Created with Sketch.
Data Security and Privacy with the Privacy Professor
56 minutes | 9 days ago
Voter Fraud Facts No One is Talking About…Until Now
In 2021 there have been at least 253 voting bills proposed in at least 43 US states. These bills are restricting voting methods, times, and even criminalizing such practices as the provision of food and drink to those who are in waiting line for hours to vote. All due to “concerns about voter fraud,” even though hundreds of audits, hundreds of ballot recounts, and hundreds of independent voting machine security assessments have found no voter fraud. What security measures are actually established for poll centers on voting day? For early voting locations? And for mail-in and absentee voting ballots? What would election officials tell you about those images and videos claiming to be evidence? Are they really evidence? Or, are they bogus? And how can you tell? Can boxes of ballots actually be brought into election centers and processed? What controls are in place for elections centers where ballots are collected, processed, and sorted? Listen in as Genya Coulter, named as one of the Top 25 Women in Election Security and Tech, as well as being the Polk County, Florida, Election Clerk who oversees all her precinct operations and manages her team during election season, answers these and many more questions, as well as describes the facts about voting and ballot security controls, and answers questions about voting fraud claims during the 2020 US election during this conversation with Rebecca. Follow Genya on Twitter: @ElectionBabe
57 minutes | a month ago
Fighting US Elections & Campaigns Interference with Cybersecurity
There continue to be more lessons to learn from the past 8+ years of election cycles in the US. Lessons that can be applied throughout the world, about the need to build in strong security and privacy protections to the associated processes, systems, and physical components of elections to strengthen democracy as well as to establish verifiable and validated election results. The FBI reports verified election interference attempts and goals of China, Russia, Iran & domestic groups; often through election candidates’ campaign organizations and associated groups. What kind of interference is targeting campaigns and candidates? How does strengthening security practices help to prevent these interference goals from being fulfilled? What is the goal and mission for CyberDome? Why is US CyberDome well-suited to help fight interference with election campaigns? Listen in as Matt Barrett, co-founder of US CyberDome, provides insights, research findings, advice to campaigns, and describes the goals of CyberDome to protect election campaigns during this conversation with Rebecca.
56 minutes | 2 months ago
Healthcare CISOs: Securing Patient Data & HIPAA Compliance
Health data is considered personal data gold to cybercrooks. Hospitals, clinics and telehealth situations involve a lot of complexity that brings many threats and vulnerabilities to patient data. • Is your healthcare and patient data safe? • Are hospitals and clinics doing all they can to protect your data? • What would you like to ask your hospital about this? • Would they know how to answer? • Are HIPAA requirements effective for protecting patient data? Listen in as Mitch Parker, a healthcare security expert and executive at multiple large hospital systems, provides answers to these questions and more. Mitch will cover longtime, current and emerging challenges for corporate information security officers (CISOs) at the largest hospitals as well as the smallest, rural clinics. Mitch also provides insights and his thoughts on HIPAA updates during this conversation with Rebecca.
57 minutes | 3 months ago
Holding Privacy Events in a Pandemic World
For Data Privacy Day month Rebecca is speaking with Kim Hakim, CEO & Founder of FutureCon Events, about how she handled needing to move...almost overnight!...all her 2020 conferences to being online events at the beginning of 2020 when COVID-19 started spreading through the USA. Kim also discusses some of the key privacy issues she had to address when doing so. Kim will also describe the most requested privacy topics for the FutureCon events. Some topics covered in this episode include: • What makes FutureCon events unique from all other cybersecurity and privacy events? • What were the most requested topics in 2020 & for the upcoming 2021 events? • What are the inventive ways that Kim arranged for online FutureCon event attendees to interact with speakers & sponsors? • What makes a great cybersecurity and privacy speaker? • What advice does Kim have for those who want to be speakers at cybersecurity and privacy conferences? Tune in to hear these topics covered, and much more!
