6 Ways To Keep Data Protection From Entering An Echo Chamber (Chamber, Chamber…)
What’s an Echo Chamber got to do with Data Protection I hear you ask? Well, metaphorically, an echo chamber describes the frustration of great ideas and concepts being bounced around but never being...
View ArticleWhat Are Your 2017 Data Security Predictions?
It’s December so that means it’s time to blow the dust off your crystal ball. Perhaps you prefer to read tea leaves or consult astrology charts. Maybe you gather your team around a Ouija board....
View ArticlePrivacy and Security are Key to Enabling Data-driven Healthcare
While the HIMSS Privacy and Security Forum last week in Boston featured a diverse group of healthcare professionals from payers and providers of all sizes, there was one common theme that everyone...
View ArticleTop 10 Pieces of Advice for CIOs from CIOs in 2016
As I looked back over this year, I wanted to capture the best advice for CIOs from CIOs out of the hundreds of enlightening recommendations offered by the great IT leaders involved in the #CIOChat. My...
View Article#MyDataMatters
Have you told IT? It is time that business leaders tell their IT organizations that their data matters. It does not make a difference whether you are talking about customer data, marketing data, or...
View ArticlePseudonymization vs. Anonymization and How They Help With GDPR
Pseudonymization and Anonymization are two distinct terms that are often confused in the data security world. With the advent of GDPR, it is important to understand the difference, since anonymized...
View Article#MyDataMatters to Me
When anthropologists try to understand an ancient culture, let’s say the Greeks, they look at the physical artifacts left behind—the tools, the utensils, etc. and try to infer insights into the prior...
View ArticleBankers Have Work to Do to Respond to Fintech Challengers
Bankers need to become more data centric in order to retain their right to win. Otherwise, the transformational business changes being made by others will chip away at their natural incumbent...
View ArticleHave You Added Data Privacy Day to Your Calendar?
Many pundits have asked as technology has become increasingly capable, whether privacy is dead. Yet, each January you can add your voice to Data Privacy Day, this year on the 26th. Clearly, the voices...
View ArticleHow Should You Protect Enterprise Data?
In today’s business, protecting your data is no longer a luxury. I recall a CIO friend telling me after the Target data breach that, “Target wasn’t stupid; the business case for data security is just...
View ArticleWith Data Comes Risk, But Where There’s a Will There’s a Way to Protect It
Organizations all over the world are using data technologies to their advantage, storing, and analysing information to quickly connect dots from multiple sources and locations to spot patterns,...
View Article5 Takeaways from The Privacy Engineer’s Manifesto
Recently, after connecting with Michelle Dennedy, Cisco’s Chief Privacy Officer, I took the time to read her book, The Privacy Engineer’s Manifesto. For those that will be at the RSA Conference this...
View ArticleRSA Day One — Five Key Takeaways
It’s a real pleasure to be at RSA Conference with Protegrity this year, driving home the message that #MyDataMatters to an audience more used to talking about data security than privacy. The timing is...
View ArticleMore RSA Takeaways – Day Two
As I said yesterday, RSA is always a large event with a lot going on and day two was even busier than the first. Privacy is a hot topic this year, a theme common to many of the sessions I attended and...
View ArticleRSA Conference — Seven Key Takeaways from Day Three
Another fantastic and busy day at RSA Conference. Clearly privacy matters to the good folks here because the stream of visitors at our booth wanting to know more about centrally managing and protecting...
View ArticleInsurers Need Data to Make Transformative Changes
It is increasingly clear that insurance organizations wanting to retain their competitive advantage, need data to make transformative business changes. Data incompatibility, poor governance, and...
View ArticleSilos: What Causes Them and How to Overcome Them
eventdate:January 01, 1970 - January 01, 1970:eventdateend: According to Patrick Lencioni, “Silos are nothing more than the barriers that exist between departments within an organization, causing...
View ArticleYou Have More Data Than You Think
eventdate:January 01, 1970 - January 01, 1970:eventdateend:The reality of our endlessly connected, always online lives is that as digital citizens we are constantly sending sensitive data about...
View ArticleA Checkmark Doesn’t Mean You’re Secure
eventdate:January 01, 1970 - January 01, 1970:eventdateend:It’s 2017. Every enterprise product advertised a checkmark that says it’s “secure.” If that’s true, why are breaches still happening so...
View ArticleCDOs Need to Build Their Defensive Capabilities
eventdate:January 01, 1970 - January 01, 1970:eventdateend: Chief Data Officers, as I indicated in The CDO toolkit essentials, need to be focused upon what Tom Davenport labels data defense and data...
View Article