Logo

    shesaidprivacyhesaidsecurity

    Explore "shesaidprivacyhesaidsecurity" with insightful episodes like "Canada vs. US Privacy Law – What Companies Need to Know", "Establishing Consent With Loyalty Programs", "What You Should Know About Ransomware and Developing Incident Response Plans", "Protect Your Digital Profile From the Dark Web: What You Should Know About Device Settings" and "Building Privacy Programs in the Evolving Ad Tech Space" from podcasts like ""She Said Privacy/He Said Security", "She Said Privacy/He Said Security", "She Said Privacy/He Said Security", "She Said Privacy/He Said Security" and "She Said Privacy/He Said Security"" and more!

    Episodes (72)

    Canada vs. US Privacy Law – What Companies Need to Know

    Canada vs. US Privacy Law – What Companies Need to Know

    Cat Coode is the Founder of Binary Tattoo, a data and privacy consultancy. With a certification in data privacy law and two decades of experience in mobile development and software architecture, she helps individuals and corporations better understand cybersecurity and data privacy. Cat specializes in global privacy regulation compliance and delivering privacy education seminars. She is a member of the Canadian Standards Council for GDPR and in 2021, was named one of Canada’s Top 20 Women in Cybersecurity. 

    In this episode…

    Most professionals and corporations are familiar with GDPR and CCPA, but Canada’s data privacy law differs in that individuals are permitted to access and amend personal information from companies. This right has exposed various data privacy breaches from large organizations like Tim Hortons and Home Depot. So what can companies learn from these mistakes?

    Data privacy infringements occur when businesses mislead their customers about how they’re utilizing personal information for various services. Regardless of where you’re located, Cat Coode says to avoid disclosing sensitive data to third parties. Instead, it’s crucial to maintain transparency regarding data collection and usage so consumers can take control of their information.

    In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels host data privacy strategist and Founder of Binary Tattoo, Cat Coode, to chat about Canadian data privacy laws. Cat also shares the implications of Home Depot’s data collection and sharing methods, the three best practices for vendor due diligence, and how Canada’s data privacy laws compare to other regulations.

    Establishing Consent With Loyalty Programs

    Establishing Consent With Loyalty Programs

    Phil Rubin is the Founder and Principal of Grey Space Matters, a consulting firm that works with companies ranging from early-stage and emerging growth to global brand leaders across various industries and sectors. He is a customer-focused strategic growth leader with more than 30 years of experience driving growth for global brands. 

    Recognized as an industry thought leader, Phil is a keynote speaker for events across North America, Asia, and Europe. He has been quoted in The Wall Street Journal, Forbes, and numerous other trade publications. Before GSM, Phil led Global Insights and Strategic Partnerships for Bond, a loyalty and customer marketing firm.

    In this episode…

    Airlines and other brands utilize loyalty programs to generate customer insights and enhance experiences. For instance, Delta Airlines has partnered with American Express and Lyft to offer frequent flier miles and discounted transportation — but this raises concerns regarding data collection. So how are brands collecting customer data, and how can you take precautions to protect privacy?

    According to Phil Rubin, brands collect two types of data: zero-party data that customers share willingly with the company and first-party data, which brands collect and own directly from their customers. When leveraging loyalty programs, brands should remain transparent about data collection methods to avoid costly privacy breaches. Customers join loyalty programs to receive value and benefits, so it’s crucial to provide useful services and establish trust to increase consent.

    In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels interview Phil Rubin, Founder and Principal of Grey Space Matters, to discuss data-sharing in loyalty programs. Phil explains integrated loyalty experiences, the common forms of data collected for loyalty programs, and how privacy laws impact these programs.

    What You Should Know About Ransomware and Developing Incident Response Plans

    What You Should Know About Ransomware and Developing Incident Response Plans

    Larry Slusser is the Senior Director of Professional Services at SecurityScorecard, the global leader in cybersecurity ratings. In his role, he assists clients in both active and reactive cybersecurity through services including global digital forensics, incident response, and ransomware mitigation. As a retired Air Force officer, Larry partnered with technical engineers, investigators, and business and external stakeholders to sustain focus and achieve milestones. Before SecurityScorecard, he held several leadership positions at Fortune 500 companies.  

