Privacy is a fundamental human right and this needs an understanding of data. Many companies fail to leverage industry-standard usability principles to make privacy regulations easy for their customers to understand and consume. Looking from both organization and consumer perspectives, this talk will showcase how UX can simplify the integration of privacy/security compliance and scale for future regulations.
Zensar's complete customer engagement solution is a big
data analytics solution that produces intelligence for
consumption by various business functions to take 'next
best action' at the point of decision.
Drawing from CrowdStrike's work, Cayce Beames will present evolving cybersecurity threats, discussed her thoughts on why traditional security is failing and shared a bit on what this "next generation endpoint protection" is about.
Cayce has been working in technology for over 25 years. From IT Systems Administration to Network Engineering and Internet Security, Risk Management and Compliance Auditing, Cayce has consulted with many Global corporations and traveled extensively. Cayce is currently a governance, risk and compliance analyst at CrowdStrike and founder of the not for profit, public benefit, education for kids organization called "The Computer Club" where she works to inspire kids and adults to address their fear of the unknown and make something awesome with technology.
Zensar's complete customer engagement solution is a big
data analytics solution that produces intelligence for
consumption by various business functions to take 'next
best action' at the point of decision.
Drawing from CrowdStrike's work, Cayce Beames will present evolving cybersecurity threats, discussed her thoughts on why traditional security is failing and shared a bit on what this "next generation endpoint protection" is about.
Cayce has been working in technology for over 25 years. From IT Systems Administration to Network Engineering and Internet Security, Risk Management and Compliance Auditing, Cayce has consulted with many Global corporations and traveled extensively. Cayce is currently a governance, risk and compliance analyst at CrowdStrike and founder of the not for profit, public benefit, education for kids organization called "The Computer Club" where she works to inspire kids and adults to address their fear of the unknown and make something awesome with technology.
Data, Strategy, and Authenticity: a love storyKendra Clarke
We all have data. We know that we need to use data. But how do we use data to make strategic decisions when strategy making is a primarily creative act?
State of Endpoint Security: The Buyers MindsetCrowdStrike
Where is endpoint security headed? How do your priorities and capabilities compare to those of your peers?
As the battle against breaches rages on, many enterprises are focused on revamping their endpoint security strategy – from enhancing efficacy to reducing complexity and agent bloat. A new webcast, “State of the Endpoint: The Buyer Mindset,” discusses the current state of endpoint security and offers insights from an all-star panel of thought leaders, including Internationally recognized cybersecurity leader and CrowdStrike Co-founder Dmitri Alperovitch, VP of Product Marketing Dan Larson, and other experts as they discuss today’s most important security issues. Join them as they explore the findings from a new research report, “Trends in Endpoint Security: A State of Constant Change,” a study conducted by ESG and commissioned by CrowdStrike and other technology vendors. The panel will provide their impressions of the data in the survey and how the viewpoints revealed mesh with current technology trends, offering insights that can help inform your security strategy going forward.
Join this webcast to learn:
-The current state of Antivirus (AV) including how many organizations are choosing to change vendors and why
-Best of breed vs. comprehensive suites – which approach do your peers prefer and what are the advantages and challenges of each?
-How solutions are affecting endpoints and your IT Security peers, including the increase in agents installed and the impact of increased complexity
Hacking the CEO: Ninja Mind Tricks and Other Ruses to get Security DollarsDenim Group
If you’ve ever had your security budget eviscerated, this is your session! CEOs have become more wary of scare tactics. What are the tricks to get more security dollars? Discover how to get inside the CEO’s head to get exec support and how to use pet projects to pry scarce resources from budgets. I will share common data points from interviews with over 40 CISOs that have been there and done that.
Organizational Privacy Score and Big Data Privacy Guidelies July 17 2014 - ...Rajesh Jayaprakash
Presentation to IPQC audience in Vegas. Overall objective is to better protect consumer privacy and to find innovative win - win solutions for consumers and organizations.
Two topics discussed,
1) Best Practices for perserving Privacy and Security for Big Data Platforms.
2)Explanation of Organizational Privacy Score (OPS) and how it can turn a good privacy policy into a competitive advantage for the organization.
Less tech more talk the future of the ciso rolePriyanka Aash
As technology’s role in business success increases, so does the importance of cybersecurity. This session will discuss how the role of the CISO is evolving from a technical position to a business-focused position, and the business and communication skills that will become critical.
