversation explores balancing user control with ease of use, why informed permission requests matter, and how user feedback directly shapes product improvements. With examples from their own workflows and challenges, they highlight what it means to build responsible software in an age of heightened privacy concerns.0:09 Introduction to MacPaw's Perspective (Part 1)  This edition of MacVoices is supported by Notion, the best AI tool for work. Check it out at notion.com/macvoices. Show Notes: Chapters: 01:49 Roles and Responsibilities at MacPaw 03:58 Evolving Demands in Software Development 04:50 Trust and Security in Software 09:36 Educating Customers on Data Privacy 13:21 Permission Requests and User Experience 17:17 Customer Experience with CleanMyMac 20:47 The Importance of User Feedback 32:31 Closing Thoughts on User Control Links: MacPaw Discord Server: https://discord.gg/eN4dX2RRkN Guests: Pavlo Haidamak is a Product Manager at MacPaw, currently leading the team behind CleanMyMac. With a background in Computer Science, Pavlo began his career as a QA engineer and has since managed acclaimed products such as Gemini 2, Setapp, and SpyBuster. As a CODA (Child of Deaf Adults), he is dedicated to driving innovation and making apps smarter and more accessible. Outside of technology, Pavlo is an avid painter and analogue photography enthusiast, with a particular love for Polaroid cameras. In his free time, he enjoys baking bread, vibe coding and spending time with his tiny chihuahua, Loretta. You can connect with him here: www.linkedin.com/in/haidamak Serhi Popovi is a Senior Software Engineer at MacPaw with more than 7 years of experience developing world-class multi-platform apps. An expert in Swift, Swift Multiplatform, MarketplaceKit, Accessibility and other technologies, he's worked on several projects like Setapp, Setapp software development kit, and Spark Email. As the engineering lead of Setapp Mobile, Serhii has lead his team to develop one of the first successful alternative marketplaces for iOS, all while contributing to the Apple developer community through conference presentations, advocacy, and education.You can connect with him here:  LinkedIn - linkedin.com/in/serg-i  X: x.com/zaris__  Website: bysergi.com Support:      Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:      http://macvoices.com      Twitter:      http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices      Mastodon:      https://mastodon.cloud/@chuckjoiner      Facebook:      http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:      http://www.facebook.com/macvoices/      MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice      LinkedIn:      https://www.linkedin.com/in/chuckjoiner/      Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

Microsoft Mechanics Podcast
Introducing Microsoft Purview Alert Triage Agents for Data Loss Prevention & Insider Risk Management

Microsoft Mechanics Podcast

Play Episode Listen Later Jun 16, 2025 8:07 Transcription Available


Boost data security and automate prioritization for data alerts with Security Copilot-powered Alert Triage Agents for Microsoft Purview Data Loss Prevention and Insider Risk Management. Surface the highest-risk alerts across your environment, no matter their default severity, and take action. Customize how your agents reason, teach them what matters to your organization, and continuously refine to reduce time-to-resolution. Talhah Mir, Microsoft Purview Principal GPM, shows how to triage, investigate, and contain potential data risks before they escalate. ► QUICK LINKS:  00:00 - Agents in Microsoft Purview 00:58 - Alert Triage Agent for DLP 01:54 - Customize Agents 03:32 - View prioritized alerts 05:17 - Calibrate Agent Behavior with Feedback 06:38 - Track Agent Performance and Usage 07:34 - Wrap up ► Link References Check out https://aka.ms/PurviewTriageAgents ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics

Clarkslegal Podcast
WhatsApp in the workplace: Is it legally safe?

Clarkslegal Podcast

Play Episode Listen Later Jun 16, 2025 9:15 Transcription Available


WhatsApp is a convenient and quick way to communicate with colleagues and clients, but is it legally safe to use in the workplace? In this podcast, Lucy White and Monica Mastropasqua, members of the Data Protection team at Clarkslegal, will address frequently asked questions from clients regarding the use of WhatsApp at work. Key topics include:The difference between personal and professional boundaries when using WhatsApp The fact that WhatsApp messages are not stored on company servers The widespread use of WhatsApp on personal devices Commonly overlooked issues related to data retention and GDPR compliance Steps employers can take to mitigate risksIf your organisation needs help reviewing your GDPR policies and practices or employee training on data protection requirements, please contact our Data Protection Lawyers.

Serious Privacy
A doozy of a week in Privacy

Serious Privacy

Play Episode Listen Later Jun 13, 2025 30:37


Send us a textOn this week of Serious Privacy, Paul Breitbarth is away so Ralph O'Brien of Reinbo Consulting, and Dr. K Royal  bring you a full docket of privacy news. And it is a doozy of a week!  Powered by TrustArcSeamlessly manage your privacy program, assess risks, and stay up to date on laws across the globe.With TrustArc's Privacy Studio and Governance Suite, you can automate cookie compliance, streamline data subject rights, and centralize your privacy tasks—all while reducing compliance costs. Visit TrustArc.com/serious-privacy.If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.

Serious Privacy
A strong week in Privacy

Serious Privacy

Play Episode Listen Later Jun 5, 2025 36:45


Send us a textOn this week of #SeriousPrivacy, Paul Breitbarth, Dr. K Royal, and Ralph O'Brien catch up on recent activity in the world of purveyors,  data protection, and cyber law.  Powered by TrustArcSeamlessly manage your privacy program, assess risks, and stay up to date on laws across the globe.With TrustArc's Privacy Studio and Governance Suite, you can automate cookie compliance, streamline data subject rights, and centralize your privacy tasks—all while reducing compliance costs. Visit TrustArc.com/serious-privacy.If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.

Mediterranean Sustainability Partners
Data protection, disinformation  and hybrid threats: impact on national security in the digital age

Mediterranean Sustainability Partners

Play Episode Listen Later Jun 3, 2025 19:46


Data protection, disinformation  and hybrid threats: impact on national security in the digital ageThe objective of this talk is to provide a view on the problem of the importance and role of strategic global policies and investments in the protection and resiliency of critical infrastructure, national and international, in the context of modern hybrid threats. Disinformation, broadly defined as false information intended to mislead, emanates from both states and non-state actors, and affects communities across the globe. Fake news and deception are ages-old phenomena, but the digital age has facilitated the amplification and manipulation of false information to an unprecedented extent threw internet and new media. Acknowledging the importance of disinformation and its consequences and considering the fact that in future wars the primary target of the attack is going to be critical infrastructure (one or more) the cyberspace will be a tool for conducting attack(s) threw hybrid threats. Potential solution to the problem of insufficient state protection of critical infrastructure should be observed through the prism of building investment policies in broader national strategies for protecting critical infrastructure as well as national security budget defence expenditures/allocations leading to higher level of protection and resiliency of critical infrastructure.Short bioProf. dr. sc. Marija Boban,  Full Professor at Universtiy of Split Faculty of Law in Split is expert in the field of personal data protection, GDPR, information security and smart technologies; Head of Department of Economic, Financial and Information Sciences and Statistics, Faculty of Law, University of Split; Director and owner of the consulting company TechFuturo innovation specialized in business consulting in the digital age. Author and co-author of 7 books, more than 140 scientific papers in the field of personal data protection, cybersecurity, citizen's privacy, AI, robotics, right of access to information and computer forensics from which 45 scientific papers are cited in the Scopus and Web of science databases. Teaches courses Informatics in Law, Cyber crimes, Intellectual Property and Information Security, National Security Systems and Electronic Business at the Faculty of Law in Split and at the Department of Forensic Sciences at the University of Split. Also for many year is external associate professor of  the Polytechnic "Marko Marulić" in Knin and the Faculty of Law, University of Mostar. As invited speaker and lecturer has participated in more than150  international and domestic scientific and professional conferences with the presentation of papers published in proceedings and relevant scientific and professional journals. She has won a number of awards and recognitions and through her many years of scientific and professional work has profiled her as one of the most recognized experts in the Republic of Croatia in cyber security, personal data protection, e-Health, e-Government and computer forensics.