    In this episode…

    As ransomware attacks grow increasingly elaborate, companies need to develop sound incident response measures to protect their data. Yet less than 10% of incident response plans are prepared to combat these attacks, and in the event of a threat, 80% of businesses pay the ransom. So how can you optimize your response strategies to ensure maximum preparation?

    Larry Slusser advises developing and executing tabletop exercises to simulate an actual attack. But this exercise is ineffective without proper data analysis, so it’s crucial to locate and safeguard your most valuable data. Optimal awareness and preparation require you to become educated on incident detection and response and invest in antivirus security tools.

    In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels host Larry Slusser, Senior Director of Professional Services at SecurityScorecard, to discuss cyber attacks and incident response measures. Larry talks about the types of ransomware, the importance of tabletop exercises, and how companies respond to ransomware attacks.

    Protect Your Digital Profile From the Dark Web: What You Should Know About Device Settings

    Protect Your Digital Profile From the Dark Web: What You Should Know About Device Settings

    Chris Bullock is the Founder, CEO, and Managing Member of Cyber Investigations and Intelligence Agency (CI2A), a company that provides world-class cybersecurity and cybercrime solution services. He is also an award-winning chief information security officer and a decorated law enforcement veteran. As a leader and program builder, Chris has built and managed several successful cybersecurity programs at large and small organizations across many business verticals and governments.

    He holds multiple certifications including Certified Information Systems Security Professional (CISSP) and Certified Cybercrime Examiner (CCCE). Chris frequently speaks at major security conferences and writes articles on cybersecurity, and in 2012, he was voted “85th Top Ranking CISO in the US.”

    In this episode…

    Open-source intelligence has provided public access to personal information on the internet, allowing hackers to compromise anyone’s digital profile. With technology becoming increasingly pervasive in our daily lives, what steps can you take to reduce your digital footprint?

    According to Chris Bullock, attackers can steal data from your personal devices to be exchanged on the dark web. Most users aren’t aware that seemingly mundane settings on these devices can collect and release your data. To prevent unwanted attacks, Chris recommends disabling location services, photo, and microphone access for all apps and deactivating the auto-join feature for Wi-Fi and Hotspots. 

    In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels welcome Chris Bullock, Founder, CEO, and Managing Member of CI2A, to discuss tips for protecting your digital profile. Chris also explains open-source intelligence, the impact of privacy laws on data security, and how security attacks against high-profile individuals have evolved.

    Building Privacy Programs in the Evolving Ad Tech Space

    Building Privacy Programs in the Evolving Ad Tech Space

    Beatrice Botti is the Vice President and Global Data & Privacy Officer at DoubleVerify, a leading software platform for digital media measurement and analytics. After an academic career in the EU and the US, she became a contract attorney before working in various privacy roles at Virgin Pulse, including Director of Privacy, Partnerships & Legal, Privacy Officer, and Data Protection Officer. 

    In this episode…

    Privacy regulations in the US are rapidly evolving, with five new laws expected to be enacted by the end of the year. But with individual governments working independently, each law is interpreted differently, making it challenging for organizations to fully comprehend privacy. So how can you build a privacy program that conforms to each law’s regulatory framework?

    When it comes to privacy in the ad tech space, Beatrice Botti says that predicting the outlook of impending regulations is futile. It’s critical to prepare for uncertainty by analyzing your data’s location and categories to determine which laws apply to your business. Once you’ve collected the appropriate data, you can seek advice from a privacy consultant or attorney to help you assess possible solutions, create a compliant program, and decide on further action.

    In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Beatrice Botti, VP and Global Data & Privacy Officer at DoubleVerify, to discuss how privacy regulations impact ad tech. Beatrice speaks about the most pervasive privacy challenges companies face, advice for navigating US privacy laws, and how organizations can build privacy programs.

    How To Protect Backup Servers From Ransomware Attacks

    How To Protect Backup Servers From Ransomware Attacks

    Curtis Preston is the Chief Technical Evangelist at Druva, a SaaS data protection platform. He is also the Founder and Webmaster of Backup Central, a website dedicated to data backup and recovery. Since 1993, Curtis has specialized in storage, backup, and recovery and has been an end-user, consultant, and analyst. He has written four books on these subjects and is the host of the Restore it All and No Hardware Required podcasts.

    In this episode…

    Ransomware is becoming increasingly sophisticated, with hackers deactivating companies’ backup servers to counteract cybersecurity efforts in a traditional attack. Still, businesses are neglecting to test and protect their backup servers. So how can you safeguard your data against cyberattacks?

