This browser doesn't support Spotify Web Player. Switch browsers or download Spotify for your desktop.

Data Security and Privacy with the Privacy Professor

By Rebecca Herold

There are more information security and privacy threats than ever before. As more technologies emerge, more big data analytics are used, and more artificial intelligence systems are deployed, cybersecurity and privacy risks grow exponentially. Rebecca has spent her entire career working to improve information security and privacy protections, by not only raising awareness of the issues within businesses and other types of organizations, but also by raising the awareness of these risks in the public and helping them to understand how to better protect their own personal data, allowing them to take their privacy protections into their own hands. Rebecca offers you information about these existing and emerging security and privacy risks and provides fresh insights into the impacts of exploiting these risks, and gives guidance, tips, expert advice, news, with fascinating guests, to help all organizations, and the general public, understand what they need to do to mitigate these risks.

  1. 1.
    China Tech, Reusing Old Devices, Accessing Patient Data and More!04/16/2019
    55:40
  2. 2.
    GDPR: Implementing Data Subject Access and Rights04/09/2019
    46:13
  3. 3.
    Continuing the Cannabis Security and Privacy Risks Conversation04/02/2019
    55:06
  4. 4.
    Fax Tech and Machines: The Achilles Heels of Cybersecurity03/26/2019
    56:41
  5. 5.
    Childrens Online Cyberbullying, Privacy and Cybersecurity03/19/2019
    55:35
  6. 6.
    Amazing Cryptography and Codebreaker Pioneer: Elizebeth Friedman03/12/2019
    57:09
  7. 7.
    Huge Risks From SaaS Orgs With No Test Regions or Change Controls03/05/2019
    53:31
  8. 8.
    Is AI a Friend or Foe to Information Security and Privacy?02/26/2019
    56:46
  1. 9.
    No Change Control is Like Playing with Fire in a Dynamite Factory02/19/2019
    56:15
  2. 10.
    Backdoors in Cybersecurity Tools Gives Privacy Only to Outlaws02/12/2019
    57:32
  3. 11.
    Will Australias Encryption Law Kill Privacy in Name of Safety?02/05/2019
    57:33
  4. 12.
    Will You Sacrifice Your Privacy When Purchasing Cannabis?01/29/2019
    58:56
  5. 13.
    GDPR, Data Privacy Day and The Need for Privacy01/22/2019
    56:30
  6. 14.
    Data Security and Privacy Ethics in Computing01/15/2019
    56:21
  7. 15.
    2019 Information Security Forecast: Worldwide and In Colombia01/08/2019
    56:26
  8. 16.
    Encore: Medical Cannabis Patient Privacy and Data Security01/01/2019
    57:43
  9. 17.
    Encore: Are Encryption Backdoors Really Necessary for National Security?12/25/2018
    56:21
  10. 18.
    More Needs to Be Done to Protect Student and Teacher Privacy12/18/2018
    58:54
  11. 19.
    Is Anonymization Possible with Current Technologies?12/11/2018
    56:41
  12. 20.
    FTC Influences on Privacy Sanctions and Regulations12/04/2018
    58:27
  13. 21.
    IOT Security, Privacy and Safety11/27/2018
    56:38
  14. 22.
    GDPR: Using Legitimate Interests as a Lawful Basis for Processing11/20/2018
    55:47
  15. 23.
    Government Hacking and Surveillance: Activities, Tools and Laws11/13/2018
    54:30
  16. 24.
    New Toolkit to Mitigate Teacher and Student Privacy Risks11/06/2018
    57:34
  17. 25.
    Information Security and Privacy Questions from Listeners10/30/2018
    57:10
  18. 26.
    Security Views from an Elections Official and Voting Security Expert10/23/2018
    55:02
  19. 27.
