Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
The great debate:
Security vs. Privacy
David Strom
@dstrom
ISACA keynote
October, 2016
Here is the choice:
Agenda
• Notable privacy failures
• Suggested solutions
• Scary things from today’s current events
• Some key takeaways
Notable failures
This isn’t news
10
How to get arrested
for your tweets and
pay thousands in
fines
http://strominator.com
http://strominator.com 11
3/11, he Tweeted
10 jokes making
fun of the Japanese
after the tsunami –
AFLAC fired him as
thei...
Speaking of vans…
Suggested solutions
• Privacy by design
• Can you protect your most sensitive data?
• Anonymous vs. private information
• ...
PbyD: 7 point plan
• Be proactive
• Do it by default
• It is a win-win
• Include from the start
• End-to-end security very...
Privacy vs. anonymity
Just some of the conditions
We retain the personal information you provide while your account is
in existence or as needed...
Scary things about
security and
privacy from
the present day
Mother Horrified to Learn Hackers Put
Live Feed of Daughters' Bedroom Online
Progressive Insurance’s
Snapshot Device
What we use to calculate your Snapshot result:
• Hard braking
• Amount of time dri...
Vs.
http://strominator.com 71
Good luck and stay safe!
David Strom
(314) 277-7832
david@strom.com
Twiiter: @dstrom
http://stro...
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Upcoming SlideShare
Loading in …5
×

Security v. Privacy: the great debate

954 views

Published on

A presentation at @ISACASTL 10-16

Published in: Technology
  • Get the best essay, research papers or dissertations. from ⇒ www.HelpWriting.net ⇐ A team of professional authors with huge experience will give u a result that will overcome your expectations.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • If we are speaking about saving time and money this site ⇒ www.HelpWriting.net ⇐ is going to be the best option!! I personally used lots of times and remain highly satisfied.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • I like this service ⇒ www.WritePaper.info ⇐ from Academic Writers. I don't have enough time write it by myself.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Writing good research paper is quite easy and very difficult simultaneously. It depends on the individual skill set also. You can get help from research paper writing. Check out, please ⇒ www.HelpWriting.net ⇐
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • You have to choose carefully. ⇒ www.HelpWriting.net ⇐ offers a professional writing service. I highly recommend them. The papers are delivered on time and customers are their first priority. This is their website: ⇒ www.HelpWriting.net ⇐
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Security v. Privacy: the great debate

  1. 1. The great debate: Security vs. Privacy David Strom @dstrom ISACA keynote October, 2016
  2. 2. Here is the choice:
  3. 3. Agenda • Notable privacy failures • Suggested solutions • Scary things from today’s current events • Some key takeaways
  4. 4. Notable failures
  5. 5. This isn’t news
  6. 6. 10 How to get arrested for your tweets and pay thousands in fines http://strominator.com
  7. 7. http://strominator.com 11 3/11, he Tweeted 10 jokes making fun of the Japanese after the tsunami – AFLAC fired him as their rep
  8. 8. Speaking of vans…
  9. 9. Suggested solutions • Privacy by design • Can you protect your most sensitive data? • Anonymous vs. private information • Understanding privacy policies of Google et al.
  10. 10. PbyD: 7 point plan • Be proactive • Do it by default • It is a win-win • Include from the start • End-to-end security very important • Let the sun shine in • Keep it user-centric
  11. 11. Privacy vs. anonymity
  12. 12. Just some of the conditions We retain the personal information you provide while your account is in existence or as needed to provide you services. We may retain your personal information even after you have closed your account if retention is reasonably necessary to comply with our legal obligations, meet regulatory requirements, resolve disputes between Members, prevent fraud and abuse, or enforce this Privacy Policy and our User Agreement. We may retain personal information, for a limited period of time, if requested by law enforcement. We may also disclose your personal information to a third party as part of a sale of the assets of LinkedIn Corporation, a subsidiary, or division, or as the result of a change in control of the company or one of its affiliates, or in preparation for any of these events. Any third party to which we transfers or sells our assets will have the right to continue to use the personal and other information that you provide to us in the manner set out in this Privacy Policy.
  13. 13. Scary things about security and privacy from the present day
  14. 14. Mother Horrified to Learn Hackers Put Live Feed of Daughters' Bedroom Online
  15. 15. Progressive Insurance’s Snapshot Device What we use to calculate your Snapshot result: • Hard braking • Amount of time driven • Time and day • Fast or jackrabbit starts • Trip regularity
  16. 16. Vs.
  17. 17. http://strominator.com 71 Good luck and stay safe! David Strom (314) 277-7832 david@strom.com Twiiter: @dstrom http://strominator.com Slides available: http://slideshare.net/davidstrom

×