{"id":3769,"date":"2017-03-03T20:10:35","date_gmt":"2017-03-04T02:10:35","guid":{"rendered":"https:\/\/thiemeworks.com\/?p=3769"},"modified":"2021-05-05T05:06:15","modified_gmt":"2021-05-05T10:06:15","slug":"when-privacy-goes-poof","status":"publish","type":"post","link":"https:\/\/thiemeworks.com\/videos\/when-privacy-goes-poof\/","title":{"rendered":"When Privacy Goes Poof!"},"content":{"rendered":"

[et_pb_section fb_built=”1″ fullwidth=”on” admin_label=”Section” _builder_version=”4.9.0″ _module_preset=”default” saved_tabs=”all”][et_pb_fullwidth_header title=”When Privacy Goes Poof!” subhead=”Why It’s Gone and Never Coming Back” text_orientation=”center” _builder_version=”4.9.4″ _module_preset=”default” subhead_font_size=”22px”][\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.22″][et_pb_row _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_video src=”https:\/\/www.youtube.com\/watch?v=atDgnkvzD8I” image_src=”\/\/i.ytimg.com\/vi\/atDgnkvzD8I\/hqdefault.jpg” admin_label=”YouTube Video” _builder_version=”4.9.4″ _module_preset=”default”][\/et_pb_video][et_pb_text admin_label=”Description” _builder_version=”4.9.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]<\/p>\n

“Get over it!” as Scott McNeeley said – unhelpfully. Only if we understand why it is gone and not coming back do we have a shot at rethinking what privacy means in a new context. Thieme goes deep and wide as he rethinks the place of privacy in the new social\/cultural context and challenges contemporary discussions to stop using 20th century frames. Pictures don’t fit those frames, including pictures of “ourselves.” We have always known we were cells in a body, but we emphasized “cell-ness”. Now we have to emphasize “body-ness” and see ourselves differently. What we see depends on the level of abstraction at which we look. The boundaries we imagine around identities, psyches, private internal spaces,” are violated in both directions, going in and going out, by data that, when aggregated, constitutes “us”. We are known by others more deeply in recombination from metadata than we know ourselves. We are not who we think we are. To understand privacy – even what we mean by “individuals” who want it – requires a contrary opinion. Privacy is honored in lip service, but not in the marketplace, where it is violated every day. To confront the challenges of technological change, we have to know what is happening to “us” so we can re-imagine what we mean by privacy, security, and identity. We can’t say what we can’t think. We need new language to grasp our own new “human nature” that has been reconstituted from elements like orange juice. The weakest link in discussions of privacy is the definition of privacy, and the definition of privacy is not what we think. Buddhists call enlightenment a “nightmare in daylight”, yet it is enlightenment still, and that kind of clarity is the goal of this presentation.<\/span><\/span><\/span><\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Post Nav Section” _builder_version=”4.8.2″ _module_preset=”default” background_color=”#ededed” global_module=”2999″ saved_tabs=”all”][et_pb_row _builder_version=”4.8.2″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.8.2″ _module_preset=”default”][et_pb_post_nav in_same_term=”on” _builder_version=”4.8.2″ _module_preset=”default”][\/et_pb_post_nav][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

“Get over it!” as Scott McNeeley said – unhelpfully. Only if we understand why it is gone and not coming back do we have a shot at rethinking what privacy means in a new context. Thieme goes deep and wide as he rethinks the place of privacy in the new social\/cultural context and challenges contemporary […]<\/p>\n","protected":false},"author":2,"featured_media":3867,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"

\"The Road to Resilience: Strategies for Playing Through the Pain\" by Richard Thieme at Def Con 26 (August 11 2018) is now available on you tube. 23rd year at Def Con.\u00a0 Connecting with the heart of a left-brain crowd.<\/p>

https:\/\/youtu.be\/TA8GksT707o<\/a><\/p>

https:\/\/www.youtube.com\/watch?v=TA8GksT707o&t=364s<\/a><\/p>

The Road to Resilience: Strategies for Playing Through the Pain <\/span><\/p>

by Richard Thieme - www.thiemeworks.com<\/a><\/span><\/p>

At one end of the spectrum, stressful events at work can add up to just another bad day. We have all had those. But toward the other end, information security work \u2013 which shades easily into work for the intelligence and defense communities \u2013 can be traumatic and impact us deeply.<\/span><\/p>

Sometimes the darker knowledge we gather can not be forgotten and abrades the way we like to think of ourselves or life in general. Sometimes we encounter momentous challenges to the ethics or morality we believe governs our actions. Sometimes we are compelled to do things that so seriously assault our core selves \u2013 our very sense of who we are \u2013 that it rises to the level of \u201cmoral harm,\u201d a category of damage often discussed today in relationship to war. <\/span><\/p>

We all bear scars. Resilience includes learning to live with them. But sometimes the challenges go beyond that. We deny or minimize or rationalize our experience in order to deal with it, but those strategies are ultimately self-defeating. The traumatic impact of what can never be forgotten - what we did or know others did while we stood by \u2013 can erode our enthusiasm for getting up in the morning and rising to the challenge of the everyday. <\/span><\/p>

Information security can bring us into situations we did not anticipate when we thought of the job as merely technical. Engaging with malevolent actors from individuals to criminal networks to nation states can call our fundamental assumptions into question. <\/span>The real cost goes beyond dollars. It is measured in family life, relationships, and mental and physical well-being. The real impact of this work on people over the long term has to be mitigated by counter-measures and strategies so scars can be endured or, even better, incorporated and put to use. <\/span><\/span><\/span><\/p>

Richard Thieme has listened closely for 25 years to information security and intelligence professionals who often struggle to \u201cplay through the pain.\u201d He presents meaningful strategies for transcending the consequences of being on the front lines of an undeclared war without borders where attackers have taken the high ground. He discusses these issues aloud to combat the silence that so often attends their mere mention.<\/span><\/p>

This conversation needs to happen.<\/span><\/p>","_et_gb_content_width":"","footnotes":""},"categories":[42],"tags":[],"_links":{"self":[{"href":"https:\/\/thiemeworks.com\/wp-json\/wp\/v2\/posts\/3769"}],"collection":[{"href":"https:\/\/thiemeworks.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thiemeworks.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thiemeworks.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thiemeworks.com\/wp-json\/wp\/v2\/comments?post=3769"}],"version-history":[{"count":0,"href":"https:\/\/thiemeworks.com\/wp-json\/wp\/v2\/posts\/3769\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thiemeworks.com\/wp-json\/wp\/v2\/media\/3867"}],"wp:attachment":[{"href":"https:\/\/thiemeworks.com\/wp-json\/wp\/v2\/media?parent=3769"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thiemeworks.com\/wp-json\/wp\/v2\/categories?post=3769"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thiemeworks.com\/wp-json\/wp\/v2\/tags?post=3769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}