HBS Partners Richard Sheinis & Jade Davis Host New Podcast “PrivacyCafé”
Hall Booth Smith is proud to announce the launch of its new podcast PrivacyCafé, hosted by Partners Richard Sheinis and Jade Davis.
About PrivacyCafé
PrivacyCafé explores the complex and ever-changing landscape of data privacy, cybersecurity, and related technology. In each episode, PrivacyCafé will unravel the intricacies of privacy laws, offer insights on cybersecurity issues and concerns, discuss fast-moving artificial intelligence technologies and their implications, and interview top experts.
While this podcast is intended for data privacy and cybersecurity experts, it is also essential listening for business owners, executives, and anyone interested in the latest insights on these topics.
PrivacyCafé is carried by the Business RadioX® network and can be found on all the major podcast apps. You can listen to the introduction below.
Disclaimer
This material is provided for informational purposes only. It is not intended to constitute legal advice nor does it create a client-lawyer relationship between Hall Booth Smith, P.C. and any recipient. Recipients should consult with counsel before taking any actions based on the information contained within this material. This material may be considered attorney advertising in some jurisdictions. Prior results do not guarantee a similar outcome.
Featured in This Post
Richard Sheinis
Partner | Charlotte Office
T: 980.859.0381
E: rsheinis@hallboothsmith.com
Richard Sheinis assists businesses in the areas of data privacy and cyber security, employment, and technology. He works with a wide variety of companies from small technology businesses to publicly traded companies with a global footprint.
Jade Davis
Partner | Tampa Office
T: 813.329.3890
E: jdavis@hallboothsmith.com
Jade Davis focuses her practice on data privacy, cyber security, and construction matters. Jade provides strategic privacy and cyber-preparedness compliance advice and defends, counsels, and represents companies on privacy, global data security compliance, data breaches, and investigations.
Leave a comment
You must be logged in to post a comment.