Podcasts about privacy management

  • 14PODCASTS
  • 64EPISODES
  • 50mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Jan 25, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about privacy management

Latest podcast episodes about privacy management

Mint Techcetra
AI Built-in Smartphones: Life-altering Advantages & Trade-offs

Mint Techcetra

Play Episode Listen Later Jan 25, 2024 33:20


Is the new Rabbit R1 truly the future of smartphone devices? What is an AI phone in the context of Samsung S24 Ultra? How does Gen AI impact smartphones? What are some of user privacy and security concerns? Can phone makers charge more for AI phones? How will AI built-in devices change the consumer electronics market? And what did Indian mobile operating systems designers, like Karthik Ayyar of BharOS, said about the new AI models built-in on consumer devices and privacy issues at the India Science Fest 2024? These are some of the hot topics hosts, Shouvik, Leslie & Deepti discuss in this episode. Tune in to find out how can AI smartphones make your life more convenient and what are some of the trade offs you might have the option to make.

InfosecTrain
Free Certified Information Privacy Manager Certification Training | How To Clear CIPM in 30 Days?

InfosecTrain

Play Episode Listen Later Dec 18, 2023 43:06


clear elevate certified information privacy certification training privacy management
Data Security and Privacy with the Privacy Professor
The History, Mystery, and Rise of AI at CornCon!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Oct 7, 2023 56:06


Dr. John Johnson describes why he created the wildly popular cybersecurity conference, CornCon! It was first held in 2015, in Davenport, Iowa on the banks of the Mississippi River. He also describes the goals for the conference, how it is unique from others in offering a children's hacking bootcamp, and a hacking contest for teens, along with two days of sessions and activities for professionals. Rebecca is also excited to be a speaker with her talk, “It's Not Always a Rattlesnake Just Because It Rattles: Everything I Learned About Risk Management I Learned on the Farm,” and picks John's brain to get some tips. Plus, a Bill Murray after-party…oh, yeah, we're there! Please listen in! #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #PersonalData #Awareness #Education #Compliance #Law #JohnJohnson #CornCon #ProfessionalDevelopment

Data Security and Privacy with the Privacy Professor
The History, Mystery, and Rise of AI at CornCon!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Oct 7, 2023 56:06


Dr. John Johnson describes why he created the wildly popular cybersecurity conference, CornCon! It was first held in 2015, in Davenport, Iowa on the banks of the Mississippi River. He also describes the goals for the conference, how it is unique from others in offering a children's hacking bootcamp, and a hacking contest for teens, along with two days of sessions and activities for professionals. Rebecca is also excited to be a speaker with her talk, “It's Not Always a Rattlesnake Just Because It Rattles: Everything I Learned About Risk Management I Learned on the Farm,” and picks John's brain to get some tips. Plus, a Bill Murray after-party…oh, yeah, we're there! Please listen in! #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #PersonalData #Awareness #Education #Compliance #Law #JohnJohnson #CornCon #ProfessionalDevelopment

Data Security and Privacy with the Privacy Professor
Need More Privacy? Write the Privacy Law We All Need!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Sep 2, 2023 57:27


Do you see a need for more privacy in certain areas of your life? Or within certain industries? Or throughout society? Well, don't just sit there; get up offa that thing, and get that new privacy law drafted into a bill, and then passed into law! It'll make you and everyone else who cares about privacy feel better, while also strengthening privacy protections. Want to know how? Tom Kemp, author of the newly released book, “Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy,” is on the show to tell you how! . Please listen in! . . #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #PersonalData #Awareness #Education #Compliance #Law #TomKemp

Data Security and Privacy with the Privacy Professor
Need More Privacy? Write the Privacy Law We All Need!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Sep 2, 2023 57:27


Do you see a need for more privacy in certain areas of your life? Or within certain industries? Or throughout society? Well, don't just sit there; get up offa that thing, and get that new privacy law drafted into a bill, and then passed into law! It'll make you and everyone else who cares about privacy feel better, while also strengthening privacy protections. Want to know how? Tom Kemp, author of the newly released book, “Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy,” is on the show to tell you how! . Please listen in! . . #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #PersonalData #Awareness #Education #Compliance #Law #TomKemp

TechCrunch Startups – Spoken Edition
Osano, a data privacy management platform, nabs $25M

TechCrunch Startups – Spoken Edition

Play Episode Listen Later Aug 11, 2023 6:02


Osano, an Austin, Texas-based startup developing a platform to help companies manage their data privacy, today announced that it raised $25 million in a Series B funding round.

Data Security and Privacy with the Privacy Professor
GDPR Compliance Stats Everyone, Everywhere, Needs to Know!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Jul 1, 2023 54:07


The EU General Data Protection Regulation (GDPR) has been in effect for 5 years now. What have been the impacts to organizations who must comply? What have been the penalties applied? And for what specific non-compliance issues? Which EU country has been most active in applying GDPR non-compliance penalties? Have there been any countries where no fines/penalties have been applied? What is the largest GDPR fine/penalty to date and to what entity was it applied? What was it for; which GDPR Article(s) were violated? Rebecca speaks with Tara Taubmann-Bassirian, a well-known GDPR expert and Privacy Hero of the Year award winner to get answers to these, and more questions. Please listen in! #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #Awareness #Education #GDPR #Compliance #EUPrivacy #PersonalData #Law

Data Security and Privacy with the Privacy Professor
GDPR Compliance Stats Everyone, Everywhere, Needs to Know!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Jul 1, 2023 54:07


The EU General Data Protection Regulation (GDPR) has been in effect for 5 years now. What have been the impacts to organizations who must comply? What have been the penalties applied? And for what specific non-compliance issues? Which EU country has been most active in applying GDPR non-compliance penalties? Have there been any countries where no fines/penalties have been applied? What is the largest GDPR fine/penalty to date and to what entity was it applied? What was it for; which GDPR Article(s) were violated? Rebecca speaks with Tara Taubmann-Bassirian, a well-known GDPR expert and Privacy Hero of the Year award winner to get answers to these, and more questions. Please listen in! #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #Awareness #Education #GDPR #Compliance #EUPrivacy #PersonalData #Law

Data Security and Privacy with the Privacy Professor
Individuals & Businesses: Mitigate! Those! Risks!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Jun 3, 2023 55:28


Everyone is at risk of cybercrime, privacy breaches, and associated physical risks. Individuals in their personal lives, as well as businesses and their employees within work areas…which are often in homes, and other locations outside of physical business facilities…are at risk. Each and every one of them needs to understand how to recognize information security and privacy risks, and basic ways to mitigate those identified risks. But most folks don't know how to do this. More needs to be done to raise awareness of these important life-encompassing risks if we have any chance at all of slowing down and preventing security incidents and privacy breaches. We dedicate this episode to supporting that goal! In this episode Rebecca has a highly informative discussion with Ron Woerner, a noted international consultant, keynote speaker, teacher, blogger, and writer in the Privacy and Cybersecurity industry. The show starts with the inaugural episode of the new game show, “Mitigate! That! Risk!” Discussion then covers the following: • What are risks in personal lives, as opposed to in business? • What is risk management? • What has been the most significant change in risk management since Ron started his security and privacy career? • What has stayed the same for risk management since the beginning of Ron's career? • What is zero trust, as it relates to risk management? • What is data centric security, as it relates to risk management? • And more… Please listen in! #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #Awareness #Education #RiskAssessment #RiskAnalysis