58 minutes | 4 months ago
How A Trail-Blazing STEM Mentor Is Revolutionizing Cybersecurity
The numbers of women & people of color are still a woefully small percentage of the IT and cyber/data/network/applications security workforce. Such lack of diversity results in weak and flawed IT, security and privacy practices, applications, networks, and data protection. Rebecca discusses the related issues with cybersecurity expert, industry leader & long-time mentor, Dr. Cheryl Cooper: • What is Dr. Cooper working to change in society with her mentoring work? • Many displaced workers in their 40s, 50s and beyond, with no IT or cybersecurity background would like to start a cybersecurity career. What advice does Dr. Cooper have for them? • What are common challenges that all ages of women and people of color face in cybersecurity careers & what type of support do members of WINS provide to them? • What is Dr. Cooper’s greatest achievement in her career? • What advice does Dr. Cooper have for those who would like a career in cybersecurity but do not know where to start?
56 minutes | 5 months ago
How Cybercriminals Take Advantage of the COVID-19 Pandemic
With 2020 being the year of the global COVID-19 pandemic, it has also become the year of globally widespread working from home offices, and attending school online from home. Cybercrime is increasing dramatically in many ways never before seen as a result of these quickly established new working and learning environments. • How has cybercrime increased since the COVID-19 pandemic started becoming noticed? • Which new types of cybercrimes were created to take advantage of the many different COVID-19 circumstances? • What do Europol and Interpol research reports reveal about cybercrimes? • Are existing laws insufficient for new types of cybercrimes? Rebecca discusses these issues, and many more about cybercrime, with world renown cybercrime expert and member of United Nations Office on Drugs and Crime expert team, Pauline Reich. Contact Pauline at: email@example.com
57 minutes | 6 months ago
Data Proves Voting Fraud is Rare; Don’t Believe Conspiracy Theories Claiming Otherwise
Voter fraud conspiracy theories have reached a fever pitch. There are even claims that mail-in ballots are “a scam.” What’s the truth? Voting security experts & researchers Jennifer Kavanagh & Quentin Hodgson describe in-depth research revealing verifiable facts about security of all types of voting including absentee/mail-in, voting machines & paper at polling locations, & drop boxes. They provide research results for questions such as: • How are voter registration databases kept up-to-date & when do errors occur? • How is signature matching done? Can poll workers throw out ballots claiming signature mismatches then submit different ballots for the voter? • How can voters determine if their mailed-in ballots were rejected because of a signature mismatch prior to election day? • What controls do poll workers follow? Are “poll watchers” who interact with voters legal? • Is it possible for someone to send “unsolicited millions of ballots”? • Does “ballot harvesting” actually occur?
56 minutes | 7 months ago
Surveillance Pandemic: How Tech Giants Collect & Use Personal Data for Profiling & Huge Profits
Since 2018 Rebecca has invited many tech giants to explain if & how they are collecting & selling personal data to govt & other entities to profile & target subsets of populations while making huge profits. For example, one tech company reportedly made over $1.6 billion from the US federal government from 2017 – 2019. No tech company has accepted the invitations. However, Mijente, which has performed significant research into tech surveillance activities, agreed to answer questions such as: • How widespread is the collection of everyone’s personal data? • What companies are providing personal data to the tech organizations? • Why don’t the data sources notify the general population about all the entities to whom everyone’s data is being shared & used? • How is tech being used to surveil & monitor specific populations? • How have people been harmed by resulting actions from surveillance of personal data? Hear Rebecca discuss these questions and more with Jacinta González from Mijente.
