PRIVILGD

What is privacy worth to you?

black backdrop.jpg

 We bring data privacy and data security awareness to the elite

 

shifaaz-shamoon-qtbV_8P_Ksk-unsplash.jpg

privacy is a privilege



Our Approach

 

Who?

We designed our data privacy and data security awareness trainings for high-profile families, athletes, and entertainers. Our invite-only clients are global influencers who are fast learners, analytical, and outcomes oriented. We use case studies and gamified activities to provide relevant industry examples.

What?

By invite-only, we provide individuals, families, estates, companies, and associations in the social media, entertainment and sports industries with the skills and knowledge to protect and secure data they may share through everyday interactions on digital platforms and applications.

How?

We customize data privacy and data security training based on the technical knowledge and needs of our clients. We keep a small team by design to help maintain confidentiality of our clients.

toa-heftiba-rQqabcGBsyk-unsplash.jpg

What Makes Us Different

 

Focus On Tech

Our tech-focused trainings are designed to accommodate high-profile influencers who are social-media savvy, analytical, and quick-witted. Training material includes relevant case studies that help participants contextualize content. We embrace current events, music, and culture as part of our trainings.

Bespoke Solutions

Our trainings focus on easy-to-understand data privacy and data security risk areas and corresponding skills. Participants learn how to use these skills correctly and effectively; including how to overcome potential obstacles. Trainings can be structured in any combination of available classes.

Global Delivery

Our advisors are available to travel to confidential locations, including in-home sessions. We deliver trainings throughout cities in the United States and globally.

Easy To Implement

Our trainings are structured to enable participants to exercise their new technical skills using their own industry experiences and issues. This method makes the concepts relevant, improves knowledge retention, and increases participant’s engagement level.

Classes

 

PRIVACY & SECURITY FOR SOCIAL MEDIA

Participants learn advanced techniques and strategies for managing their data privacy and data security when interacting on social media applications, including two-factor authentication, password management, and data deletion scheduling.

 

PRIVACY & SECURITY FOR FAMILY & STAFF

Participants learn how to secure online accounts that may be managed by two or more individuals including on-boarding, off-boarding, and on-going monitoring throughout the lifecycle of data.

 
 

MANAGING A PRIVACY INCIDENT

Participants learn immediate mitigations to take when a data privacy incident occurs (e.g. clicking on malware, becoming the victim of a phishing attack, simjacking, account takeovers) before the PR agency acts.

 

ADVANCED DIGITAL ATTACKS

Participants learn about advanced data hacking, spoofing, and blackmail tactics. They will learn how to avoid attacks by using principles of data privacy and data security by design to limit information misuse and abuse.

 

 

mohamed-masaau-nfF5-G6cFwY-unsplash.jpg

Services


TRAINING

Your data privacy and data security are only as strong as your weakest link. Personalized training ensures that you have continuous coverage against vulnerabilities.

ASSESSMENT

We evaluate your current data privacy & data security practices using a skilled red team that is trained to identify vulnerabilities. Once we've established a baseline of problems and weaknesses, you will have a better understanding of potential threats. We make a series of recommendations in the form of a tailored plan in order to mitigate weaknesses and risks.


MANAGED SERVICE

When a one-time assessment and series of recommendations is not enough, we provide on-going monitoring to ensure the continued data protection and data security of client data.


INCIDENT RESPONSE

We deploy forensic resources to respond to a developing breach of client data (e.g. account takeover). Response may include root- cause investigation, account recovery, clean-up, and remediation.

Founding partners

 
 

Ayana

 

Samantha

 
 
 

We bring over 30 years of combined in-house advisory experiences at globally-recognized companies to bear for our confidential clients and we are trusted subject matter experts for award-winning media outlets.

 
 
 
black backdrop.jpg