(Source : RSA Conference USA 2017)
Data Science Transforming Security OperationsPriyanka Aash
Data science brings a huge promise to IT security and accordingly to the sprouting of DS teams across all enterprises, and numerous vendors. Indeed DS has the potential to transform the way security is done—yet, the secret sauce is how to do it in a way that actually provides clear value, embedded into the security workflow, and leverages the human knowledge in combined with the data.
(Source: RSA USA 2016-San Francisco)
No more security empires - The ciso as an individual contributorPriyanka Aash
The staffing model for many mid-sized security programs is typically based on a highly centralized security team. While that provides a high degree of control, it can create inefficiencies and a lack of ownership relative to implementation of the program. This session will share the presenter’s experience as a CISO with no direct reports, leveraging people and budgets across the entire company.
(Source : RSA Conference USA 2017)
Contrary to popular opinion, developers are actually easy to sell to. This presentation walks through the psychology of developers and an effective "sales" process for developer marketing and developer evangelism.
A data monetization framework from Accenture Interactive. Three questions your company should answer to start realizing revenue opportunities from your data.
You Know Me: Privacy in the Era of Customer Experience ManagementJahia Solutions Group
Traditionally, marketers make promises to customers and prospects, and the rest of the organization has to scramble to keep the promises. In today’s customer-centric era, that’s no longer tenable. Customers demand a seamless and cohesive experience. The entire organization must work as one, identity with the customer and ensure that expectations match reality.
The technical architecture that delivers customer experience must protect the customer relationship as well as flex to fulfill as-yet-unknown requirements even as it provides continuous value to each customer and internal user.
Together, empathy and agility form the crucial foundation for today’s competitive digital enterprise.
Join Tim Walters, co-founder and principal analyst at Digital Clarity Group, and Serge Huber, Chief Technology Officer at Jahia, for a lively discussion about the power of organizational empathy and agility in delivering quality customer experience.
Discover the following (and more!) in this dynamic one-hour webinar:
- How re-imagining customer relationships can drive enterprise-wide transformation.
- The power of Conway's Law
- The importance of your organization reflecting the experience you want to offer.
- What future-proofing your technology means in practical terms.
- The critical elements of agile architecture.
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezEC-Council
Bobby Dominguez is an accomplished Internet pioneer and an acknowledged security, risk, and privacy expert. Mr. Dominguez has successfully integrated information security into top-level business initiatives at Home Shopping Network, PSCU Financial Services, and PNC Bank, where he implemented a new technology risk management framework. Under his leadership, the Sykes Global Security and Risk Management team was nominated and selected as one of the 5 best by 2008 SC Magazine “Best Security Team in the US.” Mr. Dominguez was also selected as one of the top 5 Chief Security Officers for the 2009, 2010, and 2013 SC Magazine “CSO of Year.” In 2012 he was a finalist for (ISC)2 Americas Information Security Leadership Awards.
Inside This Issue:
1. Why Cyberthugs LOVE Your Business
2. Announcing...New Promotion Managed Security PLUS Network, Servers, Workstations & Much More.
3. Download: The Ultimate Small Business Guide To Setting Up A Work-From-Home System For Your Staff.
4. 4 Steps to Become A More Genuine Leader
5. Are you keeping up with the trends? The God Protocol Blockchain
6. Enjoy!
Data, Strategy, and Authenticity: a love storyKendra Clarke
We all have data. We know that we need to use data. But how do we use data to make strategic decisions when strategy making is a primarily creative act?
State of Endpoint Security: The Buyers MindsetCrowdStrike
Where is endpoint security headed? How do your priorities and capabilities compare to those of your peers?
As the battle against breaches rages on, many enterprises are focused on revamping their endpoint security strategy – from enhancing efficacy to reducing complexity and agent bloat. A new webcast, “State of the Endpoint: The Buyer Mindset,” discusses the current state of endpoint security and offers insights from an all-star panel of thought leaders, including Internationally recognized cybersecurity leader and CrowdStrike Co-founder Dmitri Alperovitch, VP of Product Marketing Dan Larson, and other experts as they discuss today’s most important security issues. Join them as they explore the findings from a new research report, “Trends in Endpoint Security: A State of Constant Change,” a study conducted by ESG and commissioned by CrowdStrike and other technology vendors. The panel will provide their impressions of the data in the survey and how the viewpoints revealed mesh with current technology trends, offering insights that can help inform your security strategy going forward.
