Jen Amaral. Data Privacy Manager, Contrast Security
Jen’s interest in data privacy was piqued after she moved to the U.S. from the U.K. shortly after the passing of the GDPR and experienced first-hand the different ways that personal data are handled in different countries. She has held data privacy positions in a variety of companies ranging from large multinationals to small startups and specializes in building flexible and responsive privacy programs that fit a company’s needs. Jen joined Contrast in October 2023 and is based in Austin, Texas
Subscribe NowTopics
- Thought Leaders
- Application Security
- Contrast News
- DevOps
- AppSec
- Hacked
- vulnerabilities
- Threat
- DevSecOps
- Product
- Runtime Security
- RASP
- API security
- CodeSec
- Security
- Contrast Protect
- Contrast Assess
- Metrics
- APIs
- AI
- cybersecurity
- OSS
- cyberattacks
- CISA
- CVE
- IAST
- MFA
- SCA
- passwords
- runtime protection
- 2FA
- AWS
- Contrast Scan
- JavaScript
- SAST
- cybersecurity awareness month
- CISO
- GitHub
- OpenSource
- backlog
- breach
- data breach
- incident response
- ransomware
- regulation
- scan
- software development
- threat modeling
- .Net
- ChatGPT
- Community Edition
- Contrast SCA
- DBIR
- DHS
- Gen AI
- KVE
- Log4j
- MTTR
- OpenAI
- RSA
- React
- SQL injection
- Security Observability
- WAF
- artificial intelligence
- attack
- awareness
- chat apps
- critical infrastructure
- data privacy week
- jQuery
- okta
- python
- remediation
- supply chain
- threat detection
- transparency
- workplace
- .Net
- AI Act
- AST
- Angular
- Article 25
- Awards
- Below the Waterline
- CISO Insights
- CISOs
- Cloud Native Security
- Console
- Cyber Bank Heists
- DAST
- DORA
- Dependabot
- Developers
- Digital Operational Resilience Act
- Drupal
- European Union
- Gartner Peer Insights
- Git
- GitHub Action
- Go
- IoT
- Known Exploited Vulnerabilities
- MLflow
- MOVEit
- Microsoft
- Namasday
- Node.js
- OpenSourceSoftware
- PATs
- RCE
- Regulation (EU) 2022/2554
- Ruby
- TypeScript
- agents
- application attacks
- authentication security
- benefits
- best practices
- brute force attack
- burnout
- compliance
- corporate culture
- crime
- cybercrime
- cyberespionage
- data privacy
- digital resilience
- false positive
- financial
- financial institutions
- financial sector
- github application security
- github secure code
- github security scanning
- happiness
- hiring
- instrumentation
- java
- labor shortage
- languages
- legislation
- machine learning
- malicious actors
- nation states
- observability
- organized crime
- passkeys
- password managers
- penetration testing
- perks
- personal access tokens
- phishing
- quantum encryption
- regulatory
- retention
- risk ranking
- root account
- sbom
- scams
- security blueprint
- security culture
- security debt
- security monitoring
- shift smart
- tracking
- verizon
- voice cloning
- voice of the customer
- vue.js
- work-life balance
- zero-day
Loving our content? Subscribe now!
Get the latest application security news, trends, tips and insights content from Contrast directly to your inbox. By subscribing, you will stay up to date with all the latest and greatest from Contrast Security.