Protect Your Privacy in the Information Age
Now on every MONDAY morning from 8:00 AM - 8:30 AM, Pacific Time
on 88.9 FM in Irvine
and WORLDWIDE live audio streaming at www.kuci.org
KUCI/Privacy Piracy Fund Drive Donors
We want to give a special thank you to those who donated to the KUCI Fund Drive
in special support of Privacy Piracy
Meet your hosts
Mari Frank, attorney and privacy consultant, is the creator of The Identity Theft Survival
Kit, the audiocassette series Identity Theft Prevention and Survival, co-author of Privacy
Piracy (with Beth Givens), and the author of two new books published by Porpoise Press
(January 2005): From Victim to Victor: A Step by Step Guide for Ending the Nightmare of
Identity Theft (2nd Edition, with CD) and Safeguard Your Identity: Protect Yourself With
a Personal Privacy Audit. Mari is also the co-host with Lloyd Boshaw of Privacy Piracy
a one hour public affairs radio show at KUCI 88.9 FM and www.kuci.org (U. of Ca., Irvine)
dealing with all issues of privacy in the information age.
Ms. Frank has testified many times on privacy and identity theft issues in the California
legislature and in the US Congress. In May 1999, she was summoned to the White House to a
press conference to speak on Consumer Privacy, and the speech was broadcast on C-SPAN. In
December 2004, and March 2005, Mari's ninety-minute PBS Television special, "Identity Theft:
Protecting Yourself in the Information Age," aired nationwide and aired again in June 2005.
Both of her new books were featured as gifts for viewers who pledged support for local PBS
Mari consults with corporations and government agencies and provides professional speaking
programs. She serves on the identity theft task force of the LA County District Attorney,
and California's DMV Task Force on privacy. She's an Orange County Sheriff Reserve on the
High Tech Crime Unit, an Advisory Board Member of the Identity Theft Resource Center, the
Privacy Rights Clearinghouse, and she's a member of the Advisory Board of the State of
California's Office of Privacy Protection. Mari is a certified trainer for the State Bar of
California, a law professor, and currently teaches Conflict Management at the University of
Mari has appeared on dozens of national TV programs including Dateline, 48 Hours, the
O'Reilly Factor, Investigative Reports, NBC and ABC Nightly News, CNN and has been
interviewed on more than 250 radio shows. She has been featured in major newspapers
and magazines, and her articles have been published in legal journals and magazines.
Please find out more at www.identitytheft.org.
Lloyd D. Boshaw, Jr. is our radio engineer and sometimes co-host (when he isn't too busy
running the board, he asks questions too!) Lloyd has been a General Contractor and Builder
for almost 30 years. He also is very adept at fixing almost anything and quick to learn
the radio engineering skills. Lloyd is also a qualified and experienced mediator and arbitrator
of construction disputes, and he has helped resolved many complex cases to the parties'
satisfaction. Lloyd and Mari have been friends since they met in Hawaii in1989 and after
many years married in 2001. As a favor to Mari, and as a result of his strong belief that
privacy is diminishing in our society, Lloyd agreed to learn the radio skills necessary to
team with Mari for this show.
GO TO TOP
Apr 14, IAPP Exhibitors from IAPP's 2014 Global Privacy Summit.
The International Association of Privacy Professionals Annual Summit in Washington D.C. had incredibly brilliant and exciting exhibitors. The
following people displayed their products and services in the exhibit during the Global Privacy Summit, March 5-7, 2014. Listen in to hear about
these incredibly privacy protective new products and services. The following people were kind enough to speak with us:
- David Cohen, CIPP/US of IAPP
- Linda Park, Senior Product Marketing Manager of Symantec
- Todd Ruback, Chief Privacy Officer of Evidon
- Theodore F. Claypoole, Esq., Attorney at Law with Womble, Carlyle, Sandridge & Rice
- Rebecca Perry, CIPP/US/G, Director of Professional Services of Jordan Lawrence
- Mark P. Diamond, President & CEO of Contural, Inc.
- Paul Albano, Senior Manager, Marketing & CI of Canon USA
- Dan Revellese, Vice President, Corporate & Canada Solutions of Hi Software
- Ed Hallock, Director of Product Marketing of RSD America, Inc.
