Cyberside Chats: Cybersecurity Insights from the Experts

Data Is Hazardous Material: How Data Brokers Telematics and Over-Collection Are Reshaping Cyber Risk


Listen Later

The FTC has issued an order against General Motors for collecting and selling drivers’ precise location and behavior data, gathered every few seconds and marketed as a safety feature. That data was sold into insurance ecosystems and used to influence pricing and coverage decisions — a clear reminder that how organizations collect, retain, and share data now carries direct security, regulatory, and financial risk. 


In this episode of Cyberside Chats, we explain why the GM case matters to CISOs, cybersecurity leaders, and IT teams everywhere. Data proliferation doesn’t just create privacy exposure; it creates systemic risk that fuels identity abuse, authentication bypass, fake job applications, and deepfake campaigns across organizations. The message is simple: data is hazardous material, and minimizing it is now a core part of cybersecurity strategy. 


Key Takeaways:

1. Prioritize data inventory and mapping in 2026 

You cannot assess risk, select controls, or meet regulatory obligations without knowing what data you have, where it lives, how it flows, and why it is retained. 

2. Reduce data to reduce risk 

Data minimization is a security control that lowers breach impact, compliance burden, and long-term cost. 

3. Expect that regulators care about data use, not just breaches 

Enforcement increasingly targets over-collection, secondary use, sharing, and retention even when no breach occurs. 

4. Create and actively use a data classification policy 

Classification drives retention, access controls, monitoring, and protection aligned to data value and regulatory exposure. 

5. Design identity and recovery assuming personal data is already compromised 

Build authentication and recovery flows that do not rely on the secrecy of SSNs, dates of birth, addresses, or other static personal data. 

6. Train teams on data handling, not just security tools 

Ensure engineers, IT staff, and business teams understand what data can be collected, how long it can be retained, where it may be stored, and how it can be shared. 


Resources:

1. California Privacy Protection Agency — Delete Request and Opt-Out Platform (DROP) 

https://privacy.ca.gov/drop/ 

2. FTC Press Release — FTC Takes Action Against General Motors for Sharing Drivers’ Precise Location and Driving Behavior Data 

https://www.ftc.gov/news-events/news/press-releases/2025/01/ftc-takes-action-against-general-motors-sharing-drivers-precise-location-driving-behavior-data 

3. California Delete Act (SB 362) — Overview 

https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202320240SB362 

4. Texas Attorney General — Data Privacy Enforcement Actions 

https://www.texasattorneygeneral.gov/news/releases 

5. Data Breaches by Sherri Davidoff 

https://www.amazon.com/Data-Breaches-Opportunity-Sherri-Davidoff/dp/0134506782

...more
View all episodesView all episodes
Download on the App Store

Cyberside Chats: Cybersecurity Insights from the ExpertsBy Chatcyberside

  • 5
  • 5
  • 5
  • 5
  • 5

5

2 ratings


More shows like Cyberside Chats: Cybersecurity Insights from the Experts

View all
No Agenda Show by Adam Curry & John C. Dvorak

No Agenda Show

5,968 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

370 Listeners

The DSR Network by The DSR Network

The DSR Network

1,797 Listeners

Conspirituality by Derek Beres, Matthew Remski, Julian Walker

Conspirituality

2,073 Listeners

What Rough Beast by Virginia Heffernan and Stephen Metcalf

What Rough Beast

64 Listeners