76 episodes

There are more information security and privacy threats than ever before. As more technologies emerge, more big data analytics are used, and more artificial intelligence systems are deployed, cybersecurity and privacy risks grow exponentially. Rebecca has spent her entire career working to improve information security and privacy protections, by not only raising awareness of the issues within businesses and other types of organizations, but also by raising the awareness of these risks in the public and helping them to understand how to better protect their own personal data, allowing them to take their privacy protections into their own hands. Rebecca offers you information about these existing and emerging security and privacy risks and provides fresh insights into the impacts of exploiting these risks, and gives guidance, tips, expert advice, news, with fascinating guests, to help all organizations, and the general public, understand what they need to do to mitigate these risks.

Data Security and Privacy with the Privacy Professor The VoiceAmerica Talk Radio Network

    • Technology

There are more information security and privacy threats than ever before. As more technologies emerge, more big data analytics are used, and more artificial intelligence systems are deployed, cybersecurity and privacy risks grow exponentially. Rebecca has spent her entire career working to improve information security and privacy protections, by not only raising awareness of the issues within businesses and other types of organizations, but also by raising the awareness of these risks in the public and helping them to understand how to better protect their own personal data, allowing them to take their privacy protections into their own hands. Rebecca offers you information about these existing and emerging security and privacy risks and provides fresh insights into the impacts of exploiting these risks, and gives guidance, tips, expert advice, news, with fascinating guests, to help all organizations, and the general public, understand what they need to do to mitigate these risks.

    How Biased and Malicious AI Can Do Harm

    How Biased and Malicious AI Can Do Harm

    Listen in to my chat with artificial intelligence expert Davi Ottenheimer about not only the potential benefits of AI, but also the risks to information security, privacy and safety when flawed, biased and maliciously-engineered AI is used. Also hear the boundaries Davi recommends for preventing bad AI. Some of the questions covered include:
    • What are some examples of tragedies that possibly could have been prevented with AI?
    • In what ways are AI controlled robots shifting power in our society?
    • What kind of boundaries can be used with AI to support strengthening information security and protecting privacy?
    • Are AI regulations, laws, and other rules necessary?
    • And many more!

    • 57 min
    Diving into the Dark Net

    Diving into the Dark Net

    Many listeners have sent questions over the past two years about the dark web
    • What is the dark web? Is it the same as the dark net? How is it different from the deep web?
    • Is it legal to go into the dark web?
    • What is Tor?
    • What are some real-life crimes found on dark web?
    • What are some of the most disturbing activities in the dark web?
    • What do information security and privacy pros need to know about the dark web to help them with their job responsibilities?
    • What should the general public know about the dark net?
    Tune in to hear Rebecca discuss these topics and more with Andrew Lewman, co-founder of The Tor Project, Farsight Security & DarkOwl, and technology advisor to Interpol’s Crimes Against Children Initiative.

    • 56 min
    The Criticality of Change Control Management in Cloud Services

    The Criticality of Change Control Management in Cloud Services

    Recently the CEO of a cloud services business for compliance & information security shrugged off the problems he has on an ongoing basis with his SaaS cloud site where he does not have change controls implemented, & doesn't use a separate test or development region or server. He shrugged & said, “That’s just the way it is with a cloud service, they all have these problems.” Wrong!

    In this episode I discuss the importance of change controls to supporting information security & privacy with an expert in this area.

    • What kind of change control processes need to be applied within SaaS environments?
    • What are some of the biggest vulnerabilities within cloud services & how they handle change controls with new and updated applications and systems development?
    • What types of change controls need to be followed when patching cloud systems?

    Tune in to hear Rebecca discuss these topics and more with Becky Swain, Founder of the Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM).

    • 55 min
    Professional ethics and technology in the cyber age

    Professional ethics and technology in the cyber age

    Executives, tech, data & cyber security, and privacy professionals face situations testing their ethics every day.

    Just a few issues include:
    • Profit maximization at any cost, including privacy and data security
    • Creating and selling products and services that monetize personal data at the cost of privacy, security and safety of the associated individuals
    • Intentionally refusing to acknowledge known security and privacy problems to not damage sales and profits
    • Deliberately releasing technologies that executives know do not work as expected or as advertised

    Tune in to hear Rebecca discuss these topics and more with Dr. Katina Michael, who has done significant research in these, and related, areas.

    • 57 min
    White hat hacking & security break-in testing & ethics

    White hat hacking & security break-in testing & ethics

    A recent incident occurred in central Iowa where security vendor, Coalfire, employees were arrested for breaking/entering and robbery of a county government building. After the arrest it was determined this was part of a contract the vendor had with a Federal agency in a neighboring county. This incident brought a wide range of online discussions about white hat hacking, facility break-in tests, and associated responsibilities and related ethical considerations.

    • What are some lessons from the Coalfire security vendor arrests?
    • What are some recommendations for contracting an outside entity to perform hacking and/or break-in activities?
    • What activities need to be confirmed for such activities?
    • What should related contracts contain for such activities?

    Tune in to hear Rebecca discuss these topics and more with Dr. Mich Kabay.

    • 56 min
    Cybercrime Trends and Changes in Past 3 Decades

    Cybercrime Trends and Changes in Past 3 Decades

    According to Cybersecurity Ventures research, sponsored by Herjavec Group, cybercrime damages will be Dollor 6 trillion By 2021, up from Dollor 3 trillion in 2015.

    What are the biggest cybercrime trends of 2019?
    What were the biggest cybercrime trends 1, 2 and 3 decades ago?
    Where is cybercrime increasing?
    What are the impacts of ransomware?
    How does cybercrime hit small businesses differently than large businesses?
    What concerns info security pros and executives most about cybercrime?

    Tune in to hear Rebecca discuss these topics and more with Kim Hakim, CEO/ Founder at FutureCon Events.

    CyberCrime Ransomware Phishing IOT CyberCriminals Conferences FutureCon Privacy

    • 56 min

Top Podcasts In Technology

Listeners Also Subscribed To

More by The VoiceAmerica Talk Radio Network