- Alexander C. Gross, Esq., Director of Kroll Advisory Solutions
- Cody Cornell of Phoenix Data Security, Inc.
- Rick Kam, CIPP, President & Co-Founder of ID Experts
- Michael Bruemmer, VP Data Breach of Experian
- Lindsey Grieg, CEO of Data Guidance
GO TO TOP
Apr 21, Rebecca Tushnet, professor at the Georgetown University Law Center.
Rebecca Tushnet is a professor at the Georgetown University Law Center. After clerking for Chief Judge Edward R. Becker of the
Third Circuit and Associate Justice David H. Souter on the Supreme Court, she practiced intellectual property law at
Debevoise & Plimpton before beginning teaching. Her blog, 43(b)log, covers copyright, trademark, and false advertising law. Her
publications include "Worth a Thousand Words: The Images of Copyright Law" (Harvard L. Rev. 2012); "Gone in 60 Milliseconds: Trademark
Law and Cognitive Science" (Texas L. Rev. 2008); and "Copy This Essay: How Fair Use Doctrine Harms Free Speech and How Copying Serves
It" (Yale L.J. 2004). She helped found the Organization for Transformative Works, a nonprofit dedicated to supporting and promoting
fanworks, and currently volunteers on its legal committee. She is also an expert on the law of engagement rings.
GO TO TOP
Apr 28, Michael Kaiser, Executive Director of National Cyber Security Alliance.
Michael Kaiser joined the National Cyber Security Alliance in 2008. As NCSA's chief executive, Mr. Kaiser engages diverse constituencies-business,
government, other non-profit organizations-in NCSA's broad public education and outreach efforts to strengthen the nation's cyber infrastructure, including
leadership of NCSA's premier outreach and awareness campaign, National Cyber Security Awareness Month. NCSA builds efforts through public private
partnerships that address cyber security issues for home users (parents and children), K-12 and higher education, and small business. Mr. Kaiser
serves on the Department of Commerce, NTIA Online Safety Technology Working Group and was named one of SC Magazine's information security luminaries of 2009.
Prior to joining NCSA, Mr. Kaiser spent 25 years in the field of victim's services and rights at holding senior staff positions at the National Center
for Victims of Crime in Washington, D.C. and Safe Horizon in New York City.
Mr. Kaiser has developed training and other programs on the use of technology in crimes such as stalking and identity theft, and worked on programs exploring
the use of technology to improve community policing. Along with his wife Laura Fisher Kaiser, he co-authored The Official eBay Guide to Buying, Selling, and
Collecting Just About Anything (Simon and Shuster, 1999). He was one of a small group of eBay University instructors and has personally trained more than 8,000
eBay users on expanding their eBay businesses.
Mr. Kaiser has served on several non-profit Boards. He is currently the Chair and a founding Board Member of SPINUSA a national non-profit based in
Massachusetts, and has served on the Board of Trustees of the College of the Atlantic in Bar Harbor, Maine, and New Destiny Housing Corporation in New York City.
GO TO TOP
May 5, W. Barry Nixon, SPHR, COO, of PreEmploymentDirectory.com.
W. Barry Nixon, SPHR, COO, PreemploymentDirectory.com is recognized as one of the leading experts on background screening worldwide. PreemploymentDirectory.com is
the leading web site on the internet for comprehensive information on the background screening. It is used by companies worldwide to find resources and information on background screening.
Prior to founding the PreemploymentDirectory.com, Mr. Nixon studied 'General Management' in the Executive Management Program, University of Hawaii. He earned a masters
degree in Human Resource Development from the New School University, and a Bachelor of Science degree in Business Administration from Northeastern University. Mr. Nixon
has also completed the Advanced Human Resource Management program of Babson College, as well as the certification programs in Organization Development from National
Training Laboratories, Systems Thinking from MIT, the highly acclaimed "Creating Competitive Advantage through Human Resources," program from the University of
Michigan's School of Industrial Relations and is a Senior Professional in Human Resources (SPHR). He has earned certifications in Workplace Security, P.O.S.T. Background
Screening and Safe Hiring. In addition, he serves as Co-Chair of the International Committee for the National Association of Professional Background Screeners (NAPBS).