    Answering Questions from Listeners for Cyber Security Awareness10/16/2018
    56:25
  20. 28.
    Pen Tests and Vulnerability Scans: Advice, Experience and Case Studies10/09/2018
    57:02
  21. 29.
    Turning A Blind Eye Does Not Fix Voting Security Vulnerabilities10/02/2018
    56:47
  22. 30.
    Encore: Are Encryption Backdoors Really Necessary for National Security?09/25/2018
    56:21
  23. 31.
    Cyber Terrorism Defense at Home and While Traveling09/18/2018
    56:58
  24. 32.
    Voting Systems Security and Risk Limiting Audits09/11/2018
    57:28
  25. 33.
    The Philippines BPO Industry Goal to be World Leader in Privacy09/04/2018
    55:38
  26. 34.
    Advice for CyberSecurity and Privacy Threats, Challenges and Careers08/28/2018
    56:37
  27. 35.
    Unifying GDPR With US Laws Compliance08/21/2018
    56:55
  28. 36.
    Fighting International Cybercrime and Cyber Security Threats08/14/2018
    56:55
  29. 37.
    Physical Fails for Information Security and Privacy08/07/2018
    57:56
  30. 38.
    Education and Advice for Successful Information Security Careers07/31/2018
    58:10
  31. 39.
    Are US Voting Systems and Voter Registration Data Secure?07/24/2018
    57:03
  32. 40.
    Are Encryption Backdoors Really Necessary for National Security?07/17/2018
    56:21
  33. 41.
    Curious Cases of Catphishing Executives and IT Pros07/10/2018
    55:31
  34. 42.
    Encryption Trends Around the World07/03/2018
    58:16
  35. 43.
    Are Our Voting and Elections Processes Secure?06/26/2018
    58:21
  36. 44.
    Separating Facts from Fiction in Digital Forensics06/19/2018
    57:35
  37. 45.
    GDPR: Debunking Personal Data and Applicability Myths06/12/2018
    57:32
  38. 46.
    DNA Forensics Can Solve Crimes. Are There Also Privacy Risks?06/05/2018
    57:26
  39. 47.
    Swatting Dangers and Defenses05/29/2018
    58:09
  40. 48.
    Why Do Women Leave IT Careers?05/22/2018
    56:24
  41. 49.
    Who's Eavesdropping on You? Government Surveillance and Laws05/15/2018
    57:16
  42. 50.
    Honey Sticks and Honey Points: Not-So-Sweet Cyber Crook Tools05/08/2018
    58:21
  43. 51.
    Why Nation States and Cybercrooks Love Wi-Fi05/01/2018
    55:54
  44. 52.
    Encore: EU GDPR Sanity: Practical Advice for Effective Compliance04/27/2018
    56:18
  45. 53.
    The Path of This Privacy Expert Led to Many World Icons04/20/2018
    55:52
  46. 54.
    IT and Privacy Career Trends and Tips for Success04/13/2018
    57:24
  47. 55.
    Association Memberships Build Data Security and Privacy Careers04/06/2018
    56:04
  48. 56.
    Many Areas of InfoSec and Privacy Expertise? Make Them Your Career!03/30/2018
    56:50
  49. 57.
    Is Hacking Ever Ethical? A Professional Hacker Explains!03/23/2018
    56:21
  50. 58.
    Privacy and Security Incident Response Mistakes Organizations Make03/16/2018
    56:01
  51. 59.
    Uberveillance:Would You Embed Constant Surveillance In Your Body?03/09/2018
    55:59
  52. 60.
    Balancing Privacy with Safety when Using Body Cams03/02/2018
    57:27
  53. 61.
    Identity Fraud and Theft: Don't Be a Victim!02/23/2018
    57:04
  54. 62.
    EU GDPR Sanity: Practical Advice for Effective Compliance02/16/2018
    56:18
  55. 63.
    The Ghosts of Government in Our Machines: The CIA and Surveillance02/09/2018
    56:45
  56. 64.
    Computer Hacking Crimes and Prosecutions02/02/2018
    55:32
  57. 65.
    Medical Cannabis Patient Privacy and Data Security01/26/2018
    57:43

Listen to Data Security and Privacy with the Privacy Professor now.

Listen to Data Security and Privacy with the Privacy Professor in full in the Spotify app