Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
The CISO and The SEC Cyber Regulations and Their Impact on Privacy and Security
|
May 02, 2024 |
Strategies for Privacy Professionals in the Boardroom With Judy Titera
|
Apr 25, 2024 |
Pixel Litigation, Ad Tech, and Digital Advertising Privacy With Alysa Hutnik
|
Apr 18, 2024 |
Building Privacy Programs for Global Businesses
|
Apr 11, 2024 |
Measuring Cybersecurity and Privacy With a Scorecard With Owen Denby
|
Apr 04, 2024 |
Privacy and Security Concerns in Data Retention With Bill Piwonka
|
Mar 28, 2024 |
Protecting Children’s Privacy in the Social Media Age With Titania Jordan
|
Mar 21, 2024 |
The Essentials of Privacy Engineering With Jay Averitt
|
Mar 14, 2024 |
U.S. Privacy Law Models Across the States With Keir Lamont
|
Mar 07, 2024 |
New Technologies and Navigating Privacy Risk With Joe Toscano
|
Feb 29, 2024 |
Selecting and Leveraging Privacy Software and Generative AI’s Impact on Privacy With Ben Brook
|
Feb 22, 2024 |
Best Tips for Privacy Experts To Elevate Their Practice With Jamal Ahmed
|
Feb 15, 2024 |
Expert Negotiation Tips When Your IT Network Is Held Hostage
|
Feb 08, 2024 |
How Levi’s Values Influences its Privacy Program With Karen McGee
|
Feb 01, 2024 |
Breaking Down the Washington State My Health, My Data Act With Mike Hintze
|
Jan 25, 2024 |
Updates and Changes in US State Privacy Laws for 2024 With Andrew Kingman
|
Jan 18, 2024 |
Navigating Privacy Landscapes: US State Privacy Laws, UK Data Protection, and Cross-Border Transfers
|
Jan 11, 2024 |
Decoding Quebec’s Law 25: What Companies Need To Know With Sharon Bauer
|
Jan 04, 2024 |
The Paradigm of Adtech Privacy: Using Data Clean Rooms and Opt-In/Opt-Outs To Achieve Compliance
|
Dec 14, 2023 |
How Reliance on AI Technologies Places Smaller Businesses at Risk of Ransomware Attacks With Taylor Hersom
|
Dec 07, 2023 |
Privacy Lawyer Jennifer Mitchell on Employee Data Privacy Under the California Consumer Privacy Act
|
Nov 30, 2023 |
Why Companies Should Outsource CISO Services and How the Role Intersects With Privacy Duties
|
Nov 16, 2023 |
How Smaller Companies Can Mitigate Cybersecurity Risks and Comply With the New SEC Rules
|
Nov 09, 2023 |
ZoomInfo’s Al Raymond on B2B Privacy Programs and Third-Party Privacy Risk Management
|
Nov 02, 2023 |
HP’s Aaron Weller on Privacy Engineering, PETs, and Information Security
|
Oct 26, 2023 |
How Cyber Services Can Heed the New SEC Regulations to Address Privacy and Security Concerns
|
Oct 19, 2023 |
Meta, AI, and the New Privacy Laws: What You Need to Know
|
Oct 12, 2023 |
Privacy Regulations, Privacy by Design, and AI: Creating Engaging Apps While Remaining Compliant
|
Oct 05, 2023 |
Best Practices for Mitigating Cybersecurity and Blockchain Risks With Roderic Deichler
|
Sep 28, 2023 |
Mark Webber on Law Firms Implementing AI and Complying with the US-EU Data Privacy Framework
|
Sep 21, 2023 |
The Future of Identity With Riley Hughes
|
Sep 12, 2023 |
Tim Lupinacci on Leadership and Why Cybersecurity Is Essential for Law Firms
|
Sep 07, 2023 |
Integrating Data Privacy Into Customer Data Platforms With Julian Llorente Perdigones of Tealium
|
Aug 31, 2023 |
Privacy AI: The Future of Building Smart Privacy Programs
|
Aug 24, 2023 |
How a Global Brand Can Build a Privacy Program With Eduardo Ortiz of Carnival Cruise Line
|
Aug 17, 2023 |
How To Talk to Your Kids About the Dangers of Social Media With Officer David Gomez