His clients include many of the top background screening firms in the world. He also teaches human resource management and recruiting & selection courses at several universities.
In addition, Mr. Nixon is a frequently requested speaker on Background Screening. His presentations include 'The Future of Background Screening in India,' Background
Investigators Annual India Screening Conference, 'Emerging Practice of Background Screening in Asia Pacific,' Singapore World HR Congress, 'Emerging Issue of International
Background Screening' at ASIS International European Security Conference, Copenhagen as well as numerous presentations in the U.S. He is co-author of 'Background
Screening & Investigations: Managing Hiring Risk from a HR and Security Perspectives, authors The Background Screening Column in PI Magazine, publishes the leading
newsletter for the background screening industry - The Background Buzz - and also publishes the Annual Background Screening Industry Buyers Guide. In addition, to
writing numerous articles he has appeared on ABC, MSNBC, Wall Street Journal Radio, United Kingdom - National Talk Radio, WGST News Radio's Job Talk. He is also a
past recipient of the prestigious Top 25 Most Influential People in Security award by Security magazine. He has also served on the Special Expertise Panel for SHRM
for Security, Safety and Occupational Health.
Visit our Archives for previous guest interviews
GO TO TOP
Apr 7, James Ransome, Senior Director of Product Security and responsible for all aspects of McAfee's Product Security Program.
Dr. James Ransome, CISSP, CISM, is the Senior Director of Product Security and responsible for all aspects of McAfee's Product Security Program to
include the Product Security Incident Response Team (PSIRT), a corporate-wide initiative that supports the delivery of secure software products to
customers. He is a recognized security practitioner, author, and speaker with a current focus software security. His career is marked by leadership
positions in the private and public industries, having served in three chief information security officer (CISO) and four chief security officer
(CSO) roles at Applied Materials, Autodesk, Qwest Communications, Pilot Network Services, Exodus Communications, Exodus Communications -Cable and
Wireless Company, and Cisco. Ransome was also the vice president of Integrated Security at CH2M HILL and senior vice president of Commercial Managed
and Professional Security Services at SecureInfo Inc. While at Exodus Communications and Cable and Wireless, he managed Internet and physical security
for hundreds of thousands of users within the world's largest commercial hosting environment, serving more than 4,500 customers from 42 data centers.
Ransome has 23 years of government service, which includes ten years as a computer scientist and geospatial imagery intelligence analyst, weapons of
mass destruction threat credibility assessment analyst and senior NEST key leader for DOE/Lawrence Livermore National Laboratory, three years as US
Special Agent for the Naval Criminal Investigative Service (NCIS), and a retired Naval Intelligence Officer (Commander) with twenty-three years combined
active and reserve service for the U.S. Navy and the U.S. Marine Corps as a Weapons Platoon Sergeant and Intelligence Specialist.
He holds a Ph.D. in Information Systems and developed/tested a security model, architecture, and provided leading practices for converged wired-wireless
network security for his doctoral dissertation as part of a NSA/DHS Center of Academic Excellence in Information Assurance Education program. He is a member
of Upsilon Pi Epsilon, the International Honor Society for the Computing and Information Disciplines, a Certified Information Security Manager (CISM), a
Certified Information Systems Security Professional (CISSP), and a Ponemon Institute Distinguished Fellow.
Ransome recently authored his 10th information security book "Core Software Security: Security at the Source." He also developed the initial wireless,
network architecture, SCADA, Cryptography, and VoIP security leading practices for the Federal Communications Commission Network Reliability and
Interoperability Council Focus Group on Cybersecurity - Homeland Defense.
GO TO TOP
Mar 24, Tom Cross, Director of Security Research at Lancope.
Tom Cross is Director of Security Research at Lancope, where he works on advancing the state of the art in network behavioral anomaly detection. He
has over a decade of experience as a computer security researcher and thought leader. He is credited with discovering a number of critical security
vulnerabilities in enterprise-class software and has published papers on collateral damage in cyber conflict, vulnerability disclosure ethics, security
issues in internet routers, encrypting open wireless networks, and protecting Wikipedia from vandalism.