Join this webcast to learn:
-The current state of Antivirus (AV) including how many organizations are choosing to change vendors and why
-Best of breed vs. comprehensive suites – which approach do your peers prefer and what are the advantages and challenges of each?
-How solutions are affecting endpoints and your IT Security peers, including the increase in agents installed and the impact of increased complexity
Hacking the CEO: Ninja Mind Tricks and Other Ruses to get Security DollarsDenim Group
If you’ve ever had your security budget eviscerated, this is your session! CEOs have become more wary of scare tactics. What are the tricks to get more security dollars? Discover how to get inside the CEO’s head to get exec support and how to use pet projects to pry scarce resources from budgets. I will share common data points from interviews with over 40 CISOs that have been there and done that.
Organizational Privacy Score and Big Data Privacy Guidelies July 17 2014 - ...Rajesh Jayaprakash
Presentation to IPQC audience in Vegas. Overall objective is to better protect consumer privacy and to find innovative win - win solutions for consumers and organizations.
Two topics discussed,
1) Best Practices for perserving Privacy and Security for Big Data Platforms.
2)Explanation of Organizational Privacy Score (OPS) and how it can turn a good privacy policy into a competitive advantage for the organization.
Less tech more talk the future of the ciso rolePriyanka Aash
As technology’s role in business success increases, so does the importance of cybersecurity. This session will discuss how the role of the CISO is evolving from a technical position to a business-focused position, and the business and communication skills that will become critical.
(Source : RSA Conference USA 2017)
Data Science Transforming Security OperationsPriyanka Aash
Data science brings a huge promise to IT security and accordingly to the sprouting of DS teams across all enterprises, and numerous vendors. Indeed DS has the potential to transform the way security is done—yet, the secret sauce is how to do it in a way that actually provides clear value, embedded into the security workflow, and leverages the human knowledge in combined with the data.
(Source: RSA USA 2016-San Francisco)
No more security empires - The ciso as an individual contributorPriyanka Aash
The staffing model for many mid-sized security programs is typically based on a highly centralized security team. While that provides a high degree of control, it can create inefficiencies and a lack of ownership relative to implementation of the program. This session will share the presenter’s experience as a CISO with no direct reports, leveraging people and budgets across the entire company.
(Source : RSA Conference USA 2017)
Contrary to popular opinion, developers are actually easy to sell to. This presentation walks through the psychology of developers and an effective "sales" process for developer marketing and developer evangelism.
A data monetization framework from Accenture Interactive. Three questions your company should answer to start realizing revenue opportunities from your data.
You Know Me: Privacy in the Era of Customer Experience ManagementJahia Solutions Group
Traditionally, marketers make promises to customers and prospects, and the rest of the organization has to scramble to keep the promises. In today’s customer-centric era, that’s no longer tenable. Customers demand a seamless and cohesive experience. The entire organization must work as one, identity with the customer and ensure that expectations match reality.
The technical architecture that delivers customer experience must protect the customer relationship as well as flex to fulfill as-yet-unknown requirements even as it provides continuous value to each customer and internal user.
Together, empathy and agility form the crucial foundation for today’s competitive digital enterprise.
Join Tim Walters, co-founder and principal analyst at Digital Clarity Group, and Serge Huber, Chief Technology Officer at Jahia, for a lively discussion about the power of organizational empathy and agility in delivering quality customer experience.
Discover the following (and more!) in this dynamic one-hour webinar:
- How re-imagining customer relationships can drive enterprise-wide transformation.
- The power of Conway's Law
- The importance of your organization reflecting the experience you want to offer.
- What future-proofing your technology means in practical terms.
- The critical elements of agile architecture.
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezEC-Council
Bobby Dominguez is an accomplished Internet pioneer and an acknowledged security, risk, and privacy expert. Mr. Dominguez has successfully integrated information security into top-level business initiatives at Home Shopping Network, PSCU Financial Services, and PNC Bank, where he implemented a new technology risk management framework. Under his leadership, the Sykes Global Security and Risk Management team was nominated and selected as one of the 5 best by 2008 SC Magazine “Best Security Team in the US.” Mr. Dominguez was also selected as one of the top 5 Chief Security Officers for the 2009, 2010, and 2013 SC Magazine “CSO of Year.” In 2012 he was a finalist for (ISC)2 Americas Information Security Leadership Awards.