    With the emergence of modern technology and impending security regulations, W. Curtis Preston says it’s more crucial than before to implement disaster recovery plans that facilitate data restoration. One way to ensure maximum protection is to utilize a SaaS data protection provider. Selecting a provider necessitates evaluating your cybersecurity methods and aligning them with the provider’s disaster response plans.

    In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with W. Curtis Preston of Druva and Backup Central to talk about data protection and disaster recovery. Curtis explains how ransomware targets backup servers, the importance of updating backup plans, and key considerations for selecting data protection SaaS providers.

    Hiring and Staffing in the Privacy and Security Space

    Hiring and Staffing in the Privacy and Security Space

    Jared Coseglia is the Founder and CEO of TRU Staffing Partners, an award-winning staffing company representing talent and opportunities in data privacy, e-discovery, and cybersecurity. TRU has been voted a top-three legal and/or litigation support staffing agency for seven consecutive years in both the National Law Journal and the New York Law Journal and has been named one of the Inc. 5000 Fastest Growing Private Companies in America. 

    Jared has placed over 3000 professionals in full-time and temporary positions at the Fortune 1000 and Am Law 200 levels and throughout the global consultancy, service, and software provider communities. As an active member of the legal and cybersecurity community, he is a member of the Board of Editors for Cybersecurity Law and Strategy, has written over 90 articles, regularly appears in podcasts and webinars, and has spoken at over 50 conferences. 

    In this episode…

    When it comes to hiring, data privacy and security companies aren’t sure what to look for in candidates. Similarly, professionals are struggling to understand businesses’ qualifications and gain the skills needed for each discipline. With so much variability surrounding hiring practices, how can organizations maintain clarity to attract and retain top talent?

    Privacy and security staffing expert Jared Coseglia says that companies need to develop robust, transparent, and simple privacy and security programs. This demonstrates that you recognize your business’ requirements and can assess the market effectively. Some companies have employed AI technology to streamline the hiring process. Yet, this raises representation issues, so Jared says it’s crucial to utilize this technology to enhance diversity and provide candidates with an inclusive experience. 

    In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels chat with Jared Coseglia about hiring and staffing trends in privacy and security. Jared talks about how companies can attract and retain privacy talent, AI’s role in the hiring process, and compensation in privacy versus security.

    Blockchain: The Road to Adoption

    Blockchain: The Road to Adoption

    Zenobia Godschalk is the SVP of Communications at Hedera, an enterprise-grade public network for building decentralized applications. As the Founder and CEO of the technology marketing firm ZAG Communications, she has launched and grown multiple $1B, high-growth, global technology companies. Zenobia has experience in distributed databases, cybersecurity strategies, public relations, and financial reporting. She is also a board member of Stanford FLAN (First-Generation and/or Low-Income Alumni Network). 

    In this episode…

    Blockchain is surging in popularity — everything from banking transactions to digital concert tickets uses some form of decentralized finance. Yet, consumers distrust this software as it poses security risks and often results in adverse online experiences. So, what does this mean for the future of blockchain?

    Early adopters of this technology have employed a more synthetic version of decentralized finance (DeFi), exploiting customers by claiming unrealistic ROIs. Given that blockchain and other types of DeFi are still unregulated by FDIC and venture capital, Zenobia Godschalk says that the road to full adoption is likely to be hindered. Meanwhile, she notes that companies seeking to integrate blockchain must understand its underlying protocols and technology infrastructure to create seamless consumer interactions. 

    In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels welcome Zenobia Godschalk, SVP of Communications at Hedera, to discuss security trends in the blockchain space. Zenobia talks about venture capital’s security regulations for blockchain, how to build trust in decentralized finance, and how to optimize digital transactions.

    Protecting Consumer Data From Third Parties

    Protecting Consumer Data From Third Parties

    Ian Cohen is the Founder and CEO of Lokker, a company committed to protecting businesses from third-party privacy risks. Before Lokker, he served as CEO of Credit.com, where he transformed the company into a trusted high-growth hub for consumers seeking guidance on credit and finance. Ian is also a Board Member of Uqual, an Industry Advisor at Long Ridge Equity Partners, and an Advisor and Investor at PolyScale. 

    In this episode…

    Data collection has become increasingly obscure, and companies like Meta and Oracle are facing lawsuits for unauthorized data tracking and sharing across third parties. With data sharing largely unregulated among companies, how can you protect customer data?