Prior to Lancope, Tom served as Manager of Threat Intelligence and Strategy in IBM's X-Force Research organization. One of Tom's contributions at
IBM was serving as the technical editor of the X-Force Trend Report, a biannual report that analyzes data about computer security vulnerability
disclosures, trends in Internet attack activity, and other data sources that shed light on the state of the Internet threat landscape.
Tom has operated online social communities almost continuously since 1991. In 1996, Tom cofounded Electronic Frontiers Georgia, where he worked to protect
the Constitutional rights of Internet users in the US State of Georgia. In 2001, Tom cofounded MemeStreams, an innovative collaborative blogging system
that combined online social networking with reputation systems technology.
Tom frequently speaks on information security and technology policy issues at conferences around the world. He holds a Bachelor of Science in Computer
Engineering from the Georgia Institute of Technology. He is a Distinguished Fellow at the Ponemon Institute
GO TO TOP
Mar 17, Jody Westby, CEO of Global Cyber Risk LLC.
Drawing upon a unique combination of more than twenty years of technical, legal, policy, and business experience, Ms. Westby provides consulting
and legal services to public and private sector clients around the world in the areas of privacy, security, cybercrime, breach management, and IT
governance. She also serves as Adjunct Professor to the Georgia Institute of Technology's School of Computer Science and is Adjunct Distinguished
Fellow to Carnegie Mellon CyLab. She is a professional blogger for Forbes.
Ms. Westby is a member of the bars of the District of Columbia, Pennsylvania, and Colorado and serves as chair of the American Bar Association's
Privacy and Computer Crime Committee (Section of Science & Technology Law). She co-chaired the World Federation of Scientists' (WFS) Permanent
Monitoring Panel on Information Security and served on the ITU Secretary-General's High Level Experts Group on Cybersecurity.
Ms. Westby led the development of the International Toolkit on Cybercrime Legislation and is an editor and co-author of the 2010 WFS-ITU
publication, The Quest for Cyber Peace. Ms. Westby is co-author and editor of four books on privacy, security, cybercrime, and enterprise
security programs and author of two books on legal issues associated with cybersecurity research. She speaks globally on these issues.
Previously, she launched In-Q-Tel, was senior managing director at PricewaterhouseCoopers, was senior fellow and director of IT Studies for the
Progress and Freedom Foundation, and was director of domestic policy for the U.S. Chamber of Commerce. Ms. Westby practiced law at Shearman & Sterling
and Paul, Weiss, Rifkind, Wharton & Garrison. B.A., summa cum laude, University of Tulsa; J.D., magna cum laude, Georgetown University Law Center; Order
of the Coif. Ms. Westby is a member of the American Bar Foundation and the Cosmos Club.
Please visit www.globalcyberrisk.com
GO TO TOP
Mar 10, Domingo Guerra, President and Co-founder of Appthority.
Domingo was born and raised in Monterrey, Mexico, Domingo moved to the United States at age 18 to pursue his passion for technology. Domingo
brings years of Lean Manufacturing and Stanford's "Design Thinking" experience to Appthority. These principles translate well into the Lean Startup
mantra we embrace at the company.
Domingo has Product Design & Development experience as well as New Product Introduction & Operations experience across multiple industries. As
a Mechanical Engineer for Applied Materials (Semiconductor Manufacturing Industry), he led design and development projects in the Robotics
space, securing two patents and winning multiple design awards. With Program & Project Management roles at Brocade Communications (Datacenter
Networking Industry), Domingo led large cross-functional matrix teams in the introduction of both hardware and software enterprise products.
Domingo holds a BS from The University of Texas at Austin, an MS from Stanford University, and an MBA from Santa Clara University.
160 Spear Street
San Francisco, CA 94105
GO TO TOP
Mar 3, Julia Angwin, author of Stealing MySpace and an award-winning investigative journalist for the independent news organization ProPublica.
Julia Angwin is the author of Stealing MySpace and an award-winning investigative journalist for the independent news organization
ProPublica. From 2000 to 2013 she was a staff reporter for The Wall Street Journal, where she was on the team of reporters awarded
the 2003 Pulitzer Prize for coverage of corporate corruption and led a team covering online privacy that was a finalist for a 2012
Pulitzer Prize. She lives in New York City with her husband and two children.
