
{"id":30705,"date":"2016-08-30T09:30:54","date_gmt":"2016-08-30T13:30:54","guid":{"rendered":"http:\/\/www.bu.edu\/law\/?p=30705"},"modified":"2020-07-22T15:02:42","modified_gmt":"2020-07-22T19:02:42","slug":"cynthia-larose-com79-law88-named-one-of-the-50-most-powerful-women-in-technology","status":"publish","type":"bu-article","link":"https:\/\/www.bu.edu\/law\/record\/articles\/2016\/cynthia-larose-com79-law88-named-one-of-the-50-most-powerful-women-in-technology\/","title":{"rendered":"Cynthia Larose (COM\u201979, LAW\u201988) Named One of the 50 Most Powerful Women in Technology"},"content":{"rendered":"<h2><em>Larose, a partner at Mintz Levin, is a privacy and security expert who helps companies protect their data.<\/em><\/h2>\n<p><img loading=\"lazy\" src=\"\/law\/files\/2016\/08\/cynthia-j-larose-1.jpg\" alt=\"Cynthia Larose\" width=\"212\" height=\"169\" class=\"alignright wp-image-30714 size-full\">Cynthia Larose (&#8217;88) is not a social media executive and bestselling author like Facebook\u2019s Sheryl Sandberg, nor is she an influential engineer like StubHub\u2019s Raji Arasu. So what led the National Diversity Council to put Larose, a partner at the Boston firm Mintz Levin, next to Sandberg and Arasu on <a href=\"http:\/\/top50tech.org\/2016\/2015\/06\/24\/cynthia-larose\/\" target=\"_blank\">this year\u2019s list<\/a> of the top 50 most powerful women in technology?<\/p>\n<p>It\u2019s her job to help keep your data from getting stolen.<\/p>\n<p>With&nbsp;widespread data breaches leading to business disruptions and negative press across the world, Larose, who leads Mintz Levin\u2019s privacy and data security practice, counsels companies on how to protect themselves from hackers. \u201cMy job is twofold: it\u2019s to advise companies what to do and how to prepare, in order to identify their risk and try to avoid it,\u201d Larose says, \u201cand then the second half of it is to help them work through the issues when they do have something like this happen.\u201d<\/p>\n<p>Too often, she only becomes involved after something bad has happened.<\/p>\n<p>\u201cI wish it were more often before,\u201d she says. \u201cI wish companies would be more proactive.\u201d<\/p>\n<p>In 2016, Larose argues, data security should be a basic element of risk management, like fire safety or disaster recovery. \u201cCompanies are starting to look at this as the cost of doing business,\u201d she says.<\/p>\n<p>And with data breaches, she says, it\u2019s no longer a matter of <em>if <\/em>but <em>when<\/em>: \u201cAny company that\u2019s connected to the Internet, there\u2019s a real risk. There\u2019s a risk of your systems being infected, there\u2019s a risk of your data being taken hostage by ransomware, there\u2019s a risk of your employees clicking on a link and being victimized by phishing scams. All of those risks are real. And they\u2019re not theoretical, they\u2019re not things that happened to somebody else. They happen to companies every single day of the week. And they cost money to fix.\u201d<\/p>\n<h3>Radio Days<\/h3>\n<p>Larose started her career as a journalist. She graduated from BU\u2019s College of Communications with a master\u2019s in broadcasting and journalism in 1979 and went to work as a reporter and a news director for public radio in New Hampshire.<\/p>\n<p>In those years, she spent time with quite a few presidential hopefuls: \u201cI have a nice big wall of pictures of people\u2014Jimmy Carter, Ronald Reagan, Ted Kennedy, Fritz Hollings, Jesse Jackson, everybody that came through during that time. Everybody that came through those New Hampshire cities in those days before the advent of satellite 24-hour news cycles, came to the local radio station to sit down and do the Sunday morning public affairs shows.\u201d<\/p>\n<p>After spending some time working for political campaigns, Larose decided to come back to BU for law school. She knew she wanted to focus on business law and stay out of the courtroom. As a former radio reporter, she parlayed an interest in information technology into a specialty in cyberlaw. Ultimately, she developed a focus on privacy: \u201cI had spent so long working for information technology companies, at some point it dawns on you that data might be a really important part of what these companies are doing.\u201d<\/p>\n<h3>The Future of Privacy and Security<\/h3>\n<p>One thing that has surprised her over the years has been the pace of change and how it affects companies: \u201cIt changes more rapidly than companies can keep their arms around it, frankly. Because there are new devices coming into the workplace, there are new ways that employees are using the information access that they have\u2026things are becoming much more portable and much more mobile, and less secure at the same time. And there are more and more ways that the bad guys out there are finding to exploit that. So it\u2019s happening faster than I think anyone ever anticipated.