OneTrust_Square Banner_300x250_DD_ROS_01_19

By Gant Redmon

My ‘tween daughter is super social. She seems to have a new best friend forever—or BFF, as the kids say—every couple of months. But a BFF the privacy professional should stick with month in and month out is the chief security officer (CSO), because we make a wicked good match.

We privacy folks shouldn’t be intimidated by the security wonks. They even have a playful side to them. I knew one who would stop and change the password and lock any workstation he came by that was left open and unlocked. What a kidder…

So after you finish this article, walk down the hall and invite your CSO to lunch, your treat. Why? Well, here are four good reasons to pick up that tab.


Think of the CSO as your own little privacy NORAD who will give you real-time insight to potential dangers. They’re the early warning system for losses of personal information. You know how most companies know they’ve had a breach? They get a phone call—it could be from a customer, a regulator, or a credit card issuer. This is not how you want to learn of the problem. You want a CSO who knows how to get a hold of you fast, just like a good BFF should. And they need to know what to look for. This is where you come in: to make privacy concerns part the CSO’s thought process.

Here are some ways the CSO can think like your BFF.

Scenario 1: Stolen Laptop

Fred from finance has his laptop stolen when his house is broken into. The CSO may have focused on getting Fred a new laptop and restoring info from backup. But did he think about what data was on the laptop? Did the information match definitions of PII or PHI? How does that relate to the data breach regulations affecting the company? The CSO hears “lost laptop,” but you think “lost information.” You can lead him along the path to privacy righteousness.

Scenario 2: Malware

Malware is detected on the HR and engineering servers, and log files show files have been accessed by an IP address assigned to an Internet service provider in Kazakhstan. The CSO will focus on closing the vulnerability and ridding the system of malware. How fast will he or she also determine which files have been accessed and what was in those files? I’d be willing to bet it will be faster if he knows how important it is for you to determine if the intruder made off with protected information.

Scenario #3: Insider Threat

Your network monitoring tool throws an alert that Rissa, the receptionist, has been removing files from the CFO’s laptop just as your company is set to announce quarterly results. The CSO may think his job is done when he reports Rissa to HR and she’s marched out of the building. Will he think of analyzing Rissa’s computer to see where that information might have been sent? You’ll certainly want to know.


The second reason why the CSO should be your BFF is CSOs have skills and staff resources that you don’t. Do you know how to analyze a log file or take an image of a disk? Most of us don’t. The CSO’s team is the only source for answering four questions required to determine if a breach has occurred in the eyes of state and federal regulators. First, a breach is generally only reportable if information is accessed or acquired. That analysis is clearly in the CSO’s domain.

Second, if it was accessed or acquired, was it encrypted at the time? The answer is complicated when you consider the loss may have occurred when the data was in transit or at rest. This will take serious forensic footwork.

Third, what information was accessed or acquired? State breach notice laws define personal information. If the information accessed or acquired doesn’t meet the definition, then you’re not required to report. The CSO is your gatekeeper to these files you will need to review to determine if they contain personal information. You’ll also need to know where those affected live, because we look at individuals’ state citizenship to determine applicable state law for breach notices. The CSO has the tools and technology to give us the information we need to determine if we have a reportable breach on our hands.


The third reason why the CSO should be your BFF is that by collaborating, both your roles are strategic to the business with real impact on the customer or client experience. The CSO will have a hand in the company’s mobile, social media and cloud strategies but needs the CPO’s guidance in launching these strategies. For example, a healthcare organization realizes doctors are communicating with patients on the doctors’ personal unencrypted e-mail accounts. The CSO wants to roll out a patient site for communications with doctors in a secure environment. A number of vendors offer such patient sites, but which will keep the company on the right side of HIPAA/HITECH? You may not know log files, but you know HIPAA. When you take a seat at the table next to the CSO for purposes of patient interaction, you have promoted yourself from a basic compliance function to a strategic contributor.


Reason number four why the CSO should be your BFF is that they have money. I know that sounds a tad shallow, but privacy offices are not known for lavish budgets. Some in management feel that traditional compliance functions should be kept on a strict fiscal diet so they don’t become strong enough to hamper the business. IT and security don’t suffer from such reduced rations. Network security is red hot these days, and money is being spent. Got a tool that helps the CSO identify privacy issues in everyday security incidents? You may find the CSO’s budget a lot easier to tap than your own.

Still intimidated? You shouldn’t be. Just think of all the insight you’ll be getting, the strategies you’ll learn and the skills you’ll walk away with—just by becoming BFFs with your CSO. And don’t forget the last part: The CSO has the dough to implement those security prevention programs that may just save your company at some point in the near future.

Now, how about that lunch?

Gant Redmon is general counsel and VP of business development at Co3 Systems. Gant has practiced law for 19 years, 15 of which as in-house counsel for security software companies. Prior to joining Co3 Systems, Gant was general counsel of Arbor Networks, now part of the Danaher Corporation.


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

Latin America Dashboard Digest

A roundup of the top privacy news from Latin America

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Get more News »

IAPP Communities

Meet locally with privacy pros, dive deep into specialized topics or connect over common interests. Find your Community in KnowledgeNet Chapters, Sections and Affinity Groups.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find a KnowledgeNet Chapter Near You

Talk privacy and network with local members at IAPP KnowledgeNet Chapter meetings, taking place worldwide.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

The Privacy Core™ Library Has Evolved

Privacy Core™ e-learning essentials just expanded to include seven new units for marketers. Keep your data safe and your staff in the know!

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

Upcoming Web Conferences

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Team

Get your team up to speed on privacy by bringing IAPP training to your organization.

Let’s Get You DPO Ready

There’s no better time to train than right now! We have all the resources you need to meet the challenges of the GDPR.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

FIP Designation

Recognizing the advanced knowledge and issue-spotting skills a privacy pro must attain in today’s complex world of data privacy.

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.


The IAPP’S CIPP/E and CIPM are the ANSI/ISO-accredited, industry-recognized combination for DPO readiness. Learn more today.

Learn more about IAPP certification »

Are You Ready for the GDPR?

Check out the IAPP's EU Data Protection Reform page for all the tools and resources you need.

IAPP-OneTrust PIA Platform

New U.S. Government Agency privacy impact assessments - free to IAPP members!

IAPP Communities

Meet locally with privacy pros, dive deep into specialized topics or connect over common interests. Find your Community in KnowledgeNet Chapters, Sections and Affinity Groups.

Privacy Vendor List

Find a privacy vendor to meet your needs with our filterable list of global service providers.

More Resources »

Europe Data Protection Intensive 2017

The Intensive is sold out! But cancellations do happen—so hurry and get on the wait list in case more seats become available.

Global Privacy Summit 2017

The world’s premier privacy conference returns with the sharpest minds, unparalleled programs and preeminent networking opportunities.

Canada Privacy Symposium 2017

The Symposium returns to Toronto this spring and registration has opened! Take advantage of Early Bird rates and join your fellow privacy pros for another stellar program.

The Privacy Bar Section Forum 2017

The Privacy Bar Section Forum returns to Washington, DC April 21, delivering renowned keynote speakers and a distinguished panel of legal and privacy experts.

Asia Privacy Forum 2017

The Forum returns to Singapore for exclusive networking and intensive education on data protection trends and challenges in the Asia Pacific region. Call for Speakers open!

Privacy. Security. Risk. 2017

This year, we're bringing P.S.R. to San Diego. The Call for Speakers is now open. Submit today and be a part of something big! Submission deadline: February 26.

Europe Data Protection Congress 2017

European policy debate, multi-level strategic thinking and thought-provoking discussion. The Call for Speakers is open until March 19.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»