|
Aug 10, 2023 |
Chief Privacy Officer Jason Sarfati Explains Everything You Need To Know About Location Data Privacy
|
Aug 03, 2023 |
Rohan Massey Provides a Deep Dive on Data Privacy Framework & Cross Borders
|
Jul 27, 2023 |
Protecting Consumer Data Using Secret Shopper Safeguards With Boltive CEO Dan Frechtling
|
Jul 20, 2023 |
Gaining Customer Business by Providing Trustworthy Data Software With Ed Britan of Salesforce
|
Jul 13, 2023 |
The Far-Reaching Risks of the Emerging Framework for AI Deployment With Jim Dempsey
|
Jul 06, 2023 |
AI Governance and Responsible AI With Dr. Emre Kazim
|
Jun 22, 2023 |
Cybersecurity, Risks, and Why Your Company Needs a vCISO With New Oceans Enterprises Donna Gallaher
|
Jun 15, 2023 |
A Conversation About the California Delete Act and Future of AI With Investor and Author Tom Kemp
|
Jun 08, 2023 |
Where Privacy and Security Overlap
|
Jun 01, 2023 |
Compliance Scalability: Tips and Tools From RadarFirst CEO Don India
|
May 25, 2023 |
Jodi and Justin’s Top 5 Must-Haves in Your Company’s AI Policy
|
May 18, 2023 |
Mitigating Security Breaches Through Distributed Data Command and Control
|
May 12, 2023 |
The Upsurge in Ransomware and Voice Phishing: How Managed Security Services Can Help
|
May 04, 2023 |
AI and Privacy: A Future of Privacy Forum Conversation
|
Apr 27, 2023 |
Privacy Laws and Ad Tech: A Deep Dive on Compliance
|
Apr 20, 2023 |
ChatGPT and AI: Crucial Considerations for Businesses
|
Apr 13, 2023 |
The Future of Privacy: Insights From a General Counsel
|
Apr 06, 2023 |
Leveraging Privacy SaaS Platforms To Boost Compliance
|
Mar 30, 2023 |
The Rise of Website Pixel Class Action Lawsuits
|
Mar 23, 2023 |
Data Transformation Strategies to Comply With Privacy Regulations
|
Mar 16, 2023 |
US Federal Privacy Regulations: Updates and Factors Influencing its Development
|
Mar 09, 2023 |
Canada vs. US Privacy Law – What Companies Need to Know
|
Mar 02, 2023 |
Establishing Consent With Loyalty Programs
|
Feb 23, 2023 |
What You Should Know About Ransomware and Developing Incident Response Plans
|
Feb 16, 2023 |
Protect Your Digital Profile From the Dark Web: What You Should Know About Device Settings
|
Feb 09, 2023 |
Building Privacy Programs in the Evolving Ad Tech Space
|
Feb 02, 2023 |
How To Protect Backup Servers From Ransomware Attacks
|
Jan 26, 2023 |
Hiring and Staffing in the Privacy and Security Space
|
Jan 19, 2023 |
Blockchain: The Road to Adoption
|
Jan 05, 2023 |
Protecting Consumer Data From Third Parties
|
Dec 15, 2022 |
Protecting Consumer Data From Third Parties
|
Dec 15, 2022 |
Building Privacy Programs for Software Engineers
|
Dec 08, 2022 |
Assessing and Preventing Financial Risks
|
Dec 01, 2022 |
Know Your Data: How To Manage and Secure Regulated Company Data
|
Nov 17, 2022 |
Proactive Incident Response Measures for Cyber Attacks
|
Nov 10, 2022 |
Blockchain: Concerns, Considerations, and Regulations
|
Nov 03, 2022 |
Deconstructing Privacy and Consent in Digital Marketing and Ad Tech
|
Oct 27, 2022 |
The Importance of a Strategic Privacy Program
|
Oct 13, 2022 |
Understanding Privacy and Security Regulations in the Ad Tech Space
|
Oct 06, 2022 |
Emphasizing Data Privacy and Security: Insights From Jodi and Justin Daniels
|
Sep 22, 2022 |
Smart Technology: A Privacy and Security Perspective
|
Sep 15, 2022 |
The Future of Data Privacy in the U.S.