Masters of Privacy
Lauren Reid: privacy metrics and the unbearable insignificance of the privacy professional

Masters of Privacy

Play Episode Listen Later Jun 1, 2025 35:32


What do we refer to with “privacy metrics”? Are privacy professionals delusional regarding the impact of the discipline in the overall business context? Lauren Reid is founder of The Privacy Pro, a boutique firm that provides essential training, tools, and support for privacy professionals to turn knowledge into action. In addition to leading The Privacy Pro, Lauren works with executives, boards, and product teams to build privacy data governance strategies that support responsible innovation and prepare companies for investor and regulatory scrutiny. She has a 20-year track record in this space. References: Lauren Reid on LinkedIn The Privacy Pro Lauren Reid: Rethinking Privacy Metrics: Aligning with Business Strategy

Serious Privacy
The State of Digital (with Akhi Srivastava)

Serious Privacy

Play Episode Listen Later May 31, 2025 28:07


Send us a textOn this week of Serious Privavy, Paul, Ralph, and Dr. K catch up with Akhi Srivastava, an experienced tech leader to discuss strategy and state of the digital world (as himself and not as any of the company's he's worked for then it now). Powered by TrustArcSeamlessly manage your privacy program, assess risks, and stay up to date on laws across the globe.With TrustArc's Privacy Studio and Governance Suite, you can automate cookie compliance, streamline data subject rights, and centralize your privacy tasks—all while reducing compliance costs. Visit TrustArc.com/serious-privacy.If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.

ITSPmagazine | Technology. Cybersecurity. Society
When Simplicity Meets Strategy: Making Immutability Accessible for All | A Brand Story with Sterling Wilson from Object First | An RSAC Conference 2025 Post-Event Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 30, 2025 14:35


When it comes to data protection, the word “immutability” often feels like it belongs in the realm of enterprise giants with complex infrastructure and massive budgets. But during this RSAC Conference conversation, Sterling Wilson, Field CTO at Object First, makes a strong case that immutability should be, and can be, for everyone.Wilson brings a grounded perspective shaped by his experience on the floor at RSAC, where Object First made its debut as a sponsor. The energy, he notes, was contagious: not just among vendors, but also from practitioners expressing serious concerns about their ability to recover data post-incident. These conversations weren't hypothetical; they were real worries tied to rising insurance premiums, regulatory compliance, and operational survivability. And at the core of all this? Trust in the data backup process.Agentic AI, AI capable of making decisions independently, is one of the trends Wilson flags as both promising and risky. It offers potential for improving preparedness and accelerating recovery. But it also raises concerns around access and control of sensitive data, particularly if exploited by adversaries. For Sterling, the opportunity lies in combining proactive readiness with simplicity and control, especially for those who aren't traditional security practitioners.Object First is doing just that through OOTBI: Out of the Box Immutability. And yes, there's a mascot: OOTBI. More than just a marketing hook, OOTBI represents a shift toward making backup and recovery systems approachable, usable, and, importantly, accessible. According to Wilson, the product gets users from “box to backup” in 15 minutes... with encrypted, immutable storage that meets critical requirements for cyber insurance coverage.Cost, Wilson adds, is a key barrier that often prevents organizations from reaching data protection best practices. That's why Object First now offers consumption-based pricing models. Whether a business is cloud-first or scaling fast, it's a path to protection that doesn't require breaking the budget.Ultimately, Wilson emphasizes education and community as critical drivers of progress. From field labs where teams can configure their own Opi, to on-location conference conversations, the company is building awareness, and reducing fear, by making secure storage not just a feature, but a foundation.This episode is a reminder that effective cybersecurity isn't only about innovation; it's about inclusion, practicality, and trust... both in your tools and your team.Learn more about Object First: https://itspm.ag/object-first-2gjlNote: This story contains promotional content. Learn more.Guest: Sterling Wilson, Field CTO, Object First | https://www.linkedin.com/in/sterling-wilson/ResourcesLearn more and catch more stories from Object First: https://www.itspmagazine.com/directory/object-firstLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, marco ciappelli, sterling wilson, immutability, agentic, ai, backup, recovery, cybersecurity, insurance, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

UBC News World
TUSK Web Browser Offers Secure Online Searches, User Control & Data Protection

UBC News World

Play Episode Listen Later May 29, 2025 2:07


TUSK gives you the perfect alternative to Google if you're looking for more control over your search experience, without any of the left-wing bias! Find out more at https://tuskbrowser.com/ TUSK City: Santa Barbara Address: 5383 Hollister Ave., Suite 120 Website: https://tuskbrowser.com/

Trust Issues
EP 8 - Zero Trust, Zero Chill: Securing Machine Identity

Trust Issues

Play Episode Listen Later May 28, 2025 45:08


In this episode of Security Matters, host David Puner welcomes Kevin Bocek, CyberArk SVP of Innovation, for an insightful discussion on the critical role of machine identity in modern cybersecurity. As digital environments become increasingly complex, securing machine identities has never been more crucial.According to the CyberArk 2025 Identity Security Landscape, machine identities now outnumber human identities by more than 80 to 1. As organizations scale cloud workloads and automation, these identities are becoming a critical part of the cybersecurity frontline. From TLS certificate outages to API key exposures, failures in machine identity management can lead to outages, breaches, and cascading system failures. In this episode of Security Matters, Kevin Bocek explains why this moment is pivotal for getting machine identity right—and how Zero Trust principles, automation, and visibility are essential to building cyber resilience.We also explore the future of identity security—from AI kill switches and agentic AI to quantum threats—and how identity can serve as both a safeguard and a kill switch in the age of autonomous systems.Whether you're a cybersecurity professional or simply interested in the latest security trends, this episode offers valuable insights into the importance of machine identity in safeguarding our digital world. Don't forget to subscribe, leave a review, and follow Security Matters for more expert discussions on the latest in cybersecurity.

Masters of Privacy
Pascale Arguinarena (Utiq): cross-device addressability in digital advertising through telco-powered identifiers

Masters of Privacy

Play Episode Listen Later May 26, 2025 33:55


Can telco-powered identifiers overcome their own privacy challenges in their attempt to replace third-party cookies or email-based alternatives? Pascale is the Data Protection Officer at Utiq, a European based AdTech company. She has been working in privacy and data protection ever since completing her degree in Law, including roles at fashion group Arcadia and Vodafone Group. Pascale's main goal is always to put privacy at the heart of the business. Utiq's mission is to enable more responsible digital marketing by offering a telco powered privacy-first technology to Brands, Publishers and Tech Vendors operating in the adtech ecosystem. The Utiq technology consists of online identifiers which can be used to support and optimize digital marketing, advertising and analytics activities, whilst offering individuals enhanced choice, control and transparency, including via the application of privacy-centric controls and a dedicated privacy portal for end users, known as consenthub. Launched in 2023, Utiq was originally backed by Deutsche Telekom AG, Orange SA, Telefónica S.A., and Vodafone Group plc. It has continued to gain support from numerous other leading telecom operators across Germany, France, Spain, Austria and soon expanding to the UK and Italy. References: Pascale Arguinarena on LinkedIn FCC fines Verizon $1.35 million over ‘supercookie' tracking (The Verge, May 2016) Utiq's consenthub  

Serious Privacy
Retro Week in Privacy - So much to Cover!

