Couverture de She Said Privacy/He Said Security

She Said Privacy/He Said Security

She Said Privacy/He Said Security

De : Jodi and Justin Daniels
Écouter gratuitement

3 mois pour 0,99 €/mois

Après 3 mois, 9.95 €/mois. Offre soumise à conditions.

À propos de ce contenu audio

This is the She Said Privacy / He Said Security podcast with Jodi and Justin Daniels. Like any good marriage, Jodi and Justin will debate, evaluate, and sometimes quarrel about how privacy and security impact business in the 21st century. Direction Economie Management Management et direction
Les membres Amazon Prime bénéficient automatiquement de 2 livres audio offerts chez Audible.

Vous êtes membre Amazon Prime ?

Bénéficiez automatiquement de 2 livres audio offerts.
Bonne écoute !
    Épisodes
    • How Safe Are Kids' GPS Trackers and Smartwatches?
      Jan 22 2026

      Steve Blair is the Senior Privacy and Security Test Program Leader at Consumer Reports, where he evaluates connected devices and digital products to uncover privacy and security risks. With a background spanning early internet technology, mobile hardware, and product security, he helps consumers better understand how their data is collected, used, and protected, especially in emerging technologies designed for families and children.

      In this episode…

      Connected devices designed for kids play a growing role in how families stay connected and informed. GPS trackers, smartwatches, and other apps and tools often promise safety and convenience, yet they also raise questions about how children's data is collected, used, stored, and protected. The challenge is not whether these tools function as intended, but how they handle personal information once they are in use. How can parents gain confidence in the technology their children use every day while avoiding privacy and security risks?

      A practical starting point is to read privacy notices and product descriptions, then examine how devices and apps behave in practice. Reviewing default settings, questioning app permissions, and noting how easy privacy controls are to find can help parents manage risk and better understand how a company collects and handles kids' data. These considerations become especially important when children are required to use certain apps or connected devices to participate in school activities or other events.

      In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels talk with Steve Blair, Senior Privacy and Security Test Program Leader at Consumer Reports, about privacy and security risks in kids' GPS trackers, wearables, and apps. Steve explains what Consumer Reports found when testing GPS trackers and wearables designed for children, and how hands-on testing helps parents better understand device privacy controls. He shares practical ways parents can assess app privacy and security protections, even without deep technical expertise. And Steve also shares practical privacy and security tips parents can use every day, like keeping devices updated, removing apps when they are no longer needed, and requesting data deletion when app use ends.

      Afficher plus Afficher moins
      30 min
    • From Manual to Automated: Building Privacy Programs That Scale
      Jan 8 2026

      Ron De Jesus is the Field Chief Privacy Officer at Transcend, driving practical privacy governance and industry advocacy. He previously led privacy at Grindr, Tinder, and Match Group, built global programs at Tapestry and American Express, founded De Jesus Consulting, and remains an active community leader through the IAPP and LGBTQ Privacy & Tech Network.

      In this episode…

      Privacy professionals navigate a growing web of privacy regulations and emerging technologies, yet many still rely on manual processes to manage their programs. Teams might track global requirements in spreadsheets and manually triage privacy rights requests. To scale privacy programs effectively, teams need to move beyond manual approaches. So what should privacy teams consider as they adopt automated solutions?

      The key to scaling privacy programs efficiently lies in embracing automation and technology that aligns with an organization's broader goals. When privacy leaders secure early buy-in from stakeholders, technology decisions are more likely to support the business beyond basic compliance needs. Teams also need clarity on what they are trying to accomplish, a thorough understanding of where their data lives, and time to evaluate how new tech fits into their existing systems and workflows. Sometimes teams expect third-party privacy tools to work out of the box and solve their compliance needs. However, that is often not the case, and why companies must review and test vendor tech solutions to ensure they accurately meet company requirements.

      In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels talk with Ron De Jesus, Field Chief Privacy Officer at Transcend, about transitioning privacy programs from manual processes to automation. Ron emphasizes the importance of internal alignment when adopting privacy technology, discusses the risks of treating privacy tools as plug-and-play compliance solutions, and highlights the need for companies to review vendor tech solutions against their specific requirements and legal obligations. He also explains how the privacy community helps shape his view of how teams operationalize privacy in practice and shares his prediction for what's in store for privacy professionals in 2026.

      Afficher plus Afficher moins
      27 min
    • Why Knowing Company Data is Every General Counsel's First Privacy Move
      Dec 18 2025

      Talar Herculian Coursey is the GC and VP HR for ComplyAuto, a SaaS company serving auto dealerships in the US. Talar was previously the GC for Vista Ford and a file clerk, associate, and partner at the national labor and employment law firm, Fisher Phillips LLP.

      Talar is licensed to practice law in California and Utah. She is also a CIPP, CIPM, certified yoga instructor, certified life coach, and a retired dog walker.

      In this episode…

      Knowing the types of data a company collects is essential for building strong privacy and security practices. Many organizations collect a wide range of sensitive information, including financial data, identity documents, and data created through connected technologies. Employees often rely on text messages and mobile apps to communicate, creating touchpoints where sensitive information is shared with third parties. So, how can general counsels and privacy pros safeguard sensitive information while accounting for the risks introduced by third-party vendors?

      Protecting sensitive information starts with establishing policies and processes that reflect how data flows through an organization and understanding how teams communicate with consumers. That's why it's important to provide employees with secure, encrypted channels when communicating with customers. Customized training is equally important, and using gamification and tailored phishing simulations helps engage employees, deepen their understanding of the sensitive information they handle, and improve their ability to recognize potential privacy and security risks. By pairing these tools with training that is specific to the work environment, general counsels and privacy pros can help employees stay vigilant and reduce the likelihood of privacy and security incidents.

      In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels talk with Talar Herculian Coursey, General Counsel and Vice President of Human Resources at ComplyAuto, about managing privacy and security risk tied to data collection practices. Drawing on her experience in the automotive dealership industry, Talar explains why understanding the types of data companies collect is critical to building effective privacy and security programs. She explains how companies can strengthen their defenses through encrypted communication tools and customized employee training programs. Talar also outlines the significant risks posed by third-party vendors and offers practical tips for managing these risks.

      Afficher plus Afficher moins
      27 min
    Aucun commentaire pour le moment