Submit Search
Upload
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
•
Download as PPTX, PDF
•
0 likes
•
768 views
C
centralohioissa
Follow
Apple vs DOJ: Privacy in Today's Enterprise
Read less
Read more
Technology
Slideshow view
Report
Share
Slideshow view
Report
Share
1 of 11
Download now
Recommended
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
centralohioissa
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Shawn Tuma
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Shawn Tuma
Data Privacy Micc Presentation
Data Privacy Micc Presentation
ashishjoshi
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
Dan Michaluk
Security v. Privacy: the great debate
Security v. Privacy: the great debate
David Strom
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Gohsuke Takama
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
tomasztopa
Recommended
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
centralohioissa
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Shawn Tuma
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Shawn Tuma
Data Privacy Micc Presentation
Data Privacy Micc Presentation
ashishjoshi
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
Dan Michaluk
Security v. Privacy: the great debate
Security v. Privacy: the great debate
David Strom
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Gohsuke Takama
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
tomasztopa
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
Shawn Tuma
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
PECB
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016
Dan Michaluk
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
Shawn Tuma
Cas cyber prez
Cas cyber prez
Dan Michaluk
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys today
Dan Michaluk
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Nicholas Van Exan
Data Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
Privacy by design
Privacy by design
Michelangelo van Dam
Working with law enforcement
Working with law enforcement
Meg Weber
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Financial Poise
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
Amy Purcell
Privacy and Data Security
Privacy and Data Security
WilmerHale
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01
Donna Koger
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Shawn Tuma
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
PECB
Data privacy & social media
Data privacy & social media
Prof. Jacques Folon (Ph.D)
Duty of Care Online
Duty of Care Online
bwiredgroup
Privacy issues and internet privacy
Privacy issues and internet privacy
vinyas87
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
Wendy Knox Everette
AIIM 2015 - Data Privacy
AIIM 2015 - Data Privacy
Alan Pelz-Sharpe
More Related Content
What's hot
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
Shawn Tuma
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
PECB
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016
Dan Michaluk
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
Shawn Tuma
Cas cyber prez
Cas cyber prez
Dan Michaluk
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys today
Dan Michaluk
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Nicholas Van Exan
Data Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
Privacy by design
Privacy by design
Michelangelo van Dam
Working with law enforcement
Working with law enforcement
Meg Weber
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Financial Poise
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
Amy Purcell
Privacy and Data Security
Privacy and Data Security
WilmerHale
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01
Donna Koger
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Shawn Tuma
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
PECB
Data privacy & social media
Data privacy & social media
Prof. Jacques Folon (Ph.D)
Duty of Care Online
Duty of Care Online
bwiredgroup
Privacy issues and internet privacy
Privacy issues and internet privacy
vinyas87
What's hot
(20)
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
Cas cyber prez
Cas cyber prez
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys today
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Data Privacy and Protection Presentation
Data Privacy and Protection Presentation
Privacy by design
Privacy by design
Working with law enforcement
Working with law enforcement
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security
Privacy and Data Security
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
Data privacy & social media
Data privacy & social media
Duty of Care Online
Duty of Care Online
Privacy issues and internet privacy
Privacy issues and internet privacy
Similar to Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
Wendy Knox Everette
AIIM 2015 - Data Privacy
AIIM 2015 - Data Privacy
Alan Pelz-Sharpe
FBI–Apple encryption dispute
FBI–Apple encryption dispute
HaniAbdallah4
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
TechSoup Canada
Apple vs FBI on Data Privacy
Apple vs FBI on Data Privacy
Frances Coronel
What's Exciting in Privacy
What's Exciting in Privacy
Brian Focht
The Blockchain and Identity -- Grant Fondo, Goodwin Proctor
The Blockchain and Identity -- Grant Fondo, Goodwin Proctor
bernardgolden
Virtru: Trends in Federal Surveillance Law Q2 2014
Virtru: Trends in Federal Surveillance Law Q2 2014
virtruprivacy
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx
Edwardk3aWallacey
Privacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in Wisconsin
Boyle_Fredrickson
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
FourthAsAService
Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021
Nicole Fucile-Borsian
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
Michael Sexton
Apple vs. FBI
Apple vs. FBI
Andrew Birkeland
4-Privacy1.pptx
4-Privacy1.pptx
SherifElGohary7
Keynote - Cindy Cohn
Keynote - Cindy Cohn
Clio - Cloud-Based Legal Technology
Edited basic newsgathering and publication speech (00006477)[1]
Edited basic newsgathering and publication speech (00006477)[1]
internewsarmenia
piiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnier
pii2011
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Christina Gagnier
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
REVULN
Similar to Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
(20)
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
AIIM 2015 - Data Privacy
AIIM 2015 - Data Privacy
FBI–Apple encryption dispute
FBI–Apple encryption dispute
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
Apple vs FBI on Data Privacy
Apple vs FBI on Data Privacy
What's Exciting in Privacy
What's Exciting in Privacy
The Blockchain and Identity -- Grant Fondo, Goodwin Proctor
The Blockchain and Identity -- Grant Fondo, Goodwin Proctor
Virtru: Trends in Federal Surveillance Law Q2 2014
Virtru: Trends in Federal Surveillance Law Q2 2014
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx
Privacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in Wisconsin
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
Apple vs. FBI
Apple vs. FBI
4-Privacy1.pptx
4-Privacy1.pptx
Keynote - Cindy Cohn
Keynote - Cindy Cohn
Edited basic newsgathering and publication speech (00006477)[1]
Edited basic newsgathering and publication speech (00006477)[1]
piiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnier
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
More from centralohioissa
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
centralohioissa
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
centralohioissa
Bob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
centralohioissa
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
centralohioissa
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
centralohioissa
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
centralohioissa
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
centralohioissa
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
centralohioissa
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?