|
Sep 08, 2022 |
Automating Data Privacy
|
Sep 01, 2022 |
The Importance of Privacy and Security in Product Design
|
Aug 25, 2022 |
Addressing Children’s Privacy Concerns on the Internet
|
Aug 18, 2022 |
Privacy Protection From Online Harassment and Job Security Threats
|
Aug 11, 2022 |
Understanding Drone Privacy and Security Regulations
|
Aug 04, 2022 |
Red Teaming for Security Exploits
|
Jul 28, 2022 |
Cybersecurity Education: Best Practices
|
Jul 21, 2022 |
Privacy Compliance in a Post-Cookies World
|
Jul 14, 2022 |
Regulating Air Traffic for Drone Use
|
Jul 07, 2022 |
Reinstating Control With Digital Identity
|
Jun 30, 2022 |
Implementing Virtualization for Safe and Efficient Software Testing
|
Jun 23, 2022 |
Developing Security Programs to Mitigate Cyber Attacks
|
Jun 16, 2022 |
Building Privacy Programs for Your Organization
|
Jun 09, 2022 |
Implementing a Secure Identity and Access Management Program
|
Jun 02, 2022 |
Maintaining Data Security With SDKC
|
May 26, 2022 |
Transforming How Your Children Use Technology
|
May 19, 2022 |
Jodi and Justin’s Top Five Privacy and Security Lessons for 2022
|
May 12, 2022 |
Training Your Company on Privacy and Security Laws
|
May 05, 2022 |
Data Privacy in the Evolving Advertising Landscape
|
Apr 28, 2022 |
Building a Balanced Privacy Program
|
Apr 14, 2022 |
Data Collaboration and the Future of Data Privacy
|
Apr 07, 2022 |
How Security Plans Impact Business Transactions
|
Mar 31, 2022 |
Privacy, Security, and Drones
|
Mar 24, 2022 |
Keeping Your Kids Safe in the Digital World
|
Mar 17, 2022 |
Building a Privacy and Security Strategy for the Cloud
|
Mar 10, 2022 |
Evolving Privacy Laws
|
Mar 03, 2022 |
What is Communication’s Impact on Your Security and Privacy Program?
|
Feb 24, 2022 |
Private Cyber 911
|
Feb 17, 2022 |
Privacy and Security Precautions for the Cloud
|
Feb 10, 2022 |
The Future of Online Identity Verification
|
Feb 03, 2022 |
Privacy by Design
|
Jan 27, 2022 |
Closing the Security Gap For IoT Devices
|
Jan 20, 2022 |
Building Trust Through Data Transparency
|
Jan 13, 2022 |
Using AI for Data Breach Response
|
Jan 06, 2022 |
Securing the Cloud with Identity and Access Management
|
Dec 16, 2021 |
How Can Hackers Improve Your Company’s Security?
|
Dec 09, 2021 |
Protecting Your Data One Drive at a Time
|
Dec 02, 2021 |
Ethical Privacy Practices for Businesses
|
Nov 18, 2021 |
Building Trust With Privacy Compliance
|
Nov 11, 2021 |
Outsmarting a “Smart” World
|
Nov 04, 2021 |
The Ins and Outs of Ransom Negotiation
|
Oct 28, 2021 |
The Trifecta of Vendor Due Diligence With Caroline McCaffery
|
Oct 21, 2021 |
Strategies for Disrupting Cybercrime Threats in the Corporate World
|
Oct 14, 2021 |
Revolutionizing Cybersecurity Training
|
Oct 07, 2021 |
Using AI to Protect Children Online
|
Sep 30, 2021 |
Building Atlanta Into a Cybersecurity Empire
|
Sep 23, 2021 |
Planning Ahead for a Public Relations Crisis
|
Sep 16, 2021 |
Cybersecurity: The 21st Century Digital Seatbelt
|
Sep 09, 2021 |
The Future of Shared Breach and Security Data
|
Sep 02, 2021 |
The Truth About Election Security With the General Counsel for the Georgia Secretary of State
|
Aug 26, 2021 |
Jodi & Justin's Top 5 Privacy & Security Trends 2021
|
Aug 19, 2021 |
Cybersecurity, the Cloud, and Your Company: Everything You Need to Know