Data Security and Privacy with the Privacy Professor
Individuals & Businesses: Mitigate! Those! Risks!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Jun 3, 2023 55:28


Everyone is at risk of cybercrime, privacy breaches, and associated physical risks. Individuals in their personal lives, as well as businesses and their employees within work areas…which are often in homes, and other locations outside of physical business facilities…are at risk. Each and every one of them needs to understand how to recognize information security and privacy risks, and basic ways to mitigate those identified risks. But most folks don't know how to do this. More needs to be done to raise awareness of these important life-encompassing risks if we have any chance at all of slowing down and preventing security incidents and privacy breaches. We dedicate this episode to supporting that goal! In this episode Rebecca has a highly informative discussion with Ron Woerner, a noted international consultant, keynote speaker, teacher, blogger, and writer in the Privacy and Cybersecurity industry. The show starts with the inaugural episode of the new game show, “Mitigate! That! Risk!” Discussion then covers the following: • What are risks in personal lives, as opposed to in business? • What is risk management? • What has been the most significant change in risk management since Ron started his security and privacy career? • What has stayed the same for risk management since the beginning of Ron's career? • What is zero trust, as it relates to risk management? • What is data centric security, as it relates to risk management? • And more… Please listen in! #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #Awareness #Education #RiskAssessment #RiskAnalysis

Data Security and Privacy with the Privacy Professor
IoT Stalking, IoT Jewelry, JuiceJacking, AI, CheckWashing & More!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later May 6, 2023 55:05


In this episode Rebecca continues answering a few more of the hundreds of questions she has received from listeners and readers throughout the past few months, covering a wide range of topics. Some of the questions include: • What happened to those men, bar owners, who were arrested for stalking a woman by using digital tracking devices there in Des Moines, Iowa? Did they go to prison? What laws apply? Hear Rebecca's answers, in addition to other associated news and points about IoT trackers, and how to identify if they are stalking you. • The FBI and FCC recently warned that those free USB charging stations in public spaces, such as airports, hotels, hospitals, etc., can have devices hidden within them to steal data, spread malware, etc. Didn't you discuss this in a previous episode? What are some other ways to prevent such skimmers from stealing data? What other harms can result from such skimmers and modified charging cords? Rebecca answers these, and provides some additional helpful information for this threat. • A family member was a victim of check washing! Are there any more tips you have about how to prevent check washing that you can provide in addition to those your described in your December 2022 Privacy Professor Tips message? • I received a pretty “smart” necklace for Hanukkah that, if you press the button on the charm twice, texts and GPS location will immediately be sent to up to five friends/family members to let them know help is needed. With an option to also contact 911. It sounds like it could be extremely privacy-invasive. What tips do you have for me to use this in a secure, privacy-protecting way? Rebecca provides several suggestions, along with a real-life case of IoT being used to track down an assault victim. • Do you think AI and ML will help to reduce financial cybercrime or make it worse? Rebecca's answer may surprise you! • And more… Rebecca provides answers that all listeners, anywhere in the world, can use. #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #Awareness #Education #Spam #Spoofing #Dobbs #DobbsLeak #Government Security #IoT #IoTSecurity #IoTPrivacy #LocationTrackers #IoTAssaults #IoTCrime #AI #ArtificialIntelligence #ML #MachineLearning #CheckWashing #StalkingLaws #CyberStalking #USBSkimmers #JuiceJacking #Malware

Data Security and Privacy with the Privacy Professor
IoT Stalking, IoT Jewelry, JuiceJacking, AI, CheckWashing & More!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later May 6, 2023 55:05


In this episode Rebecca continues answering a few more of the hundreds of questions she has received from listeners and readers throughout the past few months, covering a wide range of topics. Some of the questions include: • What happened to those men, bar owners, who were arrested for stalking a woman by using digital tracking devices there in Des Moines, Iowa? Did they go to prison? What laws apply? Hear Rebecca's answers, in addition to other associated news and points about IoT trackers, and how to identify if they are stalking you. • The FBI and FCC recently warned that those free USB charging stations in public spaces, such as airports, hotels, hospitals, etc., can have devices hidden within them to steal data, spread malware, etc. Didn't you discuss this in a previous episode? What are some other ways to prevent such skimmers from stealing data? What other harms can result from such skimmers and modified charging cords? Rebecca answers these, and provides some additional helpful information for this threat. • A family member was a victim of check washing! Are there any more tips you have about how to prevent check washing that you can provide in addition to those your described in your December 2022 Privacy Professor Tips message? • I received a pretty “smart” necklace for Hanukkah that, if you press the button on the charm twice, texts and GPS location will immediately be sent to up to five friends/family members to let them know help is needed. With an option to also contact 911. It sounds like it could be extremely privacy-invasive. What tips do you have for me to use this in a secure, privacy-protecting way? Rebecca provides several suggestions, along with a real-life case of IoT being used to track down an assault victim. • Do you think AI and ML will help to reduce financial cybercrime or make it worse? Rebecca's answer may surprise you! • And more… Rebecca provides answers that all listeners, anywhere in the world, can use. #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #Awareness #Education #Spam #Spoofing #Dobbs #DobbsLeak #Government Security #IoT #IoTSecurity #IoTPrivacy #LocationTrackers #IoTAssaults #IoTCrime #AI #ArtificialIntelligence #ML #MachineLearning #CheckWashing #StalkingLaws #CyberStalking #USBSkimmers #JuiceJacking #Malware

Serious Privacy
A State of Compliance (with Ralph O'Brien)

Serious Privacy

Play Episode Play 51 sec Highlight Listen Later Apr 7, 2023 26:32


At the end of March, Dr. K Royal started her new role with Crawford & Company, and because of that, was traveling to the company's headquarters in Atlanta (GA). That same week, Paul Breitbarth of Catawiki was teaching a new data protection course with our favourite guest co-host Ralph O'Brien at Maastricht University's European Centre on Privacy and Cybersecurity: a Masterclass on privacy management and data governance. Therefore, this week, a discussion on the ins and outs of privacy management, ISO certifications and how to work towards compliance. If you would like to know more about the Masterclass, check out the website linked above. New dates for the course will be announced in the coming weeks.The Leadercast PodcastThe fun way to grow you and your top talent.Listen on: Apple Podcasts Spotify As always, if you have comments or questions, find us on LinkedIn, Twitter @podcastprivacy @euroPaulB @heartofprivacy and email podcast@seriousprivacy.eu. Rate and Review us! #heartofprivacy #seriousprivacy #privacy #dataprotection #cybersecuritylaw #CPO #DPO

Redefining CyberSecurity
Safeguarding the C-Suite | Pioneering the Future of the Executive Digital Protection Revolution | A Their Story Conversation from RSA Conference 2023 | A BlackCloak Story With Chris Pierson and Daniel Floyd