centralohioissa
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
centralohioissa
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospital
centralohioissa
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
centralohioissa
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
centralohioissa
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
centralohioissa
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
centralohioissa
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
centralohioissa
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
centralohioissa
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
centralohioissa
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
centralohioissa
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
centralohioissa
More from centralohioissa
(20)
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Bob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospital
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
Recently uploaded
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Fwdays
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions
costume and set research powerpoint presentation
costume and set research powerpoint presentation
phoebematthew05
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Safe Software
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
null - The Open Security Community
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
ngoud9212
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
BookNet Canada
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Deakin University
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Fwdays
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
LBM Solutions
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
jimielynbastida
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
Recently uploaded
(20)
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
costume and set research powerpoint presentation
costume and set research powerpoint presentation
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
1.
Apple v. DOJ: Privacy
in Today’s Enterprise April 12, 2016
2.
© Fidelis Cybersecurity Intro Justin
Harvey Chief Security Officer Fidelis Cybersecurity Twitter: @jbharvey Justin.Harvey@fidelissecurity.com 2
3.
© Fidelis Cybersecurity Ordering
of Events • Dec 2 2015: Syed Farook and wife murder 14 and wound 22 innocent people in San Bernadino, California. • January 2016: FBI requests iCloud password of phone changed, Apple complies. This action creates a conundrum. • Feb 9 2015: FBI Director Comey informs the Senate they are still trying to unlock the iPhone 5C. • Feb 2016: New York District Attorneys claim they have over 175 iPhones ready to be unlocked after San Bernadino case. • Feb 16 2016: US District Court rules that Apple must provide “Reasonable technical assistance” to the FBI. Specifically ordered to write a work around. Based upon All Writs Act of 1789. • March 21 2016: Hours before a scheduled court appearance, the FBI postpones their hearing before a judge to debate the case. 3
4.
© Fidelis Cybersecurity DOJ’s
Initial Request 4
5.
© Fidelis Cybersecurity Do
we have a right to privacy? Fourth Amendment to the Constitution of the United States: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” This is often broadly interpreted. 5
6.
© Fidelis Cybersecurity Two
Interpretations • Humans have a fundamental right to privately communicate without being forced to divulge communication or methods. • Spying is allowed when there is probable cause and judiciary oversight. • The check to this balance is through the legislative branch. 6
7.
© Fidelis Cybersecurity This
man changed everything…. 7
8.
© Fidelis Cybersecurity Corporate
Juxtaposition 8 Vs. Monitoring for threats Spying on employees
9.
© Fidelis Cybersecurity Employees’Rights It
is critical to: Be transparent and clearly communicate: • Right to Privacy • Surveillance • Acceptable Use Policies • Usage of Personal vs. Corporate assets • Clearly BYOD doesn’t make any of this easy for us. • Doing business in Europe? Good luck! – GDPR among other regulations make it difficult. • Romanian Case involving Yahoo! Messenger 9
10.
Open Discussion Justin Harvey Chief
Security Officer Fidelis Cybersecurity Twitter: @jbharvey Justin.Harvey@fidelissecurity.com
11.
Thank You!
Editor's Notes
Mention NSA’s approach to data collection, metadata and the secret courts in which the gov’t allowed mass surveillance.
Same as NSA
Download now