She Said Privacy/He Said Security cover image

She Said Privacy/He Said Security

Latest episodes

undefined
Jul 21, 2022 • 23min

Cybersecurity Education: Best Practices

Brandon Laur is the Executive Manager and Instructor at The White Hatter, an internet safety and digital literacy education specialist company focused on facilitating workshops and providing presentations on technology safety and privacy. Brandon has worked with The White Hatter for more than 12 years to provide cybersecurity training to students, businesses, and adults.  Brandon is also multi-certified and continues to receive ongoing training in Open Source Intelligence (OSINT). He conducts research in areas such as the social aspect of phishing cyber attacks, employee social media screening and online background checks, and the influence of digital technology on human sexuality.   In this episode… As parents, it’s often easy to assume your children have all the knowledge and answers about technology. But this is not always the case — they may fall victim to scams, phishing, or hacking. So, how can you educate yourself and your children on these matters? Cybersecurity educator Brandon Laur recommends acquiring knowledge of password and account management to mitigate the risk of being hacked. Managing each account and password can be difficult, so it’s important to leverage regulation tools such as Google Password Manager, iCloud, or LastPass so you can stay organized. Brandon works with children and adults of all ages and skill levels to help them develop digital literacy and critical thinking to solve complex cybersecurity challenges.  In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Brandon Laur, Executive Manager and Instructor at The White Hatter, to discuss cybersecurity education methods. Brandon shares his strategies for training students on privacy and security concerns, the common misconceptions regarding children’s knowledge of technology, and essential cybersecurity tools for parents and children.
undefined
Jul 14, 2022 • 30min

Privacy Compliance in a Post-Cookies World

Roy Smith is an entrepreneur and the CEO of PrivacyCheq, a company that helps mobile apps comply with privacy regulations. PrivacyCheq was the first company to offer cookieless consent-based management tools in 2016. Roy has over 35 years of experience branding and marketing new technologies designed to disrupt the market. As an engineer-turned-executive, Roy has been successful in building numerous companies from the ground up. In this episode… With US states adopting a host of new privacy laws and regulations, website cookies no longer meet consent requirements, forcing companies to employ alternative data collection methods. So, how can you convert to a cookieless digital space to stay compliant and protect your customer’s data? According to Roy Smith, complying with updated privacy laws requires modifying your website. PrivacyCheq streamlines this process by adapting to each state’s privacy laws so you can update your policies accordingly. And with PrivacyCheq’s cloud-based technology, you can store your customer’s data in convenient locations so they can easily access it and customize their preferences.  In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels talk with Roy Smith, CEO of PrivacyCheq, about complying with privacy regulations in a post-cookies world. Roy shares tips for companies to comply with consent laws, how impending privacy regulations will affect organizations, and the ways PrivacyCheq simplifies the consent process for businesses.
undefined
Jul 7, 2022 • 34min

Regulating Air Traffic for Drone Use

Dawn Zoldi (Colonel, United States Air Force Retired) is the Founder and CEO of P3 Tech Consulting, a company connecting people and companies passionate about advanced tech platforms with the plans, policies, programs, and information they need to succeed. She is a licensed attorney and a 28-year U.S. Air Force Veteran. As an internationally-recognized expert in unmanned aircraft systems and advanced mobility law and policy, Dawn was listed in the eVTOL Insights 2022 Powerbook, one of the Top Women in Aerospace and Aviation to Follow on LinkedIn in 2021, and a recipient of the Woman to Watch Leadership Award for 2019. She is also an Adjunct Professor at Colorado State University-Pueblo and Embry Riddle Aeronautical University Worldwide Campus. In this episode… With unmanned aerial vehicles (UAV) on the rise, privacy and security is often unregulated, and drone users outsource air traffic management to a third party. So, what systems can your company put in place to protect your data and mitigate drone misuse? As a licensed attorney and UAV specialist, Dawn Zoldi suggests implementing cybersecurity guidelines for drone hardware and operations. One way to accomplish this is to put a system in place that identifies faulty signals and seizes control over the aircraft to safely land it. With the proper constraints in place, you can effectively secure your data and connection. In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Dawn Zoldi, Founder and CEO of P3 Tech Consulting, to discuss drone regulations. She talks about the different types of drones and how each one collects data, the risks associated with outsourcing air traffic control to a third party, and how companies can implement cybersecurity solutions for drone control.
undefined
Jun 30, 2022 • 28min