|
Aug 12, 2021 |
The Intersection of Crisis Response and Privacy and Security Infrastructure
|
Aug 05, 2021 |
Creating Safe Spaces to Protect Your Children from Online Harm
|
Jul 29, 2021 |
Be Prepared Now — Not Sorry Later
|
Jul 22, 2021 |
Avoiding Ransomware Attacks in Businesses of All Sizes
|
Jul 15, 2021 |
Everything You Need to Know About Your Child’s Online Safety
|
Jul 01, 2021 |
Building a Privacy and Security-Savvy Workplace Culture
|
Jun 24, 2021 |
Keeping Up With Current Privacy and Security Regulations
|
Jun 17, 2021 |
Privacy, Security, and Artificially Intelligent Drones
|
Jun 10, 2021 |
Data Erasure: A 21st Century Necessity
|
Jun 03, 2021 |
Prioritizing Basic Privacy and Security Controls
|
May 27, 2021 |
The Importance of Modernizing Your Company’s Privacy and Security Legacy Systems
|
May 20, 2021 |
Protecting Your Nonprofit’s Privacy and Security
|
May 13, 2021 |
A Day in the Life of a Chief Privacy Officer
|
May 06, 2021 |
How to Make Privacy and Security Training Memorable and Enjoyable for Your Employees
|
Apr 29, 2021 |
Cybersecurity: It’s Not an IT Problem, It’s a Business Problem
|
Apr 22, 2021 |
Why IP Laws Are Your Company’s Best Friend
|
Apr 15, 2021 |
How CFOs Impact Privacy and Security
|
Apr 08, 2021 |
Building Effective IT Infrastructure for Your Business
|
Apr 01, 2021 |
A Handy Guide to Cyber Insurance Coverage
|
Mar 25, 2021 |
What Your Company Needs to Know about Identity and Access Management
|
Mar 18, 2021 |
How Your Company Can Avoid Phishing, Ransomware, and Other Privacy and Security Breaches
|
Mar 11, 2021 |
How Small and Large Organizations Can Identify and Prevent Common Privacy and Security Issues
|
Mar 04, 2021 |
The Truth About Drones and Your Data
|
Feb 25, 2021 |
Helping Tech-Savvy Children Understand The Importance of Security and Privacy
|
Feb 18, 2021 |
How Your Company Can Identify and Mitigate Dangerous Cybersecurity Risks
|
Feb 11, 2021 |
The Regulation Dilemma: How Can We Standardize Privacy and Security?
|
Feb 04, 2021 |
What Marketers and Consumers Need to Know About Privacy, Security, and Cookieless Advertising
|
Jan 28, 2021 |
Avoiding Common Cybersecurity Threats and Protecting Your Data
|
Jan 21, 2021 |
Smart Cities: The Privacy Concerns We Should All Be Aware Of
|
Jan 14, 2021 |
What Every Parent Needs to Know About The Social Dilemma and The Great Hack
|
Jan 07, 2021 |
What Every Parent Needs to Know About The Social Dilemma and The Great Hack
|
Jan 07, 2021 |
Navigating the Cybersecurity Maturity Model Certification (CMMC)
|
Dec 31, 2020 |
Are You Really Doing Enough to Ensure Your Company’s Privacy and Security?
|
Dec 24, 2020 |
What Companies Need to Know About Third-Party Vendor Security and Privacy Issues
|
Dec 17, 2020 |
Cybersecurity and Privacy Lessons from a 'Smart City Testing Lab' for Future Cities
|
Dec 10, 2020 |
Insights Into Cybersecurity and Protecting Your Business with Mark Sangster
|
Dec 03, 2020 |
Investigating Cyber Crimes with United States Secret Service Special Agent, Marc Debrody
|
Nov 26, 2020 |
Identifying Cybersecurity Risks with Former FBI Special Agent, Michael F. D. Anaya
|
Nov 19, 2020 |
Privacy Notices: Everything You Need to Know
|
Oct 29, 2020 |
Marketing & Privacy 101
|
Oct 14, 2020 |