Inside This Issue:
1. Why Cyberthugs LOVE Your Business
2. Announcing...New Promotion Managed Security PLUS Network, Servers, Workstations & Much More.
3. Download: The Ultimate Small Business Guide To Setting Up A Work-From-Home System For Your Staff.
4. 4 Steps to Become A More Genuine Leader
5. Are you keeping up with the trends? The God Protocol Blockchain
6. Enjoy!
Security in the App Economy: How to Ride the Wave Without Wiping Out!CA Technologies
The world of security has changed dramatically in the past year. Those whose strategy reflects the reality of last year are losing ground to industry leaders who really “get it.'
This presentation explores how security leaders can lead the pack in the new application economy. We explore the new security reality, and show how leading firms are successfully re-inventing their security model.
See more at:: http://cainc.to/9XcG5W
Giving Organisations new capabilities to ask the right business questions 1.7OReillyStrata
This presentation takes the seminal work structured analytic techniques work pioneered within US intelligence, and proposes adaptions and simplifications for use within commercial enterprises
Software Liability?: The Worst Possible Idea (Except for all Others)Sonatype
While many had hoped that market competition would influence security improvements, customers are forced to accept software as is with no alternatives. Software is responsible for our critical infrastructure, cars, medical devices and is a part of our daily lives including our well-being. Will we be able to achieve better software security without vendors facing financial consequences?
Here is the next edition of Red Door’s MindSHARE – Staying Secure Online. This information comes from the minds of security experts. It is the product of intense research, field experience and considerable expertise. We are happy to share this with you—Red Door MindSHARE is a resource through which you can leverage knowledge to learn about the latest trends for staying secure online.
Our MindSHAREs are easy to read and fun, and you’re guaranteed to find something you can really use.
By reading this, you will:
- Learn how to protect cloud infrastructure from data breaches
- Learn what brands must do to protect consumer data
- Find out the key things you need to know about data breaches from a legal perspective
- View a Cyber and Privacy Risk Infographic
Measuring security culture is different from counting employeesKai Roer
These are the slides from my RSA APJ (Singapore, 2017) talk, where I explain why measuring security culture is important, how to do it, and then goes on to explain the findings from the 2017 Security Culture Report: Indepth insights into the human factor, produced by my team at CLTRe.
Similar to Humanizing privacy with power of user experience (UX) (20)
Human With Machine: Harnessing the power of UX for Securing DataRanjeet Tayi
Data is the new currency and everyone wants to steal it. Next generation data security/privacy challenges require next-generation solutions with the great user experience. Seemingly every day, a new onslaught of fresh challenges to data security arise. This is, in part, because of the increasing proliferation of sensitive data in the cloud and mobile environments, data lakes and other big data repositories. Security breaches are still on the rise because most organizations are having issues with detecting and protecting their sensitive data. Uniquely unified, data-centric security that empowers organizations to quickly and accurately assess where they need to focus investments and resources to reduce the escalating risk of data breaches and misuse.
User experience (UX) design plays a critical role in empowering people to protect their privacy by controlling their data. This is all about the 4 powers of UX which helped security analysts to analyze, recommend, prioritize and protect data risks and viable in a business and regulatory context. A human-centered design approach to security can bring together what’s desirable to people, possible with technologies like Machine Learning / Artificial Intelligence.
UX is one of the rapidly developing fields and it is very competitive. These days good UX hiring success ratio is less than 2% which requires very good design artifacts. This presentation showcases best practices and tips on what hiring manager will be looking at and how to design your UX careers to win your dream job.
Data is the new currency and every one want to steal it. Next generation data security challenges require next generation solutions with great user experience. Seemingly every day, a new onslaught of fresh challenges to data security arise. “Despite all the time, effort and billions, maybe trillions, of dollars spent, security is not working. Learn more how good User experience (UX) & Human centered design plays a critical role in empowering people to protect their privacy by controlling their data and how we solved UX challenges of designing for data centric security.
#UX #DataSecurityIntelligence #Informatica #UXIndia
Language is a system of words or signs that people use to express thoughts and feelings to each other. Design is a communication medium and a design language essentially conveys the philosophy that you follow and defines what you give importance to. A design language is created to create a consistency of experience across multiple products for a particular domain, products or brand.
