chapter ten
10 Implementing privacy by closing security vulnerabilities
This chapter covers:
- Privacy risks that are often hidden within security risks
- How business efficiencies around testing and development can lead to and expanded risk surface
- How companies can build an enterprise risk model to identify, track and address privacy risks
- How major privacy and security risks are cumulative and impactful in nature
- How companies can use authorization to reduce risk
- The different kinds of privacy risks that are hidden in authorization implementation details
Privacy controls are complicated to implement for many companies with limited budgets and/or businesses that are small/medium sized. Such organizations often face a critical question: Where do we get started when it comes to building privacy into our technical infrastructure? While prioritization questions are perennial, the much harder question to answer is around what to do first.
In my experience, companies just starting out in the privacy space may find it daunting to start with making their data privacy-safe. Whether it is practices like data minimization or data governance, these require significant changes that in many cases will affect all levels of the company.