Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical Security

Strong Privacy Requires Strong Security — and GenAI Raises the Stakes

By Jack Cherkas
Keys on yellow background
Alp Duran via Unsplash
January 28, 2026

For years, organizations have treated privacy and security as if they were parallel tracks, related, but separate. Privacy teams focused on policies, notices and regulatory commitments. Security teams handled infrastructure, access controls, monitoring and incident response. But in the real world, this separation has become increasingly artificial.

You cannot claim to protect someone’s data if it isn’t properly secured. And you cannot secure that data effectively if you don’t understand the privacy obligations attached to it (i.e., who should access it, how long it should be retained, what jurisdictions it touches, or how it may be used). Privacy and security are not competing disciplines; they are inseparable components of the same responsibility.

As Data Privacy Day has arrived, it’s an ideal moment for organizations to pause and examine the gap between their stated privacy commitments and the controls operating day to day. True privacy protection isn’t expressed in elegant policy language, it’s about the technical, procedural, and cultural disciplines that make those policies real in daily operations.

The Fundamentals Still Matter

Despite the rapid evolution of technology and regulation, the fundamentals matter more than ever:

Strong Identity and Access Management

Ensuring only the right people have access to the right data at the right time and removing unnecessary access as roles change.

Mastering Basic Security Controls

Encryption, patching hygiene, multifactor authentication, log monitoring, and secure configuration remain the clearest indicators of whether an organization can truly protect sensitive data.

Responding Quickly When Something Goes Wrong

Breaches happen, even in mature environments. The differentiator is how fast and effectively an organization detects, contains, and recovers from them, and how transparently it communicates.

Disciplined Data Hygiene

This means understanding what data you collect, classifying it correctly, retaining only what you genuinely need, and enforcing governance that limits how data moves inside and across systems.

These are not merely security pillars; they are the foundation of credible privacy protection. 

Why This Matters Even More in 2026: The AI Acceleration

The rise of Generative AI (genAI) has fundamentally reshaped how organizations must think about data protection. Data is no longer something we simply store. It has become the rocket fuel for every AI system we build, buy or use.

The implications are profound:

  • AI systems learn from the data they ingest
  • Outputs may inadvertently reveal sensitive information
  • Third‑party AI tools may process data outside the organization’s governance boundary
  • “Shadow AI” used by employees can leak proprietary or personal data
  • Large Language Models (LLMs) introduce new risks 

If organizations don’t understand how their data is collected, labeled, shared, governed, and used by AI systems, they will face exposures that traditional security controls were never designed to handle. Simply put, without data maturity, there can be no AI maturity.

The Blueprint for Success

The organizations that will thrive in 2026 and beyond will be those that treat privacy and security as a unified active discipline, woven into product design, development, architecture, and day-to-day decision-making.

Success will require:

  • Balancing innovation with responsibility
  • Embedding privacy and security into AI design and deployment
  • Maintaining governance that evolves as data volumes and use cases grow
  • Ensuring AI ambitions are grounded in clear data stewardship and mature security controls
  • Recognizing that strong privacy and strong security are mutually dependent

Ultimately, protecting data, especially in the age of AI, is about more than preventing breaches. It’s about preserving trust and enabling innovation responsibly.

This Data Privacy Day, the message is clearer than ever: privacy and security must advance together. Organizations that recognize their interdependence will be the ones prepared for the next wave of technological change and will innovate with confidence.

KEYWORDS: artificial intelligence (AI) data privacy data protection data storage

Share This Story

Jack cherkas headshot

Jack Cherkas is Global CISO at Syntax.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Cloud icon

Google Cloud Service Exploited in New Phishing Campaign

Illustrated ladder

Agentic AI Security Is Complicated, and the Hyper-Scalers Know It

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 29, 2026

Protecting Data Centers as National-Level Critical Infrastructure

Data centers have quietly become some of the most critical infrastructure around the globe — often as essential as power grids, financial networks and telecommunications. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing