April 5, 2023

Privacy Threat Modeling with DoorDash's Nandita Rao Narla

How to Subscribe
Share In

Privacy threat modeling is a structured approach to identifying and assessing potential privacy risks associated with a particular system, application, or process. It involves analyzing how personal data flows through a system, identifying potential vulnerabilities or weaknesses, and evaluating the potential consequences of a privacy breach.

The goal of privacy threat modeling is to identify and prioritize potential privacy risks and to develop effective strategies for mitigating those risks. This process involves considering various aspects of the system or process being analyzed, including the data that is collected, how it is stored and processed, who has access to it, and how it is transmitted.

Privacy threat modeling can help organizations better understand their privacy risks and make more informed decisions about how to protect personal data. Implementing privacy measures and conducting regular privacy threat modeling can help organizations minimize the risk of a privacy breach and ultimately save them money in the long run.

Nandita Rao Narla, Head of Technical Privacy & Governance at DoorDash, joins the show to explain privacy threat modeling, the common misconceptions, and how to make a privacy threat model program successful.

Topics:

  • What is privacy threat modeling?
  • How do you balance the need to collect and use data with the need to protect privacy, and what role does privacy threat modeling play in this process?
  • Who typically owns this process in an organization?
  • What are some of the typical approaches companies follow to privacy threat modeling?
  • How should companies think about setting up a process to continually iterate and evolve the model?
  • Once you’ve performed this process, how do you go about fixing the identified issues?
  • What are some common misconceptions about privacy threat modeling, and how would you address those misconceptions?
  • How do you determine which threats to prioritize when conducting privacy threat modeling, and what factors do you consider when making these decisions?
  • How do you involve stakeholders (e.g. customers, employees, regulators) in the privacy threat modeling process, and what benefits do you see in doing so?
  • What challenges have you encountered when conducting privacy threat modeling, and how have you overcome these challenges?
  • How does privacy threat modeling differ from other types of risk assessments (e.g. security risk assessments), and what unique challenges does it present?
  • What advice would you give to other companies looking to implement privacy threat modeling as part of their privacy and security strategy?
  • How do you see privacy threat modeling evolving in the future?

Resources:

Other Podcast

September 11, 2024

Pseudo-anonymization of Data with Jack Godau

In this episode, Sean sat down with Jack Godau to dive deep into the world of pseudoanonymization. Jack shared how pseudoanonymization differs from anonymization, explaining its value for maintaining data utility while complying with stringent regulations like GDPR.

August 28, 2024

The Evolution of Certificate Management with Anchor Security's Ben Burkert

In this episode we explore how certificates and TLS function, the inherent difficulties in managing internal TLS certificates, and why nearly every engineer has a horror story related to it.

August 14, 2024

What is a Data Lakehouse with Upsolver's Ori Rafael

In this episode, we sit down with Ori Rafael, CEO and Co-founder of Upsolver, to explore the rise of the lakehouse architecture and its significance in modern data management.