Skip to content ↓ | Skip to navigation ↓

Outside of the Security B-Sides conference, I spoke with Paul Reymann, CEO of the Reymann Group, and one of the authors of Data Security Rules for the Banking Industry.

Reymann and I talked about the most overlooked avenue for data loss, and that’s the use of third party data recovery vendors. They’re causing significant exposure to personal data. Companies don’t think to vet these data recovery vendors, and as a result this sleeper risk is turning out to be a real risk.


  • Steve Mellings

    There are other areas of concern as well. Warranty RMA, vendor trade in, and end of lease are all scenarios where the data controller willingly gives their infrastructure to 3rd parties most often with data on. Whilst encryption can offer some protection only a proper data overwriting process can ensure that the data is managed appropriately.

  • Steve Mellings

    There are other areas of concern as well. Warranty RMA, vendor trade in, and end of lease are all scenarios where the data controller willingly gives their infrastructure to 3rd parties most often with data on. Whilst encryption can offer some protection only a proper data overwriting process can ensure that the data is managed appropriately.

  • Pingback: 5 Best Videos from the RSA Conference (#RSAC)()