Experian Website Banner 680x75 r1 video ldbd

Breach Trends for 2016

Mike Bruemmer, vice president at Experian Data Breach Resolution, talks with Katherine Keefe, of Beazley Breach Response Services, about what to expect for data breach trends in 2016.


Data Protection Intensive 2015 || The GDPR: A Discussion

In a panel discussion at the IAPP Data Protection Intensive 2015, Promontory’s John Bowman, CIPP/E, Hunton & Williams’ Rosemary Jay, LEGO’s Max Sorensen, CIPP/E, and Privacy International’s Anna Fielder talk about the upcoming General Data Protection Regulation. “We’ll be looking ahead to see if there’s any key things which we can develop, maybe give a flavor of what the final text might look like, certainly looking into the crystal ball,” Bowman said. “The regulation is definitely coming,” he added.

Data Privacy Intensive 2015 || Managing the Cool-to-Creepy Continuum

At the IAPP Data Protection Intensive 2015, author, artist, and futurist Ben Hammersley discussed the advent of the Internet of Things and how the “astounding … alien technology” of today can inspire fear when users are unable to place the tools on the “continuum of cool to creepy,” Hammersley said. “And that cool-to-creepy continuum I would say is your responsibility, is managing the cool-to-creepy continuum. I would even go further than that. I would posit that managing the cool-to-creepy continuum is the greatest challenge that we as a society face given the amazing changes that Moore’s Law is bringing about,” he continued, challenging listeners to provide technologists, lawyers and government officials with “the words to use” when talking privacy. Editor’s Note: For more coverage on Hammersley’s keynote, check out The Privacy Advisor’s feature on his IoT perspectives.

Data Protection Intensive 2015 || Privacy Impact Assessments

Reed Elsevier’s Emma Butler, CIPP/E,   IBM Corporation’s Vicky Griffiths-Fisher and Barclay’s Katherine Morgan, CIPM, CIPP/E united at the IAPP Data Protection Intensive 2015 in London to discuss different practical ways to handle privacy impact assessments (PIA). “The idea we’ve got here is three speakers form three companies who’ve all looked at privacy impact assessments in one way or another,” Butler said.  “You’ll hear from each of us what we’ve done in our companies, how we’ve done it, the considerations we’ve faced, the challenges we’ve faced, what it looks like … and hopefully give you something quite useful and practical with ideas and suggestions that you can take away and either use in your own business if you’re dealing with this or perhaps even use to compare your own approaches,” she continued. 

Privacy Art: Caress of the Gaze

"What if our outfit could recognize and respond to the gaze of the other?" asks representatives from the Pier 9 Artist in Residence program. Created by Behnaz Farahi, the garment "is an interactive 3D printed wearable which can detect other people’s gaze and respond accordingly with life-like behavior." 

P.S.R. 2015 || Academia, Industry and Security

At Privacy. Security. Risk. 2015, the Carnegie Mellon University School of Computer Science’s Jean Yang discussed how start-ups can foster privacy and security by employing the research initiatives so prevalent in academia to update the out-of-date privacy standards in the field.This talk is about how we can better use what we already know about cybersecurity,” she said. “In academia, there are many ideas that comfort me. There are all these research ideas that promise to secure our software…but the curious thing, in industry, the state of the art is firewalls. In this talk, I invite you to think with me about how we can get research ideas to make their way more into practice.”

P.S.R. 2015 || This is Not the Playground

In his keynote address, former Executive Chairman of The Security Division of EMC, RSA, Arthur W. Coviello, Jr. talked ubiquitous computing while highlighting the U.S.'s global cybersecurity position. "The situation the U.S. finds itself in reminds me of when I was kid," Coviello said, citing an out-of-character childhood tussle on the playground which resulted in an unbalanced punishment from a teacher that left the instigators "Unfortunately, this is not the playground," he said. "We're living in a world where our economies are intertwined and interdependent. We're living in a world that can no longer function without enforcement of the rule of law. We're also living in a very dangerous world of terrorists and political instability. We are living in world undergoing massive change as we enter the age of digital technology." He then issued a warning: "And the United States is living in the biggest and most vulnerable digital glass house on the planet." Agree? Sound off in the comments below.

Privacy. Security. Risk. 2015 || Keynote Panel: FCC & FTC

At Privacy. Security. Risk. 2015 in Las Vegas, NV, Chief of Enforcement with the Federal Communications Commission (FCC), Travis LeBlanc and Director of the Bureau of Consumer Protection with the Federal Trade Commission (FTC) Jessica Rich, moderated by Lydia Parnes, discuss the "privacy jurisdiction of both the FTC and the FCC," the two agencies' "enforcement priorities" and whether the two groups are (or even plan to) work together.

NCSC's Know the Risk - Raise Your Shield: Spear Phishing

The National Counterintelligence and Security Center (NCSC)'s new video, Know the Risk, Raise Your Shield, marks the start of the agency's campaign to greater educate internet users about spear phishing. "Anyone with an email account is a potential victim for a digital attack, and there are more than 100 million phishing attacks every single day," the video states. 

Frank Work: Deconstructing Privacy

In a keynote address at the IAPP 2015 Canada Privacy Symposium, Frank Work, privacy consultant and former Information and Privacy Commissioner of Alberta, tackles the past 35 years of privacy and its evolution from his perspective. "I'm not going to declare it dead, but I would like to leave you with an understanding of the social forces that I think shape any current view of privacy," Work said.