Debbie Reynolds Keynote Speaker

Data Privacy and Emerging Technology

Debbie Reynolds Keynote Speaker Data Privacy and Emerging Technology

 

Debbie Reynolds is the Founder, CEO, and Chief Data Privacy Officer of Debbie Reynolds Consulting LLC. Debbie Reynolds, “The Data Diva,” is a world-renowned technologist, thought leader, and advisor working at the intersection of Data Privacy, Technology, and Law. Ms. Reynolds is an internationally published author and top media presence about Global Data Privacy, Data Protection, and Emerging Technology issues. In addition to her successful consulting career, Reynolds is a sought-after global keynote speaker on Data Privacy and Emerging Technologies for businesses.

As a keynote speaker, Reynolds brings a unique perspective to Data Privacy and Emerging Technologies. With a career spanning over 20 years, Reynolds has firsthand experience with the challenges and opportunities that come with the rapid advancement of technology for businesses. She understands the importance of protecting sensitive information and the need for businesses to adapt to new technologies to stay competitive.

In her speeches, Reynolds often discusses the growing concern over Data Privacy and the need for businesses to prioritize the protection of their customer's personal information. She emphasizes the importance of implementing robust security measures and adopting reasonable privacy programs to safeguard against data breaches and cyber-attacks. Reynolds also discusses the potential benefits of Emerging Technologies such as Artificial Intelligence(AI), the Metaverse(XR), Quantum Computing, FinTech, Biometrics, The Internet of Things (IoT), Natural Language Processing (NLP), and Machine Learning and how these tools can help businesses improve their operations, increase their revenue, and better serve their clients.

In addition to her extensive knowledge of data and data systems, Reynolds also brings a sense of humor and charm to her speeches. She can engage her audience and deliver her message in a relatable and entertaining manner. This talent makes Debbie Reynolds, “The Data Diva” a popular choice for keynote speaking engagements at conferences and events focused on Data Privacy and Emerging technologies.

Debbie Reynolds is an excellent choice as a keynote speaker on Data Privacy and Emerging Technologies for businesses. Her unique perspective and engaging speaking style make her a valuable asset for any event focused on these important topics.


Top Ten Keynotes 2023

"Generative AI and the Future of Cybersecurity and Data Privacy in the Enterprise"

With the 2022 release of two groundbreaking Generative AI models open to the public, like Dall-E to create images and ChatPGT to create text when prompted, no AI topic has received so much attention. But what is Generative AI, and what do businesses need to know about the Legal, Cybersecurity, and Data Privacy concerns of Generative AI?

This session will cover the various types of Generative AI, their uses and applications, and the ethical considerations surrounding their development and deployment. We will define Generative AI used to create text, images, audio, and video, discuss potential uses of Generative AI in business, explore the legal, ethical, Cybersecurity, and Data Privacy risks of use, and look at existing and emerging regulatory issues that may be implicated. 

Understanding Digital Assets: An Introduction to Cybersecurity and Data Privacy Concerns for Business

Digital Assets are a store of value that only exists in the digital world, like non-fungible tokens (NFTs),  self-executing smart contracts, cryptocurrency, etc. These emerging technological innovations bring unique benefits and risks that have Legal, Cybersecurity, and Data Privacy challenges, like proof of ownership, the value of assets, protection against theft or scams, lack of regulation, protection of data using the blockchain to transfer information, etc.  

This session will cover the various types of Digital Assets, their uses and applications, and the ethical considerations surrounding their creation and transfer. We will explore the legal, ethical, Cybersecurity, and Data Privacy risks of use and look at existing and emerging regulatory issues that may be implicated. 

"Web 3.0 and the Evolving Landscape of Cybersecurity and Data Privacy for Businesses"

Web 3.0 is often discussed but rarely explained!

Web 3.0, also known as the "Semantic Web," is the next generation of the Internet, in which data is more interconnected and machine-readable, enabling new capabilities such as decentralized computing, Digital Asset security, data protection by design, Artificial Intelligence, and the Internet of Things(IoT). This course will cover the legal implications of these new technologies, including Data Privacy and cybersecurity issues. 

This session will cover the evolution from Web 1.0 to Web 2.0 to Web 3.0,  the existing and new legal frameworks and regulations that may apply to Web 3.0, and how to navigate the complex landscape of emerging technologies. We will explore the legal, ethical, Cybersecurity, and Data Privacy risks of use and look at existing and emerging regulatory issues that may be implicated.

"The Importance of Data Literacy in the Era of Cybersecurity and Data Privacy"

In an increasingly digital world, businesses must find novel ways to be more conversant in the digital domain of their clients.  This session will explore digital literacy and why it is vital to businesses, key technology concepts and terminology that will better help organizations understand the challenges their clients face, and ways to improve maturity in digital literacy continually.