    When collecting consumer data, companies often struggle to interpret the data and lack knowledge about its location and usage. With the emergence of GDPR (General Data Protection Regulation) in the US, businesses must go beyond internal privacy programs to regulate external data sharing and comply with the law. Ian Cohen stresses the importance of establishing awareness campaigns and fostering transparency and visibility among third parties.

    In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels host Ian Cohen, Founder and CEO of Lokker, to discuss protecting consumer data from third-party access. Ian explains how Lokker collects and analyzes data, discusses the compliance challenges of third-party data, and offers advice on third-party data sharing.

    Protecting Consumer Data From Third Parties

    Protecting Consumer Data From Third Parties

    Ian Cohen is the Founder and CEO of Lokker, a company committed to protecting businesses from third-party privacy risks. Before Lokker, he served as CEO of Credit.com, where he transformed the company into a trusted high-growth hub for consumers seeking guidance on credit and finance. Ian is also a Board Member of Uqual, an Industry Advisor at Long Ridge Equity Partners, and an Advisor and Investor at PolyScale. 

    In this episode…

    Data collection has become increasingly obscure, and companies like Meta and Oracle are facing lawsuits for unauthorized data tracking and sharing across third parties. With data sharing largely unregulated among companies, how can you protect customer data?

    When collecting consumer data, companies often struggle to interpret the data and lack knowledge about its location and usage. With the emergence of GDPR (General Data Protection Regulation) in the US, businesses must go beyond internal privacy programs to regulate external data sharing and comply with the law. Ian Cohen stresses the importance of establishing awareness campaigns and fostering transparency and visibility among third parties.

    In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels host Ian Cohen, Founder and CEO of Lokker, to discuss protecting consumer data from third-party access. Ian explains how Lokker collects and analyzes data, discusses the compliance challenges of third-party data, and offers advice on third-party data sharing.

    Building Privacy Programs for Software Engineers

    Building Privacy Programs for Software Engineers

    Vaibhav Antil is the Co-founder of Privado.ai, a developer-friendly privacy platform. Privado was purpose-built as a code-scanning solution for privacy to discover personal data, usage, flows, and leakages, as well as flag privacy issues in the code for GDPR regulations. Vaibhav became a privacy consultant to help companies remain compliant after the introduction of GDPR. Before Privado, he was the Co-founder of Jukebox Studio, which was acquired by Gaana, where he served as the Senior Product Manager of Subscriptions.

    In this episode…

    When developing apps and other software, engineers often collect excessive consumer data and lack consideration for potential breaches. As a privacy professional, how can you implement developer-friendly privacy programs?

    According to privacy consultant Vaibhav Antil, there is a knowledge barrier between engineering and privacy teams. To address and mitigate this, it’s essential to provide developers with readily-available privacy tools that display each code's data leaks and breaches. By collaborating with engineers and using familiar language when giving instructions, you can mitigate risks to your software.

    In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels host Vaibhav Antil, Co-founder of Privado.ai, to discuss building privacy programs for developers. Vaibhav explains privacy debt, the qualities of a developer-friendly privacy program, and how Privado scans codes for privacy risks.

    Assessing and Preventing Financial Risks

    Assessing and Preventing Financial Risks

    Gary Vecchiarelli is the Chief Financial Officer at CleanSpark, a sustainable Bitcoin mining company solving modern energy challenges. As a licensed CPA, he has over 10 years of experience in public accounting, having worked for international firms with clientele ranging in size from $50 million to $1 billion while operating in various industries. Gary serves on the board of directors for the Doral Academy of Nevada and Financial Executives International Las Vegas Chapter. He was named by VEGAS INC magazine to the “Las Vegas 40 Under 40” list in 2014.

    In this episode…

    With the enforcement of the Sarbanes-Oxley Act of 2002, finance departments must remain transparent in their reporting practices to mitigate fraudulent activity. Yet these departments continue to struggle with privacy and security measures and as a result, fall victim to wire fraud and phishing scams. So, how can you assess and prevent risks to stay compliant and combat attacks?

    Finance and accounting expert Gary Vecchiarelli recommends implementing internal security controls to conduct preventative risk analyses and assessments and forecast potential attacks. At the foundational level, finance departments can invest in firewalls and encryption and instruct team members to approve transactions. To ensure maximum security, Gary advises incorporating the COSO Framework into your business processes to comply with industry standards and identify, monitor, and eliminate risks effectively.

