Data Security and Privacy with the Privacy Professor

By Rebecca Herold

There are more information security and privacy threats than ever before. As more technologies emerge, more surveillance tactics are used, and more artificial intelligence systems are deployed, cybersecurity and privacy risks grow exponentially. Rebecca has spent her entire career working to improve information security and privacy protections, by not only raising awareness of the issues within businesses and other types of organizations, but also by raising the awareness of these risks in the public and helping them to understand how to better protect their own personal data, allowing them to take their privacy protections into their own hands. Rebecca offers information about these existing and emerging security and privacy risks and provides fresh insights into the impacts of exploiting these risks, and gives guidance, tips, expert advice and news, with fascinating guests, to help all organizations, and the general public, understand what they need to do to mitigate these risks.

  1. 1.
    Demystifying Cyber Insurance: Facts to Get the Right Coverage!
    56:23
  2. 2.
    The BOM Episode! DBOMs! SBOMs! And...Supply Chain Cybersecurity!
    54:59
  3. 3.
    4th Amendment Does Not Give LE the Right to Access Encrypted Data
    55:14
  4. 4.
    Data Pipelines & Data Lakes Security & Compliance Answers & Info
    53:20
  5. 5.
    Defending Against Nation-State Hacking & Cyber Warfare Attacks
    54:13
  6. 6.
    Voter Fraud Facts No One is Talking About…Until Now
    55:53
  7. 7.
    Fighting US Elections & Campaigns Interference with Cybersecurity
    56:51
  8. 8.
    Healthcare CISOs: Securing Patient Data & HIPAA Compliance
    55:45
  1. 9.
    Holding Privacy Events in a Pandemic World
    57:10
  2. 10.
    How A Trail-Blazing STEM Mentor Is Revolutionizing Cybersecurity
    57:53
  3. 11.
    How Cybercriminals Take Advantage of the COVID-19 Pandemic
    56:02
  4. 12.
    Data Proves Voting Fraud is Rare; Don’t Believe Conspiracy Theories Claiming Otherwise
    56:42
  5. 13.
    Surveillance Pandemic: How Tech Giants Collect & Use Personal Data for Profiling & Huge Profits
    56:12
  6. 14.
    COVID-19 Contact Tracing: Privacy & Security Risks
    57:36
  7. 15.
    Voting by Mail Security: Busting Myths and Explaining Facts
    59:38
  8. 16.
    Legislating Weak Encryption is Stupid and Dangerous
    54:09
  9. 17.
    Why Weakening Encryption for Law Enforcement Access is a Bad Idea
    55:35
  10. 18.
    How Rob Sand Caught the Criminal Who Committed the Largest Lottery Fraud in History
    54:11
  11. 19.
    How Poor Tech Security & Misinformation Upend Elections
    58:40
  12. 20.
    How Biased and Malicious AI Can Do Harm
    57:16
  13. 21.
    Diving into the Dark Net
    56:02
  14. 22.
    The Criticality of Change Control Management in Cloud Services
    55:44
  15. 23.
    Professional ethics and technology in the cyber age
    57:16
  16. 24.
    White hat hacking & security break-in testing & ethics
    56:15
  17. 25.
    Cybercrime Trends and Changes in Past 3 Decades
    55:41
  18. 26.
    Voting Security, Malware as Art, Ransomware, Breaches plus More
    56:53
  19. 27.
    Security and Privacy Careers Opportunities, Advice and Experiences
    56:40
  20. 28.
    Cybersecurity Lessons from the Mueller Report
    56:45
  21. 29.
    Small Business Risks, Careers, Mueller Report, CPU Vulns and More!
    54:51
  22. 30.
    Hotel Data Security and Privacy
    58:11
  23. 31.
    China Tech, Reusing Old Devices, Accessing Patient Data and More!
    55:40
  24. 32.
    GDPR: Implementing Data Subject Access and Rights
    46:13
  25. 33.
    Continuing the Cannabis Security and Privacy Risks Conversation
    55:06
  26. 34.
    Fax Tech and Machines: The Achilles Heels of Cybersecurity
    56:41
  27. 35.
    Childrens Online Cyberbullying, Privacy and Cybersecurity
    55:35
  28. 36.
    Amazing Cryptography and Codebreaker Pioneer: Elizebeth Friedman
    57:09
  29. 37.
    Huge Risks From SaaS Orgs With No Test Regions or Change Controls
    53:31
  30. 38.
    Is AI a Friend or Foe to Information Security and Privacy?
    56:46
  31. 39.
    No Change Control is Like Playing with Fire in a Dynamite Factory
    56:15
  32. 40.
    Backdoors in Cybersecurity Tools Gives Privacy Only to Outlaws
    57:32
  33. 41.
    Will Australias Encryption Law Kill Privacy in Name of Safety?
    57:33
  34. 42.
    Will You Sacrifice Your Privacy When Purchasing Cannabis?
    58:56
  35. 43.
    GDPR, Data Privacy Day and The Need for Privacy
    56:30
  36. 44.
    Data Security and Privacy Ethics in Computing
    56:21
  37. 45.
    2019 Information Security Forecast: Worldwide and In Colombia
    56:26
  38. 46.
    Encore: Medical Cannabis Patient Privacy and Data Security
    57:43
  39. 47.
    Encore: Are Encryption Backdoors Really Necessary for National Security?
    56:21
  40. 48.
    More Needs to Be Done to Protect Student and Teacher Privacy
    58:54
  41. 49.
    Is Anonymization Possible with Current Technologies?
    56:41
  42. 50.
    FTC Influences on Privacy Sanctions and Regulations
    58:27

Listen to Data Security and Privacy with the Privacy Professor now.

Listen to Data Security and Privacy with the Privacy Professor in full in the Spotify app