This session will explore what data literacy is and why it is a challenge for businesses,  how organizations can use Data Literacy to better communicate with internal and external clients, explore key concepts and terminology of data literacy, and the best next steps to embrace data literacy.

"Navigating the Landscape of Emerging Data Types: Key Cybersecurity and Data Privacy Insights for Businesses"

Data is ubiquitous and ever-growing. As we live in a rapidly digital world, more data and new data types are being created. As a result, many emerging data concerns things as biometrics, virtual and augmented reality, the Internet of Things (IoT), Smart devices, the Metaverse, and others involving Data Privacy, Data Protection, and Cybersecurity are on the horizon.  In this session, we will discuss types of technologies that create and use emerging data,  regulations and ethical concerns about and rights of the individual, and what businesses need to know about emerging data to succeed in the future with their businesses. 

This session will explore what emerging data is and why it is a challenge for businesses, the types of technologies that create emerging data types, the ethical concerns when using emerging data, the Data Privacy and Cybersecurity Concerns of emerging data types, and the best next steps to best leverage emerging data. 

"Future Threats to Cybersecurity and Data Privacy: The importance of Post-Quantum Cryptography for Businesses"

The development of Quantum Computing, digital computing that is vastly more powerful and capable than current computers, will create new opportunities and risks that will greatly impact most industries.

Huge opportunities with Quantum Computing include, for example, the ability to solve extremely complex problems more quickly than traditional computing. In addition, Quantum Computing will present more risks as, for example, Quantum Computers will be more capable of decrypting modern-day Cryptography used to secure the Internet and other critical applications and greatly increase the ability to leverage Machine Learning (ML) and Artificial Intelligence (AI). Also, as the technology becomes more complex, there is a need for better explainability and understanding of Quantum Computing. It becomes apparent that applications vulnerable to algorithmic bias (e.g., in the employment screening space, policing, etc.) may become even more so. In other words, Quantum Computing may have a magnifying negative side effect that could render such applications too risky to use absent special mitigating controls.

This session will define Quantum Computing and Post Quantum Cryptography and what businesses need to know, explore the benefits and risks of both, provide use cases and practical examples of scenarios that Quantum Computing and Post Quantum Cryptography may impact, and provide a survey of the legal, Data Privacy and Cybersecurity landscape including frameworks created to protect data in the Post Quantum Cryptography world, address Quantum Computing explainability, mitigating bias in AI, and look regulatory issues that may be implicated.

"Navigating the Cybersecurity and Privacy Challenges of the Internet of Things"

Connected devices and the internet of things (IoT) objects are all around us, including things like smartphones, smart doorbells, smart speakers, Smart thermostats, etc. A recent study stated that many businesses have more IoT and connected devices than computers. With more varied types of connected devices and IoT objects, there is an increase in data collection, risk, and a rapidly changing regulatory landscape.

 This session will explore types of connected devices and Internet of Things objects, how they collect data, the emerging opportunity and threats caused by these technologies, the current and emerging regulatory landscape, and what businesses need to know to stay rear of these new development opportunities.

"Navigating the Cybersecurity and Data Privacy Implications of Facial Recognition and Other Biometric Technologies"

Facial recognition has entered the mainstream with uses as varied as using biometrics instead of passwords, checking temperatures due to Covid–19 and uses in facility security and employee timekeeping. Facial recognition and other biometric data captures are becoming hot topics as we see more regulations and fines for businesses using these technologies, and a legal tightrope as businesses try to use emerging technologies is part of the new normal. There is also a risk in the legal frameworks and fines for businesses that use biometrics in ways that are counter to growing consumer and employee rights.

 This session will define concepts like facial recognition versus facial capture, explore the debate about the proper Data Privacy security concerns with biometric data capture, legal cases, the new and varied types of emerging biometrics, and what businesses need to know to stay informed about the benefits, risks, and regulatory issues with the use of biometrics.

"Navigating the Cybersecurity and Data Privacy Implications of the Metaverse: A Business Guide to Virtual and Augmented Reality"

Advancements in technology and digital realms are bringing forth new uses that will impact individuals and businesses. Although we may have heard buzzwords like the Metaverse, Virtual Reality, or Augmented reality, what do these emerging technologies mean for businesses?

This session will dive deep into the description and explanation of Metaverse, Virtual Reality, and Augmented Reality, the unprecedented data collection, the current and emerging uses cases, the regulatory and ethical landscape of emerging technology uses, and what businesses need to know to stay informed about the advantages and risks of these emerging technologies.

