Podcast: Play in new window | Download (Duration: 20:11 — 18.5MB)
Subscribe: Google Podcasts | RSS
In this episode of CHATTINN CYBER, Marc Schein interviews James Mottola, the Vice President of Data Privacy, Investigations, and Security for Porzio Compliance Services. He served 25 years in the United States Secret Service as former Special Agent in charge of the Newark Field Office of the United States Secret Service. Jim discusses how he leverages his experience to advise clients on matters of information security, data privacy, physical security, schools’ safety, internal corporate investigations, incident response management, and other compliance-related matters.
Over his 25-year career, Jim worked on many cases pertaining to financial fraud. In that time, fraud schemes have grown more sophisticated and entered into online spaces. Most businesses are underprepared and under matched to defend against these new tactics, making them easy targets. Jim explains how the greater presence of digital information has made it easier for criminals to commit identity theft.
The digital world continues to grow exponentially, particularly in light of the COIVD-19 pandemic. Jim unpacks how e-commerce giants are influencing user behavior. How we can control the digital world and live normally when it is evident that cybercrime disruptions will increase?
Jim advises people to take control of their information since technology is evolving:
“I think as a society we got to take a hold of our information and we have to, unfortunately, put more obligation on businesses on how they have our information, what they do with our information.”
Jim continues on why there’s a need for public and private co-operation to protect individual rights. “Together we need to figure out what are the threats we need to work on, focus on those, and then collaborate as best as possible.”
What You Will Learn:
- How the digitization of information is aiding in the facilitation of identity theft cybercrimes.
- The future of eCommerce in influencing consumer behavior and how it will create cyber disruptions.
- How to install resilient measures to combat cybercrime
- Why public and private sectors need to partner to protect individual’s rights.