Governance & Risk Management , Privacy

Security and Privacy: Often Aligned, But Sometimes Not

Few Continue to Conflate Security and Privacy, Says Attorney James Shreve
James Shreve, partner, Thompson Coburn LLP

Not so long ago, many were confused about how security and privacy differed, but that has been rapidly changing, thanks to regulations such as the European Union's General Data Protection Regulation and California's Consumer Privacy Act, says attorney James Shreve, who's a partner at Thompson Coburn LLP.

See Also: Expanding Beyond Cybersecurity to Take on Digital Trust

For some projects, such as access management, privacy and security teams might align. But other initiatives, such as the use of biometrics, may be championed by security teams while generating caution from privacy groups, in light of emerging regulations, he says.

In a video interview with Information Security Media Group at RSA 2020, Shreve also discusses:

  • How privacy and security are sometimes complementary, but sometimes in conflict;
  • The growing impact of privacy regulations such as GDPR and CCPA on security practices;
  • How the cloud has changed the third-party risk landscape, and how organizations must respond.

Shreve is a partner at Thompson Coburn LLP in Chicago, where he chairs the cybersecurity practice. He previously served at such practices at BuckleySandler, Goodwin Procter and WilmerHale.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.