  • Featured Speaker: Ask the Expert: Are You Ready for the CPRA? – Q&A with Debbie Reynolds “The Data Diva”, and Demeka Fields of New Balance, IronClad, February 2021

    Data Protection 2021: Key Data Privacy and Cybersecurity Best Practices, Women in Cybersecurity Canada, January 2021

    Keynote: Data Protection 2021: Key Data Privacy and Cybersecurity Best Practices, CyberLancers, January 2021

    Keynote Speaker: California Consumer Privacy Act (CCPA) Year in Review, Compliance Week, December 2020

    Featured Speaker: The Right to be Forgotten: Managing GDPR risk of data erasure for businesses, IAPP, November 2020

    Fireside Chat: Data Privacy, Automobiles & Your Personal Data; What you Need to Know Now, Debbie Reynolds and Helen Oakley of Leading Cyber Ladies, siberX, CISO Forum Canada 2020, November 2020

    Featured Speaker: Managing Data Transfers After the EU-US Privacy Shield Invalidation: A Deep Dive with the Data Diva, Debbie Reynolds, International Association of Privacy Professionals (IAPP), October 2020

    Featured Speaker: Why Cybersecurity and Data Privacy are crucial to the future of business, SMB-Cybersummit sponsored by CYBERX Cybersecurity Solutions. April 2020

    Featured Speaker: The CCPA Ripple effect: The Impact of CCPA Outside of California,The National Association of Women Lawyers, webcast, February 2020

    Featured Speaker: The Impact of GDPR, CCPA, and Global Data Privacy developments on eDiscovery, Women in eDiscovery, Chicago, January 2020

    Featured Speaker: Consumer Data Protection: The Future of Consumer Identity, Data Privacy, and Trust, Consumer Identity World EU 2019 conference hosted by KuppingerCole Analysts AG Amsterdam Netherlands, October 2019

    Speaker: GDPR Guidance as it Relates to eDiscovery, Illinois Paralegal Association (IPA) Fall Conference Chicago, November 2018

Popular Keynote Topics



  • Data Privacy and The Future

    • Data Privacy and Antitrust

    • Data Privacy and Impact on Investor Profits

    • Third-Party Data Transfer Risk and Consent

    • Data Privacy and Data Intermediaries

    • Data Privacy and Inferences

    • EU Standard Contract Clauses its impact on Data Privacy

    • Data Privacy And Data Accuracy

    • The global impact of GDPR

    • Data Privacy and Data Localization

    • Third-Party Doctrine and Data Privacy

    • Data Privacy and "Derivative Works"

    • Data Privacy The UN And Privacy Enhancing Technology (PET)

    • Data Privacy and the Problem of Third-Party Data

    • Data Privacy and Incremental Consent

    • How the Coronavirus (COVID-19) impacts global Data Privacy

    • Human vs. Consumer Data Privacy Laws

    • Data Privacy, GDPR, and Immaterial Harm

    • Data Privacy, Data Tracking, And Transparency

    • Data Privacy and The Perception of Encryption in Courts

    • Data Privacy, Five Eyes Countries, and Encryption

    • Data Privacy, Trust, and Differential Privacy

    • Business implications of Data Privacy in India

    • The Right to be Forgotten: Managing GDPR risk of data erasure for businesses

    • Data Privacy and Tech Companies as Intermediaries

    • Data Privacy and Credit Ratings

    • Data Privacy and the impact of the CCPA beyond California

    • Managing Data Transfers After the EU-US Privacy Shield Invalidation

    • Data Privacy and the Geopolitics of the EU US Privacy Shield Invalidation

  • Global Data Privacy Regulations

    • Data Privacy and Illinois Biometric Information Privacy Act (BIPA)

    • The California Privacy Rights Act (CPRA)

    • California Consumer Privacy Act (CCPA)

    • 1986 Stored Communications Act (SCA)

    • UK Standard Contract Clauses 2022

    • EU ePrivacy Directive

    • China’s Personal Information Protection Law (PIPL)

    • UAE Protection of Personal Data Law (PPD)

    • Global Cross Border Privacy Rules (CBPR)

    • Computer Fraud and Abuse Act (CFAA)

    • APEC Cross-Border Privacy Rules (CBPR)

    • European Strategy for Data (EUSD)

    • Australia’s Surveillance Identify and Disrupt Bill

    • The General Data Protection Regulation (GDPR)

    • Mutual Legal Assistance Treaties (MLATs) and Data Privacy

    • Privacy implications of complying with CCPA and HIPAA

    • How the 2001 US Patriot Act impacts Data Privacy

    • Data Privacy and the US “Cloud Act”

    • Data Privacy International Traffic in Arms Regulations (ITAR)

