Privacy Professor Radio
Technology
1/8/2019 – 2019 Information Security Forecast: Worldwide and In Colombia
12/11/2018 – Is Anonymization Possible with Current Technologies?
11/27/2018 – IOT Security, Privacy and Safety
10/30/2018 – Information Security and Privacy Questions from Listeners
10/16/2018 – Answering Questions from Listeners for Cyber Security Awareness
10/9/2018 – Pen Tests and Vulnerability Scans: Advice, Experience and Case Studies
6/19/2018 – Separating Facts from Fiction in Digital Forensics
Administrative & Legal
1/22/2019 – GDPR, Data Privacy Day and The Need for Privacy
12/4/2018 ‐ FTC Influences on Privacy Sanctions and Regulations
11/20/2018 – GDPR: Using Legitimate Interests as a Lawful Basis for Processing
11/13/2018 – Government Hacking and Surveillance: Activities, Tools and Laws
8/21/2018 – Unifying GDPR With US Laws Compliance
6/12/2018 – GDPR: Debunking Personal Data and Applicability Myths
5/15/2018 – Who's Eavesdropping on You? Government Surveillance and Laws
3/16/2018 – Privacy and Security Incident Response Mistakes Organizations Make
2/16/2018 – EU GDPR Sanity: Practical Advice for Effective Compliance
Careers & Professional Development
8/28/2018 – Advice for CyberSecurity and Privacy Threats, Challenges and Careers
7/31/2018 – Education and Advice for Successful Information Security Careers
5/22/2018 – Why Do Women Leave IT Careers?
4/20/2018 – The Path of This Privacy Expert Led to Many World Icons
4/13/2018 – IT and Privacy Career Trends and Tips for Success
4/6/2018 – Association Memberships Build Data Security and Privacy Careers
3/30/2018 – Many Areas of InfoSec and Privacy Expertise? Make Them Your Career!
Physical Security & Safety
9/18/2018 – Cyber Terrorism Defense at Home and While Traveling
8/7/2018 – Physical Fails for Information Security and Privacy
5/29/2018 – Swatting Dangers and Defenses
3/2/2018 – Balancing Privacy with Safety when Using Body Cams
Hot Topics
Voting Security
10/23/2018 – Security Views from an Elections Official and Voting Security Expert
10/2/2018 – Turning A Blind Eye Does Not Fix Voting Security Vulnerabilities
9/11/2018 – Voting Systems Security and Risk Limiting Audits
7/24/2018 – Are US Voting Systems and Voter Registration Data Secure?
6/26/2018 – Are Our Voting and Elections Processes Secure?
Encryption
2/5/2019 – Will Australias Encryption Law Kill Privacy in Name of Safety?
7/17/2018 – Are Encryption Backdoors Really Necessary for National Security?
7/3/2018 – Encryption Trends Around the World
Health Data, Medical Security, and Privacy
1/29/2019 – Will You Sacrifice Your Privacy When Purchasing Cannabis?
6/5/2018 – DNA Forensics Can Solve Crimes. Are There Also Privacy Risks?
1/26/2018 – Medical Cannabis Patient Privacy and Data Security
Implanted Devices and Privacy
Industries & Events
Computer Crimes & Ethics
2/12/2019 – Backdoors in Cybersecurity Tools Gives Privacy Only to Outlaws
1/15/2019 – Data Security and Privacy Ethics in Computing
9/18/2018 – Cyber Terrorism Defense at Home and While Traveling
8/14/2018 – Fighting International Cybercrime and Cyber Security Threats
7/10/2018 – Curious Cases of Catphishing Executives and IT Pros
5/8/2018 – Honey Sticks and Honey Points: Not-So-Sweet Cyber Crook Tools
5/1/2018 – Why Nation States and Cybercrooks Love Wi-Fi
3/23/2018 – Is Hacking Ever Ethical? A Professional Hacker Explains!
2/23/2018 – Identity Fraud and Theft: Don't Be a Victim!
2/9/2018 – The Ghosts of Government in Our Machines: The CIA and Surveillance
2/2/2018 – Computer Hacking Crimes and Prosecutions