Reinstating Control With Digital Identity

David Lucatch is the CEO, President, and Chair at Liquid Avatar Technologies, a digital identity and fintech solutions company that provides verified users with services to manage, control, and benefit from their digital identity. David has over 35 years of experience inventing technology and business solutions in the international marketing arena. He spent the last 20 years developing payment technology, language, and translation services to support the infrastructure of conducting business online. In this episode… Many forms of identity verification are outdated, with users lacking control over their own identities. Methods like two-factor authentication can lead to hacking and a subsequent violation of the user’s privacy. What steps can you take to safeguard your consumer’s identity and gain their trust in the process? You can start by leveraging digital identity to allow users to protect and control their identity. One way to achieve this is by utilizing biometrics as a form of authentication so consumers can regulate how and where they can share their identities. And by implementing blockchain, you can safely and seamlessly verify your user’s individual credentials to minimize the risk of identity theft.  Tune in to this episode of the She Said Privacy/He Said Security podcast as Jodi and Justin Daniels talk with David Lucatch, CEO, President, and Chair of Liquid Avatar Technologies, about how you can best secure your consumer’s identity. David explains how Liquid Avatar allows users to verify their identities, blockchain’s role in identity verification, and how Liquid Avatar leverages the three types of identity.
undefined
Jun 23, 2022 • 36min

Implementing Virtualization for Safe and Efficient Software Testing

Amanda Gorton is the CEO and Co-founder of Corellium, a platform that helps developer and security teams build, test, and secure mobile and IoT apps supporting iOS, Android, and Linux through ARM virtualization. Amanda was previously the Co-founder of Virtual, which Citrix acquired in 2014. She holds a master's degree in Latin from Yale. In this episode… When testing new software and devices, it’s necessary to provide your development team with the resources needed to conduct effective tests — but many companies rely on physical devices that get lost, broken, or compromise their employees’ personal security. So what is the most productive method to run QA and security tests? Virtualization services allow you to conduct software and device testing by creating replicas in component-based applications. This system enables you to run multiple softwares simultaneously, ensuring maximum efficiency. And with Corellium’s ARM-based virtualization, you can protect your company’s privacy by destroying virtual devices and seamlessly performing security tests during the initial stages of development. In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Amanda Gorton, Co-founder and CEO of Corellium, to discuss using virtualization services to perform safe and effective software testing. Amanda talks about how Corellium employs virtualization for developers to test software, the privacy and security guidelines companies should consider when working with virtualization, and the steps companies are taking to solve the most pressing privacy and security challenges.
undefined
Jun 16, 2022 • 22min

Developing Security Programs to Mitigate Cyber Attacks

Rachael Tenerowicz is the Director of Privacy and Cybersecurity at Uber. She is the primary counsel for the information security team, working on information security issues such as environmental, social, and governance (ESG), and supporting incident response investigations. Prior to her role at Uber, Rachael spent more than eight years working with clients in commercial, product liability, and litigation at Shook, Hardy & Bacon L.L.P. In this episode… In today’s privacy and security landscape, security breaches are commonplace – yet the legal terms and conditions surrounding those breaches are often convoluted. As a result, many companies remain unsure about how to effectively handle their breaches. So how can you stay ahead of your breaches and mitigate risks?   Rachael Tenerowicz, Director of Privacy and Cybersecurity at Uber, suggests taking a proactive approach to the cybersecurity disclosure guidelines outlined by the Securities and Exchange Commission (SEC). These guidelines can pose significant risks to your company, so it’s important to develop the appropriate incident response measures. Informing your customers of a security breach before disclosing to the general public allows your clients to secure their own data and minimizes your risks of further attacks. In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels talk with Rachael Tenerowicz of Uber about developing a robust cybersecurity program to mitigate risks. Rachael provides tips for investors to understand cybersecurity challenges, how companies can prepare for SEC cyber disclosure laws, and how organizations can establish trust with their customers and the public.
undefined
Jun 9, 2022 • 27min