GO TO TOP
Feb 24, Justin Baxter, Consumer Litigation Attorney with the Pacific Northwest law firm of Baxter Baxter.
Justin Baxter's practice focuses on consumer litigation with an emphasis on credit reporting and unlawful debt collection cases. He is the
past chair of the Oregon State Bar Consumer Law Section, and currently the co-chair of the Oregon Trial Lawyers Association's Consumer Protection Section.
Justin has been a member of the Oregon State Bar since 1999, and a member of the Washington State Bar Association since 2007. He received his J.D.
from the Northwestern School of Law of Lewis & Clark College, where he was an associate editor on the Journal of Small and Emerging Business Law. In 2009, he
received the prestigious Martindale-Hubbell AV Peer Review Rating ® for legal skill and ethics.
*Verdicts not intended to be representative.
- In 2007, he obtained a $200,000 verdict against Equifax for violations of the Fair Credit Reporting Act.*
- In 2010, he obtained a $95,000 verdict against TRS Home Furnishings for violations of the Oregon Unlawful Debt Collection Practices Act and related claims.
- In 2010, he obtained a $100,000 verdict in a Fair Debt Collection Practices Act case.
- In 2013, he obtained a verdict against Equifax for $18.5 million for violations of the Fair Credit Reporting Act.
Outside of his law practice, Justin enjoys spending time outdoors with his family. He enjoys climbing and mountaineering, and includes Mt.
Rainier, Mt. Hood and Mt. Adams on his climb resume. He is an avid cyclist and triathlete having participated in the Pacific Crest Half Ironman
and Seattle to Portland Bicycle Classic.
GO TO TOP
Feb 17, Omer Tene, Vice President of Research and Education at the International Association of Privacy Professionals.
Omer Tene is Vice President of Research and Education at the International Association of Privacy Professionals. He is Managing Director of
Tene & Associates and Deputy Dean of the College of Management School of Law, Rishon Le Zion, Israel (on a leave of absence). He is an
Affiliate Scholar at the Stanford Center for Internet and Society; and a Senior Fellow at the Future of Privacy Forum.
GO TO TOP
Feb 10, Debra N. Diener, J.D., CIPP/G, Privacy and Identity Management Consultant.
Debra N. Diener's career has spanned over 30 years including senior managerial (including Senior Executive Service), legal, policy and legislative positions in all
Debra is proud to have been selected to serve as one of the first co-chairs of the Identity Management Subcommittee of the Federal CIO Council's Privacy Committee. In
that role, she helped to spearhead collaborations with private sector groups and individuals on several of the federal government's identity management priority initiatives.
She is now an independent consultant providing strategic guidance to corporate and non-profit organizations for whom she helps craft and implement privacy enhancing
business solutions. Her current clients include the American Psychological Association (APA) and Resilient Network Systems; prior clients include Booz Allen Hamilton and Criterion Systems, Inc.
Debra writes a consumer-oriented privacy blog (www.PrivacyMadeSimple.net). Her blogs have been reposted by the American Library Association, the Consumer Federation
of America and FraudAvengers; her blog site is a link on the home page of Copytalk.com. In addition to her consulting and blogging, Debra also contributes her time
as a member of the Open Identity (OIX) Advisory Board, the Shared Assessments Advisory Board and the Patient Privacy Rights Board.
She is a frequently requested speaker before a wide range of audiences. During 2013, she spoke about emerging privacy issues at meetings of university
professors, technology and security researchers; health care practitioners and industry members; financial and health industry business and operational
staff; and senior governmental officials.
General Counsel (Enforcement)(Main Treasury); Chief Counsel, Financial Management Service (Treasury); as an Assistant United States Attorney for the District
of Columbia; as a counsel to the Crime and Criminal Justice Subcommittee, Judiciary Committee, U.S. House of Representatives; and as a Judicial Law Clerk to
the (now retired) Honorable Stanley S. Harris, U.S. District Court for the District of Columbia.
