Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Reimagining How Companies Share Data

Автор: Red Clover Advisors

Загружено: 2025-04-03

Просмотров: 37

Описание:

Brian Mullin is the CEO and Co-founder of Karlsgate. He is also a creator of Karlsgate Identity Exchange, a groundbreaking solution for zero-trust remote data matching and integration. Brian has over 30 years of experience in data privacy and security with leadership roles at companies across the data-driven marketing ecosystem.

Here’s a glimpse of what you’ll learn:

• [00:00] Introduction
• [02:41] Brian Mullin’s career journey from working with large data sets to co-founding Karlsgate
• [05:19] The challenges of protecting data privacy and why companies need a legal framework
• [08:05] How privacy-enhancing technologies help control shared data and facilitate collaboration
• [12:10] The difference between data clean rooms and Karlsgate’s privacy enhancing technology
• [16:29] The risks of persistent IDs and how middlemen become data aggregators
• [19:32] Tips for reducing privacy and security risks across multi-party data sharing
• [22:15] Brian’s personal privacy tip

In this episode…

Data is often viewed as binary and categorized as either public or private with the assumption that private data is secure and tightly protected. Companies often rely on firewalls, contracts, and policies to secure data, yet these measures don’t guarantee control once data is shared across multiple platforms and with third-party vendors. Every time data changes hands, the risk of exposure, misuse, or compliance failure increases. So, how can organizations securely share data while minimizing risks and protecting individual identities?

To address this challenge, companies can treat sensitive information as a “protected data” category where data is only shared under specific, controlled, and technology-enforced conditions. Rather than trusting third-party data clean rooms to match and analyze data sets, businesses can use Karlsgate’s peer-to-peer privacy-enhancing technology to prevent identity exposure altogether. This allows companies to reduce risk while eliminating the need for persistent IDs like cookies to ensure data set matching occurs without revealing personal information.

In this episode of the She Said Privacy/He Said Security Podcast, Jodi and Justin Daniels talk with Brian Mullin, CEO and Co-founder of Karlsgate, about how companies can rethink data sharing with privacy-first tools. Brian discusses the dangers of persistent identifiers and why protected pipelines offer a more scalable and secure solution than traditional data clean rooms. Brian also shares how Karlsgate enables secure data set matching between organizations while eliminating the need to hand over control and explains how organizations can adopt these technologies quickly without adding friction to existing workflows.

Resources mentioned in this episode:

• Jodi Daniels on LinkedIn -   / jodihoffmandaniels  
• Justin Daniels on LinkedIn -   / justinsdaniels  
• Red Clover Advisors’ website - https://redcloveradvisors.com/
• Red Clover Advisors on LinkedIn -   / redcloveradvisors  
• Red Clover Advisors on Facebook -   / redcloveradvisors  
• Red Clover Advisors’ email: [email protected]
• Data Reimagined: Building Trust One Byte at a Time by Jodi and Justin Daniels - https://redcloveradvisors.com/book-sa...
• Brian Mullin on LinkedIn -   / brmullin  
• Karlsgate - https://karlsgate.com/

Sponsor for this episode...

This episode is brought to you by Red Clover Advisors.

Red Clover Advisors uses data privacy to transform the way that companies do business together and create a future where there is greater trust between companies and consumers.

Founded by Jodi Daniels, Red Clover Advisors helps companies to comply with data privacy laws and establish customer trust so that they can grow and nurture integrity. They work with companies in a variety of fields, including technology, e-commerce, professional services, and digital media.

To learn more, and to check out their Wall Street Journal best-selling book, Data Reimagined: Building Trust One Byte At a Time, visit https://www.redcloveradvisors.com.

Reimagining How Companies Share Data

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

array(10) { [0]=> object(stdClass)#6096 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "RN_-Bft8rO4" ["related_video_title"]=> string(60) "Inside Cybersecurity: How Hackers Think and How To Stop Them" ["posted_time"]=> string(25) "3 месяца назад" ["channelName"]=> string(19) "Red Clover Advisors" } [1]=> object(stdClass)#6069 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "wjZofJX0v4M" ["related_video_title"]=> string(148) "LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(11) "3Blue1Brown" } [2]=> object(stdClass)#6094 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "kqaMIFEz15s" ["related_video_title"]=> string(40) "Cybersecurity Trends for 2025 and Beyond" ["posted_time"]=> string(27) "5 месяцев назад" ["channelName"]=> string(14) "IBM Technology" } [3]=> object(stdClass)#6101 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "uyRMu7b_rqE" ["related_video_title"]=> string(59) "Terms, Tech & Trust: A Privacy Deep Dive With Harvey AI" ["posted_time"]=> string(23) "1 месяц назад" ["channelName"]=> string(19) "Red Clover Advisors" } [4]=> object(stdClass)#6080 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "TprZ-83fAiE" ["related_video_title"]=> string(150) "Нейробиолог: Как не отупеть к 50 годам. Связь слабоумия и привычек | Владимир Алипов" ["posted_time"]=> string(27) "9 месяцев назад" ["channelName"]=> string(46) "Подкаст Алексея Голубева" } [5]=> object(stdClass)#6098 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "kpHsmh-ml-s" ["related_video_title"]=> string(77) "How New AI Leaders Succeed in Running Their First AI Project (Kathleen Walch)" ["posted_time"]=> string(65) "Трансляция закончилась 6 дней назад" ["channelName"]=> string(21) "Intelligence Briefing" } [6]=> object(stdClass)#6093 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "2ZrpPcwJ2Ow" ["related_video_title"]=> string(77) "Agentic AI for Software Security: Eliminate More Vulnerabilities, Triage Less" ["posted_time"]=> string(21) "5 дней назад" ["channelName"]=> string(19) "Red Clover Advisors" } [7]=> object(stdClass)#6103 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "aySFnsCFk60" ["related_video_title"]=> string(58) "How AI Is Revolutionizing Contract Reviews for Legal Teams" ["posted_time"]=> string(25) "2 месяца назад" ["channelName"]=> string(19) "Red Clover Advisors" } [8]=> object(stdClass)#6079 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "WXK5yvOhhJE" ["related_video_title"]=> string(158) ""ЭТО ПОСЛАНИЕ НАМ, РОССИИ". Пропагандисты разочаровались в Трампе из-за ударов по Ирану" ["posted_time"]=> string(24) "10 часов назад" ["channelName"]=> string(19) "Майкл Наки" } [9]=> object(stdClass)#6097 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "c1K6bw5ATzk" ["related_video_title"]=> string(33) "Cost of a Data Breach 2024 Trends" ["posted_time"]=> string(28) "10 месяцев назад" ["channelName"]=> string(14) "IBM Technology" } }
Inside Cybersecurity: How Hackers Think and How To Stop Them

Inside Cybersecurity: How Hackers Think and How To Stop Them

LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры

LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры

Cybersecurity Trends for 2025 and Beyond

Cybersecurity Trends for 2025 and Beyond

Terms, Tech & Trust: A Privacy Deep Dive With Harvey AI

Terms, Tech & Trust: A Privacy Deep Dive With Harvey AI

Нейробиолог: Как не отупеть к 50 годам. Связь слабоумия и привычек | Владимир Алипов

Нейробиолог: Как не отупеть к 50 годам. Связь слабоумия и привычек | Владимир Алипов

How New AI Leaders Succeed in Running Their First AI Project (Kathleen Walch)

How New AI Leaders Succeed in Running Their First AI Project (Kathleen Walch)

Agentic AI for Software Security: Eliminate More Vulnerabilities, Triage Less

Agentic AI for Software Security: Eliminate More Vulnerabilities, Triage Less

How AI Is Revolutionizing Contract Reviews for Legal Teams

How AI Is Revolutionizing Contract Reviews for Legal Teams

"ЭТО ПОСЛАНИЕ НАМ, РОССИИ". Пропагандисты разочаровались в Трампе из-за ударов по Ирану

Cost of a Data Breach 2024 Trends

Cost of a Data Breach 2024 Trends

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]