Application Security , General Data Protection Regulation (GDPR) , Next-Generation Technologies & Secure Development

Analysis: Privacy and Security by Design

Former Deputy NSA Latha Reddy on the Steps for Building a Privacy Framework
Latha Reddy, co-chair, Global Commission on the Stability of Cyberspace

Support for building in privacy and security by design is growing as a result of the explosion of such new technologies as such artificial intelligence, IoT and various digital devices, says Latha Reddy, co-chair of the Global Commission on the Stability of Cyberspace and former deputy national security and cybersecurity adviser of India.

See Also: Why CASBs Matter to Cloud Security

But it's tough and expensive for companies to retroactively fit security into design to comply with the EU's General Data Protection Regulation, she says.

In a video interview at Information Security Media Group's Bengaluru Fraud & Breach Prevention Summit, Latha discusses:

  • Deploying the right controls and standards for data privacy and protection;
  • The GDPR compliance challenges facing Indian organizations;
  • Implications of the Justice B. N. Krishna Committee report on data protection framework.

Reddy, a distinguished fellow - EastWest Institute, New York, is the former deputy national security and cybersecurity adviser of India. She is now co-chair of the Global Commission on the Stability of Cyberspace. Reddy served in the Indian Foreign Service from 1975 to 2011.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Managing Editor, Asia & the Middle East, ISMG

Nandikotkur is an award-winning journalist with over 20 years' experience in newspapers, audio-visual media, magazines and research. She has an understanding of technology and business journalism, and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a Group Editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.