    • Data Privacy and WhatsApp and GDPR Fine 2021

    • Data Privacy and EU Standard Contract Clauses 2021

    • Data Privacy and the EU Directive on Collective Redress

    • Data Privacy and Brexit

    • Data Privacy, SCOTUS, and the Computer Fraud and Abuse Act

    • Data Privacy the US and FTC New Rules

    • Data Privacy and UK’s Age Appropriate Design Code

    • New York City's Tenant Data Privacy Act (TDPA)

    • The US FTC Health Breach Notification Rule

    • Data Privacy and 1996 US Communications Decency Act & Encryption

    • Data Privacy and The EU Digital Services Act

    • Data Privacy, Schrems II, and the U.S. Cloud Act

    • Data Privacy and After the Privacy Shield

  • Data Privacy and Emerging Technology

    • Data Privacy for Mobile App Developers

    • Google’s Accelerated Mobile Pages (AMP)

    • Global Privacy Control (GPC)

    • Data Privacy and Encryption

    • Google’s Privacy Sandbox for Android

    • Data Privacy and Reverse Search Warrants

    • Data Privacy and The Metaverse

    • Data Privacy and Post Quantum Cryptography

    • The impact of IoT (Internet of Things) on Data Privacy

    • Data Privacy, Smart Cities, and Fusion Technologies

    • Data Privacy and Digital Cartography

    • Data Privacy and Thermal Cameras

    • Cryptocurrency and Data Privacy

    • Data Privacy and 5G Networks

    • The global impact of geospatial Data Privacy

    • Digital Widgets and Data Privacy

    • Data Privacy, Inferred Radiation (IR), and Decryption

    • Data Privacy and Virtual Reality (VR)

    • Data Privacy and Smartphone Accelerometers

    • Data Privacy And Open Source Intelligence (OSINT)

  • Data Privacy and Biometrics

    • Biotechnology in the Age of Pandemic: Data Privacy and Surveillance.

    • Data Privacy and DNA Testing

    • Data Privacy and Voiceprinting

    • Data Privacy and Biometric Psychography

    • Facial Recognition, Bias, and Data Privacy

    • Data Privacy and Voice Recognition Devices

    • The global impact of digital health apps on Data Privacy

    • Data Privacy And Biometric Reference Databases

    • Data Privacy and Facial Recognition

    • Digital Identity "Digital Twin" and Data Privacy

    • Data Privacy And Emerging Biometric Data Captures

    • Data Privacy and IoT Facial image capture and Faceprinting

  • Internet of Things (IoT) and Connected Devices

    • Data Privacy and Drones

    • The Internet of Bodies (IoB)

    • Sports Biomechanics And Optical Tracking

    • IoT And Right To Repair Laws

    • Data Privacy And Automobile Telematics

    • Data Privacy Chip Advances And “Always-On” Mobile Camera

    • Data Privacy And Apple's Private Relay

    • Data Privacy and Video Surveillance with Audio Capabilities

    • Data Privacy and Automobiles

  • Ad Tech and Artificial intelligence (AI)

    • Data Privacy and Deep Fakes

    • "Digital Beacons" and Data Privacy

    • Data Privacy and Netflow Data

    • Data Privacy and Cookies

    • Behavioral Advertising And Norway Grindr Fine 2021

    • Data Privacy, IAB Europe Transparency & Consent Framework

    • Data Privacy and Data Purpose Jacking

    • Data Privacy and Nudge Technology

    • Data Privacy, Ad Targeting, and Bias

    • Data Privacy And Spain’s Artificial Intelligence Agency

    • Data Privacy And The UK Algorithmic Transparency Standard

    • Data Privacy, The U.S. Capitol Attack, and AI Transparency

    • Data Privacy, Google, and Android (AAID)

    • Data Privacy, Digital Fingerprinting, Probabilistic Attribution

    • Data Privacy, Data Scraping, and Clearview AI

    • Data Privacy, AI, and Activity Forecasting

    • Data Privacy, Steganography, and Adversarial AI

    • Data Privacy, AdTech, and Real-Time Bidding (RTB)

    • The Global impact of AdTech on Data Privacy

  • Data Protection and Cybersecurity

    • Data Privacy, Sensitive Data, and APIs

    • Data Privacy And Fast Identity Online (FIDO)

    • The Gramm-Leach-Bliley Act Updated Safeguard Rule 2022

    • Data Privacy, EU’s PSD2 Directive, and Open Banking

    • New York Shield Act, Cybersecurity, and Data Privacy

    • Data Privacy and Breach of Board-Level Oversight

    • Data Privacy and U.S. Fifth Amendment and Passwords