CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Ken Mortensen
Data Protection Officer at InterSystems
As an attorney and engineer, Ken Mortensen is a privacy and security professional with over 20 years of legal and over 30 years of IT experience. Ken leads Global Trust at InterSystems as the Data Protection Officer, working to enhance transparency, accountability, and governance. Ken also served in a number of chief privacy/security roles including in the Bush Administration as Associate Deputy AG for Privacy and Civil Liberties at DOJ supporting law enforcement and foreign intelligence activities. Ken joined DHS early in its existence, becoming its first Deputy CPO. He had his own law firm, was special counsel to the PA AG for cyber, ran a technology business, taught at Villanova Law, and began as a EE. He served on the boards of IAPP, HITRUST, NH-ISAC, and Shared Assessments. Ken is the privacy expert to TSA’s Aviation Security Advisory Committee. He maintains CIPP/US, CIPP/G, and CIPM; PA, NJ, SCOTUS bars


Image of business executive walking up stairs representing steps for security experts to gain privacy perspective, from CISO to CPO
Cyber SecurityInsights

CISO to CPO: Four Steps for Security Experts to Get a Privacy Perceptive

January 2, 2018
It’s not all about the safeguards and technical measures around information. Savvy security experts need to understand privacy and how it interacts with the security world and what privacy means for an organization’s security strategy and compliance with things like HIPAA, GDPR, CBPR, etc.
Read More
Image of man jumping over a crevice against moutain backdrop signifying how privacy professionals and CPO needs to bridge the gap and become security savvy as a CISO
Data ProtectionInsights

CPO to CISO: Four Steps for Privacy Professionals to Get Security Savvy

October 30, 2017
As more CPOs need to interact with security, they need the right skills to integrate security into the privacy strategy and compliance with regulations.
Read More

Latest

Automobile production line showing OT devices vulnerabilities for industrial control systems

Warning for Industrial Control Systems: Research Discovers 56 “Insecure by Design” Vulnerabilities in Two Dozen OT Devices

User typing password on screen showing portable digital identity

Are Portable Digital Identities Swiftly Replacing Conventional Passwords?

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results