Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical Security

Strong Privacy Requires Strong Security — and GenAI Raises the Stakes

By Jack Cherkas
Keys on yellow background
Alp Duran via Unsplash
January 28, 2026

For years, organizations have treated privacy and security as if they were parallel tracks, related, but separate. Privacy teams focused on policies, notices and regulatory commitments. Security teams handled infrastructure, access controls, monitoring and incident response. But in the real world, this separation has become increasingly artificial.

You cannot claim to protect someone’s data if it isn’t properly secured. And you cannot secure that data effectively if you don’t understand the privacy obligations attached to it (i.e., who should access it, how long it should be retained, what jurisdictions it touches, or how it may be used). Privacy and security are not competing disciplines; they are inseparable components of the same responsibility.

As Data Privacy Day has arrived, it’s an ideal moment for organizations to pause and examine the gap between their stated privacy commitments and the controls operating day to day. True privacy protection isn’t expressed in elegant policy language, it’s about the technical, procedural, and cultural disciplines that make those policies real in daily operations.

The Fundamentals Still Matter

Despite the rapid evolution of technology and regulation, the fundamentals matter more than ever:

Strong Identity and Access Management

Ensuring only the right people have access to the right data at the right time and removing unnecessary access as roles change.

Mastering Basic Security Controls

Encryption, patching hygiene, multifactor authentication, log monitoring, and secure configuration remain the clearest indicators of whether an organization can truly protect sensitive data.

Responding Quickly When Something Goes Wrong

Breaches happen, even in mature environments. The differentiator is how fast and effectively an organization detects, contains, and recovers from them, and how transparently it communicates.

Disciplined Data Hygiene

This means understanding what data you collect, classifying it correctly, retaining only what you genuinely need, and enforcing governance that limits how data moves inside and across systems.

These are not merely security pillars; they are the foundation of credible privacy protection. 

Why This Matters Even More in 2026: The AI Acceleration

The rise of Generative AI (genAI) has fundamentally reshaped how organizations must think about data protection. Data is no longer something we simply store. It has become the rocket fuel for every AI system we build, buy or use.

The implications are profound:

  • AI systems learn from the data they ingest
  • Outputs may inadvertently reveal sensitive information
  • Third‑party AI tools may process data outside the organization’s governance boundary
  • “Shadow AI” used by employees can leak proprietary or personal data
  • Large Language Models (LLMs) introduce new risks 

If organizations don’t understand how their data is collected, labeled, shared, governed, and used by AI systems, they will face exposures that traditional security controls were never designed to handle. Simply put, without data maturity, there can be no AI maturity.

The Blueprint for Success

The organizations that will thrive in 2026 and beyond will be those that treat privacy and security as a unified active discipline, woven into product design, development, architecture, and day-to-day decision-making.

Success will require:

  • Balancing innovation with responsibility
  • Embedding privacy and security into AI design and deployment
  • Maintaining governance that evolves as data volumes and use cases grow
  • Ensuring AI ambitions are grounded in clear data stewardship and mature security controls
  • Recognizing that strong privacy and strong security are mutually dependent

Ultimately, protecting data, especially in the age of AI, is about more than preventing breaches. It’s about preserving trust and enabling innovation responsibly.

This Data Privacy Day, the message is clearer than ever: privacy and security must advance together. Organizations that recognize their interdependence will be the ones prepared for the next wave of technological change and will innovate with confidence.

KEYWORDS: artificial intelligence (AI) data privacy data protection data storage

Share This Story

Jack cherkas headshot

Jack Cherkas is Global CISO at Syntax.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing