Webcon Ad_300x250_Radar_FINAL

By Gant Redmon

My ‘tween daughter is super social. She seems to have a new best friend forever—or BFF, as the kids say—every couple of months. But a BFF the privacy professional should stick with month in and month out is the chief security officer (CSO), because we make a wicked good match.

We privacy folks shouldn’t be intimidated by the security wonks. They even have a playful side to them. I knew one who would stop and change the password and lock any workstation he came by that was left open and unlocked. What a kidder…

So after you finish this article, walk down the hall and invite your CSO to lunch, your treat. Why? Well, here are four good reasons to pick up that tab.


Think of the CSO as your own little privacy NORAD who will give you real-time insight to potential dangers. They’re the early warning system for losses of personal information. You know how most companies know they’ve had a breach? They get a phone call—it could be from a customer, a regulator, or a credit card issuer. This is not how you want to learn of the problem. You want a CSO who knows how to get a hold of you fast, just like a good BFF should. And they need to know what to look for. This is where you come in: to make privacy concerns part the CSO’s thought process.

Here are some ways the CSO can think like your BFF.

Scenario 1: Stolen Laptop

Fred from finance has his laptop stolen when his house is broken into. The CSO may have focused on getting Fred a new laptop and restoring info from backup. But did he think about what data was on the laptop? Did the information match definitions of PII or PHI? How does that relate to the data breach regulations affecting the company? The CSO hears “lost laptop,” but you think “lost information.” You can lead him along the path to privacy righteousness.

Scenario 2: Malware

Malware is detected on the HR and engineering servers, and log files show files have been accessed by an IP address assigned to an Internet service provider in Kazakhstan. The CSO will focus on closing the vulnerability and ridding the system of malware. How fast will he or she also determine which files have been accessed and what was in those files? I’d be willing to bet it will be faster if he knows how important it is for you to determine if the intruder made off with protected information.

Scenario #3: Insider Threat

Your network monitoring tool throws an alert that Rissa, the receptionist, has been removing files from the CFO’s laptop just as your company is set to announce quarterly results. The CSO may think his job is done when he reports Rissa to HR and she’s marched out of the building. Will he think of analyzing Rissa’s computer to see where that information might have been sent? You’ll certainly want to know.


The second reason why the CSO should be your BFF is CSOs have skills and staff resources that you don’t. Do you know how to analyze a log file or take an image of a disk? Most of us don’t. The CSO’s team is the only source for answering four questions required to determine if a breach has occurred in the eyes of state and federal regulators. First, a breach is generally only reportable if information is accessed or acquired. That analysis is clearly in the CSO’s domain.

Second, if it was accessed or acquired, was it encrypted at the time? The answer is complicated when you consider the loss may have occurred when the data was in transit or at rest. This will take serious forensic footwork.

Third, what information was accessed or acquired? State breach notice laws define personal information. If the information accessed or acquired doesn’t meet the definition, then you’re not required to report. The CSO is your gatekeeper to these files you will need to review to determine if they contain personal information. You’ll also need to know where those affected live, because we look at individuals’ state citizenship to determine applicable state law for breach notices. The CSO has the tools and technology to give us the information we need to determine if we have a reportable breach on our hands.


The third reason why the CSO should be your BFF is that by collaborating, both your roles are strategic to the business with real impact on the customer or client experience. The CSO will have a hand in the company’s mobile, social media and cloud strategies but needs the CPO’s guidance in launching these strategies. For example, a healthcare organization realizes doctors are communicating with patients on the doctors’ personal unencrypted e-mail accounts. The CSO wants to roll out a patient site for communications with doctors in a secure environment. A number of vendors offer such patient sites, but which will keep the company on the right side of HIPAA/HITECH? You may not know log files, but you know HIPAA. When you take a seat at the table next to the CSO for purposes of patient interaction, you have promoted yourself from a basic compliance function to a strategic contributor.


Reason number four why the CSO should be your BFF is that they have money. I know that sounds a tad shallow, but privacy offices are not known for lavish budgets. Some in management feel that traditional compliance functions should be kept on a strict fiscal diet so they don’t become strong enough to hamper the business. IT and security don’t suffer from such reduced rations. Network security is red hot these days, and money is being spent. Got a tool that helps the CSO identify privacy issues in everyday security incidents? You may find the CSO’s budget a lot easier to tap than your own.

Still intimidated? You shouldn’t be. Just think of all the insight you’ll be getting, the strategies you’ll learn and the skills you’ll walk away with—just by becoming BFFs with your CSO. And don’t forget the last part: The CSO has the dough to implement those security prevention programs that may just save your company at some point in the near future.

Now, how about that lunch?

Gant Redmon is general counsel and VP of business development at Co3 Systems. Gant has practiced law for 19 years, 15 of which as in-house counsel for security software companies. Prior to joining Co3 Systems, Gant was general counsel of Arbor Networks, now part of the Danaher Corporation.


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

Latin America Dashboard Digest

A roundup of the top privacy news from Latin America

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Get more News »

IAPP Communities

Meet locally with other privacy pros, dive deep into a specialized topic or simply share a common interest, IAPP Communities are for you.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

We Need You! Call for Volunteers Opens Soon!

Advisory Board Leaders and KnowledgeNet Chapter Chairs call for volunteers opens Oct. 5. Don't miss out on your chance to lead!

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

NEW! Raise Staff Awareness

Equip all your data-handling staff to reduce privacy risk, with Privacy Core™ e-learning essentials.

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

The Training Post—Can’t-Miss Training Updates

Subscribe now to get the latest alerts on training opportunities around the world.

Upcoming Web Conferences

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Team

Get your team up to speed on privacy by bringing IAPP training to your organization.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

NEW! FIP Designation

Recognizing the advanced knowledge and issue-spotting skills a privacy pro must attain in today’s complex world of data privacy.

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.

Learn more about IAPP certification »

IAPP-OneTrust PIA Platform

Simplify privacy impact assessments with this cloud-based customizable platform - free to IAPP members!

Privacy Vendor List

Find a privacy vendor to meet your needs with our filterable list of global service providers.

NEW! Raise Staff Awareness

Equip all your data-handling staff to reduce privacy risk, with Privacy Core™ e-learning essentials.

IAPP Communities

Meet locally with other privacy pros, dive deep into a specialized topic or simply share a common interest, IAPP Communities are for you.

More Resources »

Time to Get to Work at the Congress

Thought leadership, a thriving community and unrivaled education...the Congress prepares you for the challenges ahead. Register today.

GDPR Comprehensive London

Our third and final GDPR Comprehensive 2016 was a great success. London delegates spent two full days with world-recognized experts taking a guided tour of the GDPR.

Call for Speakers at Summit 2017

Are you an engaging speaker with privacy expertise to share? We want you! Submit a proposal today! The Call for Speakers closes Oct. 2, 2016.

GDPR's Top Impacts - Webcon Delivered in French

Rejoignez des experts pour en savoir plus : Les 10 conséquences pratiques les plus importantes du RGPD. S’inscrire maintenant.

Intensive Education at the Practical Privacy Series

The Series is returning to DC, this year spotlighting Data Breach, FTC and Consumer Privacy, GDPR and Government privacy issues. It’s the education you need now!

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»