Building Privacy Programs for Your Organization

Ron Whitworth is Chief Privacy Officer at Truist, the sixth largest bank in the U.S., which recently completed a merger of SunTrust and BB&T. He manages the Enterprise Privacy and Technology Office (EPTO) within Compliance Risk Management. Ron is certified by the International Association of Privacy Professionals (IAPP) as a Fellow of Information Privacy (FIP), a Certified Information Privacy Manager (CIPM), and Certified Information Privacy Professional for the United States, Canada, and Europe (CIPP/US, CIPP/C, and CIPP/E). In this episode… The evolution of technology has given rise to highly-regulated data privacy laws. In today’s digital era, organizations and privacy professionals need to modify their technology to comply with these laws. So, how can you implement a privacy program that complies with these advancements and secures your client’s data? According to Ron Whitworth, automated data governance allows you to understand and manage your data. With this technology, you can make strategic and informed decisions about where your data is and how you’re using it, so you stay compliant while establishing trust with your consumers. In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels talk with Ron Whitworth, Chief Privacy Officer at Truist, about implementing privacy programs in today’s changing privacy and security landscape. Ron shares some of the major privacy and security challenges banks face, how banking technology has evolved to comply with updated privacy laws, and how he manages data privacy amongst changing privacy and security standards.
undefined
Jun 2, 2022 • 22min

Implementing a Secure Identity and Access Management Program

David Chan is a Managing Director within EY’s Technology Consulting practice, where he helps entrepreneurs, companies, and government entities solve their most pressing cybersecurity challenges. David has over 16 years of experience in cybersecurity and identity and access management. He is currently focused on security reviews of Web3 and implementing blockchain at large organizations. In this episode… When it comes to cyberspace, digital identity is expanding. To adopt this form of identity, businesses need to adhere to the privacy regulations surrounding its use. So, how can your business implement user-friendly identity and access management programs that maintain privacy and security?  Blockchain encourages user transparency and identity security. With blockchain, users can authenticate their identity without using passwords, ensuring an effortless and secure experience. And, by integrating decentralized identifiers (DIDs) into your business, you can save money on privacy and security while giving users consent over their information and identity. In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with David Chan, Managing Director of EY’s Technology Consulting practice, to talk about integrating identity programs into your business. They cover the three types of identity and access management programs, how businesses can adopt DID while adhering to privacy and security, and the benefits of implementing blockchain into your identity programs.
undefined
May 26, 2022 • 26min

Maintaining Data Security With SDKC

David Kruger is the Co-founder and VP of Strategy at Absio, a military-grade data security corporation. He is also the Co-inventor of Absio’s patented Software-Defined Distributed Key Cryptography (SDKC). David has over 40 years of experience in technology consulting, business development, and sales strategy. He is a certified General Data Protection Regulation (GDPR) practitioner with knowledge in all aspects of data privacy. In this episode… Data security is becoming more complex, and many companies don’t realize that data is a physical substance that can cause damage if it’s not appropriately controlled. So, how can you secure your data to ensure widespread protection? For starters, companies should take a proactive rather than reactive approach to controlling data usage. David Kruger’s patented technology, Software-Defined Distributed Key Cryptography (SDKC), enables software applications to create the keys needed to encrypt data safely and efficiently. With SDKC, you can store your data and keys in one secure location to seamlessly maintain control over your data. In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels talk with David Kruger, Co-founder and VP of Strategy of Absio, about actively securing your data. David shares his approach to data security, tips for efficient data encryption and decryption, and how his patented Software-Defined Distributed Key Cryptography (SDKC) technology can help companies effectively secure their data.
undefined
May 19, 2022 • 30min

Transforming How Your Children Use Technology

Sean Herman is the Founder and CEO of Kinzoo, a company that is on a mission to be the most trusted brand for incorporating technology into children’s lives. Kinzoo unlocks technology’s true potential by focusing on connection, creativity, and cultivating new skills and interests for children and families. Sean is also the author of Screen Captured, a #1 Amazon best-seller that provides new and productive ways for parents and families to think about technology and screen time. In this episode… Are you a parent concerned about your child's use of technology? Technology is becoming more and more accessible to younger children, so how can you ensure that your child's content is safe and appropriate? Kinzoo understands that it's not always easy to restrict children’s technology use, so they've provided a secure alternative to traditional technology platforms to safely integrate and manage technology in your child's daily life. With Kinzoo's comprehensive and user-friendly privacy measures, you can feel confident knowing that your child is protected on the internet. In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Sean Herman, Founder and CEO of Kinzoo, to talk about creating a safe environment for children to use technology. Sean reveals some of Kinzoo's privacy and security features, how the platform can help solve the growing technology problem, and tips for parents to rethink how their children use technology.

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode