DiscoverThreat Vector by Palo Alto NetworksBeyond Compliance: Using Technology to Empower Privacy and Security with Daniel Rosenzweig
Beyond Compliance: Using Technology to Empower Privacy and Security with Daniel Rosenzweig

Beyond Compliance: Using Technology to Empower Privacy and Security with Daniel Rosenzweig

Update: 2024-06-06
Share

Description

In this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, is joined by Data Privacy Attorney Daniel Rosenzweig. Together, they unravel the complexities of aligning data privacy and cybersecurity laws with technological advancements. Daniel shares his insights on the critical partnership between legal and tech teams, revealing how a deep understanding of both realms can empower businesses to navigate evolving legal frameworks, particularly in light of emerging AI technologies. Listeners will gain valuable perspectives on operationalizing legal requirements and the importance of proactive collaboration across teams for robust protection strategies. Tune in to discover actionable advice for maintaining compliance in the rapidly shifting cybersecurity landscape.


Disclaimer:

The information provided on this podcast is not intended to constitute legal advice. All information presented is for general informational purposes only. The information contained may not constitute the most update, legal or interpretative compliance guidance. Contact your own attorney to obtain advice with respect to any particular legal matter.


Join the conversation on our social media channels:


About Threat Vector

Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.


Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Beyond Compliance: Using Technology to Empower Privacy and Security with Daniel Rosenzweig

Beyond Compliance: Using Technology to Empower Privacy and Security with Daniel Rosenzweig

Palo Alto Networks and N2K Networks