In today’s world of digital design, design language plays a huge role for building consistent great product experiences across industries. In this talk you will learn about design, systems, design language, design philosophy along with some good insightful examples. Informatica, a world leader in data management software is in the phase of huge industry + business transformation and recently designed a new design language called Archipelago and you will learn about how we are trying to create impact across organization, users, customers and overall business.
Responsive, Scalable and Liquid DesignRanjeet Tayi
Responsive, Scalable and Liquid Design. This presentation talks about the new way of web design standard / technique aimed at crafting sites to provide an optimal viewing experience - easy reading - easily accessible and navigation with a minimum of resizing, panning, and scrolling across a wide range of devices along with various examples.
Bit Coins are one most disruptive technologies in recent times with an impact that may ultimately be as big as the internet. Bitcoin uses peer-to-peer technology to operate with no central authority or banks. Managing transactions and the issuing of bitcoins is carried out collectively within a network. Bitcoin is open-source; its design is public, nobody owns or controls Bitcoin and anyone can take part. Through many of its unique properties, Bitcoin allows exciting uses that could not be covered by any previous payment system. Bitcoin is a virtual currency and the Bitcoin user experience will be very important for widespread adoption and use. In my talk I am going to talk about the evolution of currency, crypto currencies and Bit Coins. I will also discuss Bitcoin experiences and the Bitcoin platform eco-system, Bit Coin facts, and the possible future of Bit Coins.
"INTERNET OF THINGS" - The Changing Face of Digital Marketing.Ranjeet Tayi
Digital Marketing is all about reaching and communicating the message to the right targeted audience to influence them about a product or a service. With changing technologies and mediums "Internet of Things" (IOT) will change the face of Digital Marketing. IOT is all about things talking to humans and connected to the internet.
This presentation was presented by Ranjeet Kumar Tayi - Principal UX Designer - Informatica at DMIC - Digital Marketing India Conference held at International School of Telecom, Technology & Management (ISTTM).
FaceBook for OBAMA & FaceBook form ME. This is a presentation about what facebook ment for both OBAMA & RANJEET KUMAR TAYI (a Software Usability Engineer & Designer)
UPA 2010 Munich & UX Camp Europe - OverviewRanjeet Tayi
I have attended UPA 2010 Conference at Munich, Germany and UX Camp at Berlin. This presentation gives an overview of both the conferences topics, talks and i have illustrated all my learnings and takeaways!
~Ranjeet Kumar Tayi
Transforming Brand Perception and Boosting Profitabilityaaryangarg12
In today's digital era, the dynamics of brand perception, consumer behavior, and profitability have been profoundly reshaped by the synergy of branding, social media, and website design. This research paper investigates the transformative power of these elements in influencing how individuals perceive brands and products and how this transformation can be harnessed to drive sales and profitability for businesses.
Through an exploration of brand psychology and consumer behavior, this study sheds light on the intricate ways in which effective branding strategies, strategic social media engagement, and user-centric website design contribute to altering consumers' perceptions. We delve into the principles that underlie successful brand transformations, examining how visual identity, messaging, and storytelling can captivate and resonate with target audiences.
Methodologically, this research employs a comprehensive approach, combining qualitative and quantitative analyses. Real-world case studies illustrate the impact of branding, social media campaigns, and website redesigns on consumer perception, sales figures, and profitability. We assess the various metrics, including brand awareness, customer engagement, conversion rates, and revenue growth, to measure the effectiveness of these strategies.
The results underscore the pivotal role of cohesive branding, social media influence, and website usability in shaping positive brand perceptions, influencing consumer decisions, and ultimately bolstering sales and profitability. This paper provides actionable insights and strategic recommendations for businesses seeking to leverage branding, social media, and website design as potent tools to enhance their market position and financial success.
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...Mansi Shah
This study examines cattle rearing in urban and rural settings, focusing on milk production and consumption. By exploring a case in Ahmedabad, it highlights the challenges and processes in dairy farming across different environments, emphasising the need for sustainable practices and the essential role of milk in daily consumption.
Top 5 Indian Style Modular Kitchen DesignsFinzo Kitchens
Get the perfect modular kitchen in Gurgaon at Finzo! We offer high-quality, custom-designed kitchens at the best prices. Wardrobes and home & office furniture are also available. Free consultation! Best Quality Luxury Modular kitchen in Gurgaon available at best price. All types of Modular Kitchens are available U Shaped Modular kitchens, L Shaped Modular Kitchen, G Shaped Modular Kitchens, Inline Modular Kitchens and Italian Modular Kitchen.
