Crowdsourced private surveillance.
Privacy and biometric data.
The legislation can only do so much.
Slowly awakening to the problems we face.
Lessons learned from environmental legislation.
Compliance, regulation and small businesses.
Moving the needle in the federal space.
Helping us understand HIPAA.
The cyber resiliency of White House operations.
The quiet, behind-the-scenes work of the FBI.
Cell phone tracking and the future of data value.
There is no back door.
Exploring the cultural values of personal privacy.
And the heat goes on.
The practical concerns of data encryption.
Rigging the game.
Just gimme some truth.
Get that thing off my car.
Technology always moves quicker than policy.
Dressing for privacy.
Can smart surveillance keep us safe?
Never let a crisis go to waste.
Heat maps and surveillance temptations.
Where there's a will, there's a loophole.
You don't own your photos.
You will pay for that one way or another.
If there's cyberwar, are there cyber war crimes?
Privacy is a human right.
The different implications of surveillance.
Tech and cyber competition with China.
Pushing the CCPA.
Cybersecurity at the global, national, and state levels.
Building public trust.
Code is law.
Policy is a mess.
Huawei statements are not as strong as before.
Law takes time.
The power of the pen.
Diversity in contact tracing.
The evolution of the internet.
Need affects change.
There is a trust gap.
CCPA impact on businesses.
Understanding the right technical assistance model for your organization.
Privacy: once you give it away, it’s very hard to get back.
Your own data used against you.
Technology that allows cops to track your phone.
Generating more data with value we don't understand.
U.S. COVID-19 research efforts at risk.
EU-US Privacy Shield invalidated.
No fruit of the poisonous tree.
The tools have changed, but the tactics have remained basically the same.
The Malware Mash!
IoT device risk: can legislation keep up?
Elizabeth Wharton: Strong shoulders for someone else to stand on. [Legal] [Career Notes]
Playing into the hands of our adversaries.
Protecting the integrity of information and maintaining privacy.
Defining digital sovereignty: there's no such place as cyberspace.
A pandemic is a perfect environment for disinformation to thrive.
We don't know what we need, until we do with facial recognition.
Interim cybersecurity compliance rule prior to CMMC with some privacy thrown in.
Encore: EU-US Privacy Shield invalidated.
Encore: Dressing for privacy.
Diversity has to be part of the mission in cybersecurity.
The attempted insurrection, Congressional cybersecurity, and data ethics.
The intersection of law, technology and risk.
The new US Administration should focus on these data privacy points.
Covid's effects on medical privacy.
Privacy has become almost a fundamental right.
Internet of Bodies (IoB) devices: technology is advancing much quicker than regulations can.
Microtargeting as information warfare.
Unregulated IoT devices: What could go wrong?
Amazon Marketplace: You've got to be there.
Virginia privacy law and what it means for you.
HITECH Act: Pushing the healthcare industry toward electronic medical records.
Regulation of the Internet is evolving.
Breaches are a near certainty.
Impacts of the U.S.'s digital divide.
Cyber insurance: still a work in progress.
Privacy as a competitive advantage.
Privacy sector shift under the Biden administration.
Many do not trust their banks and banking apps.
To pay or not to pay? Ransomware negotiation.
The normalization of data leaks.
Data privacy laws are failing.
Private companies are not subject to the First Amendment.
Federal standing in identity theft cases.
Can individual liberties keep up with technology?
Difficulties and biases of online proctored exams.
Encore: A pandemic is a perfect environment for disinformation to thrive.
Healthcare cyber insurance is no longer an option.
Hacking back from a policy perspective: a bad idea.
An important consumer protection law you may not know about.
Convergence of government and private sector in national security.
Getting tough with the adversary.
Apple CSAM: well-intentioned, slippery slope.
Taking up the challenge of cyber citizenship.
Threading the needle on consumer privacy laws.
Pay the ransom anyway regardless of payment ban?
Internet communications are the latest wiretapping class action trend.
Let's talk about Facebook's research.
Protecting local officials from doxxing and threats.
Government agencies have different obligations on keeping data.