57 minutes | 8 months ago
COVID-19 Contact Tracing: Privacy & Security Risks
Tech giants & startups are quickly releasing “cutting edge” COVID-19 tracing tools. Some states have built their own tracing tools. COVID-19 tracing is absolutely necessary to get the pandemic under control. But are those tools secure? Will the privacy of the individuals’ health data be protected? • What tracing tools are being used? Which best protect privacy? Which put privacy at risk? • How do certain phones and operating systems put patient data from tracing tools at risk? • What are the concerns for location tracking? Is location tracking even necessary for effective COVID tracing? • What are some COVID-19 tracing conspiracy theories? Hear uberveillance, privacy and security expert, Dr. Katina Michael, professor at Arizona State University and National Science Foundation funded researcher, answer these questions and more about COVID-19 tracing tools and the related privacy risks and considerations. Read some of her research about this topic at https://bit.ly/3hG1FHb
60 minutes | 9 months ago
Voting by Mail Security: Busting Myths and Explaining Facts
In the midst of a deadly pandemic mail-in voting would be the safest way to vote. However, many warn that voting by mail will lead to wide-spread fraud and lost votes. Is this true, or are they baseless claims? What is true, and what are pure conspiracy theories and lies? Amber McReynolds, one of the country’s leading experts on election administration, policy & security, discusses the risks of voting by mail along with the benefits, security, and myths. Some topics covered: • How are requests for mail-in ballots confirmed to be from the actual voter? • How much fraud has actually occurred in voting by mail? • How can voter suppression be mitigated when voting by mail? • What are the security controls for mail in ballots received at elections headquarters? • Is “ballot stuffing” and counting counterfeit ballots actually happening? • In what ways are mail-in voting more secure than in-person voting, and vice versa? Hear Amber's many years of experiences & research on this topic.
54 minutes | 10 months ago
Legislating Weak Encryption is Stupid and Dangerous
The value of strong encryption cannot be overstated, but yet the efforts from lawmakers to force tech companies to create weak encryption has been put into overdrive. Bruce Schneier has been a vocal proponent of strong encryption for many years, and eloquently explains why it is technically not possible to give the good guys the access they want to encrypted files and transmission without also giving the bad guys access. Listen in as Schneier explains his thoughts about the most recent efforts from the DOJ and lawmakers to require commercial products to use accessible encryption. Schneier also answers questions such as: What would he say to AG Barr about creating such accessible encryption? What does he think about Zoom encryption, and security in general? What are his thoughts about COVID-19 tracing apps; are they sufficiently protecting privacy, and are they effective? What concerns does he have with online voting security?
55 minutes | a year ago
Why Weakening Encryption for Law Enforcement Access is a Bad Idea
Efforts are increasing in the US & worldwide to force tech companies to build encryption that would “allow only law enforcement and government” groups to get into encrypted files & communications. The claims are that this is necessary to fight online crimes such as human trafficking and child sexual exploitation. We definitely need to address these horrible crimes. However, are these commands from governments & law enforcement groups technically feasible? Why aren’t these groups including technology experts in their forums discussing these needs? What other methods of catching such criminals are available? What would be the impact to everyone if they were forced to use such weakened encryption tools? Would the criminals even use such weakened encryption? Will 5G have any impacts on strong encryption? Listen in as Dr. Eugene Spafford discusses the issues that lawmakers, law enforcement, and the general public need to understand about how encryption works & important considerations.
54 minutes | a year ago
How Rob Sand Caught the Criminal Who Committed the Largest Lottery Fraud in History
Hear Rebecca speak with Rob Sand, the lawyer who used his tech savvy as the Asst Attorney General for Iowa to successfully prosecute Eddie Tipton, who committed the largest & longest occurring lottery fraud in US history while employed as an IT worker, and was promoted to Information Security Officer, at the Multi-State Lottery Association where he committed his crimes. Eddie exploited his positions of trust to rig the lottery winning drawings, totaling more than $24 million, at least five different times. A few topics and questions Rob covers include: 1. How was Eddie Tipton first identified as a suspect? How was he caught? 2. Exactly what did Tipton do to enable him to commit this fraud? 3. How did Tipton commit the fraud so long without anyone noticing? 4. What were the key pieces of evidence used for the case? 5. What changes did the Iowa Lottery make as a result of this incident? 6. What surprised Rob most about this crime? See more in the blog post at: https://bit.ly/2UDnDRg
59 minutes | a year ago
How Poor Tech Security & Misinformation Upend Elections
Listen in to hear Rebecca speak with elections security expert Theresa Payton about elections security, safeguarding voting machines, and the types of attempts to disrupt or even change the results of elections. Some of the topics covered include: • What are some key points to understand about the tech and other problems in the Iowa caucuses? • In what ways do nation states, and other malicious actors, try to manipulate elections results? • How can voters recognize manipulation campaigns? • What favorite online marketing tool is being widely used to spread misinformation during election seasons? • How are social media posts and hashtags used to damage elections? • How do social media influencers profit from meddling in elections? • And many more!
