meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

The impact of data privacy on cyber. [CISO Perspectives]

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.6 • 1K Ratings

🗓️ 28 October 2025

⏱️ 42 minutes

🧾️ Download transcript

Summary

Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Kristy Westphal, the Global Security Director of Spirent Communications, to explore data privacy's impacts on cybersecurity efforts. Together, Kristy and Kim discuss why privacy cannot be an afterthought but rather must be something actively addressed through proactive security efforts, shifting security culture mindsets, and staying ahead of rapidly changing technologies. This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about ⁠Meter⁠. Want more CISO Perspectives? Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:09.5

This exclusive N2K Pro subscriber-only episode of CISO Perspectives has been unlocked for all Cyberwire listeners through the generous support of Meter,

0:23.1

building full-stack zero-trust networks from the ground up.

0:25.1

Trusted by security and network leaders everywhere,

0:28.0

meter delivers fast, secure by design,

0:30.5

and scalable connectivity

0:31.9

without the frustration, friction,

0:34.6

complexity, and cost

0:36.1

of managing an endless proliferation of vendors and tools.

0:40.3

Meter gives your enterprise a complete networking stack, secure wired, wireless, and cellular

0:46.3

in one integrated solution built for performance, resilience, and scale.

0:51.6

Go to meter.com slash CISOP today to learn more and book your demo.

0:57.5

That's M-E-T-E-R.com slash C-I-S-O-P.

1:02.2

Pop quiz today.

1:16.0

Which of the following situations is a violation of privacy?

1:20.9

One, a national retailer utilizes purchases you make with them to send you

1:26.0

advertisements about products you might enjoy your need.

1:30.7

Two, a reputable search engine utilizes data about you from previous searches and other products

1:37.1

to better tailor its content to your needs.

1:41.1

Or three, a government entity utilizes data in the public domain to hone in on potential criminals.

1:49.0

If you answered anything but it depends on this quiz, you haven't been following the nuances of the privacy debate.

1:58.0

Let's get a little deeper into each of these examples for just a moment.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright Š Tapesearch 2025.