Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Data privacy is a challenge. Tech leaders have the solution

IT teams have the power to turn privacy into a value-driver.

By Jonathan Joseph
data-protection-freepik1170x658v504.jpg

Image by pch.vector via Freepik

October 3, 2022

For today’s businesses, data privacy is a major headache. Modern privacy regulations will soon cover three-quarters of the world’s population, making regulatory compliance a complex, high-stakes process that touches every part of the organization and requires the coordinated efforts of countless different decision-makers.


Legal counsel interprets a slew of regulations to determine what’s permissible. The chief information officer (CIO) enshrines those decisions in data systems. The chief data officer — plus a larger cast of end-users, including marketing and sales leaders — navigate those systems to put data to work and build trust with their consumers. And the chief information security officer (CISO) keeps data safe along the way. 


All those stakeholders are on the same team, but it doesn’t always feel like they’re speaking the same language. Engineers, lawyers, analysts, and marketers all understand privacy in their own idiosyncratic ways. In trying to bring them together, organizations often wind up with data privacy mechanisms that look like Rube Goldberg designed them: complex and inflexible solutions to an overly specific regulatory problem, rather than the adaptive, streamlined, and scalable systems that organizations need in today’s fast-changing world. 


Fortunately, there’s a better way — IT leaders are stepping up and taking responsibility for driving the necessary change. The reality is that data privacy has grown so complex that it demands a technological solution. By building that infrastructure, tech leaders have a unique opportunity to eliminate friction between stakeholders, unlock genuinely scalable compliance, and transform the way their organizations use data to drive growth. 


Data privacy is a tech challenge

Why does it fall to tech leaders to solve privacy challenges? The simple truth is that nobody else is equipped to build the unified and scalable infrastructure that’s needed. 


When the Global Data Protection Regulation (GDPR) took effect, legal teams created compliance checklists that defined their organizations’ privacy strategy — an expensive, time-consuming process that ensured compliance only with a single specific set of regulatory requirements. 


Today, though, there are dozens of privacy rulebooks. At least 30 states are expected to have privacy legislation announced by 2023, and manually implementing privacy processes for each new regulation simply isn’t scalable. Instead, organizations need privacy solutions that can scale fast, rapidly adapt to new regulations, and enforce privacy decisions automatically and seamlessly across their entire global data ecosystem. 


That requires a tech-driven, programmatic approach to privacy. With the right infrastructure, compliance decisions and consent signals can be mapped to the specific purposes for which data is being collected, and seamlessly reflected across the entire data ecosystem to determine how data is accessed, used, and stored.


In practical terms, that means building systems that control the flow of data across its entire lifecycle, automatically enforcing compliance and reducing uncertainty and risk. Effectively, data control becomes a force multiplier, eliminating friction and amplifying the value that each team creates. Here’s what tech-enabled privacy means in practice: 


  • Legal Counsel can monitor new regulations, determine how they impact the organization’s data, then use a centralized policy center to enact their decisions. The system ensures that new requirements are reflected instantly across the entire ecosystem and even across third-party networks to maintain effortless compliance — with no need for lawyers to fret about the technical aspects of how their decisions are implemented.  
  • CIOs can build out a programmatic solution for their organization’s privacy needs, automating privacy enforcement and seamlessly ensuring data stewardship across the entire ecosystem. There’s no need to worry about re-implementing the legal team’s privacy rulings every time an engineer tweaks a line of code, and no need to rebuild IT infrastructure every time a new privacy regulation takes effect. 
  • Chief Marketing Officers can build trust with consumers, providing transparency and control over data usage. They can roll out data-driven campaigns that make optimal use of responsibly gathered data, delivering personalized messaging without ever overreaching or using data in non-approved ways. Even the user experience of privacy can be optimized for specific jurisdictions and purposes, giving marketing and design teams full control over the content, styling, and even timing of privacy messages.
  • Chief Data Officers can focus on driving value, using datasets to conduct analytics and foster innovation, without having to ask permission or interpret complex rulings handed down by the legal team. The system ensures that data is only used for permissible purposes, enabling data teams to focus on monetizing data efficiently and creatively, secure in the knowledge that it’s impossible for them to operate on data in non-compliant ways.
  • CISOs can keep tighter control over dataflows, while still providing users across the organization with the flexibility needed to innovate and create value. Data availability can be tailored to specific purposes, with anonymization or encryption based on the specific user and their purpose, and stale datasets can be safely pruned to minimize the impact of potential data breaches.
  • Chief Technology Officers can streamline the process of managing cross-border data transfers. They can also enable data localization, with both data presentation and collection processes automatically tailored to the requirements of end-users in any given geography.


Crucially, effective data stewardship is better for consumers. Businesses can give their consumers a far richer understanding of how their data is being used, and more meaningful opportunities to provide or revoke consent. In other words, tech-enabled data stewardship isn’t just about making organizations more efficient — it’s about forging stronger relationships by respecting consumers’ data dignity.  


The new data economy

This adds up to big gains for the entire organization. Tech-driven privacy gives each team member the tools to do their jobs better — and by boosting the value that each stakeholder creates, it ensures that the CEO and directors get the results they need, too. 


Just as importantly, CIOs who take point on privacy can prepare their organizations for the new data economy. The future of data will depend on transparency and trust, with consumers sharing data preferentially with organizations that treat them with respect. In areas such as ethical AI, big data, and more, companies that step up and prioritize users’ data rights will emerge as market leaders in the data economy of tomorrow.


For today’s businesses, the next stage of growth depends on addressing privacy holistically, and using technology to unlock value at scale while respecting customers’ dignity and agency at every step of the way. It’s time for IT leaders to rise to that challenge — and take responsibility for shaping the future of data privacy for their organizations.

KEYWORDS: cyber security data privacy data protection risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jonathan joseph (4)

Jonathan Joseph is the Head of Solutions and Marketing at Ketch, a platform for programmatic privacy, governance, and security. Passionate about innovation, his career is focused on disruptive technology and organizational change. He serves on the Board of Directors at Reel Works, which builds opportunities for diversity and inclusion in media, through a platform that empowers underserved NYC youth to share their stories through filmmaking, creating a springboard to successful careers.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Most Countries without Cybersecurity Strategy

    21% of SMBs Don't Have a Data Backup or Disaster Recovery Solution in Place

    See More
  • data-freepik1170x658v493863656.jpg

    Rising to the challenge of modern data security and growing privacy regulations

    See More
  • Computer with pink, orange and purple lighting

    45% of tech leaders have experienced a SaaS cybersecurity incident

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!