Serious Privacy

Play Episode Listen Later May 22, 2025 32:54


Send us a textOn this week of Serious Privacy, Paul Breitbarth, and Dr. K Royal (Ralph O'Brien was traveling), we cover a wild wrap up of privacy activities, including Tom Kemp as the newly appointed head of the California Consumer Privacy Protection Agency, and a wide sweep of enforcement actions including Roku, Honda Motor Company, National Public Data, Tom Snyder, plus class actions against Insomnia and Pill Pack, and a reprimand sent to Deep Seek, IAPP's state privacy law tracker update, California is seeking public feedback on proposed regulations for the delete request and opt-out platform - the DROP system, CNIL's guidance on monitoring self-checkouts, and Meta's request for a court to invalidate the EDPB guidance (can't do it, it's not a law) and Belgium's new law plus quite a bit more. We are packed with news.Please subscribe in your favorite podcast app - sharing is caring!  Powered by TrustArcSeamlessly manage your privacy program, assess risks, and stay up to date on laws across the globe.With TrustArc's Privacy Studio and Governance Suite, you can automate cookie compliance, streamline data subject rights, and centralize your privacy tasks—all while reducing compliance costs. Visit TrustArc.com/serious-privacy.If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.

Get IT: Cybersecurity insights for the foreseeable future.
Bonus Episode: Cybersecurity Challenges Faced by Canadian Organizations

Get IT: Cybersecurity insights for the foreseeable future.

Play Episode Listen Later May 20, 2025 69:30


In this episode of the CDW Canada Tech Talks podcast, host KJ Burke discusses the findings of the 2025 CDW Canada Cybersecurity Study with cybersecurity experts Ivo Wiens and Ben Boi-Doku. They explore the evolving landscape of cybersecurity threats, the importance of continuous security testing and the challenges faced by small and medium businesses. The conversation also delves into the role of AI in cybersecurity, the significance of data classification and the practical implementation of zero trust principles. The experts share insights on cloud security challenges, the necessity of tabletop exercises for preparedness and the future trends in cybersecurity as organizations move into 2025.To learn more, visit cdw.ca

Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Ep. 238 How Federal Agencies Can Achieve Cyber-Resilient Data Protection and Recovery

Federal Tech Podcast: Listen and learn how successful companies get federal contracts

Play Episode Listen Later May 15, 2025 26:33


AFCEA'S TechNet Cyber conference held in Baltimore, Maryland was the perfect opportunity to sit down with Greg Carl, Principal Technologist from Pure Storage. Pure Storage is used by 175 federal agencies.  Time to sit down from a subject matter expert and explain their value proposition. Today's federal government is attempting to accomplish digital modernization through a move to the cloud and, at the same time, reduce staff.  To multiply the risk associated with this endeavor, we see an increase in cyber attacks on data at rest, in transit, and while in use.  Greg Carl drills down on how Pure Storage can help federal leaders in several areas, he begins with Retrieval Augmented Generation, RAG. People have jumped into AI without knowing how to structure a large language model, the popular LLM.  RAG focuses on text generation and tries to make sure the data collected is accurate, relevant, and contextually aware. Pure Storage asks, if RAG protects the results of a query, what protects the “Retrieval” part of RAG.  We know LLMs are being attacked every day.  Malicious code could be placed in a LLM, and the RAG system might not know. A decade ago, backups were child's play.  A server down the hall, a backup appliance.  Today, one needs an agile cloud solution to perform continuous backups in a hybrid world.  One way to gain resilience is to use immutable backups where the attacked system can be restored and not lose valuable time. Speed and security handling important data activities can reduce costs for federal leaders by improving accuracy of LLMs and speed the time to recover after an attack. Connect to John Gilroy on LinkedIn   https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com

Serious Privacy
Indescribably Intuitive: Indigenous Privacy

Serious Privacy

Play Episode Listen Later May 14, 2025 36:46


Send us a textOn this episode of @SeriousPrivacy, hosts Paul Breitbarth and Dr. K Royal (Ralph wasn'  able to join us in DC) catch up with Tahu Kukutai, Professor, The University of Waikato; Jade Makory, CIPP/E, CIPM, CIPT, FIP, Legal and Advocacy Director, Data Analytics Kenya, and Privacy Expert, PwC (on Sabbatical); and Shana Morgan, AIGP, CIPP/E, CIPM, FIP, Global Head of AI / Privacy, L3Harris Technologies - just after the first IAPP panel on indigenous privacy at GPS25 (moderated by Shoshana Rosenberg). Fabulous and enlightening.   Powered by TrustArcSeamlessly manage your privacy program, assess risks, and stay up to date on laws across the globe.With TrustArc's Privacy Studio and Governance Suite, you can automate cookie compliance, streamline data subject rights, and centralize your privacy tasks—all while reducing compliance costs. Visit TrustArc.com/serious-privacy.If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.

Cloud Wars Live with Bob Evans
Parisa Tabriz on Google Chrome Enterprise Security and AI Innovation | Cloud Wars Live

Cloud Wars Live with Bob Evans

Play Episode Listen Later May 14, 2025 15:03


Parisa Tabriz is vice president and general manager for Google Chrome, the world's leading browser platform. She leads efforts to make Chrome a secure and essential enterprise workspace, integrating AI and advanced cybersecurity to meet evolving business needs. In this episode, Parisa joins Bob to explore how Chrome is redefining the browser as a productivity and security platform, the role of AI in enterprise protection, and what's next for Chrome's innovations.Chrome at Google Cloud NextThe Big Themes:Chrome's Evolution into a Central Productivity and Security Platform: Over the past 17 years, Chrome has transformed from a simple web browser into a comprehensive platform integral to enterprise productivity and security. Users now spend a significant portion of their workday within Chrome, utilizing it for tasks ranging from document editing to video conferencing. This shift has positioned Chrome as the new endpoint in enterprise environments.Simplifying Enterprise Security with Chrome: Complexity is often the enemy of security. Chrome aims to simplify enterprise security by integrating protective measures directly into the browser, reducing the need for multiple, potentially conflicting security solutions. Features like automatic updates, built-in phishing protection, and centralized policy management allow IT teams to maintain a secure environment with less overheads.Personalization, Governance, and AI Empowerment: Chrome prioritizes features that allow organizations to personalize user experiences while maintaining strict governance over data and AI usage. Tools like data masking, controlled copy-paste functionalities, and the ability to designate approved AI applications help prevent data leaks and ensure compliance with internal policies. By providing these controls, Chrome empowers enterprises to harness the benefits of AI technologies responsibly.The Big Quote: ". . . the browser is the place where you can give people access to the benefits [of AI], but also make sure that you have the controls and governance to turn it off or make sure that your employees aren't copying and pasting data into an unsanctioned AI surface."More from Parisa Tabriz and Google Chrome:Connect with Parisa on LinkedIn or learn more about Google Chrome.

Actualizing Success
Strengthening Treasury Against Fraud Risks

Actualizing Success

Play Episode Listen Later May 13, 2025 22:53


In this episode of Actualizing Success, our experts discuss the pressing need for enhancing treasury defenses against the evolving landscape of fraud risks. Actualize Consulting's Treasury Consultant, Dom Boyle, is joined by Baptiste Collot, co-founder and CEO of TrustPair, who brings extensive experience from his days as a treasurer. Together, they discuss the alarming rise of sophisticated fraud tactics fueled by artificial intelligence and how treasury teams can adapt to these new challenges. As AI technology continues to advance, fraudsters are leveraging it in unprecedented ways, necessitating a strategic response from organizations.Listen to learn more about:How fraudsters are exploiting AI to enhance their tactics.Building a clean and centralized data lake across your organization to protect proprietary data.The importance of a multi-layered defense strategy in treasury operations.Practical use cases and best practices for strengthening treasury against fraud risks.Avoiding blind trust and automation, and ensuring human oversight and approval layers is part of the process.Join us for an enlightening discussion on the crucial need for technological integration in financial processes to effectively combat these evolving threats and better safeguard your treasury operations.Thanks for listening to this episode of the Actualizing Success Podcast! We hope you enjoyed the discussion and will come back for more. In the meantime, don't forget to rate this episode and leave a review!  We invite you to contact Actualize and Trustpair for any inquiries regarding preventing fraud and further preparing for the AI revolution.Get in touch with Actualize at www.actualizeconsulting.com    Get in touch with Trustpair at https://trustpair.com/ |We'd love to hear from you! If you have any questions, comments, or would like to collaborate on a future episode, please contact us at podcast@actualizeconsulting.com.     