57 minutes | a year ago
How Biased and Malicious AI Can Do Harm
Listen in to my chat with artificial intelligence expert Davi Ottenheimer about not only the potential benefits of AI, but also the risks to information security, privacy and safety when flawed, biased and maliciously-engineered AI is used. Also hear the boundaries Davi recommends for preventing bad AI. Some of the questions covered include: • What are some examples of tragedies that possibly could have been prevented with AI? • In what ways are AI controlled robots shifting power in our society? • What kind of boundaries can be used with AI to support strengthening information security and protecting privacy? • Are AI regulations, laws, and other rules necessary? • And many more!
56 minutes | a year ago
Diving into the Dark Net
Many listeners have sent questions over the past two years about the dark web • What is the dark web? Is it the same as the dark net? How is it different from the deep web? • Is it legal to go into the dark web? • What is Tor? • What are some real-life crimes found on dark web? • What are some of the most disturbing activities in the dark web? • What do information security and privacy pros need to know about the dark web to help them with their job responsibilities? • What should the general public know about the dark net? Tune in to hear Rebecca discuss these topics and more with Andrew Lewman, co-founder of The Tor Project, Farsight Security & DarkOwl, and technology advisor to Interpol’s Crimes Against Children Initiative.
56 minutes | a year ago
The Criticality of Change Control Management in Cloud Services
Recently the CEO of a cloud services business for compliance & information security shrugged off the problems he has on an ongoing basis with his SaaS cloud site where he does not have change controls implemented, & doesn't use a separate test or development region or server. He shrugged & said, “That’s just the way it is with a cloud service, they all have these problems.” Wrong! In this episode I discuss the importance of change controls to supporting information security & privacy with an expert in this area. • What kind of change control processes need to be applied within SaaS environments? • What are some of the biggest vulnerabilities within cloud services & how they handle change controls with new and updated applications and systems development? • What types of change controls need to be followed when patching cloud systems? Tune in to hear Rebecca discuss these topics and more with Becky Swain, Founder of the Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM).
57 minutes | a year ago
Professional ethics and technology in the cyber age
Executives, tech, data & cyber security, and privacy professionals face situations testing their ethics every day. Just a few issues include: • Profit maximization at any cost, including privacy and data security • Creating and selling products and services that monetize personal data at the cost of privacy, security and safety of the associated individuals • Intentionally refusing to acknowledge known security and privacy problems to not damage sales and profits • Deliberately releasing technologies that executives know do not work as expected or as advertised Tune in to hear Rebecca discuss these topics and more with Dr. Katina Michael, who has done significant research in these, and related, areas.
56 minutes | 2 years ago
White hat hacking & security break-in testing & ethics
A recent incident occurred in central Iowa where security vendor, Coalfire, employees were arrested for breaking/entering and robbery of a county government building. After the arrest it was determined this was part of a contract the vendor had with a Federal agency in a neighboring county. This incident brought a wide range of online discussions about white hat hacking, facility break-in tests, and associated responsibilities and related ethical considerations. • What are some lessons from the Coalfire security vendor arrests? • What are some recommendations for contracting an outside entity to perform hacking and/or break-in activities? • What activities need to be confirmed for such activities? • What should related contracts contain for such activities? Tune in to hear Rebecca discuss these topics and more with Dr. Mich Kabay.
56 minutes | 2 years ago
Cybercrime Trends and Changes in Past 3 Decades
According to Cybersecurity Ventures research, sponsored by Herjavec Group, cybercrime damages will be Dollor 6 trillion By 2021, up from Dollor 3 trillion in 2015. What are the biggest cybercrime trends of 2019? What were the biggest cybercrime trends 1, 2 and 3 decades ago? Where is cybercrime increasing? What are the impacts of ransomware? How does cybercrime hit small businesses differently than large businesses? What concerns info security pros and executives most about cybercrime? Tune in to hear Rebecca discuss these topics and more with Kim Hakim, CEO/ Founder at FutureCon Events. CyberCrime Ransomware Phishing IOT CyberCriminals Conferences FutureCon Privacy
Terms of Service
Do Not Sell My Personal Information
© Stitcher 2021