Redefining CyberSecurity

Play Episode Listen Later Mar 28, 2023 44:10


Welcome to another exciting episode of our podcast, where we dive into the fascinating world of cybersecurity and explore the challenges faced by businesses and individuals alike. Today, we have an extraordinary story to share, one that sheds light on the ever-evolving landscape of cyber threats and the innovative solutions being developed to protect us. We're talking about BlackCloak, a cutting-edge cybersecurity company that's changing the game when it comes to digital executive protection. So buckle up, sit back, and prepare to be amazed as we unravel the incredible story of BlackCloak and its mission to safeguard the digital lives of corporate executives and high-profile individuals. And don't forget to subscribe and share our show so that you and your network can stay ahead of the curve in this rapidly changing world of cybersecurity.In today's episode, we're joined by BlackCloak's co-founder, Dr. Chris Pierson, and their Chief Information Security Officer, Daniel Floyd. Both of these experts bring decades of experience in system architecture, security operations, and cybersecurity strategy to the table. As they discuss the unique challenges faced by executives and their families in the age of remote work, it becomes apparent that traditional cybersecurity measures are no longer enough.The conversation delves into the critical need for digital executive protection that extends beyond the four walls of a company. This is where BlackCloak steps in, providing comprehensive protection for executives and their families in their personal lives without infringing on their privacy. The aim is to create a hardened target around these high-profile individuals and their loved ones, safeguarding their homes, devices, and personal data from malicious cybercriminals.As our guests share real-world examples of high-profile breaches, such as Twilio and Uber, it becomes evident that the personal lives of executives are increasingly becoming the soft underbelly of companies' cybersecurity defenses. By targeting executives through phishing attacks and exploiting their personal devices, cybercriminals are finding ways to bypass corporate security measures and access sensitive information.In response to these evolving threats, BlackCloak offers an innovative solution that bridges the gap between corporate and personal cybersecurity. By taking a proactive approach and addressing the unique challenges faced by executives and their families, BlackCloak is redefining digital protection and shaping the future of cybersecurity as we know it.Don't miss out on this thrilling episode as we delve into the cutting-edge world of BlackCloak and learn how they're revolutionizing the way we think about cybersecurity. Remember to subscribe to our show and share it with your friends and colleagues so that everyone can stay informed and protected in this ever-changing digital landscape.Note: This story contains promotional content. Learn more: https://www.itspmagazine.com/their-infosec-storyGuests:Chris Pierson, Founder and CEO of BlackCloak [@BlackCloakCyber]On Linkedin | https://www.linkedin.com/in/drchristopherpierson/On Twitter | https://twitter.com/drchrispiersonDaniel Floyd, CISO of BlackCloak [@BlackCloakCyber]On Linkedin | https://www.linkedin.com/in/daniel-n-floyd/ResourcesLearn more about BlackCloak and their offering: https://itspm.ag/itspbcwebConnect with BlackCloak during RSA Conference: https://itspm.ag/blackcvnk8For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
Safeguarding the C-Suite | Pioneering the Future of the Executive Digital Protection Revolution | A Their Story Conversation from RSA Conference 2023 | A BlackCloak Story With Chris Pierson and Daniel Floyd

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 28, 2023 44:10


Welcome to another exciting episode of our podcast, where we dive into the fascinating world of cybersecurity and explore the challenges faced by businesses and individuals alike. Today, we have an extraordinary story to share, one that sheds light on the ever-evolving landscape of cyber threats and the innovative solutions being developed to protect us. We're talking about BlackCloak, a cutting-edge cybersecurity company that's changing the game when it comes to digital executive protection. So buckle up, sit back, and prepare to be amazed as we unravel the incredible story of BlackCloak and its mission to safeguard the digital lives of corporate executives and high-profile individuals. And don't forget to subscribe and share our show so that you and your network can stay ahead of the curve in this rapidly changing world of cybersecurity.In today's episode, we're joined by BlackCloak's co-founder, Dr. Chris Pierson, and their Chief Information Security Officer, Daniel Floyd. Both of these experts bring decades of experience in system architecture, security operations, and cybersecurity strategy to the table. As they discuss the unique challenges faced by executives and their families in the age of remote work, it becomes apparent that traditional cybersecurity measures are no longer enough.The conversation delves into the critical need for digital executive protection that extends beyond the four walls of a company. This is where BlackCloak steps in, providing comprehensive protection for executives and their families in their personal lives without infringing on their privacy. The aim is to create a hardened target around these high-profile individuals and their loved ones, safeguarding their homes, devices, and personal data from malicious cybercriminals.As our guests share real-world examples of high-profile breaches, such as Twilio and Uber, it becomes evident that the personal lives of executives are increasingly becoming the soft underbelly of companies' cybersecurity defenses. By targeting executives through phishing attacks and exploiting their personal devices, cybercriminals are finding ways to bypass corporate security measures and access sensitive information.In response to these evolving threats, BlackCloak offers an innovative solution that bridges the gap between corporate and personal cybersecurity. By taking a proactive approach and addressing the unique challenges faced by executives and their families, BlackCloak is redefining digital protection and shaping the future of cybersecurity as we know it.Don't miss out on this thrilling episode as we delve into the cutting-edge world of BlackCloak and learn how they're revolutionizing the way we think about cybersecurity. Remember to subscribe to our show and share it with your friends and colleagues so that everyone can stay informed and protected in this ever-changing digital landscape.Note: This story contains promotional content. Learn more: https://www.itspmagazine.com/their-infosec-storyGuests:Chris Pierson, Founder and CEO of BlackCloak [@BlackCloakCyber]On Linkedin | https://www.linkedin.com/in/drchristopherpierson/On Twitter | https://twitter.com/drchrispiersonDaniel Floyd, CISO of BlackCloak [@BlackCloakCyber]On Linkedin | https://www.linkedin.com/in/daniel-n-floyd/ResourcesLearn more about BlackCloak and their offering: https://itspm.ag/itspbcwebConnect with BlackCloak during RSA Conference: https://itspm.ag/blackcvnk8For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Data Security and Privacy with the Privacy Professor
“Romance Scammers Have Used My Photos Since 2016”

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Mar 4, 2023 54:41


Bryan Denny served as an officer in the U.S. Army for 26 years. In 2016, Bryan's photos were stolen and used to build thousands of fake profiles. Kathy Waters has logged over 4,000 volunteer hours helping those like Bryan Denny whose identity has been stolen, as well as the women and men who have fallen victim to the scammers. Each day new headlines report the financial and emotional destruction that romance scammers wreak on their victims' lives, who include both the targeted victims of the scams, and those whose images are used by the criminals to commit the crimes. Listen in to hear my riveting conversation with Bryan Denny and Kathy Waters as they describe the vast amount of damage romance scammers are increasingly causing. • How did Bryan discover his identity was being used for romance scams? • How did Kathy get involved with helping hundreds of romance scam victims? • What tactics do romance scammers use? • What are some of the real-life experiences of romance scam victims? • Why are romance scammers so successful with their crimes? • How can you spot a likely romance scammer? • To what groups, agencies, etc. should romance scammers be reported? Kathy and Bryan answer these and many more questions. See more about Kathy Waters and Bryan Denny at https://advocatingforu.com/meet-the-board #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #Awareness #Education #IDTheft #IdentityTheft #IDFraud #IdentityFraud #Cybercriminals #RomanceScams #ScamVictims

Data Security and Privacy with the Privacy Professor
“Romance Scammers Have Used My Photos Since 2016”