The Tech Blog Writer Podcast
3275: Cloudflare Discusses AI, Quantum Risk, and Data Protection

The Tech Blog Writer Podcast

Play Episode Listen Later May 12, 2025 29:19


In today's episode of Tech Talks Daily, I sit down with Christian Reilly, Field CTO for EMEA at Cloudflare, the Connectivity Cloud company, to examine the latest findings from their cybersecurity research and what they reveal about how prepared different industries really are. While sectors like IT, gaming, and financial services have seen a higher volume of cyberattacks, they also report greater readiness and resilience. In contrast, industries like education and healthcare, although less frequently targeted, remain far less prepared to defend against growing threats. This gap raises important questions about how organizations approach security depending on their legacy systems, revenue models, and digital maturity. Christian brings years of frontline experience to the discussion and shares actionable insights into how companies can build cybersecurity strategies that not only protect but also improve performance. From the shift toward zero trust architecture to the critical role of board-level engagement, we explore how forward-thinking organizations are rethinking the role of cybersecurity in modern digital operations. He explains why simplicity often beats complexity, and how reducing friction for end users is key to long-term resilience. We also look ahead to some of the key trends shaping the future of security. Christian dives into the challenges posed by emerging technologies such as quantum computing, AI, and the explosion of data generated by IoT and smart infrastructure. He stresses the importance of preparing now for scenarios like Harvest Now, Decrypt Later, and why organizations need to begin thinking seriously about post-quantum cryptography. On the human side, Christian outlines what effective training looks like today and how to shift employee culture from compliance to awareness. If you're wondering how to stay one step ahead of evolving threats, this conversation offers a wealth of insight from the heart of the Connectivity Cloud. How is your organization preparing for what's coming next?

PEBCAK Podcast: Information Security News by Some All Around Good People
Episode 207 - 25% of Community College Students Are Bots, Microsoft Kills the Password, Scattered Spider Ransomware Gang Lives On, Data Protection Stories

PEBCAK Podcast: Information Security News by Some All Around Good People

Play Episode Listen Later May 12, 2025 49:02


Welcome to this week's episode of the PEBCAK Podcast!  We've got four amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast   Please share this podcast with someone you know!  It helps us grow the podcast and we really appreciate it!   25% of community college students are AI bots https://calmatters.org/education/higher-education/2024/04/financial-aid-fraud/  https://x.com/elonmusk/status/1916365142918300053   Microsoft makes accounts passwordless by default https://www.bleepingcomputer.com/news/microsoft/microsoft-makes-all-new-accounts-passwordless-by-default/   Scattered Spider ransomware crew lives on https://www.darkreading.com/cyberattacks-data-breaches/despite-arrests-scattered-spider-continues-hacking   Data Protection https://www.zscaler.com/products-and-solutions/data-protection   Dad Joke of the Week (DJOW)   Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/ Raja - https://www.linkedin.com/in/rajazkhalid/

Serious Privacy
A week in privacy with Ralph and K

Serious Privacy

Play Episode Listen Later May 8, 2025 23:15


Send us a textOn this week of Serious Privacy,  Ralph O'Brien of Reinbo Consulting, and Dr. K Royal connect to cover a week in privacy as Paul Breitbarth is away. This weeks shorter episode includes a guide to what's coming up from Serious Privacy at IAPP summit in DC, a penalty from the UK ICO, EDPB draft Guidance on blockchain, state laws, enforcement actions, and more!Please subscribe in your favorite podcast app - sharing is caring! Some resourceshttps://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2025/04/law-firm-fined-60-000-following-cyber-attack/https://www.edpb.europa.eu/news/news/2025/edpb-adopts-guidelines-processing-personal-data-through-blockchains-and-ready_enhttps://iapp.org/resources/article/us-state-privacy-legislation-tracker/#state-privacy-law-chart Powered by TrustArcSeamlessly manage your privacy program, assess risks, and stay up to date on laws across the globe.With TrustArc's Privacy Studio and Governance Suite, you can automate cookie compliance, streamline data subject rights, and centralize your privacy tasks—all while reducing compliance costs. Visit TrustArc.com/serious-privacy.If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.

Employment Law This Week Podcast
Spilling Secrets: Trade Secrets on Trial: Strategic Decisions for the Courtroom

Employment Law This Week Podcast

Play Episode Listen Later May 7, 2025 33:12


What's the secret to winning a trade secret trial? Find out in this compelling episode of Spilling Secrets, where Epstein Becker Green attorneys Katherine G. Rigby, James P. Flynn, and Adam Paine break down the art of navigating these high-stakes cases. From designing winning courtroom tactics and leveraging key witnesses to using storytelling as a tool to clarify complex trade secret claims, our panelists offer actionable insights and essential tips for safeguarding confidentiality and determining the right trial format to secure the best outcomes for your business. Visit our site for this week's other highlights and links: https://www.ebglaw.com/eltw389 Spilling Secrets is a special monthly podcast series about the future of non-compete and trade secrets law. We invite you to view Employment Law This Week® – learn about significant developments in employment and labor law and workforce management in a matter of minutes every #WorkforceWednesday®. Watch the series and subscribe for email notifications: http://www.EmploymentLawThisWeek.com. These materials have been provided for informational purposes only and are not intended and should not be construed to constitute legal advice. The content of these materials is copyrighted to Epstein Becker & Green, P.C. EMPLOYMENT LAW THIS WEEK® and #WorkforceWednesday® are registered trademarks of Epstein Becker & Green, P.C. ATTORNEY ADVERTISING.

Microsoft Mechanics Podcast
Data security for agents and 3rd party AI in Microsoft Purview

Microsoft Mechanics Podcast

Play Episode Listen Later May 6, 2025 9:46 Transcription Available


Stay in control as GenAI adoption accelerates across your organization using Data Security Posture Management for AI in Microsoft Purview. With built-in visibility into how AI apps and agents interact with sensitive data—whether inside Microsoft 365 or across unmanaged consumer tools—you can detect risks early, take decisive action, and enforce the right protections without slowing innovation. Monitor usage trends, investigate prompts and responses, and respond to potential data oversharing or policy violations in real time. From compliance-ready audit logs to adaptive data protection, you'll have the insights and tools to keep data secure as AI becomes a part of everyday work. Shilpa Ranganathan, Microsoft Purview Principal Group PM, shares how to balance GenAI innovation with enterprise-grade data governance and security. ► QUICK LINKS: 00:00 - GenAI app security, governance, & compliance 01:30 - Take Action with DSPM for AI 02:08 - Activity logging 02:32 - Control beyond Microsoft services 03:09 - Use DSPM for AI to monitor data risk 05:06 - ChatGPT Enterprise 05:36 - Set AI Agent guardrails using DSPM for AI 06:44 - Data oversharing 08:30 - Audit logs 09:19 - Wrap up ► Link References Check out https://aka.ms/SecureGovernAI ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft.  • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics  

ITSPmagazine | Technology. Cybersecurity. Society
When Ransomware Strikes, Will Your Backups Hold the Line? | A Brand Story with Sterling Wilson from Object First | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 5, 2025 17:57


In today's threat environment, it's not enough to back up your data—you have to be able to trust that those backups will be there when you need them. That's the message from Sterling Wilson, Field CTO at Object First, during his conversation at RSAC Conference 2025.Object First is purpose-built for Veeam environments, offering out-of-the-box immutability (OOTBI) with a hardened, on-premises appliance. The goal is simple but critical: make backup security both powerful and practical. With backup credentials often doubling as access credentials for storage infrastructure, organizations expose themselves to unnecessary risk. Object First separates those duties by design, reducing the attack surface and protecting data even when attackers have admin credentials in hand.Immutability as a Foundation—Not a FeatureThe conversation highlights data from a recent ESG study showing that 81% of respondents recognize immutable object storage as the most secure way to protect backup data. True immutability means data cannot be modified or deleted until a set retention period expires—an essential safeguard when facing ransomware or insider threats. But Sterling emphasizes that immutability alone isn't enough. Backup policies, storage access, and data workflows must be segmented and secured.Zero Trust for Backup InfrastructureZero trust principles—verify explicitly, assume breach, enforce least privilege—have gained ground across networks and applications. But few organizations extend those principles into the backup layer. Object First applies zero trust directly to backup infrastructure through what they call zero trust data resilience. That includes verifying credentials at every step and ensuring backup jobs can't alter storage configurations.A Real-World Test: Marysville School DistrictWhen Marysville School District suffered a ransomware attack, nearly every system was compromised—except the Object First appliance. The attacker had administrative credentials, but couldn't access or encrypt the immutable backups. Thanks to the secure design and separation of permissions, recovery was possible—demonstrating that trust in your backups can't be assumed; it must be enforced by design.Meeting Customers Where They AreTo support both partners and end customers, Object First now offers OOTBI through a consumption-based model. Whether organizations are managing remote offices or scaling their environments quickly, the new model provides flexibility without compromising security or simplicity.Learn more about Object First: https://itspm.ag/object-first-2gjlNote: This story contains promotional content. Learn more.Guest: Sterling Wilson, Field CTO, Object First | https://www.linkedin.com/in/sterling-wilson/ResourcesLearn more and catch more stories from Object First: https://www.itspmagazine.com/directory/object-firstLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, sterling wilson, ransomware, immutability, backups, cybersecurity, zero trust, data protection, veeam, recovery, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

Masters of Privacy
Georgia Voudoulaki: beyond compliance - embedding ethical considerations into AI and data governance frameworks

Masters of Privacy

Play Episode Listen Later May 4, 2025 30:03


Georgia Voudoulaki is Senior Legal Counsel at Bosch, certified Compliance Officer, and adjunct professor at the University of Applied Sciences in Ludwigsburg and the Cooperative State University of Baden-Württemberg in Germany. In addition to her legal and academic roles, Georgia regularly publishes articles in leading legal journals and magazines, contributing valuable insights to the evolving conversation around compliance, digital innovation, and responsible AI.  References: Georgia Voudoulaki on LinkedIn University of Applied Sciences Ludwigsburg Baden-Wuerttemberg Cooperative State University (DHBW)  

Serious Privacy
A week in privacy plus Summit Day 2 recap

Serious Privacy

Play Episode Listen Later May 3, 2025 41:34


Send us a textOn this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien of Reinbo Consulting, and Dr. K Royal have a short week in privacy (a lot about #Meta and children using #AI) along with some updates on the IAPP #GPS25 where we learned that it was all about the people, such as our friends at TrustArc, Ben Siegal, Dan Solove, and so many others. Please subscribe in your favorite podcast app - sharing is caring!  Powered by TrustArcSeamlessly manage your privacy program, assess risks, and stay up to date on laws across the globe.With TrustArc's Privacy Studio and Governance Suite, you can automate cookie compliance, streamline data subject rights, and centralize your privacy tasks—all while reducing compliance costs. Visit TrustArc.com/serious-privacy.If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.

Communism Exposed:East and West
TikTok Hit With $600 Million Fine for Breaching EU Data Protection Rules

Communism Exposed:East and West

Play Episode Listen Later May 2, 2025 4:11


ITSPmagazine | Technology. Cybersecurity. Society
When Every Second Counts: Building Cyber Resilience Through A Smarter Approach to Data Protection | A Brand Story with Eric Herzog from Infinidat | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 30, 2025 19:05


Storage often sits in the background of cybersecurity conversations—but not at Infinidat. In this episode, Eric Herzog, Chief Marketing Officer of Infinidat, joins Sean Martin to challenge the notion that storage is simply infrastructure. With decades of experience at IBM and EMC before joining Infinidat, Herzog explains why storage needs to be both operationally efficient and cyber-aware.Cyber Resilience, Not Just StorageAccording to Herzog, today's enterprise buyers—especially those in the Global Fortune 2000—aren't just asking how to store data. They're asking how to protect it when things go wrong. That's why Infinidat integrates automated cyber protection directly into its storage platforms, working with tools like Splunk, Microsoft Sentinel, and IBM QRadar. The goal: remove the silos between infrastructure and cybersecurity teams and eliminate the need for manual intervention during an attack or compromise.Built-In Defense and Blazing-Fast RecoveryThe integration isn't cosmetic. Infinidat offers immutable snapshots, forensic environments, and logical air gaps as part of its storage operating system—no additional hardware or third-party tools required. When a threat is detected, the system can automatically trigger actions and even guarantee data recovery in under one minute for primary storage and under 20 minutes for backups—regardless of the dataset size. And yes, those guarantees are provided in writing.Real-World Scenarios, Real Business OutcomesHerzog shares examples from finance, healthcare, and manufacturing customers—one of which performs immutable snapshots every 15 minutes and scans data twice a week to proactively detect threats. Another customer reduced from 288 all-flash storage floor tiles to just 61 with Infinidat, freeing up 11 storage admins to address other business needs—not to cut staff, but to solve the IT skills shortage in more strategic ways.Simplified Operations, Smarter SecurityThe message is clear: storage can't be an afterthought in enterprise cybersecurity strategies. Infinidat is proving that security features need to be embedded, not bolted on—and that automation, integration, and performance can all coexist. For organizations juggling compliance requirements, sprawling infrastructure, and lean security teams, this approach delivers both peace of mind and measurable business value.Learn more about Infinidat: https://itspm.ag/infini3o5dNote: This story contains promotional content. Learn more.Guest: Eric Herzog, Chief Marketing Officer, Infinidat | https://www.linkedin.com/in/erherzog/ResourcesLearn more and catch more stories from Infinidat: https://www.itspmagazine.com/directory/infinidatLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, eric herzog, storage, cybersecurity, automation, resilience, ransomware, recovery, enterprise, soc, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

Microsoft Mechanics Podcast
Protect AI apps with Microsoft Defender

Microsoft Mechanics Podcast

Play Episode Listen Later Apr 29, 2025 15:00 Transcription Available


Stay in control with Microsoft Defender. You can identify which AI apps and cloud services are in use across your environment, evaluate their risk levels, and allow or block them as needed—all from one place. Whether it's a sanctioned tool or a shadow AI app, you're equipped to set the right policies and respond fast to emerging threats. Defender XDR gives you the visibility to track complex attack paths—linking signals across endpoints, identities, and cloud apps. Investigate real-time alerts, protect sensitive data from misuse in AI tools like Copilot, and enforce controls even for in-house developed apps using system prompts and Azure AI Foundry. Rob Lefferts, Microsoft Security CVP, joins Jeremy Chapman to share how you can safeguard your AI-powered environment with a unified security approach. ► QUICK LINKS: 00:00 - Stay in control with Microsoft Defender 00:39 - Identify and protect AI apps 02:04 - View cloud apps and website in use 04:14 - Allow or block cloud apps 07:14 - Address security risks of internally developed apps 08:44 - Example in-house developed app 09:40 - System prompt 10:39 - Controls in Azure AI Foundry 12:28 - Defender XDR 14:19 - Wrap up ► Link References Get started at https://aka.ms/ProtectAIapps ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics   

The Road to Accountable AI
Ashley Casovan: From Privacy Practice to AI Governance

The Road to Accountable AI

Play Episode Listen Later Apr 24, 2025 38:29 Transcription Available


Professor Werbach talks with Ashley Casavan, Managing Director of the AI Governance Center at the IAPP, the global association for privacy professional and related roles. Ashley shares how privacy, data protection, and AI governance are converging, and why professionals must combine technical, policy, and risk expertise. They discuss efforts to build a skills competency framework for AI roles and examine the evolving global regulatory landscape—from the EU's AI Act to U.S. state-level initiatives. Drawing on Ashley's experience in the Canadian government, the episode also explores broader societal challenges, including the need for public dialogue and the hidden impacts of automated decision-making. Ashley Casovan  serves as the primary thought leader and public voice for the IAPP on AI governance. She has developed expertise in responsible AI, standards, policy, open government and data governance  in the public sector at the municipal and federal levels. As the director of data and digital for the government of Canada, Casovan previously led the development of the world's first national government policy for responsible AI. Casovan served as the Executive Director of the Responsible AI Institute, a member of OECD's AI Policy Observatory Network of Experts, a member of the World Economic Forum's AI Governance Alliance, an Executive Board Member of the International Centre of Expertise in Montréal on Artificial Intelligence and as a member of the IFIP/IP3 Global Industry Council within the UN. Transcript Ashley Casovan IAPP IAPP AI Governance Profession Report 2025 Global AI Law and Policy Tracker Mapping and Understanding the AI Governance Ecosystem

Serious Privacy
The 30 Year Plan: Live from IAPP GPS25

Serious Privacy

Play Episode Listen Later Apr 24, 2025 32:19


Send us a textWe are a little late this week, but with good reason: Paul Breitbarth and Dr. K Royal were attending the IAPP Global Privacy Summit in Washington D.C. and bring you their report from the Opening General Session of the conference. The speakers during this session were professor Lawrence Lessig, Hans Peter Brøndmo and Catie Cuan, each reflecting on 25 years of IAPP and what is next for us privacy professionals. Apparently: it's robots! Powered by TrustArcSeamlessly manage your privacy program, assess risks, and stay up to date on laws across the globe.With TrustArc's Privacy Studio and Governance Suite, you can automate cookie compliance, streamline data subject rights, and centralize your privacy tasks—all while reducing compliance costs. Visit TrustArc.com/serious-privacy.If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.

Microsoft Mechanics Podcast
How Microsoft 365 Backup works and how to set it up

Microsoft Mechanics Podcast

Play Episode Listen Later Apr 24, 2025 0:50 Transcription Available


Protect your Microsoft 365 data and stay in control with Microsoft 365 Backup —whether managing email, documents, or sites across Exchange, OneDrive, and SharePoint. Define exactly what you want to back up and restore precisely what you need to with speeds reaching 2TB per hour at scale. With flexible policies, dynamic rules, and recovery points up to 365 days back, you can stay resilient and ready. Jeremy Chapman, Director on the Microsoft 365 product team, shares how to minimize disruption and keep your organization moving forward with Microsoft 365 Backup. QUICK LINKS:  00:00 - Automate recovery process 00:37 - How to use Microsoft 365 Backup 01:49 - Compare with migration-based solutions 02:30 - How to set it up 03:33 - Exchange policy for email backup 05:00 - View and manage backups 05:24 - Recover from a restore point 07:45 - Restore from OneDrive & SharePoint 08:33 - Bulk restore 09:41 - Wrap up ► Link References Check out https://aka.ms/M365Backup Additional backup and restore considerations at https://aka.ms/M365BackupNotes ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics  

Code Story
The Gene Simmons of Data Protection - Are You Ready For the GenAI Data Frontier?

Code Story

Play Episode Listen Later Apr 23, 2025 28:19


The Gene Simmons of Data Protection: Protegrity's KISS MethodToday, we are releasing another episode from our series, entitled The Gene Simmons of Data Protection - the KISS Method, brought to you by none other than Protegrity. Protegrity is AI-powered data security for data consumption, offering fine grain data protection solutions, so you can enable your data security, compliance, sharing and analytics.Episode Title: Are You Ready For the GenAI Data Frontier? Exploring GenAI SecurityIn this episode, we talk with Anthony Cammarano, CTO & VP of Engineering, as he breaks down and simplifies GenAI for companies struggling in the new frontier. There is a flood of unstructured data pouring into workflows - thanks to GenAI - and traditional security methods aren't prepared to cover this expanded attack surface. The good news is that companies already have what they need to fix this, and it's a simple mindset shift.QuestionsWhat are some of the most common misconceptions or trends about GenAI, as it relates to data protection and privacy, that organizations face today?What are the primary business challenges facing the adoption of GenAI today?How do modern GenAI systems create data security vulnerabilities and what are the potential risks?What is crucial in the implementation of GenAI-security solutions, and how can it accelerate AI adoption?Can you provide examples of how attackers are targeting data during its use and the importance of securing this data?What are some best practices for robust data governance and how can organizations stay ahead in the rapidly evolving GenAI landscape?Linkshttps://www.protegrity.com/https://www.linkedin.com/in/ac56/Our Sponsors:* Check out Vanta: https://vanta.com/CODESTORYSupport this podcast at — https://redcircle.com/code-story/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

The Data Chronicles
Data Protection in the Asia Pacific region | Trends, enforcement, and what's ahead

The Data Chronicles

Play Episode Listen Later Apr 17, 2025 25:38


In this episode of The Data Chronicles, host Scott Loughlin is joined by Charmian Aw, a partner in the firm's Singapore office, to explore the current state of data protection law across the Asia Pacific region. As countries throughout the region ramp up regulations around privacy, cybersecurity, incident response, and AI, it has become increasingly difficult for organizations to keep pace with the rapid developments. Together, Scott and Charmian provide a timely update on recent trends, enforcement activity, and what the future may hold for data governance in this complex and evolving landscape.

Code Story
The Gene Simmons of Data Protection – Are Your Systems Smarter Than a Threat Actor?

Code Story

Play Episode Listen Later Apr 16, 2025 16:02


The Gene Simmons of Data Protection: Protegrity's KISS MethodToday, we are releasing another episode from our series, entitled The Gene Simmons of Data Protection - the KISS Method, brought to you by none other than Protegrity. Protegrity is AI-powered data security for data consumption, offering fine grain data protection solutions, so you can enable your data security, compliance, sharing and analytics.Episode Title: Are You Smarter Than a Threat Actor? Maybe Your Current Methods Are ObsoleteIn today's episode, we are talking with Eve Rajca, Senior Solutions Engineer, as she dives into the ever-evolving landscape of cybersecurity. As threat actors become more sophisticated, its critical to reassess and simplify security strategies. She will explore outdated methods, which can leave your data vulnerable, and discuss the importance of adopting straightforward security methods.QuestionsWhat are some common signs that an organization's current cybersecurity methods might be outdated?How have threat actors evolved in their tactics over the past few years?Can you explain the concept of "security through simplicity" and why it's important?How can organizations balance the need for robust security with the need for simplicity?What role does employee training play in maintaining effective data security?Linkshttps://www.protegrity.com/https://www.linkedin.com/in/iwonarajca/Our Sponsors:* Check out Kinsta: https://kinsta.com* Check out Vanta: https://vanta.com/CODESTORYSupport this podcast at — https://redcircle.com/code-story/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Serious Privacy
Not your Grandma's Cookies (with Darren Abernethy)

Serious Privacy

Play Episode Listen Later Apr 16, 2025 41:52


Send us a textOn this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien of Reinbo Consulting, and Dr. K Royal connect with Darren Abernethy of Greenberg Traurig to discuss all things #cookies and #trackers.Please subscribe in your favorite podcast app - sharing is caring!  Powered by TrustArcSeamlessly manage your privacy program, assess risks, and stay up to date on laws across the globe.With TrustArc's Privacy Studio and Governance Suite, you can automate cookie compliance, streamline data subject rights, and centralize your privacy tasks—all while reducing compliance costs. Visit TrustArc.com/serious-privacy.If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.

