The Law is Coming: The Department of Justice Files Antitrust Suit Against Google

The Depart of Justice filed an antitrust lawsuit against Google for maintaining an illegal monopoly over search and search advertising on Tuesday morning. 

It’s been decades since the federal government has taken an action this extreme against a company. Tim Wu, professor at Columbia Law School and author of the Curse of Bigness about the history of antitrust, noted that the suit itself looks like almost a copy-paste of the (successful) case against Microsoft in the 1990s. 

In these extremely partisan times, one of the more surprising aspects of today’s news has been the most unified reaction from the right and left. Most people agree with the DOJ regardless of affiliation. However, many believe that current antitrust legislation is not enough to curb Big Tech and have suggested that a mix of additional actions should supplement DOJ’s suit to rein in Silicon Valley.

The outcome of the DOJ’s filing today is uncertain. Google has been battling stricter antitrust laws in Europe for years and there is debate around whether Google is anti-competitive or just the best product that customers continue to choose. What is clear is that the future holds more aggressive actions against Tech power from federal and state governments. The law is coming, it seems. 

Additional Information:


Think Pieces

  • New York Times: Kara Swisher: The Justice Dept.’s Lawsuit Against Google: Too Little, Too Late
    • Key Quotes:
      • But here’s the trouble: There’s no such thing as a single entity called Big Tech, and just saying it exists will not cut it. The challenges plaguing the tech industry are so complex that it is impossible to take action against one without understanding the entire ecosystem, which hinges on many monster companies, with many big problems, each of which requires a different remedy.
  • Time: Tom Wheeler: The Justice Department’s Antitrust Lawsuit Against Google Isn’t Enough to Stop the Abuses of Big Tech
    • Key Quotes: 
      • The abusive practices of the dominant digital platforms are so widespread and have become so embedded that there is no single solution. What is needed is a cocktail of remedies that blends antitrust with ongoing regulatory oversight.
      • We need to couple antitrust with a new vehicle for public-interest oversight to prevent abuses in the first place.


Google Statement

DOJ Statement

COVID-19’s Impact on the Cyber Media with SDxCentral’s Jessica Hardcastle

I recently connected with tech reporter extraordinaire (and one of my personal favorite people to work with), Jessica Hardcastle, the managing editor of SDxCentral covering next-generation data centers, security, and software-defined storage. We chatted about what she’s been working on during COVID-19 and how the pandemic has shaped her coverage.

See below for a Q&A breakdown of our conversation (edited for clarity and conciseness):

Jill: What cybersecurity stories have you been working on outside of COVID-19-centered articles?

Jessica: I’ve been working on the usual trend pieces, and what’s next on the threat landscape. I also think between now and November election security is obviously going to be a big one.

Jill: How are you seeing COVID-10 shape the cyber media landscape?

Jessica: I think it’s shaping the media landscape in many of the same ways that it’s shaping the cybersecurity landscape overall: It’s basically expanding everything. The threat landscape is bigger (more threats and a larger attack surface) now that people are working from home, so that definitely expands the focus area of our coverage. Plus, in addition to COVID-19, there’s still all the usual stuff — product releases, non-COVID-related threats, reports, and trends — so as media we’re trying to balance it all. It’s a lot more work for us, but we realize it’s also a lot more work for the defenders.

Jill: How are you staying sane through the increased stress and pressures during COVID?

Jessica: Honestly, not very well. It’s a struggle every day and now that fully-remote first grade for my twins has started, it’s even harder. I think long walks and getting outside has really helped me over the last few months, but now the Santa Cruz fires [where Jessica is based] have ruined that one, too. Damn you, 2020!

Jill: On a hopefully more positive note, which of your recent articles are you most proud of?

Jessica: I’m proud of this election security story [around disinformation] and also this one [about how defenders have responded to increased cyber threats caused by the pandemic], which I think – or at least I hope – shows some of the human side of everything going on right now.

Jill: Finally — a silly one — what’s one fun fact about yourself?

Jessica: I can sing every word to every Billy Joel song ever written.

It’s clear from our conversation that for  PR and media, COVID-19 has increased the stress and pressure on top of traditional announcements and news of the day. It’s a lot. 

Shortly after our quick Q&A, Jessica shared this article from the New Yorker with me about all of the things we’ll do when the pandemic is ‘over.’ It popped into my inbox at the end of a particularly long day, breaking a smile into my tired eyes and driving home the point: We’re all in this together, and we could all damn well use a laugh. I’m grateful to work with people like Jessica who embrace this outlook. 

One day soon, we’ll all be back singing karaoke (maybe to a Billy Joel song?), but until then, those of us in PR need to think about how we can support our journalist buddies with thoughtful pitches and connecting them with resources who can comment on the most influential and critical topics of the time.

Like this Q&A? Read some of our other reporter interviews with Dark Reading’s Kelly Jackson Higgins and freelancer Alyssa Newcomb on the Highwire blog.

The State of Fintech Conferences in 2020

As the COVID-19 pandemic continues to impact our global health and economy, the fintech community is finding ways to adjust and marshall its resources and technology to help aid governments and consumers

It’s inevitable that fintech conferences this year have canceled or pushed out their events. Though some have resorted to a virtual option, and sticking to their original dates. While virtual events will certainly have a different look and feel, with the right set tactics, you’ll be able to achieve your goals, whether that includes sales prospecting, recruitment, fostering customer engagement, gathering competitive intelligence, or visibility. Keep in mind that digital advertising, content optimized for specific channels, and interactive forums for dialogue and engagement, among other strategies, can ensure you make the most of both virtual and physical events. 