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Mar 4, 2023 54:41


Bryan Denny served as an officer in the U.S. Army for 26 years. In 2016, Bryan's photos were stolen and used to build thousands of fake profiles. Kathy Waters has logged over 4,000 volunteer hours helping those like Bryan Denny whose identity has been stolen, as well as the women and men who have fallen victim to the scammers. Each day new headlines report the financial and emotional destruction that romance scammers wreak on their victims' lives, who include both the targeted victims of the scams, and those whose images are used by the criminals to commit the crimes. Listen in to hear my riveting conversation with Bryan Denny and Kathy Waters as they describe the vast amount of damage romance scammers are increasingly causing. • How did Bryan discover his identity was being used for romance scams? • How did Kathy get involved with helping hundreds of romance scam victims? • What tactics do romance scammers use? • What are some of the real-life experiences of romance scam victims? • Why are romance scammers so successful with their crimes? • How can you spot a likely romance scammer? • To what groups, agencies, etc. should romance scammers be reported? Kathy and Bryan answer these and many more questions. See more about Kathy Waters and Bryan Denny at https://advocatingforu.com/meet-the-board #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #Awareness #Education #IDTheft #IdentityTheft #IDFraud #IdentityFraud #Cybercriminals #RomanceScams #ScamVictims

Data Security and Privacy with the Privacy Professor
Dobbs Leak, Airtags, Spam, Spoofed Email, & Data Privacy Day!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Feb 4, 2023 53:56


It has been almost three years since Rebecca has done a show answering listener questions; it is time she did another one! In this episode she answers a wide range of questions. Some of the questions include: • Why are location trackers (Apple Airtag, Tile, etc.) bad from a privacy perspective? They aren't even sending any personal information; just location. Should they be outlawed if they are actually bad? Listen in to hear not only her answer, but how she explains what engineers need to consider in the design of these, and other types of, IoT products. • How do you think the Dobbs decision was leaked last year from the US Supreme Court? Rebecca provides some insightful theories that have not yet been discussed anywhere else! • Some spam blockers, like AOL spam blocker, are not effective against email addresses. How can more email spam be blocked? Rebecca provides some good advice in response. • How can spoofed emails be prevented? Everyone needs to hear Rebecca's answer to this. • Should spoofed emails be reported? To where? Rebecca provides answers that all listeners, anywhere in the world, can use. Listen in to hear the answers to these, and more, questions. #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #Awareness #Education #Spam #Spoofing #Dobbs #DobbsLeak #Government Security #IoT #IoTSecurity #IoTPrivacy #LocationTrackers #IoTAssaults #IoTCrime

Data Security and Privacy with the Privacy Professor
Dobbs Leak, Airtags, Spam, Spoofed Email, & Data Privacy Day!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Feb 4, 2023 53:56


It has been almost three years since Rebecca has done a show answering listener questions; it is time she did another one! In this episode she answers a wide range of questions. Some of the questions include: • Why are location trackers (Apple Airtag, Tile, etc.) bad from a privacy perspective? They aren't even sending any personal information; just location. Should they be outlawed if they are actually bad? Listen in to hear not only her answer, but how she explains what engineers need to consider in the design of these, and other types of, IoT products. • How do you think the Dobbs decision was leaked last year from the US Supreme Court? Rebecca provides some insightful theories that have not yet been discussed anywhere else! • Some spam blockers, like AOL spam blocker, are not effective against email addresses. How can more email spam be blocked? Rebecca provides some good advice in response. • How can spoofed emails be prevented? Everyone needs to hear Rebecca's answer to this. • Should spoofed emails be reported? To where? Rebecca provides answers that all listeners, anywhere in the world, can use. Listen in to hear the answers to these, and more, questions. #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #Awareness #Education #Spam #Spoofing #Dobbs #DobbsLeak #Government Security #IoT #IoTSecurity #IoTPrivacy #LocationTrackers #IoTAssaults #IoTCrime

Data Security and Privacy with the Privacy Professor
A Cybersecurity Expert's Real Life Identity Theft Experience

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Jan 7, 2023 55:41


Everyone is a target for identity thieves. Even the most brilliant cybersecurity and privacy experts. Why? One significant reason is because when those organizations and individuals who possess and use your personal data do not effectively secure that data, they leave it vulnerable, leaving YOU at the mercy of cybercrooks. Listen in to hear my riveting conversation with Christine Abruzzi, cybersecurity expert with 30 years of experience, and owner of Cacapon Cyber Solutions describe her current real-life experiences in helping a family member who is an identity theft victim. • What tipped them off that something was wrong? • How they first react and respond? • How did this identity theft situation occur? • What actions are they taking to clean up the victim's credit files? • What are the lessons learned? • How can listeners protect themselves, family and friends from being identity theft and fraud victims? Christine answers these and many more questions. See more about Christine at https://www.linkedin.com/in/christine-abruzzi-738aa913/ See the identity theft & fraud resource list mentioned during the show at https://privacysecuritybrainiacs.com/privacy-professor-blog/ It will be posted on 1/7/2023 #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #Awareness #Education #IDTheft #IdentityTheft #IDFraud #IdentityFraud

Data Security and Privacy with the Privacy Professor
A Cybersecurity Expert's Real Life Identity Theft Experience

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Jan 7, 2023 55:41


Everyone is a target for identity thieves. Even the most brilliant cybersecurity and privacy experts. Why? One significant reason is because when those organizations and individuals who possess and use your personal data do not effectively secure that data, they leave it vulnerable, leaving YOU at the mercy of cybercrooks. Listen in to hear my riveting conversation with Christine Abruzzi, cybersecurity expert with 30 years of experience, and owner of Cacapon Cyber Solutions describe her current real-life experiences in helping a family member who is an identity theft victim. • What tipped them off that something was wrong? • How they first react and respond? • How did this identity theft situation occur? • What actions are they taking to clean up the victim's credit files? • What are the lessons learned? • How can listeners protect themselves, family and friends from being identity theft and fraud victims? Christine answers these and many more questions. See more about Christine at https://www.linkedin.com/in/christine-abruzzi-738aa913/ See the identity theft & fraud resource list mentioned during the show at https://privacysecuritybrainiacs.com/privacy-professor-blog/ It will be posted on 1/7/2023 #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #Awareness #Education #IDTheft #IdentityTheft #IDFraud #IdentityFraud

InfosecTrain
Building Privacy Management System in Organization | What is Privacy Management?

InfosecTrain

Play Episode Listen Later Dec 26, 2022 35:54


Privacy management tools help organizations conduct privacy impact assessments, check processing activities against requirements from privacy regulations, and track incidents that lead to unauthorized disclosures of personal data (investigation, remediation, reporting). Thank you for watching this video, For more details or free demo with out expert write into us at sales@infosectrain.com Subscribe to our channel to get video updates. Hit the subscribe button above. Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infosec_Train LinkedIn: https://www.linkedin.com/company/infosec-train/ Instagram: https://www.instagram.com/infosectrain/ Telegram: https://t.me/infosectrains

Tech Disruptors
How ZoomInfo Is Leading the Way In Data Privacy Management

Tech Disruptors

Play Episode Listen Later Dec 8, 2022 32:44


Bloomberg Intelligence Analysts Niraj Patel and Matthew Schettenhelm host ZoomInfo Chief Compliance Officer Simon McDougall to discuss how his company is charting a course for companies to navigate data privacy regulations. We dive into GDPR's impact across Europe and its possible migration to the US, emerging US data regulations from California and other states on business contact information use, and ZoomInfo's advanced notification and technology process.

