

Keeping it Private for the Good of the Company
“The unseen enemy is always the most fearsome” -George R.R Martin, A Clash of Kings, ‘Game of Thrones’ Hold on a second. Maybe we have it all wrong. I am not big on picking off the corpses of broken reputations like a carrion bird, but I think we need to rethink privacy for a second. In […]


The Evolving Levels of Effort
Many years ago, in order to clean a used shirt, people would take a basket down to the river and let the flowing water soak through it. They would then hang it on a rock, and let the sun take care of the drying. At a later stage, when soap was invented, they would spread […]


It’s Your Right. Do it Right.
You know the feeling, the one that is a nagging doubt, that itch that won’t quieten down? You know, when you’ve just pulled an all nighter to finish the project by the deadline, but that itch is still there, because something is missing. I’ve experienced that way too much recently, and according to my therapist, […]


Dear CISO: Partial Inventory is No Inventory at All
GDPR started it and others followed. Unlike with other sensitive data assets that we as CISOs need to manage, it’s now quite clear what is expected of us regarding personal data. After analyzing all these expectations (more like requirements) and merging them into practical actions, the only practical solution is to create a central and […]


Dear CISO: Where to Look for Personal Data
For part 2 of the “Dear CISO” series, click here.Inventorize Your Personal DataDear CISO, It has come to my attention that recent regulations require us to manage personal data in a very specific way. I trust that the security teams that report to you are now managing sensitive data such as our customer info in a […]


C is For Cookie and Compliance
I was checking out a certain website the other night (which I won’t call out here) when a peculiar message popped up. I’ve noticed many different layouts and versions of “Our website uses third-party tracking and cookies, to learn about it click here”, but this one was in its own category. The main message of […]
All Posts
- On the Convergence of Data Privacy and Data Security: Part 1 November 27, 2019 David Froud
- Safety Detective Interview- CCO Mark Wellins August 7, 2019 Tom Bonaventura
- Part 5: Machine Learning Methods to Process Datasets With QI Values July 31, 2019 Halyna Oliinyk
- Part 4: Standard Ways to Process Datasets with QI Values July 31, 2019 Halyna Oliinyk
- Part 3: Machine Learning Ways to De-Identify Personal Data (Homomorphic Encryption) July 31, 2019 Halyna Oliinyk
- Part 2: Standard Ways to De-Identify Personal Data July 31, 2019 Halyna Oliinyk
- Part 1: Introduction and Resources of the Data Breach July 31, 2019 Halyna Oliinyk
- GDPR Weekly Podcast – 1touch.io July 10, 2019 Mark Wellins
- Dear CISO: Who is Responsible for the Privacy of Data Subjects? June 24, 2019 Itzhak Assaraf
- A Controlled and Happy Family June 22, 2019 Daniel Zacks