    In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels host Gary Vecchiarelli, Chief Financial Officer at CleanSpark, to discuss managing risks in financial environments. Gary shares how he manages security from a financial perspective, how finance departments can prevent fraud and hacking, and the impact of risk assessments on financial decisions.

    Know Your Data: How To Manage and Secure Regulated Company Data

    Know Your Data: How To Manage and Secure Regulated Company Data

    Dimitri Sirota is the Co-founder and CEO of BigID, a data platform that helps entrepreneurs acquire actionable intelligence in the data center and cloud to solve data privacy, protection, and prospective problems. As an established serial entrepreneur, investor, mentor, and strategist, he founded two enterprise software companies focused on security and API management. Dimitri is a contributor to Forbes Tech Council and was a finalist for the 2021 EY Entrepreneur of the Year Award.

    In this episode…

    With increasing ambiguity around sensitive consumer data, businesses are struggling to identify and manage personal information securely. So, how can you distinguish and reduce security risks on regulated data to provide your customers and organization with valuable insights?

    Privacy and identity expert Dimitri Sirota maintains the importance of understanding your company’s data. This necessitates pinpointing and recognizing the precise location and forms of your data to determine the associated risks. BigID provides businesses with the data analytics technology and tools needed to generate actionable insights, discard unnecessary data, and transfer personal information and transparency back to the customer.

    In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels host Dimitri Sirota, Co-founder and CEO of BigID, to talk about identifying and managing regulated and personal data. Dimitri discusses how to leverage data to deliver value to customers and organizations, how companies can identify and minimize cloud data risks, and the key trends in businesses’ privacy programs.

    Proactive Incident Response Measures for Cyber Attacks

    Proactive Incident Response Measures for Cyber Attacks

    Troy Bettencourt is the Associate Partner of the X-Force Incident Response Team at IBM, a company that helps blue teams improve incident response plans and minimize the impact of a breach. As a technically-skilled person and process leader, he has over 10 years of leadership experience in the DFIR, law enforcement, and military spaces. Troy also has 18 years of digital forensics and incident response experience and three years of eDiscovery experience, which includes an assignment as the National eDiscovery Program Manager for a federal government agency.

    In this episode…

    With the rise in cyber attacks, it’s essential to develop proactive incident response measures. So, what are some steps you can take to mitigate breaches and make informed security decisions?

    With a breadth of technical expertise in incident response consultations, Troy Bettencourt emphasizes the importance of investing in proactive services to prepare for and emulate cyber attacks. These services include ransomware readiness assessments and tabletop exercises designed to optimize incident response measures and decision-making. When assessing and selecting services, businesses need to determine the service’s value-add to their security efforts.

    In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels host Troy Bettencourt of IBM to discuss developing incident response measures to combat cyber attacks. Troy explains how to select and purchase incident response services, the factors influencing the pricing and delivery of these services, and how he advises companies on incident response measures.

    Blockchain: Concerns, Considerations, and Regulations

    Blockchain: Concerns, Considerations, and Regulations

    Marlon Williams is the Founder of Atlanta Blockchain Center, a company that aims to be the catalyst for Atlanta’s emergence as the global premier blockchain innovation hub. He is also the Founder of Starter Labs and Qubicles, Co-founder of Telos, and a Partner at Starter Capital. At 16 years old, Marlon attended Central Florida Vocational School to study computer programming and business management before attending Miami Dade College and Kaplan University to study computer information systems and information technology.

    In this episode…

    With the rise of Bitcoin and other forms of cryptocurrency, blockchain has become increasingly common. But its emergence raises privacy and security concerns, particularly with regard to digital assets and transactions. So, what do companies and developers need to consider before adopting blockchain or creating a blockchain platform?

    Software developer Marlon Williams says that in order to mitigate transaction exploits, designers need to implement proven frameworks when writing code to consider blockchain’s nuances and lengthy finalization times. Yet when it comes to personal digital assets, privacy remains an issue, so Marlon asserts the importance of federal regulatory guidelines to simplify asset representation and functionality and help companies build privacy features into their blockchains. 

    In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels interview Marlon Williams, Founder of Atlanta Blockchain Center, about considerations and concerns surrounding blockchain’s widespread use. Marlon shares tips for developing blockchain platforms, how privacy impacts brands’ use of blockchain, and the importance of regulatory guidelines in its mass adoption.

    Deconstructing Privacy and Consent in Digital Marketing and Ad Tech

    Deconstructing Privacy and Consent in Digital Marketing and Ad Tech

    Michael Hahn is the Executive Vice President and General Counsel at the Interactive Advertising Bureau and IAB Technology Laboratory, a trade association that develops industry standards, conducts research, and provides legal support for the online advertising industry. In his role, he leads the organization’s legal affairs counsel and internal compliance efforts. 

    With extensive experience in litigation, Michael has provided multiparty class-action antitrust defense representation and directed lawsuits involving competitor conduct, distributional restraints, monopolization, and price discrimination claims. He serves as Co-chair of the New Jersey State Bar Association Antitrust Law Committee and previously served on the Editorial Advisory Board of Competition Law 360 and the Advisory Board of the American Bar Association Antitrust Section’s Civil Torts & RICO Committee.

    In this episode…

    Privacy regulations in the digital marketing and advertising technology space have become increasingly complex, with uncertainty surrounding the concept of data sales and the exchange of personal information. So, how can you navigate consent and interpret the many regulations in this industry?

    According to the settlement documents of Sephora’s enforcement action, a sale in advertising technology involves all manner of analyzing and measuring consumer data. Antitrust litigator Michael Hahn says that businesses must develop a contract that complies with state privacy laws to communicate consumer privacy preferences to organizations involved in digital ad distribution. IAB has developed a multi-state privacy agreement to help businesses remain compliant and act as a mediator in contract agreements. 

    In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels interview Michael Hahn, EVP and General Counsel at IAB, about managing evolving privacy consent laws in the advertising technology space. Michael discusses the conditions surrounding the sale of data, how IAB helps members comply with privacy laws, and the impact of Sephora’s settlement action on digital advertising.

    The Importance of a Strategic Privacy Program

    The Importance of a Strategic Privacy Program

    Michelle Dennedy is the CEO of PrivacyCode, a privacy engineering SaaS platform that translates complex privacy policies for developers. She is also the Co-founder and Partner of Privatus Consulting, a company that assists clients with privacy engineering and governance, WickedPrivacy leadership solutions, and ESG metrics. 

    Michelle works closely with families, executives, and innovators at all levels and with businesses and organizations at all stages to support the combination of privacy policies, practices, and tools. She has held many leadership roles in data strategy and privacy at Sun Microsystems, McAfee, Intel, and Cisco as well as startup companies.

    In this episode…

    Data is becoming increasingly complex and nuanced, making privacy and security integral components of an organization’s enterprise — but many companies fail to budget and plan accordingly for these policies. So, how can you implement privacy strategies into your business plan?

    Michelle Dennedy recommends adopting a problem-solving framework known as WickedPrivacy. This involves executing immediate, systematic approaches to address complex and uncertain privacy challenges, including ethics, public safety, user data, and shareholder access. PrivacyCode helps privacy engineers and officers identify use cases to integrate and deploy privacy programs utilizing a compliance and soft systems method.

    In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels interview Michelle Dennedy, CEO of PrivacyCode and Co-founder and Partner of Privatus Consulting, about developing strategic approaches to privacy. Michelle explains the major privacy challenges companies face, the WickedPrivacy methodology, and advice for implementing a privacy budget.

    Understanding Privacy and Security Regulations in the Ad Tech Space

    Understanding Privacy and Security Regulations in the Ad Tech Space

    Yacov Salomon is the Founder and Chief Innovation Officer at Ketch, a coordinated set of apps, infrastructure, and APIs designed to build trust with customers and grow with data. He is also the Chief Technology Officer at Stanza. As a recognized authority in machine learning and AI and a seasoned tech expert, Yacov has built industry-leading innovative technology and teams at startups as well as Fortune 500 companies across many verticals. Before Ketch and Stanza, he was the Head of AI and Innovation at Superset Venture Studio and a Lecturer at the University of California, Berkeley.

    In this episode…

    In the evolving privacy and security space, advertising technology is becoming increasingly invasive, with major companies like Sephora facing settlement actions over how they process consumer data, especially in digital advertising. So, how should you manage consent and develop privacy programs to control and protect your customer’s data?

    When navigating federal privacy laws surrounding ad tech data, Yacov Salomon recommends establishing a permission layer. This provides customers the option to consent before releasing their data to third-party systems. By implementing automated technology into your company’s ecosystem, you can identify confidential data and regain control over it to maximize customer trust and comply with privacy guidelines. 

    In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Yacov Salomon, Founder and Chief Innovation Officer at Ketch, to talk about how companies can manage ad-tech, privacy, and consent requirements. Yacov discusses the three privacy issues surrounding ad tech, the implications of consumer data collection, and how companies can track their ecosystem to control and protect customer data.

    Emphasizing Data Privacy and Security: Insights From Jodi and Justin Daniels

    Emphasizing Data Privacy and Security: Insights From Jodi and Justin Daniels

    Jodi Daniels is the Founder and CEO of Red Clover Advisors, a boutique data privacy consultancy and one of the few certified Women’s Business Enterprises focused solely on privacy. Since its launch, Red Clover Advisors has helped hundreds of companies create privacy programs, achieve GDPR, CCPA, and US privacy law compliance, and establish a secure online data strategy their customers can count on.

    Jodi is a Certified Informational Privacy Professional (CIPP/US) with over 20 years of experience helping a range of businesses — from solopreneurs to multinational companies — in privacy, marketing, strategy, and finance roles. She has worked with numerous companies throughout her corporate career, including Deloitte, The Home Depot, Cox Enterprises, Bank of America, and many more. Jodi is also a national keynote speaker, a member of the Forbes Business Council, and co-host of the She Said Privacy/He Said Security podcast.

    Justin Daniels is a cybersecurity subject matter expert and business attorney who helps his clients implement strategies to better manage and recover from data breaches. As outsourced general counsel for Baker Donelson, Justin advises executives on how to successfully navigate cyber business and legal concerns related to operations, M&A, incident response, and more.

    In 2017, Justin founded and led the inaugural Atlanta Cyber Week, where multiple organizations held events that attracted more than 1,000 attendees. Justin is also a TEDx and keynote speaker and co-host of the She Said Privacy/He Said Security podcast with his wife, Jodi.

    In this episode…

    When it comes to data collection, studies show that more than 80% of consumers value privacy. With security breaches and privacy violations becoming increasingly prevalent, how can businesses prioritize these matters to foster customer trust?

    To start, companies must take inventory of their data to fully understand each component and establish use cases. Another requirement is to create privacy notices, pages, or sections to connect with the consumer and develop their trust. Jodi and Justin Daniels' book Data Reimagined: Building Trust One Byte At a Time teaches businesses how to manage customer data to ensure privacy and security.

    In today’s episode of She Said Privacy/He Said Security, Chad Franzen of Rise25 talks with Jodi and Justin Daniels about prioritizing privacy and security concerns. Together, they discuss how businesses perceive and utilize data, the privacy and security concerns of data collection, and how to develop customer trust through privacy and security measures.

    Smart Technology: A Privacy and Security Perspective

    Smart Technology: A Privacy and Security Perspective

    David Rhodes is the City Attorney for Peachtree Corners, Georgia, a vibrant suburb of Atlanta. He is also Legal Counsel for Curiosity Lab, which is Peachtree Corners’ publicly-funded innovation center designed to provide a real-world test environment to advance next-generation intelligent mobility and smart city technology. Previously, David served as the Judge Advocate for the Army National Guard, where he advised the brigade commander and staff on operational law, military justice, administrative separations, and command policies. 

    In this episode…

    With innovation rapidly advancing, cities are employing various smart technologies such as autonomous vehicles to streamline transportation and other services. But this requires collecting data to identify citizen use cases, which raises privacy and security concerns. So, how can cities develop new technologies to scale while ensuring data protection?

    When gathering sensitive data for public records, it’s critical to consider the intended purpose for that information to establish the appropriate collection methods and verify demands for it. To generate trust with citizens, cities must disclose the information and assemble safeguards to mitigate data sharing with third parties. With the American Rescue Plan Act, cities can deploy the funds to optimize and enhance their privacy and security measures.

    In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels chat with David Rhodes, City Attorney for Peachtree Corners and Legal Counsel for Curiosity Lab, about prioritizing privacy and security with smart technologies. David shares the privacy challenges cities encounter when deploying smart technology, how security has evolved with cyber technologies, and the future of smart cities and their implications for citizens.

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io