She Said Privacy/He Said Security cover art

She Said Privacy/He Said Security

She Said Privacy/He Said Security

By: Jodi and Justin Daniels
Listen for free

LIMITED TIME OFFER | £0.99/mo for the first 3 months

Premium Plus auto-renews at £8.99/mo after 3 months. Terms apply.

About this listen

This is the She Said Privacy / He Said Security podcast with Jodi and Justin Daniels. Like any good marriage, Jodi and Justin will debate, evaluate, and sometimes quarrel about how privacy and security impact business in the 21st century. Economics Leadership Management Management & Leadership
Episodes
  • From Manual to Automated: Building Privacy Programs That Scale
    Jan 8 2026

    Ron De Jesus is the Field Chief Privacy Officer at Transcend, driving practical privacy governance and industry advocacy. He previously led privacy at Grindr, Tinder, and Match Group, built global programs at Tapestry and American Express, founded De Jesus Consulting, and remains an active community leader through the IAPP and LGBTQ Privacy & Tech Network.

    In this episode…

    Privacy professionals navigate a growing web of privacy regulations and emerging technologies, yet many still rely on manual processes to manage their programs. Teams might track global requirements in spreadsheets and manually triage privacy rights requests. To scale privacy programs effectively, teams need to move beyond manual approaches. So what should privacy teams consider as they adopt automated solutions?

    The key to scaling privacy programs efficiently lies in embracing automation and technology that aligns with an organization's broader goals. When privacy leaders secure early buy-in from stakeholders, technology decisions are more likely to support the business beyond basic compliance needs. Teams also need clarity on what they are trying to accomplish, a thorough understanding of where their data lives, and time to evaluate how new tech fits into their existing systems and workflows. Sometimes teams expect third-party privacy tools to work out of the box and solve their compliance needs. However, that is often not the case, and why companies must review and test vendor tech solutions to ensure they accurately meet company requirements.

    In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels talk with Ron De Jesus, Field Chief Privacy Officer at Transcend, about transitioning privacy programs from manual processes to automation. Ron emphasizes the importance of internal alignment when adopting privacy technology, discusses the risks of treating privacy tools as plug-and-play compliance solutions, and highlights the need for companies to review vendor tech solutions against their specific requirements and legal obligations. He also explains how the privacy community helps shape his view of how teams operationalize privacy in practice and shares his prediction for what's in store for privacy professionals in 2026.

    Show More Show Less
    27 mins
  • Why Knowing Company Data is Every General Counsel's First Privacy Move
    Dec 18 2025

    Talar Herculian Coursey is the GC and VP HR for ComplyAuto, a SaaS company serving auto dealerships in the US. Talar was previously the GC for Vista Ford and a file clerk, associate, and partner at the national labor and employment law firm, Fisher Phillips LLP.

    Talar is licensed to practice law in California and Utah. She is also a CIPP, CIPM, certified yoga instructor, certified life coach, and a retired dog walker.

    In this episode…

    Knowing the types of data a company collects is essential for building strong privacy and security practices. Many organizations collect a wide range of sensitive information, including financial data, identity documents, and data created through connected technologies. Employees often rely on text messages and mobile apps to communicate, creating touchpoints where sensitive information is shared with third parties. So, how can general counsels and privacy pros safeguard sensitive information while accounting for the risks introduced by third-party vendors?

    Protecting sensitive information starts with establishing policies and processes that reflect how data flows through an organization and understanding how teams communicate with consumers. That's why it's important to provide employees with secure, encrypted channels when communicating with customers. Customized training is equally important, and using gamification and tailored phishing simulations helps engage employees, deepen their understanding of the sensitive information they handle, and improve their ability to recognize potential privacy and security risks. By pairing these tools with training that is specific to the work environment, general counsels and privacy pros can help employees stay vigilant and reduce the likelihood of privacy and security incidents.

    In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels talk with Talar Herculian Coursey, General Counsel and Vice President of Human Resources at ComplyAuto, about managing privacy and security risk tied to data collection practices. Drawing on her experience in the automotive dealership industry, Talar explains why understanding the types of data companies collect is critical to building effective privacy and security programs. She explains how companies can strengthen their defenses through encrypted communication tools and customized employee training programs. Talar also outlines the significant risks posed by third-party vendors and offers practical tips for managing these risks.

    Show More Show Less
    27 mins
  • So You Got the Privacy Officer Title, Now What?
    Dec 11 2025

    Teresa "T" Troester-Falk has over 20 years of experience building privacy programs that work when resources are limited and timelines are real. She led initiatives at DoubleClick (Google), Epsilon, Nielsen, and Nymity (TrustArc) before founding BlueSky Privacy and BlueSky PrivacyStack. Today she creates practical tools and systems that help privacy professionals step into their role with confidence and give executives decisions they can act on. Through her writing and teaching, she brings clarity to complex requirements and shows how privacy can succeed in practice.

    In this episode…

    Privacy professionals step into their roles with foundational knowledge, yet often without the support needed to apply it in practice. They are sometimes expected to build and maintain privacy programs without a budget, authority, or a clear plan. This gap creates daily uncertainty, especially for newly certified privacy professionals who enter the field with little operational experience. So how can privacy professionals move through these challenges and build programs they can defend with confidence?

    Building a functioning privacy program requires making decisions in gray areas and moving forward without waiting for perfect information. Privacy pros can start by focusing on high-risk areas first and documenting their decision-making process using a three-pillar approach. This framework helps professionals explain the decision they made, maintain what was decided, and defend it with evidence. Clear ownership and accountability ensure processes hold over time. With the right operational structure in place, privacy pros can move privacy programs forward even when resources are tight.

    In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels talk with Teresa Troester-Falk, Founder of BlueSky Privacy and BlueSky PrivacyStack, about building effective privacy programs with limited resources. Teresa explains how a simple decision-making framework can help new and seasoned privacy professionals work through ambiguity. She also shares strategies for prioritizing privacy work when budgets are tight and expectations are high, and explains why establishing ownership and operational processes are essential for sustaining long-term privacy success.

    Show More Show Less
    22 mins
No reviews yet