The Fully Charged PLUS Podcast
Toyota Triumphs? Trump Tariff Turmoil! Tesla's Trialing Time?

The Fully Charged PLUS Podcast

Play Episode Listen Later Apr 14, 2025 63:15


Fully Charged's 'top two' tackle the thorniest topics in this thought-provoking tete-a-tete. Don't forget to fill in EVUK's Rapid Survey - Drivers Attitudes To All-Electric Vehicles here: https://www.surveymonkey.com/r/W2CBK6D  Electric Vehicles UK, and the whole Fully Charged Show team, will be at Everything Electric LONDON this Wednesday, Thursday & Friday and we would love to meet you. Tickets can be purchased here: https://uk.everythingelectric.show/london  Please note your data will be stored and managed according to Data Protection regulations by Fully Charged Show Ltd and will not be shared with 3rd party recipients     Check out our sister channel: https://www.youtube.com/@fullychargedshow Why are our episodes now sponsored? https://fullycharged.show/blog/dan-caesar-on-x-insta-youtube-and-why-we-made-a-contro[…]s-on-fully-charged-everything-electric-electric-vehicles-uk/ Support our StopBurningStuff campaign: https://www.patreon.com/STOPBurningStuff Become a Fully Charged SHOW Patreon: https://www.patreon.com/fullychargedshow Become a YouTube member: use JOIN button above Buy the Fully Charged Guide to Electric Vehicles & Clean Energy : https://buff.ly/2GybGt0 Subscribe for episode alerts and the Fully Charged newsletter: https://fullycharged.show/zap-sign-up/ Visit: https://FullyCharged.Show Find us on X: https://x.com/Everyth1ngElec Follow us on Instagram: https://instagram.com/fullychargedshow To partner, exhibit or sponsor at our award-winning expos email: commercial@fullycharged.show Everything Electric LONDON (UK) - ExCel - 16th, 17th & 18th April 2025 Everything Electric CANADA - Vancouver Convention Center - 5th, 6th & 7th September 2025 Everything Electric SOUTH (UK) - Farnborough International - 10th, 11th & 12th October 2025 Everything Electric AUSTRALIA VIC - 14th, 15th & 16th November 2025 #fullychargedshow #everythingelectricshow #homeenergy #cleanenergy #battery #electriccars #electricvehicles

HPE Tech Talk
How do you cut off cloud computing from the internet?

HPE Tech Talk

Play Episode Listen Later Apr 10, 2025 23:05


How can cloud computing be completely isolated from the internet? This week, Technology Now explores the next step in data storage and processing: the concept of a disconnected cloud. Why would someone want their cloud cut off like this? From a single building to an entire country, what are the security and regulatory compliance benefits?! Rich Bird, Worldwide Hybrid Cloud Marketing at HPE tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.Sources cited in this week's episode:Gartner Report on cloud usage and spending:https://www.gartner.com/en/newsroom/press-releases/2024-11-19-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-total-723-billion-dollars-in-2025History of the Cloud: https://www.bcs.org/articles-opinion-and-research/history-of-the-cloud/Dark Matter and Dark Energy (Today I Learnt):https://www.cfa.harvard.edu/research/topic/dark-energy-and-dark-matterhttps://www.nature.com/articles/d41586-024-01273-4https://www.newscientist.com/article/2471743-dark-energy-isnt-what-we-thought-and-that-may-transform-the-cosmos/History of Daylight Savings in the US (This Week in History):https://unrememberedhistory.com/tag/march-31-1918-daylight-saving-time/https://www.thecongressproject.com/standard-time-act-of-1918

Serious Privacy
A Challenging Week in Privacy

Serious Privacy

Play Episode Listen Later Apr 10, 2025 39:45


Send us a textOn this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien, and Dr. K Royal make it personal. They talk about their own mental health in light of busy workloads and global developments, whether privacy related or not. And they talk about the 23andme bankruptcy and what that means for personal data, as well as a fine issued by the Jersey Data Protection Authority..Please subscribe in your favorite podcast app - sharing is caring!  Powered by TrustArcSeamlessly manage your privacy program, assess risks, and stay up to date on laws across the globe.With TrustArc's Privacy Studio and Governance Suite, you can automate cookie compliance, streamline data subject rights, and centralize your privacy tasks—all while reducing compliance costs. Visit TrustArc.com/serious-privacy.If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise
How do you cut off cloud computing from the internet?

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise

Play Episode Listen Later Apr 10, 2025 23:05


How can cloud computing be completely isolated from the internet? This week, Technology Now explores the next step in data storage and processing: the concept of a disconnected cloud. Why would someone want their cloud cut off like this? From a single building to an entire country, what are the security and regulatory compliance benefits?! Rich Bird, Worldwide Hybrid Cloud Marketing at HPE tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.Sources cited in this week's episode:Gartner Report on cloud usage and spending:https://www.gartner.com/en/newsroom/press-releases/2024-11-19-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-total-723-billion-dollars-in-2025History of the Cloud: https://www.bcs.org/articles-opinion-and-research/history-of-the-cloud/Dark Matter and Dark Energy (Today I Learnt):https://www.cfa.harvard.edu/research/topic/dark-energy-and-dark-matterhttps://www.nature.com/articles/d41586-024-01273-4https://www.newscientist.com/article/2471743-dark-energy-isnt-what-we-thought-and-that-may-transform-the-cosmos/History of Daylight Savings in the US (This Week in History):https://unrememberedhistory.com/tag/march-31-1918-daylight-saving-time/https://www.thecongressproject.com/standard-time-act-of-1918

Code Story
The Gene Simmons of Data Protection - Fortifying Your Data Defenses

Code Story

Play Episode Listen Later Apr 9, 2025 20:45


The Gene Simmons of Data Protection: Protegrity's KISS MethodToday, we are releasing another episode from our series, entitled The Gene Simmons of Data Protection - the KISS Method, brought to you by none other than Protegrity. Protegrity is AI-powered data security for data consumption, offering fine grain data protection solutions, so you can enable your data security, compliance, sharing and analytics.Episode Title: Fortifying Your Data Defenses: The Conversation that Should have Happened Yesterday with Clyde WilliamsonIn this episode, we will be talking with Clyde Williamson, Senior Product Security Architect. Clyde is going to help us see how we've created a broken systems - and it's OK, we are willing to take the necessary steps to fix it. Business face immense pressure to safeguard data, ensure compliance, follow regulation, and make data easily available when needed. This is the conversation we should have heard yesterday, when it comes to our data.QuestionsWhy is consumer privacy more critical than ever in today's digital world, and what role do businesses play in protecting and consuming data? How that concern translates to regulatory requirements and changes for businesses. What does it mean to “future-proof” consumer data in terms of regulatory compliance, and why should businesses care? How can businesses effectively balance the need for data accessibility with the need to protect consumer privacy? What role does data de-identification play in helping businesses secure sensitive data while minimizing risk, and what are the tangible benefits? What are some common pitfalls businesses face when implementing privacy measures, and how can they avoid them? Can you provide an example of a company that improved consumer trust by adopting stronger data protection strategies? What are some emerging technologies in data protection and cybersecurity that are making, or will make, a significant impact? Can you share any real-world examples of data breaches that could have been prevented with better security practices? Linkshttps://www.protegrity.com/https://www.linkedin.com/in/clyde-williamson-6211192/Our Sponsors:* Check out Kinsta: https://kinsta.com* Check out Vanta: https://vanta.com/CODESTORYSupport this podcast at — https://redcircle.com/code-story/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Serious Privacy
F to the T to the C - a slow but substantive week in privacy

Serious Privacy

Play Episode Listen Later Apr 4, 2025 31:50 Transcription Available


Send us a textOn this week of Serious Privacy, Paul Breitbarth , Ralph O'Brien of Reinbo Consulting, and Dr. K Royal talk about the controversy with executive changes to the U.S. Federal Trade Commission #FTC, the UK #adequacy extension, and the Norwegian decision about Data Protection Officer #DPO conflicts of interest.Please subscribe in your favorite podcast app - sharing is caring!  Powered by TrustArcSeamlessly manage your privacy program, assess risks, and stay up to date on laws across the globe.With TrustArc's Privacy Studio and Governance Suite, you can automate cookie compliance, streamline data subject rights, and centralize your privacy tasks—all while reducing compliance costs. Visit TrustArc.com/serious-privacy.If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.