Data Security and Privacy with the Privacy Professor
Privacy & Cybersecurity for Your Life During the Holidays

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Dec 3, 2022 54:58


Are you armed with the privacy and security knowledge and awareness necessary to identify all the holiday scams and cybercrooks that emerge and try not only new scams and crimes, but also all the same scams and crimes that have proven to be effective year after year for decades? Are you prepared to help those to whom you give tech gifts so that they use them in the most secure and privacy-protecting way possible? Can you secure those tech gadgets that you receive as gifts to keep the hackers from accessing them and using them to steal your money or commit identity fraud to basically steal your life? You all need to maintain a high-level of awareness and knowledge about privacy and cybersecurity for your life during the holidays. Listen in to hear my conversation with two cybersecurity and privacy experts answer these and many more questions. Cheryl Jackson and Todd Fitzgerald have spent their entire careers dedicated to educating and raising the awareness of security and privacy issues for their co-workers, clients and the general public. Todd and Cheryl also share a huge amount of information about awareness events and education they've provided over the years, including those that were huge successes, and a few they were not so successful, and describe why. Please tune in! #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #HolidayScams #PersonalData #Awareness #Education

Data Security and Privacy with the Privacy Professor
Privacy & Cybersecurity for Your Life During the Holidays

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Dec 3, 2022 54:58


Are you armed with the privacy and security knowledge and awareness necessary to identify all the holiday scams and cybercrooks that emerge and try not only new scams and crimes, but also all the same scams and crimes that have proven to be effective year after year for decades? Are you prepared to help those to whom you give tech gifts so that they use them in the most secure and privacy-protecting way possible? Can you secure those tech gadgets that you receive as gifts to keep the hackers from accessing them and using them to steal your money or commit identity fraud to basically steal your life? You all need to maintain a high-level of awareness and knowledge about privacy and cybersecurity for your life during the holidays. Listen in to hear my conversation with two cybersecurity and privacy experts answer these and many more questions. Cheryl Jackson and Todd Fitzgerald have spent their entire careers dedicated to educating and raising the awareness of security and privacy issues for their co-workers, clients and the general public. Todd and Cheryl also share a huge amount of information about awareness events and education they've provided over the years, including those that were huge successes, and a few they were not so successful, and describe why. Please tune in! #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #HolidayScams #PersonalData #Awareness #Education

Data Security and Privacy with the Privacy Professor
Let's Stop the Robocall Scammers!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Nov 5, 2022 56:33


Everyone is inundated with robocalls! Many of them are legitimate, such as those providing notifications about environmental threats such as hurricanes and tornadoes. And those giving alerts about missing persons. And there are many others that are legal, but can still be quite annoying, such as from political candidates. There are also increasingly more robocalls that are used to commit scams and a wide range of crimes. Security expert Ben Rothke is fed up with all these robocall scammers! Ben has been researching this longtime, and constantly evolving scam for many years. In fact, he has amassed over 100 recorded scam calls that he provides to the public to raise their awareness for identifying these scammers. During this episode Ben describes many different ways that robocalls are used to commit crimes. Such as for spreading ransomware, gaining access to bank and other types of financial accounts, tricking people into buying high-dollar items, or for compelling the targeted robocall victims to send the crooks money. Listen in to hear Ben discuss these and many more different types of robocall crimes, and the tactics used. Mr. Rothke will also describe the overall problem, the security and privacy risks that they can bring, and what needs to be done to get rid of this scourge. Please tune in! #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #RoboCalls #RobocallCrimes #RoboCallScams #PersonalData #Awareness

Data Security and Privacy with the Privacy Professor
Let's Stop the Robocall Scammers!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Nov 5, 2022 56:33


Everyone is inundated with robocalls! Many of them are legitimate, such as those providing notifications about environmental threats such as hurricanes and tornadoes. And those giving alerts about missing persons. And there are many others that are legal, but can still be quite annoying, such as from political candidates. There are also increasingly more robocalls that are used to commit scams and a wide range of crimes. Security expert Ben Rothke is fed up with all these robocall scammers! Ben has been researching this longtime, and constantly evolving scam for many years. In fact, he has amassed over 100 recorded scam calls that he provides to the public to raise their awareness for identifying these scammers. During this episode Ben describes many different ways that robocalls are used to commit crimes. Such as for spreading ransomware, gaining access to bank and other types of financial accounts, tricking people into buying high-dollar items, or for compelling the targeted robocall victims to send the crooks money. Listen in to hear Ben discuss these and many more different types of robocall crimes, and the tactics used. Mr. Rothke will also describe the overall problem, the security and privacy risks that they can bring, and what needs to be done to get rid of this scourge. Please tune in! #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #RoboCalls #RobocallCrimes #RoboCallScams #PersonalData #Awareness

Data Security and Privacy with the Privacy Professor
“Wacky Tobaccy” Laws, Privacy & Security!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Oct 1, 2022 60:00


At this time in our current enlightened period in history, we're actually not enlightened with regard to cannabis benefits, medicinal uses, how to debunk disinformation that has been being spread since the 1930s, and how to protect the privacy of cannabis users, as well as their associated personal data, and the business data of the dispensaries. Have you used cannabis, of any kind in any form? Have any of your family members or friends? For recreation and/or for medicinal purposes? Do you know how or if the associated data you provided to the dispensaries was protected, shared, and used? At least 38 U.S. states, along with Washington, D.C. and 4 US territories, have legalized cannabis of some type, in some way. Want to hear which ones? Do you know which of these laws include requirements for privacy and/or data security? Do you know the current status of federal regulations for cannabis legalization? Including how HIPAA may or may not apply? Do you know what the difference is between cannabis, medical cannabis and marijuana, if any? What about the differences between CBD and THC? Do you know the medical benefits of cannabis? Do you know the ways in which the cannabis dispensaries put your data at risk? And your privacy at risk? Were you aware of the recent data privacy breaches at cannabis dispensaries? Or, about a huge security flaw that allowed 85,000 cannabis dispensary customers' personal data to be searchable and viewable online, by anyone? Do you realize the harms that could occur to those whose personal data and associated cannabis purchasing history and related details were obtained by others? Or, if even just the financial data of a cannabis store was breached and used by competitors? Hint: They are significant! Popular guest and medical cannabis security and privacy expert Michelle Dumay returns for this fourth in a series of shows about current cannabis laws and regulations, personal data privacy and security risks involved with in-person and online sales, and provides some wise advice for all these issues. Please tune in to hear this enlightening discussion! #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #MedicalCannabis #Cannabis #Laws #Marijuana #WackyTobaccy #Dispensaries #Breach #PersonalData #HIPAA #CBD #THC

Data Security and Privacy with the Privacy Professor
“Wacky Tobaccy” Laws, Privacy & Security!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Oct 1, 2022 56:34


