Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

The Current State of Technology: An Interview with Giuliano Liguori

Author

Omer Imran Malik

Data Privacy Legal Manager, Securiti

FIP, CIPT, CIPM, CIPP/US

Listen to the content

This post is also available in: Brazilian Portuguese

Securiti recently had the opportunity to speak with Giuliano Liguori, CEO of Kenovy and a digital transformation leader, innovation manager, and board of directors member of the CIO Club Italia. He has extensive experience in the fields of project management, business process optimization, analytics, and data-driven decision-making. He is an expert in utilizing new technologies to drive business transformation and growth. He is also a consultant and keynote speaker on digital transformation, data analytics, and artificial intelligence.

As technology evolves rapidly, companies must adapt quickly to stay competitive. Giuliano has worked with numerous organizations to help them navigate the digital landscape and implement effective strategies to achieve their business goals. With a deep understanding of emerging technologies and a keen eye for innovation, he is a valuable resource for anyone looking to stay ahead of the curve in the world of digital transformation.

In this interview, we will explore his insights and perspectives on the current state of technology, the challenges organizations face in the digital age, and the strategies that can help businesses succeed in a rapidly changing environment.

Q1. Can you describe your experience with implementing privacy and security measures in digital transformation projects?

In digital transformation projects, privacy and security are crucial considerations because such projects often involve the collection, storage, and processing of sensitive personal or business data.

As a seasoned professional with over two decades of experience in IT, I have gained extensive experience in implementing privacy and security measures in digital transformation projects. In the past, I have held DPO roles for several Italian companies. I created "KIT GDPR 2.0" and implemented it for my clients to help them comply with GDPR. Additionally, I hold certifications in both GDPR and ISO 27001, equipping me with the knowledge and skills necessary to ensure the privacy and security of sensitive data.

In my past CIO role, I have implemented various privacy and security measures in digital transformation projects, including data encryption, access control, data management, network security, and compliance with privacy regulations. I have also established incident response plans to ensure that any security incidents or breaches are handled quickly and effectively. These experiences have helped me understand the importance of privacy and security in digital transformation projects.

Now as CEO of Kenovy, I am committed to ensuring that all personal and business data of our clients are protected and secure. I believe that technology should enhance the efficiency and effectiveness of organizations while also respecting the privacy and security of sensitive data.

Q2. How should businesses approach privacy risk assessment and management in digital projects?

Privacy risk assessment and management is a critical aspect of digital projects and should be approached in a systematic and comprehensive manner. This involves defining the privacy requirements for the project, conducting a privacy impact assessment, establishing a privacy management plan, implementing technical and organizational measures, continuously monitoring and reviewing the privacy risks, and ensuring compliance with privacy regulations. Doing so will ensure that the project is carried out in a secure and compliant manner and that the privacy and security of sensitive data is protected.

Q3. How important is ensuring that privacy considerations are integrated into the design and development process of digital systems and applications?

Integrating privacy considerations into the design and development process of digital systems is essential for ensuring the safety of users and the protection of their data. This ensures that the systems are compliant with applicable privacy regulations, such as GDPR, CCPA, and HIPAA. Implementing privacy considerations in the development process also helps to prevent unauthorized access and use of sensitive information, build user trust, identify and mitigate privacy risks, and maintain a positive reputation. All of these benefits make it essential to ensure that privacy considerations are integrated into the design and development process of digital systems and applications.

Q4. Can you describe your approach to complying with privacy regulations such as GDPR, CCPA, or HIPAA in digital projects?

Complying with privacy regulations like GDPR, CCPA, and HIPAA in digital projects requires a strategic approach. The first step is to ensure that the project team understands the specific requirements of the applicable privacy regulation. Then, a privacy risk assessment should be conducted and a plan should be developed outlining mitigation measures and monitoring procedures.

Best practices dictate that technical and organizational measures should be implemented, monitored, and continuously reviewed for their effectiveness. It's also important to keep documentation updated and provide training to the team on privacy regulations.

In my opinion, this approach provides a strong foundation for ensuring compliance and protecting sensitive data.

Privacy Center
Fully Functional In Minutes

Elegant Consumer Frontend, Fully Automated Backend, Privacy Regulation Intelligent Everywhere.

 

Q5. How should businesses educate and communicate privacy practices to stakeholders, including customers and partners?

To effectively manage privacy, businesses should communicate their privacy practices to stakeholders, such as customers and partners. This includes developing a clear privacy policy, being transparent about data practices, providing educational materials to customers, clearly communicating privacy practices to partners, and providing employee training on privacy regulations and company policies.

Conclusion

Giuliano provided valuable insights into the challenges and opportunities that organizations face in the digital age. From the importance of developing a clear digital strategy to the need for a culture of innovation and continuous learning, their expertise sheds light on key factors that can help businesses thrive in today's rapidly changing environment.

Their deep understanding of emerging technologies and their real-world experience in implementing digital solutions make them a valuable resource for anyone looking to stay ahead of the curve. As technology continues to shape the world we live in, it is clear that the insights and perspectives shared by Giuliano will remain highly relevant and insightful for years to come.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share

More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
DSPM vs. CSPM – What’s the Difference?
While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Spotlight 13:32
Ensuring Solid Governance Is Like Squeezing Jello
Watch Now View
Latest
View More
Databricks AI Summit (DAIS) 2025 Wrap Up
5 New Developments in Databricks and How Securiti Customers Benefit Concerns over the risk of leaking sensitive data are currently the number one blocker...
Inside Echoleak View More
Inside Echoleak
How Indirect Prompt Injections Exploit the AI Layer and How to Secure Your Data What is Echoleak? Echoleak (CVE-2025-32711) is a vulnerability discovered in...
What is SSPM? (SaaS Security Posture Management) View More
What is SSPM? (SaaS Security Posture Management)
This blog covers all the important details related to SSPM, including why it matters, how it works, and how organizations can choose the best...
View More
“Scraping Almost Always Illegal”, Netherlands DPA Declares
Explore the Dutch Data Protection Authority's guidelines on web scraping, its legal complexities, privacy risks, and other relevant details important to your organization.
Beyond DLP: Guide to Modern Data Protection with DSPM View More
Beyond DLP: Guide to Modern Data Protection with DSPM
Learn why traditional data security tools fall short in the cloud and AI era. Learn how DSPM helps secure sensitive data and ensure compliance.
Mastering Cookie Consent: Global Compliance & Customer Trust View More
Mastering Cookie Consent: Global Compliance & Customer Trust
Discover how to master cookie consent with strategies for global compliance and building customer trust while aligning with key data privacy regulations.
Understanding Data Regulations in Australia’s Telecom Sector View More
Understanding Data Regulations in Australia’s Telecom Sector
Gain insights into the key data regulations in Australia’s telecommunication sector. Learn how Securiti helps ensure swift compliance.
Top 3 Key Predictions on GenAI's Transformational Impact in 2025 View More
Top 3 Key Predictions on GenAI’s Transformational Impact in 2025
Discover how a leading Chief Data Officer (CDO) breaks down top predictions for GenAI’s transformative impact on operations and innovation in 2025.
Gencore AI and Amazon Bedrock View More
Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock
Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...
DSPM Vendor Due Diligence View More
DSPM Vendor Due Diligence
DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...
What's
New