Podcasts

Episode #6: Data Privacy. What is security? What is compliance? What is big brother?

Sheila Jambekar, Chief Privacy Officer at Plaid, and Michael Phillips, Cyber Practice Leader, USA at CFC, discuss the human element at the forefront of security innovations and policies.

by Nikhil Chawla

Listen to the episode
2:49
3:37

Episode #6: Data Privacy. What is security? What is compliance? What is big brother?

The goal of this conversation is to frame privacy risk from a legal/regulatory perspective as well as an operational (privacy engineering) perspective. As security leaders we need to understand that privacy is more than checking a set of compliance boxes. It includes concepts like “privacy by design.” Those ideas embody the regulatory/compliance requirements as specifications to be engineered in to systems. The goal is to create systems that enable “privacy by default.”

On the go? Listen to our podcast on your favorite platforms.

You might also like

The vendors you’re probably missing

The vendors you’re probably missing

While the seven data streams from our previous post will capture the majority of your vendor relationships, they’re primarily designed to find digital services and traditional procurement relationships. Today, we’re exploring the vendor categories that fall through the cracks of most discovery programs, as well as why they often represent some of your highest-risk relationships. […]

How to prepare your organization for a post-quantum world

How to prepare your organization for a post-quantum world

Quantum computing is on the horizon, and with it comes a seismic shift in how organizations must think about cybersecurity risk. The ability of future quantum machines to break today’s cryptographic protections, what we call quantum decryption, could undermine the trust, confidentiality, and resilience of digital business. This briefing series distills a highly technical topic […]

When will quantum decryption become practical?

When will quantum decryption become practical?

As part of Cybersecurity Awareness Month, we’re publishing this three-part series that distills a highly technical topic into strategic insights for leaders. Part 1 explained why quantum decryption poses a threat to current encryption systems. Part 2 lays out credible timelines for when the disruption may arrive. Part 3 will offer practical guidance on how […]

Cyber resiliency starts here.

Request Demo