Crowdsourced private surveillance.
Privacy and biometric data.
The legislation can only do so much.
Slowly awakening to the problems we face.
Lessons learned from environmental legislation.
Compliance, regulation and small businesses.
Moving the needle in the federal space.
Helping us understand HIPAA.
The cyber resiliency of White House operations.
The quiet, behind-the-scenes work of the FBI.
Cell phone tracking and the future of data value.
There is no back door.
Exploring the cultural values of personal privacy.
And the heat goes on.
The practical concerns of data encryption.
Rigging the game.
Just gimme some truth.
Get that thing off my car.
Technology always moves quicker than policy.
Dressing for privacy.
Can smart surveillance keep us safe?
Never let a crisis go to waste.
Heat maps and surveillance temptations.
Where there's a will, there's a loophole.
You don't own your photos.
You will pay for that one way or another.
If there's cyberwar, are there cyber war crimes?
Privacy is a human right.
The different implications of surveillance.
Tech and cyber competition with China.
Pushing the CCPA.
Cybersecurity at the global, national, and state levels.
Building public trust.
Code is law.
Policy is a mess.
Huawei statements are not as strong as before.
Law takes time.
The power of the pen.
Diversity in contact tracing.
The evolution of the internet.
Need affects change.
There is a trust gap.
CCPA impact on businesses.
Understanding the right technical assistance model for your organization.
Privacy: once you give it away, it’s very hard to get back.
Your own data used against you.
Technology that allows cops to track your phone.
Generating more data with value we don't understand.
U.S. COVID-19 research efforts at risk.
EU-US Privacy Shield invalidated.
No fruit of the poisonous tree.
The tools have changed, but the tactics have remained basically the same.
The Malware Mash!
IoT device risk: can legislation keep up?
Elizabeth Wharton: Strong shoulders for someone else to stand on. [Legal] [Career Notes]
Playing into the hands of our adversaries.
Protecting the integrity of information and maintaining privacy.
Defining digital sovereignty: there's no such place as cyberspace.
A pandemic is a perfect environment for disinformation to thrive.
We don't know what we need, until we do with facial recognition.
Interim cybersecurity compliance rule prior to CMMC with some privacy thrown in.
Encore: EU-US Privacy Shield invalidated.
Encore: Dressing for privacy.
Diversity has to be part of the mission in cybersecurity.
The attempted insurrection, Congressional cybersecurity, and data ethics.