Transcript
A (0:01)
Welcome to to the Point Cybersecurity Podcast. Each week, join Jonathan Neffer and Rachel Lyon to explore the latest in global cybersecurity news, trending topics and cyber industry initiatives impacting businesses, governments and our way of life. Now, let's get to the Point. Hello, everyone. Welcome to this week's episode of to the Point podcast. Hi, I'm Rachel Lyon, here with my co host, John Neffer. John, hello.
B (0:31)
Hello, Rachel.
A (0:33)
So I have to tell you, I've been cleaning out my storage closet and I got my grandmother's piano and I brought it back to the house. And for anyone trying to relearn the piano after not playing for like 35 years, it's quite, quite an interesting activity. My brain is like exploding, but I feel like it's going to come back any day now.
B (0:55)
But I don't know, it'll come back as soon as all those fingers learn to work together.
A (1:00)
Yes, yes. The nimbleness. I gotta get back. For sure. I gotta get back. Well, we're gonna have a really fun conversation today. Anytime we can look at security through the legal lens. It really is fun and fascinating and I'm excited to welcome today's guest, Devon Carter. He's a leading cybersecurity expert, special specializing in privacy law, risk management and security solutions with certifications including cissp, cism, cipp, us. He advises a wide range of clients from government agencies to multinational corporations on protecting critical information and ensuring regulatory compliance. No small feat. Welcome, Devon.
C (1:43)
Thank you for having me. You mentioned piano, and I was just at my son's piano recital last night. Oh, wow. Yep, yep.
A (1:51)
That's wonderful. He has any tips and tricks for getting back in the groove? I would love them. It's been a slog trying to get through the learning handbook by myself.
C (2:03)
Absolutely. I'll ask him and get back to you.
A (2:06)
Thank you. Thank you for that.
C (2:08)
I appreciate it. Excellent.
B (2:10)
Well, Devon, let's jump right into this. Can you give us some background about how working in cybersecurity and compliance and so on has. And of course, being an attorney and on the legal side, how that's shaped the way you approach cybersecurity strategy?
