Everyday provides fresh evidence of the global realization that privacy matters.  Companies across the board are confronting the security challenges of compliance, technology and culture.  The significance of data protection continues to grow with the pace of innovation and around the globe.

Whether you are concerned with the privacy needs of a new client, product or service offering, the ins-and-outs of cross-border data transfers or simply what it is you don’t know about the state of data protection within your organization, Reynolds Privacy can offer actionable guidance that is credible and cogent.

Learn More


As an experienced cyber security professional, Darrin Reynolds advises many of the most recognized companies in the world on their capabilities and needs regarding data protection. His experience covers industries including healthcare, financial services, pharmaceutical, manufacturing, retail, entertainment, advertising, communications and media. He leads the Healthcare Governance & Compliance program and the Emerging Regulations program for Amazon and serves as the voice of expression for the Amazon information security environment for security inquiries. He spent 10 years with Omnicom, one of the world’s largest holding companies of advertising, PR, marketing and specialty communications firms where he served as Chief Privacy Officer and VP of Information Security for the Diversified Agency Services division of Omnicom. In this role, he drafted and deployed policy, guidance, resources and breach response assistance for more than 200 companies around the globe promoting effective cyber security practices and evangelizing the benefits of transforming business protection into business enablement.

Darrin has been practitioner, consultant, facilitator, first-responder and educator helping organizations realize the benefit of security as a differentiator. He is a member of the International Association of Privacy Professionals (IAPP), charter member of the International Information Systems Security Certification Consortium (ISC2) Indianapolis chapter and holds memberships in the Information Systems Audit and Control Association (ISACA), InfraGard and the American Society of Composers, Authors and Publishers (ASCAP). He serves on the Advisory Board for WhatFriendsDo.com – a website providing team coordination and resources for assisting people in crisis. He is an advocate of the arts involved with the International Violin Competition of Indianapolis and playing trumpet with the Amazon Symphony Orchestra. Darrin is a graduate of Stetson University in DeLand, Florida and actively participates in local efforts to further the value of privacy and security awareness among a media-saturated generation. His credentials and expertise make him a qualified and competent educator but it is his relaxed manner and disarming humor that make him a memorable and skilled communicator.

When he’s not saving the world from cyber miscreants, Darrin can be found shooting on his archery lane, chopping wood behind the barn or playing the trumpet. And it’s a good bet that no matter what he’s doing there’s an iced tea within arm’s reach.

Take a peek inside the world of Privacy

The Kimono

Data Monetization: A How NOT To

The Ghost of a Christmas Present This year I received a Christmas present.  The initial excitement quickly waned after the unboxing due to a sudden recognition that the appliance was merely exploitation disguised as innovation.  My frustration and dissatisfaction with the device resulted in a speedy return of the gift but the lessons learned from the […]

Security Tools: Groundhog Day Special Edition

Big Questions Just like the famous Groundhog, Punxsutawney Phil, I get asked some of the same questions over and over. One that I hear every time I do an assessment is, “So, what kind of tools are you using?” I suppose it’s just natural to be curious what kind of instrument is about to be […]

The Privacy Landscape

Land Grab A phrase that is quite common today is, “Data is the new oil.”  Many companies have recognized the truth of this analogy and are racing to acquire as much of it as possible.  There is money to be made by being among those who are able to extract value from this vast and […]

Survey Says

Thanks, but no thanks! I can hear the voice of Richard Dawson saying, “One hundred hackers surveyed.  Top five answers are on the board.  Name an effective social engineering technique.”  What can a survey say about the inner workings your organization?  Plenty! Surveys show up as phone solicitations, online forms and even strangers on the […]


The First Line of Defense Password authentication is a routine part of our everyday lives.  We use passwords in our personal lives to open garage doors, login at work, check email or grab cash from an ATM.  According to the federally funded Computer Emergency Response Team / Coordination Center (CERT/CC): “80% of all network security […]


Message in a Bottle Email is popular.  (And for my next understated observation…) and not very secure.  Okay, so everybody knows how to send an email but not everybody knows that email messages are sent in “clear text.”  This means that anything sent in an email can be viewed by anybody along the message’s route […]


Into the Unknown As I travel around doing security assessments, audits and visits, I am often asked to share or distribute some of the very sensitive information that I collect on my journeys.  Recognizing that it is delicate (even dangerous) information that must be communicated, I inquire as to how the recipient would like to […]

Data Inventory

Blissfully oblivious. Companies of all sizes become the victims of their own ignorance when they learn that they’ve breached data they didn’t even know they had.  If it’s true that “you can’t fix what you don’t know is broke” then it should follow that “you can’t protect what you don’t know you have.”  The first […]

Data Destruction

How Many Passes? Frequently, I think of the little boy who consulted the owl to find out how many licks it takes to get to the Tootsie Roll center of the Tootsie Pop.  The owl’s response: “Let’s find out.  One… two-hoo-hoo… three.  Three!”  I think about that sage old owl each time the topic of […]

“There are two types of companies: those who have been hacked, and those who don’t yet know they have been hacked.”
– John Chambers, CEO of Cisco


“It ain’t what you don’t know that gets you into trouble. It’s what you know for sure that just ain’t so.”
– Mark Twain

Initiate Contact