Hello everyone! I am thrilled to present my latest portfolio on LinkedIn, marking the culmination of my architectural journey thus far. Over the span of five years, I've been fortunate to acquire a wealth of knowledge under the guidance of esteemed professors and industry mentors. From rigorous academic pursuits to practical engagements, each experience has contributed to my growth and refinement as an architecture student. This portfolio not only showcases my projects but also underscores my attention to detail and to innovative architecture as a profession.
Expert Accessory Dwelling Unit (ADU) Drafting ServicesResDraft
Whether you’re looking to create a guest house, a rental unit, or a private retreat, our experienced team will design a space that complements your existing home and maximizes your investment. We provide personalized, comprehensive expert accessory dwelling unit (ADU)drafting solutions tailored to your needs, ensuring a seamless process from concept to completion.
Book Formatting: Quality Control Checks for DesignersConfidence Ago
This presentation was made to help designers who work in publishing houses or format books for printing ensure quality.
Quality control is vital to every industry. This is why every department in a company need create a method they use in ensuring quality. This, perhaps, will not only improve the quality of products and bring errors to the barest minimum, but take it to a near perfect finish.
It is beyond a moot point that a good book will somewhat be judged by its cover, but the content of the book remains king. No matter how beautiful the cover, if the quality of writing or presentation is off, that will be a reason for readers not to come back to the book or recommend it.
So, this presentation points designers to some important things that may be missed by an editor that they could eventually discover and call the attention of the editor.
White wonder, Work developed by Eva TschoppMansi Shah
White Wonder by Eva Tschopp
A tale about our culture around the use of fertilizers and pesticides visiting small farms around Ahmedabad in Matar and Shilaj.
4. #RSAC
4
Alignment of Data Collection + Usage
Data Collection
Usefulness
Creepy and
unwanted data
Data which
benefits users /
customers
Unacceptable risk
5. #RSAC
increased access to data
from consumers, allowing
companies to use data
about them.*5x
Upside of Trust!
Downside…
Boycott any company
if data protection not
taken seriously
69%
Blame the company
instead of the hacker in a
data breach
62%
Never return to a brand
that has suffered a data
breach
21%
Evolving
Customer
Expectations
Stop spending
for several months after a breach
or incident
83%
13. #RSAC
1. Empathy
Putting yourself in their
shoes…
Connecting with people
Listening to stories
Observing behaviors and
habits
Understanding pains, needs
& goals
Engage & share the feelings
18. #RSAC
Ease
Make it easy to understand,
simple and user friendly
User in control
Easy to find and making
convenient
Optimizing for the user context
Educating the user
2. Ease
24. #RSAC
Transparency
What data is collected and
why?
How will data be used and
for what purpose?
What is the benefit?
How is data proliferating
and what are the associated
risks?
Proactive communication
3. Transparency
28. #RSAC
“The way in which
two or more
concepts, objects, or
people are
connected, or the
state of being
connected”
4.Relationship
29. #RSAC
Teaming to work together
Connecting people, process
and technology
Defining the boundaries
(balance)
Engaging with rich
conversations
Setting personalized
language and tone
4. Relationship
45. #RSAC
“Humans can more easily relate to a
product, a service, a system, or an
experience when they are able to
connect with it at a personal level.”
- Don Norman (Emotional Design)
46. #RSAC
The ROI of privacy
$1
of every privacy
investment, the average
company received
benefit of
$2.70
Cisco's 2020 data privacy benchmark study
47. #RSAC
Apply Slide
47
Next week you should:
- Start thinking about privacy and human emotions as a concept
- Understand, research and agree in your organization how “Humanizing” is defined
- Determine a single problem area in need where you can test your assumptions
In the first 3 months following this presentation you should:
- Better understand your users and their pain points related to privacy definition
- Refine your privacy policies and discuss with your business leaders on how humanizing privacy benefits
- Begin to implement your assumptions to a single practical use case and share results
Within 6 months you should:
- Partner with your design teams to plan a workshop with key stakeholders to explore new ideas
- Refine your privacy policies and select right privacy tools, vendors which are designed human centered
- Implement a global plan, validate and iterate as part of the ongoing journey for better solutions