Debra received her B.A. cum laude from Syracuse University, her M.A. from the University of Pennsylvania ,and her J.D. with honors from the George Washington
University. She is also a Certified Information Privacy Professional with a Government specialization.
GO TO TOP
Feb 3, Todd Toral, partner with DLA Piper LLP.
Todd C. Toral is a partner in DLA Piper's Litigation practice and serves as the
Office/Regional Practice Group Leader for Litigation. He is based in the San
Francisco office. His practice focuses on complex financial disputes, corporate
governance, including corporate compliance, alternative investments arising out
of private equity transactions, and multifaceted real estate, tax-preferred and
special asset matters.
Mr. Toral's experience includes:
- General counsel to an international insurance holding company and its affiliates
regarding all aspects of corporate governance, business transactions, and
- Outside counsel to international banks, private equity firms, syndicators, and
hedge funds concerning alternative investment transactions
- Lead trial counsel on several high-profile tax shelter disputes with the
California Franchise Tax Board, the IRS, and promoters of tax advantaged
products involving complex financial derivatives and hedge transactions
- Special tax litigation counsel to a developer of international hydroelectric
power plants concerning the national and international tax consequences of
transactions undertaken between multiple affiliated entities located in the
United States, Canada, Barbados, Bermuda, and the Philippines
- Litigation counsel for the global workout and restructuring of a division of a
Fortune 10 company, including managing all aspects of debt and equity
restructuring transactions and creditors' rights litigation throughout the US,
Mexico, and Central America
- Litigation counsel to Federal Deposit Insurance Corporation in its receivership
capacity in disputes arising out of failed banking institutions
- Lead trial counsel to 'net winner' foreign investors involved in the fraudulent
investment operation originated by Stanford International Bank, Ltd.
For additional information about Mr. Toral, please visit www.dlapiper.com
- "Unsettled Cybersecurity Laws Puzzle Companies," Daily Journal, December 20, 2013
- "'Scheme Liability' involving third-party defendants in securities litigation," January 2008
- "Multi-jurisdictional Practice of Law for In-House Counsel," American
Association of Corporate Counsel, September 2007
- "California Court Rules 'If Any' Wording Sinks Notice of Default," June 2005
- "Ninth Circuit Allows Retroactive Lease Rejection," February 2005
GO TO TOP
Jan 27, Nathan Lowenstein, founding partner of Goldberg, Lowenstein & Weatherwax LLP & Kathryn Russo, Deputy General Counsel and an Associate in the Los Angeles
office of Goldberg, Lowenstein & Weatherwax LLP.
Nathan Lowenstein is a founding partner of Goldberg, Lowenstein & Weatherwax LLP. He has extensive experience in complex litigation in federal and
state courts and in international arbitrations. A veteran of multiple trials, he focuses his practice on intellectual property litigation, pre-litigation
counseling, commercial disputes, and election law. He has represented clients in numerous industries, including the semiconductor, medical device, TV
broadcasting, video game, telephone headset, and bio-pharmaceutical industries. He has an extensive background in redistricting and campaign finance
law and has advised various clients and campaigns in such areas. He is also the founder of GLW's Video Game practice group. Mr. Lowenstein has been
selected as a "Rising Star" lawyer and a 2014 "Super Lawyer" in Southern California by Los Angeles Magazine, one of the youngest attorneys to be selected for this honor.
Mr. Lowenstein previously practiced for many years at Irell & Manella LLP in Los Angeles. He was a redistricting consultant to the California State
Senate and the California Democratic Congressional delegation. He was the Executive Director of the successful No on Proposition 77 campaign, and
has appeared on many television and radio programs involving election issues. During law school, Mr. Lowenstein was a legal intern to the Vice Chairman
of the Federal Election Commission. Mr. Lowenstein has a J.D. from UCLA Law School and a Bachelors degree, with honors, from UCSC.
Practice Areas: Patent; Copyright and Trademark; Appellate; Business Litigation; and Election Law
Kathryn F. Russo is Deputy General Counsel and an Associate in the Los Angeles office of Goldberg, Lowenstein & Weatherwax LLP. Ms. Russo is a
Certified Information Privacy Professional in U.S. private-sector privacy laws and regulations (CIPP/US). She focuses her practice on compliance, governance,
and litigation, with particular attention to cutting-edge data privacy issues. Ms. Russo advises emerging companies on privacy and data security compliance, policies, and procedures.