Code Story
The Gene Simmons of Data Protection – KISS (Keep It Simple, Stupid): A Data Security Dilemma

Code Story

Play Episode Listen Later Apr 2, 2025 24:55


The Gene Simmons of Data P rotection: Protegrity's KISS MethodToday, we are kicking off a new series on the podcast, entitled The Gene Simmons of Data Protection - the KISS Method, brought to you by none other than Protegrity. Protegrity is AI-powered data security for data consumption, offering fine grain data protection solutions, so you can enable your data security, compliance, sharing and analytics.Episode Title: KISS (Keep It Simple, Stupid): A Data Security Dilemma with James RiceIn this episode, we are talking with James Rice, VP at Protegrity. He is going to help us strip away the nonsense, when it comes to securing data, and help us understand why we don't need a fortress... just a kill switch. While companies throw billions at firewalls, AI driven threat detection, and fortress like defenses - attackers still find their way in. James reminds us to keep it simple, with Protegrity's KISS Method which stands for Keep It Simple Stupid - and how when data is useless to attackers, breaches become mere inconveniences instead of existential threats.Questions:What exactly is the KISS method, and how does it apply to cybersecurity?Why are traditional cybersecurity approaches failing to stop breaches?What are some of the biggest myths about security that lead businesses to waste money on ineffective defenses?How do encryption, tokenization, and de-identification work together to make stolen data useless?Can you share an example where a company's focus on complex security backfired, and how a simpler approach could have helped?What's the biggest pushback you hear from companies hesitant to adopt a simpler, data-first security model? If a company wanted to implement the KISS method tomorrow, what are the first three steps they should take?Linkshttps://www.protegrity.com/https://www.linkedin.com/in/jamesrice1/Our Sponsors:* Check out Kinsta: https://kinsta.com* Check out Vanta: https://vanta.com/CODESTORYSupport this podcast at — https://redcircle.com/code-story/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Scrum Master Toolbox Podcast
AI and Cybersecurity - An Introduction to The Hidden Threats in Our Connected World | Dr. Eric Cole

Scrum Master Toolbox Podcast

Play Episode Listen Later Mar 29, 2025 37:46


BONUS: AI and Cybersecurity - An Introduction to The Hidden Threats in Our Connected World with Dr. Eric Cole In this BONUS episode, we explore the evolving landscape of cybersecurity in the age of artificial intelligence. Dr. Eric Cole, a renowned cybersecurity expert and author of Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World, shares critical insights about how AI is transforming security strategies. From the privacy concerns of our always-connected devices to practical tips for protecting your business and personal information, this conversation offers essential knowledge for navigating our increasingly digital world. The Double-Edged Sword of AI in Cybersecurity "We are giving away our IP, our data, and our privacy. The data set is what gives value to AI." The rise of artificial intelligence presents both opportunities and serious risks in the cybersecurity landscape. Dr. Cole emphasizes that while many focus solely on AI's benefits, we often overlook the fact that we're surrendering vast amounts of our sensitive information, intellectual property, and private data to AI providers. This data becomes the foundation of AI's value and capabilities, creating a significant privacy concern that many organizations fail to properly address. As we embrace these new technologies, we must carefully consider what information we're willing to share and what safeguards should be in place. Modern Attack Vectors: The Human Element "Attacks today are mostly social engineering. We end up having to retrain people to not trust their email." Today's cybersecurity threats have evolved beyond traditional technical exploits to focus primarily on social engineering—manipulating people into compromising their own security. Dr. Cole explains that modern attackers increasingly target the human element, requiring organizations to fundamentally retrain employees to approach communications with healthy skepticism. Particularly concerning are mobile threats, as our phones constantly record audio and other personal data. Dr. Cole warns that "free" apps often come with a hidden price: your privacy and security. Understanding these attack vectors is essential for developing effective defense strategies in both personal and professional contexts. Cybersecurity as a Business Enabler "Security is not a barrier, not an obstacle. Cybersecurity is a business enabler." Dr. Cole challenges the common perception that security measures primarily restrict functionality and impede business operations. Instead, he reframes cybersecurity as a critical business enabler that should be integrated into strategic decision-making. Organizations need to make deliberate decisions about the tradeoffs between security and functionality, understanding that proper security measures protect business continuity and reputation. Dr. Cole particularly warns about supply chain attacks, which have become increasingly prevalent, and emphasizes that awareness is the foundation of any effective protection strategy. He recommends centralizing data for easier security management and advises that client devices should minimize storing sensitive data. Mobile Phones: The Ultimate Tracking Device "You don't go anywhere without your cell phone. Your cell phone is never more than a foot from you it's with you wherever you go... which means if somebody wants to track and monitor you they can." We often worry about theoretical tracking technologies while overlooking the sophisticated tracking device we voluntarily carry everywhere—our mobile phones. Dr. Cole points out the irony that people who would never accept being "chipped" for tracking purposes willingly keep their phones within arm's reach at all times. These devices record our locations, conversations, messages, and activities, creating a comprehensive digital trail of our lives. With access to someone's phone, anyone can trace their movements for months and access an alarming amount of personal information. This risk is compounded when we back up this data to cloud services, effectively giving third parties access to our most sensitive information. Understanding these vulnerabilities is the first step toward more mindful mobile security practices. Business Opportunities in the Security Space "We have too much information, too much data. How can we use that data effectively?" The cybersecurity landscape presents significant business opportunities, particularly in making sense of the overwhelming amount of security data organizations collect. Dr. Cole identifies data correlation and effective data utilization as key investment areas. Modern security systems generate vast quantities of logs and alerts, but transforming this raw information into actionable intelligence remains a challenge. Companies that can develop solutions to effectively analyze, correlate, and extract meaningful insights from security data will find substantial opportunities in the market, helping organizations strengthen their security posture while managing the complexity of modern threats. Essential Training for Security-Conscious Developers "Go for secure coding courses. This helps us understand how software can be exploited." For software developers looking to build more secure applications, Dr. Cole recommends focusing on penetration testing skills and secure coding practices. Understanding how software can be exploited from an attacker's perspective provides invaluable insights for designing more robust systems. By learning the methodologies and techniques used by malicious actors, developers can anticipate potential vulnerabilities and incorporate appropriate safeguards from the beginning of the development process. This proactive approach to security helps create applications that are inherently more resistant to attacks rather than requiring extensive security patches and updates after deployment. About Dr. Eric Cole Dr. Eric Cole is the author of "Cyber Crisis, Protecting Your Business from Real Threats in the Virtual World." He is a renowned cybersecurity expert with over 20 years of experience helping organizations identify vulnerabilities and build robust defense solutions against advanced threats. He has trained over 65,000 professionals worldwide through his best-selling cybersecurity courses and is dedicated to making cyberspace a safe place for all. You can link with Dr. Eric Cole on LinkedIn, or visit his company's website Secure-Anchor.com. 

Email After Hours: The Podcast for Email Senders
The Truth About Email Compliance That No One Talks About with Mickey Chandler

Email After Hours: The Podcast for Email Senders

Play Episode Listen Later Mar 20, 2025 21:19


Join hosts Danielle Gallant and Guy Hanson as they dive deep into email compliance and deliverability with Mickey Chandler, founder of Whizardries. In this eye-opening episode, they explore why compliance should be the bedrock (not the ceiling) of email marketing, unpack the complex landscape of US privacy laws, and discuss the future of email regulations.