At this time in our current enlightened period in history, we're actually not enlightened with regard to cannabis benefits, medicinal uses, how to debunk disinformation that has been being spread since the 1930s, and how to protect the privacy of cannabis users, as well as their associated personal data, and the business data of the dispensaries. Have you used cannabis, of any kind in any form? Have any of your family members or friends? For recreation and/or for medicinal purposes? Do you know how or if the associated data you provided to the dispensaries was protected, shared, and used? At least 38 U.S. states, along with Washington, D.C. and 16 US territories, have legalized cannabis of some type, in some way. Want to hear which ones? Do you know which of these laws include requirements for privacy and/or data security? Do you know the current status of federal regulations for cannabis legalization? Including how HIPAA may or may not apply? Do you know what the difference is between cannabis, medical cannabis and marijuana, if any? What about the differences between CBD and THC? Do you know the medical benefits of cannabis? Do you know the ways in which the cannabis dispensaries put your data at risk? And your privacy at risk? Were you aware of the recent data privacy breaches at cannabis dispensaries? Or, about a huge security flaw that allowed 85,000 cannabis dispensary customers' personal data to be searchable and viewable online, by anyone? Do you realize the harms that could occur to those whose personal data and associated cannabis purchasing history and related details were obtained by others? Or, if even just the financial data of a cannabis store was breached and used by competitors? Hint: They are significant! Popular guest and medical cannabis security and privacy expert Michelle Dumay returns for this fourth in a series of shows about current cannabis laws and regulations, personal data privacy and security risks involved with in-person and online sales, and provides some wise advice for all these issues. Please tune in to hear this enlightening discussion! #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #MedicalCannabis #Cannabis #Laws #Marijuana #WackyTobaccy #Dispensaries #Breach #PersonalData #HIPAA #CBD #THC

CyberSide Chats by Epiq
Season 2, Episode 4: Don't silo your risk from legal

CyberSide Chats by Epiq

Play Episode Listen Later Jun 3, 2022 44:23


Privacy & Compliance expert from Microsoft, Ingrid Rodriguez, joins hosts Jerich Beason& Whitney McCollum to discuss taking risk out of silos. They talk about how the entire organization needs to have understanding of the enterprise risks.  Specifically, how does security & compliance fit into the enterprise risk framework?  What are the situational perspectives of the C-Suite and how can those perspectives drive compliance goals?  How can the CISO and legal work together and with the enterprise for compliance? They will also talk about risk appetite, the tolerance of risk by leadership, and aligning acceptance of risks with business goals.  How much and how often should you communicate risks and mitigation strategy?  Note: “The statements of the guest speakers and hosts in this podcast should not be construed as legal advice.  They represent their views only and not those of Epiq or their respective employers.”BIOGRAPHYIngrid is an Advanced Compliance Global Black Belt with Microsoft Security Solutions Area supporting the South, Southeast of the US, and LATAM regions. In her role, Ingrid shares her enterprising multinational information and security risk management executive experience, to help customers strategize within their Risk and Compliance obligations leveraging our solutions in Compliance, Information Protection, Privacy Management, and Insider Threat management capabilities. During her 18 years tenure in IT Risk & Compliance Leadership, Ingrid designed for an innovative Global Technology Risk Management Framework, as well as a vision for tactical implementation of technology and security controls by combining a variety of data security standards such as: NIST, ISO, PCI, HIPAA, FFIEC, GDPR, to mention a few. Ingrid designed and built the first Global Technology Risk Management programs in most of her previous employers. She lead, supported and guided over 45 countries to meet US and country-level compliance and privacy needs and well as Global Standards.  Ingrid is from Puerto Rico, based in Dallas, TX but soon relocating to beautiful Pensacola, FL. She is a frequent speaker on Risk Management and Compliance topics, in both languages English and Spanish, in many global, national and regional events including ISACA, Microsoft Executive Briefing Center, Fintech, Partners and many other associations and affiliations within the Privacy, Risk and Compliance industry in the US and LATAM.  Ingrid received a Bachelor's Degree in Computer Engineering from the University of Puerto Rico, and also holds a Master's Degree in Sciences, Computer Sciences from the University of Phoenix. She holds various industry certifications, including CRISC, CDPSE, ITIL among others. LinkedIn: https://www.linkedin.com/in/inrodz/ Find us on LinkedIn, Twitter, Facebook, and Instagram or email us at cyberside@epiqglobal.com.

CIAOPS - Need to Know podcasts
Episode 276 - Rebecca Jackson

CIAOPS - Need to Know podcasts

Play Episode Listen Later Oct 21, 2021 51:28


i speak with MVP and Digital Workplace expert Rebecca Jaskson. Rebecca is fascinated by what makes people and organisations tick. She specialises in the digital workplace, employee experience and change management. We do a  deep dive into the main collaboration tools that Microsoft provides such as SharePoint, with an especial focus on the value of the modern Intranet. There is also a round up of the latest Microsoft Cloud news at the front of the episode. This episode was recorded using Microsoft Teams and produced with Camtasia 2020. Brought to you by www.ciaopspatron.com Resources Rebecca Jason - Linkedin, Twitter, Blog, Instagram Mirosoft Ignite AI-based Privacy Management for Microsoft 365 [VIDEO] 3 ways to support frontline workers in a hybrid world  Introducing Android™ Apps on Windows 11 to Windows Insiders  Microsoft achieves a Leader placement in Forrester Wave for XDR  Windows 11 security: Protect it all with Windows 11 chip to cloud security  Sysinternals in the Windows store Sysmon report in virus total

Microsoft Mechanics Podcast
AI-based Privacy Management for Microsoft 365

Microsoft Mechanics Podcast

Play Episode Listen Later Oct 19, 2021 13:21


Get started with Microsoft's new AI-based privacy management solution for Microsoft 365, which applies intelligence to quickly assess your organization's privacy risks and help anyone working with personal data make the right decisions. Alym Rayani, General Manager for Microsoft 365 Compliance and Privacy, joins Jeremy Chapman to show how you can automate subject rights requests for Microsoft 365 data and ensure integration with your existing solutions using our API. Privacy requirements universally impact organizations as more privacy regulations are introduced around the globe. And just like security is a top priority, privacy needs to be too. Now you can build a privacy resilient organization where everybody working with personal data is empowered to be part of the solution. For admins- We've tailored the experience to what privacy teams care about to proactively identify and protect against common privacy risks. For privacy managers- We've built automation for processing subject rights requests at scale, and at quality, whether you're using our built-in experience or tools from a partner. For users- Understand privacy risks in the moment, or even in the context of your work with data. ► QUICK LINKS: 00:00 - Introduction 02:19 - See how it works: Everyday user experience 05:41 - Admin experience 08:00 - Policies 10:20 - Subject rights requests 12:38 - Wrap up ► Link References: Get started with a trial experience at https://aka.ms./TryPrivacyManagement Find guidance geared towards admins, data officers, and data workers at https://aka.ms/PrivacyManagementDocs ► Unfamiliar with Microsoft Mechanics? We are Microsoft's official video series for IT. You can watch and share valuable content and demos of current and upcoming tech from the people who build it at #Microsoft. Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries?sub_confirmation=1 Join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog Watch or listen via podcast here: https://microsoftmechanics.libsyn.com/website ► Keep getting this insider knowledge, join us on social: Follow us on Twitter: https://twitter.com/MSFTMechanics Follow us on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/

The Legalpreneur Podcast
43 - Small Business IT and Privacy Management with Nancy Sabino