Ms. Russo began her career as a finance associate in the New York office of Pillsbury Winthrop Shaw Pittman LLP, where she gained experience in transactional
issues, including structured finance and securitizations. Ms. Russo also has extensive experience as debtor's counsel in complex bankruptcy cases. In
2007, Ms. Russo was the recipient of the Pillsbury Stimson Pro Bono Fellowship and spent her fellowship year working for Human Rights Watch, one of the
world's leading independent organizations dedicated to defending and protecting human rights.
Ms. Russo received her J.D. from Cornell Law School in 2007, where she was an editor of the Cornell International Law Journal. Ms. Russo served as a judicial
extern to the Honorable Erithe A. Smith of the United States Bankruptcy Court for the Central District of California. Ms. Russo received her B.S., magna cum
laude, in 2004 from the University of Southern California. Ms. Russo is admitted to practice law in both California and New York.
Practice Areas: Data Privacy, Security & Management; Transactional and Corporate; Appellate; and Business Litigation
GO TO TOP
Jan 20, Dr. Ann Cavoukian, Information and Privacy Commissioner.
Dr. Ann Cavoukian is recognized as one of the leading privacy experts in the world. Noted for her seminal work on Privacy Enhancing Technologies (PETs) in
1995, her concept of Privacy by Design seeks to proactively embed privacy into the design specifications of information technology and accountable business
practices, thereby achieving the strongest protection possible. In October, 2010, regulators from around the world gathered at the annual assembly of International
Data Protection and Privacy Commissioners in Jerusalem, Israel, and unanimously passed a landmark Resolution recognizing Privacy by Design as an essential component
of fundamental privacy protection. This was followed by the U.S. Federal Trade Commission's inclusion of Privacy by Design as one of its three recommended practices
for protecting online privacy - a major validation of its significance.
An avowed believer in the role that technology can play in the protection of privacy, Dr. Cavoukian's leadership has seen her office develop a number of tools
and procedures to ensure that privacy is strongly protected, not only in Canada, but around the world. She has been involved in numerous international committees
focused on privacy, security, technology and business, and endeavours to focus on strengthening consumer confidence and trust in emerging technology applications.
Dr. Cavoukian serves as the Chair of the Identity, Privacy and Security Institute at the University of Toronto, Canada. She is also a member of several Boards
including, the European Biometrics Forum, Future of Privacy Forum, RIM Council, and has been conferred a Distinguished Fellow of the Ponemon Institute. Dr. Cavoukian
was honoured with the prestigious Kristian Beckman Award in 2011 for her pioneering work on Privacy by Design and privacy protection in modern international
environments. In the same year, Dr. Cavoukian was also named by Intelligent Utility Magazine as one of the Top 11 Movers and Shakers for the Global Smart Grid
industry, received the SC Canada Privacy Professional of the Year Award and was honoured by the University of Alberta Information Access and Protection of Privacy
Program for her positive contribution to the field of privacy. Most recently in November 2011, Dr. Cavoukian was ranked by Women of Influence Inc. as one of the
top 25 Women of Influence recognizing her contribution to the Canadian and global economy. This award follows her recognition in 2007 by the Women's Executive
Network as one of the Top 100 Most Powerful Women in Canada.
GO TO TOP
Jan 13, Frank Ahearn, privacy consultant who works with people who need to disappear.
Frank M. Ahearn is a privacy consultant who works with people who need to disappear. His clients range from victims of stalkers, celebrities seeking privacy,
business travelers avoiding abductions and other who find digital information all too intrusive.
Frank started his career as skip tracer (finds people) and social engineer who obtained information for investigators, lawyers and tabloids. He has worked
cases involving Monica Lewinsky, George Clooney, Conrad Black and the Oscars to name a few.
Frank is co-author of How to Disappear is the authoritative and comprehensive guide for people who seek to protect their privacy as well as for anyone
who's ever entertained the fantasy of disappearing-whether actually dropping out of sight or by eliminating the traceable evidence of their existence. Frank has
a new book coming out in March titled, "How to Disappear from BIG BROTHER."
