Security / Investigation
Building Cybersecurity Programs That Meet Privacy Regulations
October has rolled around again. It’s a month that marks two big events: Cybersecurity Awareness Month and Halloween.
But if you think we’re going to play off horror movie tropes to talk about the importance of cybersecurity, surprise! We’re taking things in another direction this year. Instead of scary scenarios, we’re going to talk about another Halloween staple: candy.
Just…
Why Security Awareness Training Matters
@media screen and (max-width: 1023px){section[data-id=”block_69fc440d03fcaaa5a51912d8c19dd877″]{ }}@media screen and (min-width: 1024px) and (max-width: 1365px){section[data-id=”block_69fc440d03fcaaa5a51912d8c19dd877″]{ }}@media screen and (min-width: 1366px){section[data-id=”block_69fc440d03fcaaa5a51912d8c19dd877″]{ }}

Dan Thornton is the Co-founder and CEO of Goldphish. He is a former Royal Marine Commando who channeled his operational expertise into cybersecurity. Today, Dan leads a security awareness training company, helping organizations turn their people into their strongest defense with
…
GPC and UOOMS: Do Consumers Want an On/Off Switch or a Dimmer?
@media screen and (max-width: 1023px){section[data-id=”block_dcb68bfc9ef043f1e9458961b4dabf25″]{ }}@media screen and (min-width: 1024px) and (max-width: 1365px){section[data-id=”block_dcb68bfc9ef043f1e9458961b4dabf25″]{ }}@media screen and (min-width: 1366px){section[data-id=”block_dcb68bfc9ef043f1e9458961b4dabf25″]{ }}
…
6 Ways Privacy Pros Strengthen Cybersecurity (Without Saying ‘Compliance’)
Privacy and security are often treated as parallel disciplines, each with its own priorities, language, and metrics. Yet the most resilient organizations are those where the two functions operate in harmony, sharing intelligence, aligning processes, and reinforcing each other’s strengths.
Privacy professionals bring a unique vantage point to this partnership. They understand the full lifecycle of sensitive data, from the…
Navigating the New Rules of Healthcare Advertising
@media screen and (max-width: 1023px){section[data-id=”block_2b24037be28b2d6320e2d946bb253826″]{ }}@media screen and (min-width: 1024px) and (max-width: 1365px){section[data-id=”block_2b24037be28b2d6320e2d946bb253826″]{ }}@media screen and (min-width: 1366px){section[data-id=”block_2b24037be28b2d6320e2d946bb253826″]{ }}

Jeremy Mittler is the Co-founder and CEO of Blueprint Audiences. With nearly two decades in healthcare, advertising, and privacy, Jeremy has shaped how marketers reach patients and providers. At Blueprint, he is creating a new, privacy-safe way to build health audiences
…
The Role of Technology: Accelerating Capability
When we talk about privacy programs, technology can often steal the spotlight. Dashboards that sparkle. Tools that promise transformation. But let’s be blunt. Tech alone doesn’t deliver privacy; it enables it, and it has to be aligned with people and process. Effective privacy tech isn’t solely about automation or analytics. Operational integration is a must to implement systems that…
How Companies Can Prevent Identity-Based Attacks
@media screen and (max-width: 1023px){section[data-id=”block_e1d9bb476fed19fdcf8705d4b2255f69″]{ }}@media screen and (min-width: 1024px) and (max-width: 1365px){section[data-id=”block_e1d9bb476fed19fdcf8705d4b2255f69″]{ }}@media screen and (min-width: 1366px){section[data-id=”block_e1d9bb476fed19fdcf8705d4b2255f69″]{ }}

Jasson Casey is the CEO and Co-founder of Beyond Identity, the first and only identity security platform built to make identity-based attacks impossible. With over 20 years of experience in security and networking, Jasson has built enterprise solutions that protect global
…
Privacy Rights and Vendor Management: Are Your Partners Putting You at Risk?
Jonah woke one March morning to birdsong and sunshine. He brewed his coffee slowly, took his dog on a leisurely walk, and smiled at how peaceful the world felt as he readied for work.
When he arrived at the train station, the platform was empty.
“Did the train leave early?” he asked the station agent.
“Train left on time.” She…







