Eight Privacy Firms to Watch
"My business didn't start to take off," Chapell told me, "until I'd spent months reaching out to literally hundreds of others in the privacy, marketing and technology fields."
Chapell's marketing paid off: His firm has expanded from his home turf of interactive marketing into traditional industries, and he's hired three staffers.
When asked about emerging trends in privacy, Chapell had this to say: "I believe that the next few years will bring some form of comprehensive data-privacy legislation at the federal level. This will significantly change the privacy-consulting landscape as we know it."
Rebecca Herold had survived the dot-com bust at an IT consulting firm, only to see it fold a few years later. Some of her firm's former clients wanted her continued help, so she used the opportunity — and her eclectic background of teaching, auditing, information security and privacy — to start Rebecca Herold LLC. Herold has gone on to land a diverse range of projects addressing all phases of a privacy and security program.
Her biggest surprise? "I'm still surprised that there's such a disconnect in many organizations between the privacy office, often within the legal area, and the information security function."
"I think over the next two years there'll be more activity in the market with awareness and training," she predicted, but she cautions organizations about relying too much on technology solutions. "There will always be the human factor that must be addressed," she said.
Michele DeMaree was the first privacy leader at Minneapolis-based retailer Best Buy when the entrepreneurial bug bit. A lawyer by trade, she left her post in 2005, moved back to her hometown of Colorado Springs and started DeMaree Consulting Inc.
"While we originally set out to cater to retail clients," she said, "we're finding others who're also interested in doing the right thing."
Her firm performs privacy assessments, writes policies and processes and trains employees. It also serves as a consumer-privacy ombudsman in federal bankruptcy cases to assist courts in understanding the ramifications of an asset sale containing valuable consumer information.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Best Practices in BYOD: BlackBerry Enterprise Service 10 Manageability, security and support - these are just a few of the reasons BlackBerry® Enterprise Service 10 is such a powerful Enterprise Mobility...
- How to Migrate from BlackBerry Enterprise Server v4.0 or v5.0 to BlackBerry Enterprise Service 10 With BlackBerry® Enterprise Service 10, you can manage your entire mobile fleet through a single, unified interface. Find out how to make the...
- Choosing an MDM Platform: Where to Start the Conversation If you're in the early stages of choosing an MDM solution, or you're considering switching vendors, here are seven critical questions to ask...
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After... All Privacy White Papers | Webcasts