Written by the world's leading experts on finding people and helping people avoid being found, How to Disappear covers everything from tools for disappearing
to discovering and eliminating the nearly invisible tracks and clues we tend to leave wherever we go. Learn the three keys to disappearing, all about your
electronic footprints, the dangers and opportunities of social networking sites, and how to disappear from a stalker.
Frank Ahearn and Eileen Horan provide field-tested methods for maintaining privacy, as well as tactics and strategies for protecting personal information
and preventing identity theft. They explain and illustrate key tactics such as misinformation (destroying all the data known about you); disinformation
(creating fake trails); and, finally, reformation-the act of getting you from point A to point B without leaving clues.
Ahearn illustrates every step with real-life stories of his fascinating career, from undercover work to nab thieving department store employees to a stint
as a private investigator; and, later, as a career "skip tracer" who finds people who don't want to be found. In 1997, when news broke of President Bill
Clinton's dalliance with a White House intern, Ahearn was hired to find her. When Oscar statuettes were stolen in Beverly Hills, Ahearn pinpointed a
principal in the caper to help solve the case. When Russell Crowe threw a telephone at a hotel clerk in 2005, Ahearn located the victim and hid him from the media.
An indispensable resource not just for those determined to become utterly anonymous, but also for just about anyone in the brave new world of on-line
information, How to Disappear sums up Ahearn's dual philosophy: Don't break the law, but know how to protect yourself.
GO TO TOP
Jan 6, Ed Adams, President and CEO of Security Innovation.
Ed Adams is the President and CEO of Security Innovation, the independent authority on application security risk assessment, risk mitigation and
education. He is a seasoned software executive with successful leadership experience in various-sized organizations that serve the IT security and quality assurance industries.
As CEO, Mr. Adams applies his information security and business skills, as well as his pervasive industry experience in the Application Quality space, to direct software
security experts in helping organizations understand the risks in their software systems and developing programs to mitigate those risks. His organization has delivered
high-quality risk solutions to the most recognizable companies in the world including Microsoft, IBM, MassMutual, Fedex, Nuance, ING, Sony, Symantec, godaddy.com and HP.
Mr. Adams is a Ponemon Institute Fellow and founded the Application Security Industry Consortium, Inc. (AppSIC), a non-profit association of industry analysts, enterprise
technologists, and security leaders established to define cross-industry application security metrics and best practices. The non-profit eventually morphed into SAFECode
at which point Mr. Adams got more engaged with other industry initiatives, including OWASP. Mr. Adams is on the board of the National Association of Information Security
Groups (NAISG) and the International Secure Software Engineering Council (ISSECO).
No stranger to the podium, Mr. Adams has presented to thousands at numerous seminars, software industry conferences, and private companies. He has contributed
written and oral commentary for business and technology media outlets such as New England Cable News, Associated Press, CSO Magazine, SC Magazine, Boston Globe,
CIO Update, Wall Street Reporter, Investors Business Daily, Optimize and CFO Magazine.
Mr. Adams is in the process of writing a book titled "Information Security Management: Survival Guide", which will be published by Wiley & Sons and is due
out in 2014. He maintains a blog with CSO Magazine and is on the board of the National Information Security Group (NAISG).
Topics of interest on which Mr. Adams has spoken:
- Considering IT security from a contextual standpoint; What security means to a specific organization
- Assessing risks and vulnerabilities in an enterprise
- Marrying security with risk management frameworks
- Integrating security into the software development lifecycle (SDLC)
- Creating a security-aware organization: effective techniques for training and awareness programs
- Measuring/assessing security investments
- Understanding the leadership, staffing and ownership of security in an organization
"Executives are looking for a way to construct a business-focused IT security strategy. They need to consider security as a business enabler, rather
than fearing security as a misunderstood enigma of technology pitfalls."
"Although there are many risk mitigation options for the software management lifecycle (SDLC), they don't address the root cause of the problem-an SDLC
that is not integrating security at each phase. Organizations have had enough of reactive spending to plug holes and pay the consequences in lost data
and dollars. They are now focusing on proactive investment of security technologies and training."