The Legalpreneur Podcast

Play Episode Listen Later Jul 30, 2020 27:00 Transcription Available


While it might not be the sexiest aspect of your business, IT and Privacy are deeply important. To shine a light on the necessity of preventative IT planning, I'm joined by Nancy Sabino, CEO and Co-Founder of Sabino Comptech. Sabino Comptech is a leading IT Managed Service Provider for small and mid-sized businesses. Nancy's holistic approach to IT will give you a strong start in protecting your digital systems!In this episode, we'll cover: How proactive legal planning breeds peace of mind for Nancy as a business ownerThe importance of trademarking for a very unique brand name, even if you don't think that anyone else would ever use it. The reasons to draft contracts that not only protect you, but also the other party's interests. Nancy's top tips for IT and Privacy planning for small businesses The importance of protecting your business from cyber crime, no matter how small you are. Want to learn more about Nancy? Connect with her here: Website - Twitter - Instagram - LinkedinTell us your key takeaways! Take a screenshot of this episode, add it to your Instagram Stories, tag @andreasagerlaw and @nancysabinosct let us know! Sign up for Legalpreneur Text AlertsText ‘PODCAST' to 832.225.3164 to enroll in our Legalpreneur text alerts! You'll receive alerts about new episodes, exclusive giveaways, and more. It also will allow you to chat 1-on-1 with me! This week's episode sponsored by TheContractVault.com With over 80 contracts and counting, The Contract Vault is your all-access pass to industry-specific template contracts. Our contract templates are constantly being updated to reflect new changes in the law to ensure that you and your business are fully protected. Plus, members of The Contract Vault have access to our Members-Only Facebook Group, where each month I will be teaching deep dives on important topics that you need to know to protect your business. Think of it as your Business Legal School. Check out The Contract Vault here! Use promo code “LEGALPRENEUR” for a secret special discount!  Links: Instagram Website FacebookTwitter Disclaimer: The Legalpreneur Podcast is advertising/marketing material. It is not legal advice. Please consult with your attorney on these topics. Copyright Andrea Sager Law 2020

Intelligent Multi-Cloud Data Management with Aparavi
Why Data Privacy Management, Why Aparavi, Why Now?

Intelligent Multi-Cloud Data Management with Aparavi

Play Episode Listen Later Jul 21, 2020 24:57


Aparavi Chief Product Evangelist and podcast host Darryl Richardson is joined by attorney, data scientist, and technologist Paul Starrett of Starrett Consulting, as well as recovering attorney and Aparavi Solutions Marketing Manager, Beth Winters. They discuss the data privacy laws that may be affecting your organization, the growing risk of data breaches, best practices for compliance, how personnel structure is shifting, and why automation revolutionizes data management.

data privacy privacy management
Data Security and Privacy with the Privacy Professor
Hotel Data Security and Privacy

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Apr 23, 2019 58:11


There are growing concerns about privacy and the security of data provided to hotels, along with increasing safety concerns. • How many different entities get your personal data when you check into a hotel? • How many third parties have access to your personal data through the hotel? • What types of activities that you do in your room that are often put into the hotel system? • What types of actions can hotels take to help them improve their systems and data security and better protect the privacy of their guests? • What are the most challenging requirements within regulations such as the EU GDPR and California CPA for hotels to meet? • What are a few tips for travelers for protecting their own privacy? Tune in to hear Rebecca discuss these topics and more with Chris Zoladz, founder of Navigate LLC and former VP of Information Protection & Privacy at Marriott International.

Data Security and Privacy with the Privacy Professor
China Tech, Reusing Old Devices, Accessing Patient Data and More!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Apr 16, 2019 55:40


In this episode Rebecca answers some questions received from show listeners and her Privacy Professor Tips readers. A wide range of topics are covered, such as: • How many voting machines were attacked during the USA 2016 elections? Will they continue? • Should listeners be concerned that wireless China tech may have surveillance built in? Or tech from other countries? • What happened at Mar-a-Lago with the USB thumb drives with malware them? • What happens to patient data when a clinic closes? • What are red flags that popular tech gadgets, like iPads, have security problems? • Is it safe to give children old phones or other tech to use? • How can people tell if skimmers are in ATMs or self-pay devices? • How can locations for those using Gmail or other email services be removed? • What popular retail check-out system is no longer being supported, leaving millions of retailers & their customers vulnerable? Tune in to hear Rebecca discuss these topics and more.

Data Security and Privacy with the Privacy Professor
GDPR: Implementing Data Subject Access and Rights

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Apr 9, 2019 46:13


In this 6th in a series of shows on GDPR we discuss issues about how to give individuals access to their own personal data, how to provide them with portability of their personal data, and related issues. Understanding the actual HOW of doing compliance requirements is usually the most challenging part of compliance. One factor is because each organization has its own unique business environment, so the HOW cannot be the same for all organizations. This show explores Articles 15, along with some of Articles 17 and 20, of GDPR. • What penalties and fines under GDPR have been applied to date? By what countries? • What are the most challenging parts of meeting GDPR compliance? • What types of data do organizations need to provide to individuals upon their request? Does such data include meta data? Log activities? Other information? Tune in to hear Rebecca discuss the answers to these questions and more with Steve Wright, privacy and GDPR expert.

Data Security and Privacy with the Privacy Professor
Continuing the Cannabis Security and Privacy Risks Conversation

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Apr 2, 2019 55:06


This is the third in a series of shows about personal data privacy and security risks involved with cannabis sales. We discuss wide-ranging issues involved with cannabis dispensaries and online cannabis sales. We also discuss some of the ways in which smartphones, apps, and other tech can bring risks to those using cannabis. • Where is cannabis legal throughout the world? • How are cannabis laws creating stigmas for those using medical cannabis? • How are the wide number of personal data items collected from cannabis customers and patients put at risk? • Is 90% of stolen cannabis patient/customer data really taken by insiders? • Are patients using THC at more or less risk of data theft, or privacy harms, than those using CBD? What are the differences? Tune in to hear Rebecca discuss the answers to these questions and more with Michelle Dumay, cannabis industry privacy and security expert, advocate and advisor.

Data Security and Privacy with the Privacy Professor
Backdoors in Cybersecurity Tools Gives Privacy Only to Outlaws

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Feb 12, 2019 57:32


The Pretty Good Privacy (PGP) encryption tool became freely available in 1991, drastically improving data security. It also stirred the ire of US government folks who could not surveil on the encrypted data. Dr. Philip Zimmermann, PGP creator, was then made target of a 3-year criminal investigation, while PGP became the most widely used email encryption software in the world. Worldwide attempts to compel tech companies to create weakened encryption has continued to increase in the name of safety. How does weakened security tech degrade the privacy of the population? Do terrorists & crooks use those weakened encryption tools? What are more effective ways of accessing communications of criminals & terrorists? How does weak encryption support surveillance worldwide? How is VoIP privacy impacted? What are some strong encryption tools available to consumers? What can support government adoption of strong encryption? Rebecca discusses these & related issues with Dr. Philip Zimmermann.

Data Security and Privacy with the Privacy Professor
Will Australias Encryption Law Kill Privacy in Name of Safety?

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Feb 5, 2019 57:33


Government leaders & law enforcement are trying to force tech companies to put backdoors in encryption in the name of public safety. There are 750,000 law enforcement employees & 1/2 million US intelligence agencies community employees who may use those backdoors, & likely many others worldwide. Strong encryption is available throughout the world. If businesses & general public are forced to use encryption with back doors, will cybercrooks will be the only ones using strong encryption; those the backdoors were intended to be used on to begin with? How will Australia's new law requiring encryption backdoors impact data security & privacy? Who has oversight of that law? How will it impact other countries? Does any evidence prove encryption backdoors have improved safety/security? Rebecca discusses these and related issues with Dr. Katina Michael, Arizona State University director of the Centre for Engineering, Policy and Society. Katina is also a privacy and uberveillance pioneer.

Data Security and Privacy with the Privacy Professor
Will You Sacrifice Your Privacy When Purchasing Cannabis?

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Jan 29, 2019 58:56


Medical cannabis is legal in 33 US states, Washington, D.C., & 4 US territories. Ten states allow legalized sale of adult use marijuana. Many more are projected to legalize in 2019. Those using cannabis dispensaries assume their personal data is secured, and many incorrectly believe paying cash will leave no record of the purchases. Many risks exist to the security & privacy of those purchasing cannabis when strong security & privacy controls haven't been implemented. Many breaches have already occurred. What is a typical visit to a cannabis store like, and where are the data security and privacy risks? What needs to be done to better secure the data that dispensaries collect, store, and share with others? How can the privacy of dispensary patients & customers be protected? Rebecca discusses these and related issues with Michelle Dumay, cannabis industry privacy and security advocate and advisor. Michelle also provides a case study using an example from an Ohio dispensary.

Data Security and Privacy with the Privacy Professor
GDPR, Data Privacy Day and The Need for Privacy

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Jan 22, 2019 56:30


2018 privacy hero of the year, Tara Taubman-Bassirian, discusses the EU GDPR, the increasing need for protecting privacy in the increasingly technology-rich environment, and some activities for Data Privacy Day on January 28, 2019. What are the benefits of GDPR? Where can it be improved upon? What do companies struggle with most for GDPR compliance? What is a “hot potato” GDPR issue? How are binding corporate rules (BCRs) used for non-adequate countries? How has Brexit impacted GDPR compliance? Why does privacy matter? What are the current largest threats to privacy? What are some activities for Data Privacy Day? Hear Tara discuss these topics, and more, with Rebecca.

Data Security and Privacy with the Privacy Professor
Data Security and Privacy Ethics in Computing

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Jan 15, 2019 56:21


There have been concerns about the ethical use of technology, data, and the results of processing for many decades. We are now dealing with additional emerging ethical issues involving big data analytics, artificial intelligence and the associated biases, the use of personal data found online that is not protected, and also for data that is generated by and transmitted through smart devices, and so many other situations. Are there generational differences in computing ethics? How do computing ethics impact data security and privacy? What are the security and privacy ethical concerns for big data analytics and artificial intelligence? Lynn Fountain discusses these, and many more related topics, with Rebecca in this episode. Lynn also provides information about her latest book, Ethics and the Internal Auditor's Political Dilemma: Tools and Techniques to Evaluate a Company's Ethical Culture published by CRC Press.

Data Security and Privacy with the Privacy Professor
2019 Information Security Forecast: Worldwide and In Colombia

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Jan 8, 2019 56:26


What will 2019 bring with regard to information security and privacy threats and trends? What is digital density? What are the security dangers for APIs? What kind of surveillance activities, if any, take place in Colombia? What are common privacy practices and regulations for both the US and Colombia? What international cybersecurity threats exist to all countries? Listen in to hear Dr. Jeimy Cano's five major 2019 information security and privacy predictions. Dr. Cano will also describe what we all need to look out for with regard to cybersecurity and privacy during the year ahead. Also hear about some of the cybersecurity and privacy activities in his home country, Colombia.

Data Security and Privacy with the Privacy Professor
Is Anonymization Possible with Current Technologies?

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Dec 11, 2018 56:41


What is possible with regard to de-identification and anonymization? Will anonymization be sufficient only for today? Or, will it keep the data anonymized for decades to come; possibly beyond? What is necessary to minimize re-identification risks? What do you need to know about anonymization before agreeing to allow your health data to be used for research? In this episode Rebecca speaks with world-renowned de-identification and anonymization expert, Dr. Khaled El Emam about anonymization, de-identification, re-identification risks, and related topics. Dr. El Emam has done extensive research in this area and written multiple books on these topics. Rebecca contributed a chapter to Dr. El Emam's book, “Risky Business: Sharing Health Data While Protecting Privacy.” Dr. El Emam also wrote “Anonymizing Health Data” and “Guide to the De-Identification of Personal Health Information,” in addition to many articles.

Data Security and Privacy with the Privacy Professor
FTC Influences on Privacy Sanctions and Regulations

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Dec 4, 2018 58:27


The Federal Trade Commission (FTC) is considered by many organizations to be the preeminent arbiter of privacy in the US. How did the FTC develop this authority over the years? What have been some of the most privacy-impacting cases? Where do organizations need to pay more attention within their privacy efforts to avoid fines & decades-long consent decrees? What does the FTC do with all the money from the fines they are paid? Where is the FTC going with privacy regulations and enforcement? How are your posted privacy notices related to the FTC Act when it doesn't even mention privacy? Listen in to hear Marc Groman, an internationally recognized privacy expert and the first FTC Chief Privacy Officer, discuss these and many more FTC privacy oversight and enterprise privacy management topics with Rebecca. Marc will also let listeners know where to get help with improving the security & privacy of their children's and teens' online use.

Data Security and Privacy with the Privacy Professor
IOT Security, Privacy and Safety

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Nov 27, 2018 56:38


At least one Internet of Things (IoT), or “smart”, device, is already used by each person within the large majority of the population. The number of IoT devices are growing exponentially, and soon every member of the population will own a few to many IoT devices each. IoT devices inherently bring privacy, safety and security risks to those using them, and attached in some way to them. Some risks, such as those created by medical devices, smart homes, smart grids and smart vehicles and roads literally could result in death. What are these data and systems security, privacy and safety risks? What needs to be done to mitigate those risks? Why aren't device makers building security, privacy and safety controls into these devices? Listen in to hear Abhik Chaudhuri, author of the book “Internet of Things, for Things and by Things” discuss these and many more IoT security, privacy and safety topics with Rebecca.

Data Security and Privacy with the Privacy Professor
GDPR: Using Legitimate Interests as a Lawful Basis for Processing

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Nov 20, 2018 55:47


• What are considered to be legitimate interests as a basis for legal processing under GDPR? Context is a vital consideration. • What should organizations do with regard to “careful assessment” to determine whether or not a situation is considered to be a legitimate interest of the data controller to enable personal data processing? • What resources and guidance are available to help organizations to determine legitimate interests? • What do organizations struggle with most for this requirement? • How high are the fines for non-compliance? Tune in to hear Teresa Troester-Falk, Chief Global Privacy Strategist, Nymity, and Gabriela Zanfir-Fortuna, EU Policy Counsel, Future of Privacy Forum, provide answers and discuss more GDPR requirements. We will also walk through some case studies for determining legitimate interests for processing, including a real-life IoT case study!

Toastcaster Communication Leadership Learning Lab
Toastcaster 72 Privacy & What Clubs Should Know - Jean Eaton

Toastcaster Communication Leadership Learning Lab

Play Episode Listen Later Aug 30, 2016 30:05


[30:05] Privacy is something we may not think about as a concern when it comes to Toastmasters. Our guest is Jean Eaton of Information Managers a practical privacy coach and expert in many disciplines including Privacy Management and Legislation. As a former Toastmaster Jean explains what privacy means and offers up some best practices,valuable tips and shares what Clubs and club leaders can do to prevent a breach. Listeners can also download her 10 Key Steps to Prevent a Privacy Breach.

privacy prevent clubs legislation toastmasters key steps privacy breach privacy management jean eaton information managers