Data Security and Privacy with the Privacy Professor

Data Security and Privacy with the Privacy Professor

There are more information security and privacy threats than ever before. As more technologies emerge, more surveillance tactics are used, and more artificial intelligence systems are deployed, cybersecurity and privacy risks grow exponentially. Rebecca has spent her entire career working to improve information security and privacy protections, by not only raising awareness of the issues within businesses and other types of organizations, but also by raising the awareness of these risks in the public and helping them to understand how to better protect their own personal data, allowing them to take their privacy protections into their own hands. Rebecca offers information about these existing and emerging security and privacy risks and provides fresh insights into the impacts of exploiting these risks, and gives guidance, tips, expert advice and news, with fascinating guests, to help all organizations, and the general public, understand what they need to do to mitigate these risks.... Show More

Episodes

September 5, 2020 56 min
Since 2018 Rebecca has invited many tech giants to explain if & how they are collecting & selling personal data to govt & other entities to profile & target subsets of populations while making huge profits. For example, one tech company reportedly made over $1.6 billion from the US federal government from 2017 – 2019. No tech company has accepted the invitations. However, Mijente, which has performed significant res...
Read more
Share
Mark as Played
Tech giants & startups are quickly releasing “cutting edge” COVID-19 tracing tools. Some states have built their own tracing tools. COVID-19 tracing is absolutely necessary to get the pandemic under control. But are those tools secure? Will the privacy of the individuals’ health data be protected? • What tracing tools are being used? Which best protect privacy? Which put privacy at risk? • How do certain phones and operating s...
Read more
Share
Mark as Played
In the midst of a deadly pandemic mail-in voting would be the safest way to vote. However, many warn that voting by mail will lead to wide-spread fraud and lost votes. Is this true, or are they baseless claims? What is true, and what are pure conspiracy theories and lies? Amber McReynolds, one of the country’s leading experts on election administration, policy & security, discusses the risks of voting by mail along with the ben...
Read more
Share
Mark as Played
The value of strong encryption cannot be overstated, but yet the efforts from lawmakers to force tech companies to create weak encryption has been put into overdrive. Bruce Schneier has been a vocal proponent of strong encryption for many years, and eloquently explains why it is technically not possible to give the good guys the access they want to encrypted files and transmission without also giving the bad guys access. Listen in...
Read more
Share
Mark as Played
Efforts are increasing in the US & worldwide to force tech companies to build encryption that would “allow only law enforcement and government” groups to get into encrypted files & communications. The claims are that this is necessary to fight online crimes such as human trafficking and child sexual exploitation. We definitely need to address these horrible crimes. However, are these commands from governments & law enfo...
Read more
Share
Mark as Played
Hear Rebecca speak with Rob Sand, the lawyer who used his tech savvy as the Asst Attorney General for Iowa to successfully prosecute Eddie Tipton, who committed the largest & longest occurring lottery fraud in US history while employed as an IT worker, and was promoted to Information Security Officer, at the Multi-State Lottery Association where he committed his crimes. Eddie exploited his positions of trust to rig the lottery ...
Read more
Share
Mark as Played
Listen in to hear Rebecca speak with elections security expert Theresa Payton about elections security, safeguarding voting machines, and the types of attempts to disrupt or even change the results of elections. Some of the topics covered include: • What are some key points to understand about the tech and other problems in the Iowa caucuses? • In what ways do nation states, and other malicious actors, try to manipulate elections r...
Read more
Share
Mark as Played
February 1, 2020 57 min
Listen in to my chat with artificial intelligence expert Davi Ottenheimer about not only the potential benefits of AI, but also the risks to information security, privacy and safety when flawed, biased and maliciously-engineered AI is used. Also hear the boundaries Davi recommends for preventing bad AI. Some of the questions covered include: • What are some examples of tragedies that possibly could have been prevented with AI? • In...
Read more
Share
Mark as Played
January 4, 2020 56 min
Many listeners have sent questions over the past two years about the dark web • What is the dark web? Is it the same as the dark net? How is it different from the deep web? • Is it legal to go into the dark web? • What is Tor? • What are some real-life crimes found on dark web? • What are some of the most disturbing activities in the dark web? • What do information security and privacy pros need to know about the dark web to help ...
Read more
Share
Mark as Played
Recently the CEO of a cloud services business for compliance & information security shrugged off the problems he has on an ongoing basis with his SaaS cloud site where he does not have change controls implemented, & doesn't use a separate test or development region or server. He shrugged & said, “That’s just the way it is with a cloud service, they all have these problems.” Wrong! In this episode I discuss the impo...
Read more
Share
Mark as Played
