She Said Privacy/He Said Security cover image

She Said Privacy/He Said Security

Latest episodes

undefined
Aug 25, 2022 • 45min

The Importance of Privacy and Security in Product Design

Chris Handman is the Co-founder and COO of TerraTrue, a data privacy platform and management software. He was previously the General Counsel at Snap, where he built the company’s legal compliance, public policy, and law enforcement team while also developing a transformative privacy program. Chris is a Homeland Security Project Fellow at Harvard’s Belfer Center for Science and International Affairs. Jad Boutros is the Co-founder and CEO of TerraTrue. As a leader in security, privacy, spam, and abuse, he spent nine years on Google’s information security team, leading security for social products. Before founding TerraTrue, Jad was the Chief Security Officer at Snap, where he managed an organization of 100 engineers. He has 21 years of technical experience, 16 of which are in the privacy and security space. In this episode… During the product development stage, organizations often only consider privacy and security from a compliance perspective, and as a result, neglect potential risks. So, how can you collaborate with internal teams to prioritize these concerns and ensure a seamless product design? Chris Handman and Jad Boutros believe privacy and security should be incorporated into company culture to disseminate information and encourage diverse ideas. To streamline the process, organizations should acquire a platform that codifies each privacy and security component. TerraTrue is a privacy management software that creates secure workflows to conform to your product design and mitigate threats. In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels welcome Chris Handman and Jad Boutros of TerraTrue to discuss prioritizing privacy and security. Together, they share the privacy challenges businesses face, how TerraTrue helps companies integrate privacy into their product design, and advice for collaborating with privacy and security teams during product development.
undefined
Aug 18, 2022 • 30min

Addressing Children’s Privacy Concerns on the Internet

Joseph (Joe) Miller, Esq is the Founder, President, CEO, and Founding Board Chair of The Washington Center for Technology Policy Inclusion (WashingTECH) — the nation’s first organization focused exclusively on diversity and inclusion in technology public policy making. Joe is a member of the Advisory Committee at the Center for Democracy and Technology, a cohort for Google’s Next Gen Policy Leaders, and is a recipient of the Rainbow Push Coalition’s 2019 Media and Technology Inspiring Leader’s Award. Before founding WashingTECH, Joe served as Deputy Director and Senior Policy Director of the Media and Technology Institute at the Joint Center for Political and Economic Studies. In this episode… The internet is largely unregulated, with social media platforms targeting and coercing children to use their sites. As parents, how can you manage and control your children’s online activity to ensure their safety? Joe Miller urges parents to conduct in-depth research into popular sites and platforms to ensure they are appropriate for use. It’s also crucial to recognize the peer pressure that accompanies social media usage, so you can establish the proper boundaries. By familiarizing yourself with each application’s parental controls, you can protect your children’s data and monitor their media consumption. In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Joe Miller of WashingTech to discuss privacy concerns surrounding children’s online activity. Joe shares social media safety concerns, the moves parents can make to protect their children online, and how to get involved in privacy policy-making.
undefined
Aug 11, 2022 • 23min

Privacy Protection From Online Harassment and Job Security Threats

Leigh Honeywell is the CEO and Co-founder of Tall Poppy, where she builds tools and services to help companies protect their employees from online harassment and abuse. She has more than a decade of experience in computer security incident response. Before co-founding Tall Poppy, Leigh was a Technology Fellow at the ACLU’s project on speech, privacy, and technology. Her previous industry experience includes running security incident response for Slack, protecting infrastructure at Salesforce.com, shipping patches for billions of computers a month at Microsoft, and analyzing malware at Symantec. In this episode… Online work and social media are now more prevalent than ever, causing individuals to face job security threats and harassment. As a business owner, how can you protect your employees from these attacks? Security expert Leigh Honeywell recommends establishing online conduct regulations to mitigate company defamation. By establishing clear guidelines and expectations with your employees, you can combat external threats and discriminatory commentary. With Tall Poppy’s cybersecurity training and incident response measures, you can remove unwanted online personal information to reduce your public presence.  In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels talk with Leigh Honeywell about privacy and security tactics for online harassment. She explains Tall Poppy’s initiatives to protect personal security amid threats and harassment, how the pandemic has impacted online harassment, and strategies for organizations to protect their employees’ privacy.
undefined
Aug 4, 2022 • 36min

