Cyber Talk Radio: Data Privacy as Protectionism
Bret Piatt, CTR Host, and Justin Freeman, of Counsel at Winstead - Week 82 of Cyber Talk Radio
This past Saturday, April 21, episode 82 of Cyber Talk Radio hit the air on 1200 WOAI and iHeartRadio streaming. I was joined by Justin Freeman, of Counsel at Winstead, to discuss data privacy regulations, cybersecurity threat evaluation and data breach response.
How did Justin land in technology and law? We kick off the show by having Justin to tell us more about his longtime interest in system/database administration stemming from a video game hobby when he was a kid. Once he worked in IT administration and support for several years, he then decided to go back to school to study law. He thought the legal field would give him the ability to see something new each day. He then married his technical background with his practice in law, now focusing on data privacy, regulations and cybersecurity. What set of services and regulations are associated with cybersecurity? What’s the difference between data privacy and cybersecurity? It’s really all about privacy and security. However, technology has just changed the medium in which people access information and data. Data privacy is regulating people’s access to information. Cybersecurity is good for preventing people from getting access to information. GDPR is the next wave of privacy and security regulations. What are the U.S. data privacy regulations? The most recent widely known data privacy issue has been around Facebook and Cambridge Analytica. In today’s digital world, data breaches are now a common occurrence unfortunately.
In the second half of the show, we talk through data breaches, cyber threats and what proactive measures businesses can take to help prevent a cyberattack. There are a lot of cyber threats that you can prevent and/or avoid. Do you know what an advanced persistent threats is? As defined by SearchSecurity.com, an advanced persistent threat (APT) is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. Justin shares a dirty little secret of data breaches. Many times you won’t have evidence of exfiltration. Most breaches aren’t even identified while the hackers are walking in the door so to speak. Even though a breach is not identified right away, we are getting better at identifying them more faster. People identify a breach now within six weeks of the breach first occurring instead of six months. This is still a scary statistic! A good physical comparison of a lock on the door for security is having no police force if someone breaks in the networking world. Do we need a cyber coast guard to do proactive monitoring of networks and IT systems? This is a major gap in protecting the commercial industry. To listen to the episode replay to learn more, gohere or watch below.**
Upcoming episode – Saturday nights from 11:00 p.m. to Midnight -
- Episode 83, April 28: CivTechSA with Jose de la Cruz, City of San Antonio Chief Innovation officer, and Joyce Deuley, Geekdom Program Manager
Listen to a replay of this episode or past episodes on a Cyber Talk Radio Podcast stream. Replays are available via the below podcast services:
Recent episodes – available to stream from our YouTube channel -
- Password Management with TeamPassword
- Effective Cyber Training with CNF Technologies
- Kids Learning to Code with Youth Code Jam Founder
- Trinity University’s Students + Startups Program with Luis Martinez
- Tech Talent South with Brian Garcia
- General Data Privacy Regulation (GDPR) with Van Lindberg
- Innovation in Education with CAST Tech
- San Antonio Economic Development Foundation
- Transit Innovation with VIA’s VP of Information Technology
- Offense-based perspective to network defense with Level Effect
- Mission Texas to Tel Aviv with Cybersecurity San Antonio and Silverfort
- Innovation in Education with Palo Alto College
- Job Training in San Antonio with SA Works
- Cybersecurity Legislation with Congressman Will Hurd
- Ethics of Artificial Intelligence and Paying Ransoms to Hackers with Van Lindberg
Have an idea for a topic or want to be a guest?
Contact Cyber Talk Radio via our request a topic or be a guest form.