VIDEO
Meta's risk evolution: Automating privacy reviews for integrated digital governance
Published: 10 June 2025
Meta recently updated its companywide risk management process, expanding risk domains and leveraging automation. As companies across sectors work to develop more holistic and coherent digital governance programs, bridging privacy, AI, online safety, cybersecurity and more, many are exploring how to integrate risk assessment processes, leveraging what works best, filling gaps and eliminating duplication. IAPP Vice President and Chief Knowledge Officer Caitlin Fennessy, CIPP/US, was joined by Meta Vice President of Policy and Deputy Chief Privacy Officer Rob Sherman for a conversation on how Meta approaches this challenge and why privacy served so well as the backbone. Watch the full recording on LinkedIn.
Meta's risk evolution: Automating privacy reviews for integrated digital governance

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.
VIDEO
Meta's risk evolution: Automating privacy reviews for integrated digital governance

Published: 10 June 2025
Meta recently updated its companywide risk management process, expanding risk domains and leveraging automation. As companies across sectors work to develop more holistic and coherent digital governance programs, bridging privacy, AI, online safety, cybersecurity and more, many are exploring how to integrate risk assessment processes, leveraging what works best, filling gaps and eliminating duplication. IAPP Vice President and Chief Knowledge Officer Caitlin Fennessy, CIPP/US, was joined by Meta Vice President of Policy and Deputy Chief Privacy Officer Rob Sherman for a conversation on how Meta approaches this challenge and why privacy served so well as the backbone. Watch the full recording on LinkedIn.
Meta's risk evolution: Automating privacy reviews for integrated digital governance

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.
Tags:
Compliance techData securityPrivacy engineeringRisk managementTechnologyCybersecurity lawPrivacy