Understanding Drone Privacy and Security Regulations

Mark McKinnon is a Partner at Fox Rothschild LLP, a national law firm representing aviation entities in international transactions and business dealings. He has over 30 years of experience in all areas of aviation and transportation law including litigation, appellate, regulatory, and other administrative matters. Mark has written and spoken extensively on unmanned aircraft systems (UAS) and other aviation subjects. Additionally, he is the co-editor of the Plane-ly Spoken Blog, a publication dedicated to providing up-to-date news, analysis, and opinions on issues affecting the aviation industry. In this episode… Drone regulations in the aviation industry are ambiguous and vague, leading many companies to neglect privacy and security considerations. So, how can you prioritize these concerns to avoid potential lawsuits from clients? According to Mark McKinnon, the Supreme Court has ruled that drones can operate at an altitude of only 200 feet without violating individuals’ reasonable expectations of privacy. But this ruling has been frequently disputed, which is why it’s critical to evaluate the regulations of the region you plan to operate from. Once you’ve established this, determine the purpose for the data you’ve collected and ensure you’re not releasing it to the public without your clients’ permission. By maintaining transparency with clients regarding their data usage, you can protect their privacy. In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels talk with Mark McKinnon, a partner at Fox Rothschild LLP, about how drone companies can ensure individual privacy and security. He discusses how the Supreme Court dictates aviation privacy regulations, the implications of commercial drone usage, and common privacy and security mistakes companies make when utilizing drones.
undefined
Jul 28, 2022 • 31min

Red Teaming for Security Exploits

Dahvid Schloss is the Managing Lead, Offensive Security and vCISO at Echelon Risk + Cyber, a cybersecurity and IT risk advisory services firm dedicated to protecting the right to privacy and security. With over 12 years of cyber attack and defense experience, Dahvid directs and manages Echelon’s teams and leads their offensive security delivery service. Prior to working at Echelon, he worked at Deloitte as a Red Team Operator leading and conducting adversarial emulation exercises. In this episode… In today’s unpredictable cybersecurity landscape, security exploits are on the rise, and businesses often lack the measures needed to combat them. So, how can you educate yourself on these matters to protect your company? Cyber defense expert Dahvid Schloss recommends adopting red teaming operations to mimic hacking and other cyber attacks. These capabilities allow businesses to analyze their security procedures to detect and prevent criminal behavior. For a fundamental approach, Dahvid advises companies to safeguard their passwords using third-party password managers.  In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Dahvid Schloss, Managing Lead, Offensive Security and vCISO at Echelon Risk + Cyber, to discuss how to avoid common security exploits. Dahvid explains red teaming and how it relates to cybersecurity, the purpose of DEF CON hacking conferences, and how to mitigate cyber-attacks. .
undefined
Jul 21, 2022 • 23min

Cybersecurity Education: Best Practices

Brandon Laur is the Executive Manager and Instructor at The White Hatter, an internet safety and digital literacy education specialist company focused on facilitating workshops and providing presentations on technology safety and privacy. Brandon has worked with The White Hatter for more than 12 years to provide cybersecurity training to students, businesses, and adults.  Brandon is also multi-certified and continues to receive ongoing training in Open Source Intelligence (OSINT). He conducts research in areas such as the social aspect of phishing cyber attacks, employee social media screening and online background checks, and the influence of digital technology on human sexuality.   In this episode… As parents, it’s often easy to assume your children have all the knowledge and answers about technology. But this is not always the case — they may fall victim to scams, phishing, or hacking. So, how can you educate yourself and your children on these matters? Cybersecurity educator Brandon Laur recommends acquiring knowledge of password and account management to mitigate the risk of being hacked. Managing each account and password can be difficult, so it’s important to leverage regulation tools such as Google Password Manager, iCloud, or LastPass so you can stay organized. Brandon works with children and adults of all ages and skill levels to help them develop digital literacy and critical thinking to solve complex cybersecurity challenges.  In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Brandon Laur, Executive Manager and Instructor at The White Hatter, to discuss cybersecurity education methods. Brandon shares his strategies for training students on privacy and security concerns, the common misconceptions regarding children’s knowledge of technology, and essential cybersecurity tools for parents and children.
undefined
Jul 14, 2022 • 30min

Privacy Compliance in a Post-Cookies World

Roy Smith is an entrepreneur and the CEO of PrivacyCheq, a company that helps mobile apps comply with privacy regulations. PrivacyCheq was the first company to offer cookieless consent-based management tools in 2016. Roy has over 35 years of experience branding and marketing new technologies designed to disrupt the market. As an engineer-turned-executive, Roy has been successful in building numerous companies from the ground up. In this episode… With US states adopting a host of new privacy laws and regulations, website cookies no longer meet consent requirements, forcing companies to employ alternative data collection methods. So, how can you convert to a cookieless digital space to stay compliant and protect your customer’s data? According to Roy Smith, complying with updated privacy laws requires modifying your website. PrivacyCheq streamlines this process by adapting to each state’s privacy laws so you can update your policies accordingly. And with PrivacyCheq’s cloud-based technology, you can store your customer’s data in convenient locations so they can easily access it and customize their preferences.  In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels talk with Roy Smith, CEO of PrivacyCheq, about complying with privacy regulations in a post-cookies world. Roy shares tips for companies to comply with consent laws, how impending privacy regulations will affect organizations, and the ways PrivacyCheq simplifies the consent process for businesses.
undefined
Jul 7, 2022 • 34min

