On March 24, 2009, the Michigan Homeland Security Consortium hosted a panel discussion addressing Data Privacy. The panel comprised experts in the fields of encryption, law, and forensics. While the business leaders in attendance worked in different fields, they were united in their concern for the security of their core information assets. Below is a summary of the panel discussion. Security BreachesRamie Phillips III, CTO of Encryption Security Solutions/Pure Entropy Technologies Unfortunately, the value of information is not fully realized until it is lost. This is especially true in the case of personal and competitive information. Through the use of case studies, Mr. Phillips emphasized the benefits of a proactive security strategy when protecting critical data.Privacy and Identify Theft Kathy Osian – Attorney, Miller/Canfield Every industry can mark its progress to maturity by the laws imposed to deal with its social and business implications. Mrs. Osian discussion focused on privacy legislation including HIPAA, COPPA, and FACTA. She described the challenges involved in creating effective legal protection for the victims of privacy breaches. Understanding Privacy and SecurityDwayne Hopkins – CEO, Innovation Corporate Solutions The modern threat landscape requires that businesses respond with an integrated risk management plan. Mr. Hopkins described the steps that every company must take to understand the value of its data and protect it accordingly. He also stressed that security must be integrated into the corporate ethos.The event closed with a round table discussion that included Nanette Poulious, Director of the Information Assurance program at Walsh College. The questions posed to the panel reflected a readiness from the business community to consider information security as business enabler. Given the damage from recent data breaches, this attitude must be embraced throughout this nation. Related content opinion Positioning the Security Team Through Influence Part 1 Influence styles are a reflection of the influencers and, by extension, their team. Thus, they must understand the situations to which different styles are applicable. This series explores the common influence styles and their application. By Steven Fox Apr 21, 2012 3 mins Technology Industry IT Jobs opinion From Obstacle to Ally - Repositioning the Security Team Pt 1 By Steven Fox Apr 08, 2012 3 mins Technology Industry IT Strategy opinion Key Sessions at CISO Executive Summit 2011 By Steven Fox Dec 03, 2011 3 mins Business Continuity Data and Information Security Careers opinion Securing User Credentials On Mobile Devices By Steven Fox Nov 15, 2011 4 mins Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe