Ed TALKS: Privacy in a Gossipy, Digital World

Logo
Presented by

Ed Adams, Security Innovation | Elena Elkina, Aleada Consulting | Larry Ponemon, Ponemon Institute | Erika Fisher, Atlassian

About this talk

Attitudes toward privacy have an amazingly broad spectrum. Laws like CCPA and GDPR are forcing organizations to build privacy programs, but their robustness varies significantly based on geography, industry, and consumer views. Counter forces of IT Security, Data Breaches, and IoT put privacy at risk every day. Come listen to 3 industry experts discuss privacy in the context of today’s digital world. They will discuss the organizational impacts of privacy, compliance drivers, and the difference between data security and data privacy. Topics include: • Impacts of emerging technologies (5G, Artificial Intelligence, etc.) on privacy programs • How the WFH movement has changed corporate privacy and security strategies • Findings from the recent study "Privacy and Security in a Digital World” by The Ponemon Institute • The battle between security and privacy (corporate, law enforcement, compliance, personal) • Practical tips on how to protect both privacy and data security
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (70)
Subscribers (14911)
Security Innovation is an authority on software security and helps organizations build and deploy more secure software. Global technology vendors and enterprise IT organizations such as Microsoft, IBM, FedEx, ING, Symantec, Coca-Cola and GE rely on our expertise to understand the security risks in their software systems and facilitate the software and process change necessary to mitigate them. Security Innovation specializes in software security, an area where traditional “information security” and “business” consultants tend to struggle. We have been analyzing application vulnerabilities and risk for almost a decade and were one of the first providers of software risk solutions to Fortune 500 firms. Our unrivaled proficiency in technical analysis, coupled with sound knowledge of business processes, results in world-class solutions that bridge the gap between application security holes and risk management optimization.