Regulating Air Traffic for Drone Use

Dawn Zoldi (Colonel, United States Air Force Retired) is the Founder and CEO of P3 Tech Consulting, a company connecting people and companies passionate about advanced tech platforms with the plans, policies, programs, and information they need to succeed. She is a licensed attorney and a 28-year U.S. Air Force Veteran. As an internationally-recognized expert in unmanned aircraft systems and advanced mobility law and policy, Dawn was listed in the eVTOL Insights 2022 Powerbook, one of the Top Women in Aerospace and Aviation to Follow on LinkedIn in 2021, and a recipient of the Woman to Watch Leadership Award for 2019. She is also an Adjunct Professor at Colorado State University-Pueblo and Embry Riddle Aeronautical University Worldwide Campus. In this episode… With unmanned aerial vehicles (UAV) on the rise, privacy and security is often unregulated, and drone users outsource air traffic management to a third party. So, what systems can your company put in place to protect your data and mitigate drone misuse? As a licensed attorney and UAV specialist, Dawn Zoldi suggests implementing cybersecurity guidelines for drone hardware and operations. One way to accomplish this is to put a system in place that identifies faulty signals and seizes control over the aircraft to safely land it. With the proper constraints in place, you can effectively secure your data and connection. In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Dawn Zoldi, Founder and CEO of P3 Tech Consulting, to discuss drone regulations. She talks about the different types of drones and how each one collects data, the risks associated with outsourcing air traffic control to a third party, and how companies can implement cybersecurity solutions for drone control.
undefined
Jun 30, 2022 • 28min

Reinstating Control With Digital Identity

David Lucatch is the CEO, President, and Chair at Liquid Avatar Technologies, a digital identity and fintech solutions company that provides verified users with services to manage, control, and benefit from their digital identity. David has over 35 years of experience inventing technology and business solutions in the international marketing arena. He spent the last 20 years developing payment technology, language, and translation services to support the infrastructure of conducting business online. In this episode… Many forms of identity verification are outdated, with users lacking control over their own identities. Methods like two-factor authentication can lead to hacking and a subsequent violation of the user’s privacy. What steps can you take to safeguard your consumer’s identity and gain their trust in the process? You can start by leveraging digital identity to allow users to protect and control their identity. One way to achieve this is by utilizing biometrics as a form of authentication so consumers can regulate how and where they can share their identities. And by implementing blockchain, you can safely and seamlessly verify your user’s individual credentials to minimize the risk of identity theft.  Tune in to this episode of the She Said Privacy/He Said Security podcast as Jodi and Justin Daniels talk with David Lucatch, CEO, President, and Chair of Liquid Avatar Technologies, about how you can best secure your consumer’s identity. David explains how Liquid Avatar allows users to verify their identities, blockchain’s role in identity verification, and how Liquid Avatar leverages the three types of identity.
undefined
Jun 23, 2022 • 36min

Implementing Virtualization for Safe and Efficient Software Testing

Amanda Gorton is the CEO and Co-founder of Corellium, a platform that helps developer and security teams build, test, and secure mobile and IoT apps supporting iOS, Android, and Linux through ARM virtualization. Amanda was previously the Co-founder of Virtual, which Citrix acquired in 2014. She holds a master's degree in Latin from Yale. In this episode… When testing new software and devices, it’s necessary to provide your development team with the resources needed to conduct effective tests — but many companies rely on physical devices that get lost, broken, or compromise their employees’ personal security. So what is the most productive method to run QA and security tests? Virtualization services allow you to conduct software and device testing by creating replicas in component-based applications. This system enables you to run multiple softwares simultaneously, ensuring maximum efficiency. And with Corellium’s ARM-based virtualization, you can protect your company’s privacy by destroying virtual devices and seamlessly performing security tests during the initial stages of development. In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Amanda Gorton, Co-founder and CEO of Corellium, to discuss using virtualization services to perform safe and effective software testing. Amanda talks about how Corellium employs virtualization for developers to test software, the privacy and security guidelines companies should consider when working with virtualization, and the steps companies are taking to solve the most pressing privacy and security challenges.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app