Podcasts

Episode #6: Data Privacy. What is security? What is compliance? What is big brother?

Sheila Jambekar, Chief Privacy Officer at Plaid, and Michael Phillips, Cyber Practice Leader, USA at CFC, discuss the human element at the forefront of security innovations and policies.

by Nikhil Chawla

Listen to the episode
2:49
3:37

Episode #6: Data Privacy. What is security? What is compliance? What is big brother?

The goal of this conversation is to frame privacy risk from a legal/regulatory perspective as well as an operational (privacy engineering) perspective. As security leaders we need to understand that privacy is more than checking a set of compliance boxes. It includes concepts like “privacy by design.” Those ideas embody the regulatory/compliance requirements as specifications to be engineered in to systems. The goal is to create systems that enable “privacy by default.”

On the go? Listen to our podcast on your favorite platforms.

You might also like

New insights on the evolving threat landscape, from our 2025 Midyear Cyber Risk Report 

New insights on the evolving threat landscape, from our 2025 Midyear Cyber Risk Report 

The cybersecurity world is experiencing an unexpected paradox in 2025. While cyber insurance claims in the Resilience portfolio dropped by 53% in the first half of the year—suggesting that organizations are getting better at preventing attacks—the financial damage from successful incidents has actually increased. Our latest 2025 Midyear Cyber Risk Report reveals that when cybercriminals […]

The seven places you should be looking when building your vendor list

The seven places you should be looking when building your vendor list

In our first post, we established why comprehensive vendor discovery matters and how most organizations approach it incorrectly. Today, we’re diving into the practical mechanics: the seven data streams that can reveal vendor relationships hiding in your existing systems. The key insight is to start with data you already have rather than surveys or questionnaires. […]

Cyber resiliency starts here.

Request Demo