Javascript is not enabled. Please enable Javascript to fully view Red Clover Advisors.
Skip to content
Close Search
Search
Search
Understanding Drone Privacy and Security Regulations
Our Podcast
Get Our Book
Services
Privacy Operations Services
Privacy Program Assessments
Regulatory Compliance
Cookie Consent Management
Data Inventory Management
Privacy Rights
Privacy Notices
Privacy Impact Assessment
Privacy Software Services
Third-Party Risk Management
Privacy Training
Cybersecurity
AI Governance
Fractional Privacy Officer
About Privacy☘PS® Managed Services
Customers & Case Studies
Regulations
US State Regulations
California CCPA
GDPR
AI Laws By State
Learn
2024 Privacy Checklist
Articles
Downloadable Resources
Podcasts
Get Our Book
Featured Media
Request a Speaker
Privacy Glossary
Company
About Red Clover
Our Team
Careers
Schedule a Consultation
Toggle Mobile Menu
Author Archive
Forum Communications
Podcast
Understanding Drone Privacy and Security Regulations
In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels talk with Mark McKinnon, a partner at Fox Rothschild LLP, about how drone companies can ensure individual privacy and security. He discusses how the Supreme Court dictates aviation privacy regulations, the implications of commercial drone usage, and common privacy and security mistakes companies make when utilizing drones.
Listen Now
Podcast
Red Teaming for Security Exploits
In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Dahvid Schloss, Managing Lead, Offensive Security and vCISO at Echelon Risk + Cyber, to discuss how to avoid common security exploits. Dahvid explains red teaming and how it relates to cybersecurity, the purpose of DEF CON hacking conferences, and how to mitigate cyber-attacks.
Listen Now
Blog
What You Need in Your Privacy Notice
View More
Podcast
Cybersecurity Education: Best Practices
In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Brandon Laur, Executive Manager and Instructor at The White Hatter, to discuss cybersecurity education methods. Brandon shares his strategies for training students on privacy and security concerns, the common misconceptions regarding children’s knowledge of technology, and essential cybersecurity tools for parents and children.
Listen Now
Podcast
Privacy Compliance in a Post-Cookies World
In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels talk with Roy Smith, CEO of PrivacyCheq, about complying with privacy regulations in a post-cookies world. Roy shares tips for companies to comply with consent laws, how impending privacy regulations will affect organizations, and the ways PrivacyCheq simplifies the consent process for businesses.
Listen Now
Blog
How ESG Can Drive Your Privacy Program
View More
Podcast
Regulating Air Traffic for Drone Use
In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Dawn Zoldi, Founder and CEO of P3 Tech Consulting, to discuss drone regulations. She talks about the different types of drones and how each one collects data, the risks associated with outsourcing air traffic control to a third party, and how companies can implement cybersecurity solutions for drone control.
Listen Now
Podcast
Reinstating Control With Digital Identity
Tune in to this episode of the She Said Privacy/He Said Security podcast as Jodi and Justin Daniels talk with David Lucatch, CEO, President, and Chair of Liquid Avatar Technologies, about how you can best secure your consumer’s identity. David explains how Liquid Avatar allows users to verify their identities, blockchain’s role in identity verification, and how Liquid Avatar leverages the three types of identity.
Listen Now
Blog
Trust: The New Currency You Should Be Investing In
View More
Podcast
Implementing Virtualization for Safe and Efficient Software Testing
In today’s episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Amanda Gorton, Co-founder and CEO of Corellium, to discuss using virtualization services to perform safe and effective software testing. Amanda talks about how Corellium employs virtualization for developers to test software, the privacy and security guidelines companies should consider when working with virtualization, and the steps companies are taking to solve the most pressing privacy and security challenges.
Listen Now
Posts navigation
1
…
12
13
14
15
16
…
32