Cyber Talk Radio: Data Privacy as Protectionism

Bret Piatt, CTR Host, and Justin Freeman, Of Counsel at Winstead - Week 82 of Cyber Talk Radio

Show Summary

This past Saturday, April 21, episode 82 of Cyber Talk Radio hit the air on 1200 WOAI and iHeartRadio streaming. I was joined by Justin Freeman, Of Counsel at Winstead, to discuss data privacy regulations, cybersecurity threat evaluation and data breach response.

How did Justin land in technology and law? We kick off the show by having Justin to tell us more about his longtime interest in system/database administration stemming from a video game hobby when he was a kid. Once he worked in IT administration and support for several years, he then decided to go back to school to study law. He thought the legal field would give him the ability to see something new each day. He then married his technical background with his practice in law, now focusing on data privacy, regulations and cybersecurity. What set of services and regulations are associated with cybersecurity? What’s the difference between data privacy and cybersecurity? It’s really all about privacy and security. However, technology has just changed the medium in which people access information and data. Data privacy is regulating people’s access to information. Cybersecurity is good for preventing people from getting access to information. GDPR is the next wave of privacy and security regulations. What are the U.S. data privacy regulations? The most recent widely known data privacy issue has been around Facebook and Cambridge Analytica. In today’s digital world, data breaches are now a common occurrence unfortunately.

In the second half of the show, we talk through data breaches, cyber threats and what proactive measures businesses can take to help prevent a cyberattack. There are a lot of cyber threats that you can prevent and/or avoid. Do you know what an advanced persistent threats is? As defined by SearchSecurity.com, an advanced persistent threat (APT) is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. Justin shares a dirty little secret of data breaches. Many times you won’t have evidence of exfiltration. Most breaches aren’t even identified while the hackers are walking in the door so to speak. Even though a breach is not identified right away, we are getting better at identifying them more faster. People identify a breach now within six weeks of the breach first occurring instead of six months. This is still a scary statistic! A good physical comparison of a lock on the door for security is having no police force if someone breaks in the networking world. Do we need a cyber coast guard to do proactive monitoring of networks and IT systems? This is a major gap in protecting the commercial industry. To listen to the episode replay to learn more, gohere or watch below.**

Upcoming episode – Saturday nights from 11:00 p.m. to Midnight -

Listen to a replay of this episode or past episodes on a Cyber Talk Radio Podcast stream. Replays are available via the below podcast services:

Recent episodes – available to stream from our YouTube channel -

Have an idea for a topic or want to be a guest?

Contact Cyber Talk Radio via our request a topic or be a guest form.

Protect Your Business Data

We are passionate about helping our customers protect their data. We want you to use Jungle Disk to protect yours. Click on Sign Up to get started. It takes less than 5 minutes!

Sign Up