Executives, tech, data & cyber security, and privacy professionals face situations testing their ethics every day. Just a few issues include: • Profit maximization at any cost, including privacy and data security • Creating and selling products and services that monetize personal data at the cost of privacy, security and safety of the associated individuals • Intentionally refusing to acknowledge known security and privacy pro...
Read more
Share
Mark as Played
A recent incident occurred in central Iowa where security vendor, Coalfire, employees were arrested for breaking/entering and robbery of a county government building. After the arrest it was determined this was part of a contract the vendor had with a Federal agency in a neighboring county. This incident brought a wide range of online discussions about white hat hacking, facility break-in tests, and associated responsibilities and ...
Read more
Share
Mark as Played
According to Cybersecurity Ventures research, sponsored by Herjavec Group, cybercrime damages will be Dollor 6 trillion By 2021, up from Dollor 3 trillion in 2015. What are the biggest cybercrime trends of 2019? What were the biggest cybercrime trends 1, 2 and 3 decades ago? Where is cybercrime increasing? What are the impacts of ransomware? How does cybercrime hit small businesses differently than large businesses? What con...
Read more
Share
Mark as Played
This week many security and privacy topics are covered, plus news about a necessary summer break! • Why are actual voting machines, with voter data, being sold on eBay? • What are cybercrooks doing on Git repositories that those using them must be prepared for? • How are the “6 most destructive malware threats” considered to be art? • How are organizations, and so many cloud services, exposing personal and sensitive data to the wo...
Read more
Share
Mark as Played
Information security, privacy and compliance careers are of great interest, and the need for more professionals to fill openings in these areas continues to increase. • What are some paths to take for getting into these careers? • What types of college degrees, if any, are necessary? • What work ethics are necessary for success in these types of careers? • How is getting into these careers different in various countries, such as i...
Read more
Share
Mark as Played
All 50 US states were targeted by hackers in the 2016 elections. Some claimed a few of the hacks successfully broke into voting systems. The 448-page Mueller Report contains many important points & findings, not only about these hacking activities & related intelligence operations against the USA elections processes and voting machines and systems, but it also points out many cyber security vulnerabilities & threats lea...
Read more
Share
Mark as Played
In this episode Rebecca answers some of the questions received from show listeners and discusses some recent news items. A very wide range of topics are covered, some of which include: • What are cybersecurity lessons found within the Mueller report? • What are the top 3 things a small business owner should be doing to secure client data? • Who should be concerned about Embedded POSReady 2009? • What are the challenges to eliminat...
Read more
Share
Mark as Played
April 23, 2019 58 min
There are growing concerns about privacy and the security of data provided to hotels, along with increasing safety concerns. • How many different entities get your personal data when you check into a hotel? • How many third parties have access to your personal data through the hotel? • What types of activities that you do in your room that are often put into the hotel system? • What types of actions can hotels take to help them i...
Read more
Share
Mark as Played
In this episode Rebecca answers some questions received from show listeners and her Privacy Professor Tips readers. A wide range of topics are covered, such as: • How many voting machines were attacked during the USA 2016 elections? Will they continue? • Should listeners be concerned that wireless China tech may have surveillance built in? Or tech from other countries? • What happened at Mar-a-Lago with the USB thumb drives with m...
Read more
Share
Mark as Played
In this 6th in a series of shows on GDPR we discuss issues about how to give individuals access to their own personal data, how to provide them with portability of their personal data, and related issues. Understanding the actual HOW of doing compliance requirements is usually the most challenging part of compliance. One factor is because each organization has its own unique business environment, so the HOW cannot be the same for...
Read more
Share
Mark as Played

Chat About Data Security and Privacy with the Privacy Professor

Popular Podcasts

Crime Junkie
The Piketon Massacre
The Piketon Massacre
On the night of April 21, 2016 in rural Piketon, Ohio - eight members of the Rhoden family were viciously murdered execution style in their homes. Two years later in 2018, their neighbors, the Wagners, were arrested and charged with committing the largest massacre in Ohio’s history. Shocked by the arrests, this once close-knit and religious community remains divided and unable to cope. Was a respected and reputable Piketon family responsible for this unimaginable murder spree? Our team will examine the deep ties that connected both families. We’ll examine the evidence and possible motives for the crimes. For the first time we’ll speak with townspeople, psychological experts, respected investigators, friends and members of both families. Are the Wagners responsible for the murders, and if convicted, will they be executed? Or is it possible that there is still a murderer at large waiting to kill again?
Dateline NBC
Dateline NBC
Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations.
    Music, radio and podcasts, all free. Listen online or download the iHeartRadio App.

    Connect

    © 2020 iHeartMedia, Inc.