TROPT Webcast Episode 1: The Privacy Tech Landscape

Image for post
Image for post

We’re thrilled to have had overwhelming feedback and inquiries about what’s next since our inaugural Summit in June.

Among many other things, we’re testing The Rise of Privacy Tech webcast. The webcast’s main goal is to feature key players in the privacy tech space given our mission, which is to fuel privacy innovation by bringing together privacy tech innovators, investors, advisors, and advocates to bridge the privacy tech-capital-expertise gaps.

If have ideas or would like to get involved as a speaker or a sponsor, please let us know by emailing us at

We’ll be publishing episode video recordings and notes, beginning with this episode 1.

Episode Description

TROPT Founder, Lourdes M. Turrecha, welcomed TROPT advisors, Micky Finneran Dennedy (CEO, The iDennedy Project) and Melanie Ensign (CEO, Discernible, Inc.) as the first guests of the series. They discussed the privacy tech landscape, pulling from their combined decades of privacy expertise plus their current work as operators, advisors, founders, and consultants in privacy tech.

TROPT Webcast Episode 1: The Privacy Tech Landscape

Some Episode Takeaways

  • Privacy tech on the rise: The speakers are long-time privacy professionals who have turned to the privacy tech landscape as founders, advisors, and consultants after observing the nascent privacy tech landscape’s rise. Each of them have witnessed the increasing number of privacy tech founders and investors who are reaching out for advice on privacy problems that are solvable through tech solutions.

Information privacy is concerned with the collection, use, dissemination, retention, and other processing of personal information, including the associated individual rights that empower individuals to take control over their personal information. Whereas, information security is concerned with the confidentiality, integrity, and availability of information (not just personal information, but also trade secrets, intellectual property, and other information that warrants securing) and the systems that process such information. The two domains intersect: privacy requires that personal information be secured during its entire lifecycle — from collection and use, to transit, storage, and destruction. But the privacy domain covers a breadth of inquiries beyond security, such as transparency (notice and consent), data minimization, purpose specification, individual rights, etc.

  • Privacy tech beyond compliance: The funding focus and activity in privacy tech has primarily been in the B2B space, oftentimes on compliance tools, especially in light of GDPR and CCPA. This means that there is a whole lot of innovation waiting to happen and opportunity waiting in non-compliance privacy tech solutions.

Episode Links

Written by

Founder & CEO @PIX_LLC @PrivacyTechRise | Privacy & Cybersecurity Strategist & Board Advisor| Reformed Silicon Valley Lawyer | @LourdesTurrecha

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store