\u201d<\/p>\n<p>Despite the recent media focus on Russian hackers, Larose says that the \u201cbad guys\u201d come from all over. \u201cThere\u2019s not just one set of bad guys, which makes tracking the threats really difficult. There\u2019s a huge span. We\u2019ve seen everybody from script kiddies in basements in their parents\u2019 houses breaking into large companies and wreaking havoc, all the way up to organized crime rings and state-sponsored hacking. It\u2019s not limited to the Russians in that arena \u2026 China\u2019s doing it, North Korea\u2019s doing it. The National Security Agency, the CIA and the FBI&#8230;have been saying for years that nation-state hacking will become one way espionage is going to be conducted. So it\u2019s not surprising.\u201d<\/p>\n<p>In the next few years, Larose believes, security improvements will make it easier for people to protect their data\u2014if they choose to. \u201cBut there\u2019s a difference between privacy and security. I think it will be easier to keep financial information, credit cards, things like that secure. Because security is getting better.\u201d<\/p>\n<p>Privacy, on the other hand, will depend on what information people are willing to give out\u2014and how much companies tell us about what they do with it. \u201cSurveys have shown that large percentages of people will give personal information to businesses in exchange for something. Whether it be discounts, whether it be promotions\u2014they\u2019ll give it out\u2026the whole digital advertising ecosystem will need to become more transparent with its users about what is actually going on and where their information is going.\u201d<\/p>\n<p>She also thinks that the coming years will still see a great need for privacy lawyers: \u201cThis will not go away. There will be a market for people who understand this space and the technology, and at the same time understand the legal issues and all of the issues surrounding information security and data privacy to continue to advise, clients, companies, boards, advocacy groups. There\u2019s going to be a continued need for this \u2018specialty.\u2019\u201d<\/p>\n<p>Larose has been with Mintz Levin for twenty years now, and says that she hopes that her place on the list of the top 50 women in tech reflects well on her and the firm.<\/p>\n<p>\u201cI\u2019m honored to be included in that group,\u201d Larose says, \u201cand I\u2019m hoping it says that I\u2019ve made a personal contribution and that the firm is continuing to make contributions in both advancing diversity and working with women getting into this area.\u201d<\/p>\n<p><em>Reported by Trevor Persaud (STH&#8217;18).<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Larose, a partner at Mintz Levin, is a privacy and security expert who helps companies protect their data.<\/p>\n","protected":false},"author":12030,"featured_media":30714,"comment_status":"closed","ping_status":"closed","template":"","meta":{"bu_prepress_billboard":"","_bu_prepress_primary_term":"","_bu_prepress_primary_term_manual":""},"tags":[],"bu-publication":[3742],"record-article-category":[3744,3774,3775],"record-topic":[],"bu_edition":[],"media_type":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/law\/wp-json\/wp\/v2\/bu-article\/30705"}],"collection":[{"href":"https:\/\/www.bu.edu\/law\/wp-json\/wp\/v2\/bu-article"}],"about":[{"href":"https:\/\/www.bu.edu\/law\/wp-json\/wp\/v2\/types\/bu-article"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/law\/wp-json\/wp\/v2\/users\/12030"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/law\/wp-json\/wp\/v2\/comments?post=30705"}],"version-history":[{"count":4,"href":"https:\/\/www.bu.edu\/law\/wp-json\/wp\/v2\/bu-article\/30705\/revisions"}],"predecessor-version":[{"id":71241,"href":"https:\/\/www.bu.edu\/law\/wp-json\/wp\/v2\/bu-article\/30705\/revisions\/71241"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/law\/wp-json\/wp\/v2\/media\/30714"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/law\/wp-json\/wp\/v2\/media?parent=30705"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bu.edu\/law\/wp-json\/wp\/v2\/tags?post=30705"},{"taxonomy":"bu-publication","embeddable":true,"href":"https:\/\/www.bu.edu\/law\/wp-json\/wp\/v2\/bu-publication?post=30705"},{"taxonomy":"record-article-category","embeddable":true,"href":"https:\/\/www.bu.edu\/law\/wp-json\/wp\/v2\/record-article-category?post=30705"},{"taxonomy":"record-topic","embeddable":true,"href":"https:\/\/www.bu.edu\/law\/wp-json\/wp\/v2\/record-topic?post=30705"},{"taxonomy":"bu_edition","embeddable":true,"href":"https:\/\/www.bu.edu\/law\/wp-json\/wp\/v2\/bu_edition?post=30705"},{"taxonomy":"media_type","embeddable":true,"href":"https:\/\/www.bu.edu\/law\/wp-json\/wp\/v2\/media_type?post=30705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}