Eight Privacy Firms to Watch
"My business didn't start to take off," Chapell told me, "until I'd spent months reaching out to literally hundreds of others in the privacy, marketing and technology fields."
Chapell's marketing paid off: His firm has expanded from his home turf of interactive marketing into traditional industries, and he's hired three staffers.
When asked about emerging trends in privacy, Chapell had this to say: "I believe that the next few years will bring some form of comprehensive data-privacy legislation at the federal level. This will significantly change the privacy-consulting landscape as we know it."
Rebecca Herold had survived the dot-com bust at an IT consulting firm, only to see it fold a few years later. Some of her firm's former clients wanted her continued help, so she used the opportunity — and her eclectic background of teaching, auditing, information security and privacy — to start Rebecca Herold LLC. Herold has gone on to land a diverse range of projects addressing all phases of a privacy and security program.
Her biggest surprise? "I'm still surprised that there's such a disconnect in many organizations between the privacy office, often within the legal area, and the information security function."
"I think over the next two years there'll be more activity in the market with awareness and training," she predicted, but she cautions organizations about relying too much on technology solutions. "There will always be the human factor that must be addressed," she said.
Michele DeMaree was the first privacy leader at Minneapolis-based retailer Best Buy when the entrepreneurial bug bit. A lawyer by trade, she left her post in 2005, moved back to her hometown of Colorado Springs and started DeMaree Consulting Inc.
"While we originally set out to cater to retail clients," she said, "we're finding others who're also interested in doing the right thing."
Her firm performs privacy assessments, writes policies and processes and trains employees. It also serves as a consumer-privacy ombudsman in federal bankruptcy cases to assist courts in understanding the ramifications of an asset sale containing valuable consumer information.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!