Rebecca Herold
![Rebecca Herold](https://www.sourcesecurity.com/img/people/rebeccaherold-300x300.jpg)
Rebecca Herold
CEO & Cofounder, Privacy & Security BrainiacsRebecca Herold is the CEO, Privacy & Security Brainiacs SaaS Services and The Privacy Professor Consultancy. She is an entrepreneur, and author & was an Adjunct Professor for the Norwich University Master of Science in Information Security & Assurance Program for 9 years where she also created the programme curriculum. Herold led the NIST Smart Grid privacy group for 7 years and is a founding member of the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group (June 2015). Rebecca has received numerous awards and recognitions for her work throughout the course of her career. Rebecca has a B.S. in Math & Computer Science & an M.A. in Computer Science & Education.
Round table contributions
The design of buildings encompasses many elements, from the practical to the aesthetic. Well-designed buildings should be functional, and they can also be beautiful and inspiring. But can security sys...
In today's interconnected world, the lines between physical and digital security are blurring. This means that threats can easily exploit vulnerabilities in both realms, potentially causing significan...
Protecting access control data is a core concept when it comes to safeguarding information assets, maintaining trust, and ensuring smooth operations. Guarding access to data also ensures compliance wi...
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to im...
Security and privacy are often seen as being at odds. In effect, you must have less of one in order to get more of the other. However, newer technologies are eliminating the need to make such a diffic...
News mentions
The design of buildings encompasses many elements, from the practical to the aesthetic. Well-designed buildings should be functional, and they can also be beautiful and inspiring. But can security sys...
In today's interconnected world, the lines between physical and digital security are blurring. This means that threats can easily exploit vulnerabilities in both realms, potentially causing significan...
Protecting access control data is a core concept when it comes to safeguarding information assets, maintaining trust, and ensuring smooth operations. Guarding access to data also ensures compliance wi...
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to im...
Security and privacy are often seen as being at odds. In effect, you must have less of one in order to get more of the other. However, newer technologies are eliminating the need to make such a diffic...