partner, chair of Advertising, Gaming & Promotions and co-chair of Privacy & Cybersecurity practices at Paul Hastings LLP
accountability, algorithm, attorney general, best practice, bias, bill (law), california, california consumer privacy act, class action, computer security, consent, consumer price index, consumer privacy, crime, cyberattack, cybersecurity, data, data breach, data security, discovery (law), donald trump, ethics, european union, evaluation, federal government of the united states, future, general data protection regulation, health care, health informatics, health insurance portability and accountability act, information, information privacy, information security, infosec, intelligence, internet privacy, justice, law, law firm, lawyer, learning, machine learning, market (economics), mathematics, mind, nevada, personal data, privacy, privacy law, protected health information, ransomware, regulation, research, rice, rights, rsa, rsa (cryptosystem), rsac, rsaconference, security, self, state law (united states), tax, technology, telecommuting, time, torah, transparency (behavior), united states, well-being, wine
api, application security, best practice, communication, computer security, cross-site scripting, cybersecurity, devops, information, information security, infosec, inventory, knowledge, mobile app, net promoter, penetration test, point of sale, risk, rsa, rsac, rsaconference, security, security hacker, shipt, sql injection, system, target corporation, understanding, vulnerability (computing), web development, world wide web
Executive Director - Marine Living Research Center at Unisys
big data, bill of materials, brand, child labour, computer security, enterprise software, hospital, information security, innovation, internet, internet of things, medical device, onboarding, procurement, proof of concept, reason, regulatory compliance, risk management, software bill of materials, solarwinds, supply chain, technology, transparency (behavior), use case
big data, bill of materials, brand, child labour, computer security, enterprise software, hospital, information security, innovation, internet, internet of things, medical device, onboarding, procurement, proof of concept, reason, regulatory compliance, risk management, software bill of materials, solarwinds, supply chain, technology, transparency (behavior), use case
Co-leader at National Technology & Information Administration, US Dept. of Commerce
big data, bill of materials, brand, child labour, computer security, enterprise software, hospital, information security, innovation, internet, internet of things, medical device, onboarding, procurement, proof of concept, reason, regulatory compliance, risk management, software bill of materials, solarwinds, supply chain, technology, transparency (behavior), use case
CSO at AlertEnterprise and Chief Strategy Officer at National Cybersecurity Center
attorney's fee, big data, bill of materials, board of directors, brand, bug bounty program, by-law, child labour, ciso, class action, computer security, conflict of interest, database, derivative suit, discovery (law), enterprise software, equifax, federal trade commission, hospital, indemnity, information security, innovation, insider trading, internet, internet of things, medical device, misprision, non-disclosure agreement, onboarding, personal data, procurement, proof of concept, ransomware, reason, regulatory compliance, risk management, software bill of materials, solarwinds, stock, supply chain, supply chain attack, technology, transparency (behavior), u.s. securities and exchange commission, united states congress, use case, verizon communications, witness
automation, communication, computer security, conversation, cyberwarfare, deterrence theory, disinformation, election security, federal bureau of investigation, fusion center, information security, intelligence, internet, mind, misinformation, organization, perception, reality, reason, risk, sense, social media, social media measurement, understanding, united states department of homeland security, united states intelligence community
We use cookies on this website to enhance your browsing experience, measure our audience, and to collect information useful to provide you with more relevant content. By continuing to use this website, by closing this box, or by clicking here, you are indicating your consent to our use of cookies.