4.8 • 11 Ratings
🗓️ 8 July 2020
⏱️ 22 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to another episode of GDPR Now, a podcast dedicated to all things related to data |
0:06.8 | security and data privacy brought to you by Data Protection for Business and this is DPO. |
0:13.2 | Your host today is me, Karen Heaton, owner of Data Protection for Business, recording from my |
0:19.1 | home office in southwest London. This episode is part of |
0:23.1 | our series of updated podcasts addressing security and privacy concerns, resulting from the coronavirus |
0:30.5 | pandemic and the shift in working practices for millions of businesses across the UK and the world. |
0:36.8 | In this episode, we are delighted to have Andrew Alston. |
0:41.3 | He's the founding director at Breach Aware and Business Intelligence Theorem. |
0:46.1 | Today, Andrew is going to talk to us about Breach Aware, |
0:49.5 | which is a data breach monitoring and reporting application. |
0:53.7 | It's designed to help organisations detect and |
0:56.9 | prevent crime as part of their system of risk management. So Andrew, can you tell us a bit about |
1:03.6 | why you started breach aware? Hi, Karen. Thanks for having me on the show. Yes, I used to work for |
1:10.3 | a security company a few years ago, |
1:12.7 | and we were selling some quite sophisticated technology. And one of the things that we noted |
1:21.2 | was that the organisations we were selling to from some of the basic tools out there, that's half the members we were |
1:30.2 | talking to have been compromised on the dark web or surface web, and we're using basic tools |
1:35.5 | just to check whether they were vulnerable to any malicious attack from outside. So we immediately |
1:43.0 | thought, well, is there an enterprise tool out there that can identify |
1:48.4 | risk on a mass scale on the market? |
1:52.3 | And it wasn't at that time. |
1:54.2 | And we started a project off. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Karen Heaton/Data Protection 4 Business, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Karen Heaton/Data Protection 4 Business and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.