Looking for insight on the state of fintech conferences? We’ve compiled a list of the major 2020 fintech conferences and noted their status. We hope to see you there (either virtually or possibly later this year in person). If you are hosting your own virtual event, learn more about how Highwire can support you here or get in touch with us at

Continuing as Planned (For Now)

Finovate Fall — September 14-16, 2020, NYC

Money 2020 — October 25-28, 2020, Last Vegas


Gone Virtual

Consensus Distributed — A virtual event starting May 11, 2020. 


Postponed Until Later in the Year

CB Insights Future of Fintech — Now planned for November 16-18, 2020, San Francisco

Finovate West — Formerly Finovate Spring, it’s now planned for November 23-4, 2020, San Francisco

Digital Banking Conference — Now planned for December 7-9, 2020 in Austin, TX

Lendit — According to the website, “LendIt Fintech USA 2020 has officially been rescheduled for September 30 through October 1, 2020.”



Fortune Brainstorm Finance — Originally slated for June 2020 in Montauk.

SALT Conference — Originally slated for May 2020 in Las Vegas. SALT Middle East is still listed as on for December 2020. Check back for updates. 

RSA Day 1: Why Cybersecurity Isn’t Working and Where We Go From Here

The #HWCyberSquad is on the ground at RSA 2020, and we’ll be recapping each day’s highlights right here in one place! Tune in all week for the latest from our award-winning security practice.

This year’s RSA theme is The Human Element, which certainly came through in today’s opening keynotes. Speakers and panelists kicked off this week’s conference by critically examining the past, present, and future of cybersecurity, and how we can better secure not just technology, but the people behind it. 

People At The Forefront

We kicked off the day with RSA Security President, Rohit Ghai, who recapped what cybersecurity has looked like in the past, what it looks like now, and how it should ideally evolve and shift as we head into 2020 and beyond. He led by saying that in order to change the future of cybersecurity, we need to do three things — examine and analyze the stories we have, imagine the story we want, and strategize a way to realistically achieve it. He argued that right now, cybersecurity professionals are living in a state of cognitive dissonance. They understand that humans need to be at the center of what they do, but are not doing enough to consider humans when creating cybersecurity strategies. Ghai noted that leaders are being too technical in their approaches to cybersecurity, and that “preparing for the worst does not prepare you for the likely.” By putting humans at the forefront of cybersecurity, organizations will be better equipped to stop emerging threats. 

Designing Cybersecurity For The Everyday Individual

Another theme highlighted in today’s presentations was the need for cybersecurity that the everyday individual can easily digest — not just the experts. Wendy Nather, Head of Advisory CISOs at Cisco, highlighted three ways that we can do this — shifting from a control model to a collaboration model, simplifying the cybersecurity controls we use, and opening up cybersecurity culture to everyone. By designing cybersecurity to be adopted rather than for it to be enforced, organizations can make cybersecurity something that users would rather choose. If security was designed in a digestible, consumer-grade fashion, humans could more easily adapt in their everyday lives. 

Cybersecurity At A Global Scale 

Of course, some of the hottest global issues were also discussed, including the pros, cons, and practicality of quantum computing, and what is being done around election security as we approach voting day. 

Steve Grobman, Senior Vice President and Chief Technology Officer at McAfee, made the case that our current practices are far too similar to what we’ve employed in the past — particularly as it pertains to quantum computing. Quantum computing is a real risk, even if it isn’t completely here yet. Panelists on the annual Cryptographer Panel shared similar sentiments, noting that currently, quantum computing is nowhere near safe enough to protect against nation states. All agreed that quantum computing needs to be designed cyber-smart if it will ever be a possibility. 

The same goes for election security – panelists on the Cryptographer Panel compared our election security to a “cyber pearl harbor” and spoke to how we need to engineer our voting systems to be inherently secure. Chris Krebs, Director of the Cybersecurity and Infrastructure Security Agency, noted that 2016 was a clear wakeup call, but reassured audience members that federal leaders across agencies are working diligently to make sure the 2020 election keeps voters protected.

Overall, there’s one thing that all of the speakers agreed on today — the current model for cybersecurity just isn’t working. Business leaders and security practitioners alike need to implement smarter cybersecurity measures that put more focus on the people. How humans — both benevolent and malicious — act and think need to be at the forefront of everything we employ if we want to protect against emerging threats at local and global scales.

Stay tuned for tomorrow’s keynote recap, and be sure to follow Highwire on Twitter and Instagram for more RSA 2020 insights at @HighwirePR.

RSAC 2020: Everything You Need To Know

RSA Conference is quickly approaching, and the #HWCyberSquad is getting its ducks in a row. For close to 30 years, the week-long conference has drawn the best and brightest in cybersecurity to discuss current trends and challenges impacting the space. 

This year, RSAC’s theme is The Human Element, which will explore how even though an automated future is inevitable, our most valuable weapon is and will always be ourselves. While artificial intelligence and machine learning are expected to fight against threats better than we ever could, humans will always be needed when it comes to making challenging ethical decisions. RSAC believes that “when we recognize that cybersecurity is, fundamentally, about people protecting people, the world becomes a better, more secure place.” 

The Human Element isn’t the only thing that will be talked about, though — topics like DevSecOps, AI and ML, and insider threats are set to take center stage alongside even more pressing conversations around election security, ransomware threats, 5G, and privacy. This year, we expect to hear compelling conversations about modern approaches to security as we enter into a new decade — how are we approaching security in new and different ways? 


Security Then and Now

As we head full force into 2020, a number of sessions will focus on how security strategies have changed and where they are going. Akamai’s talk on Security’s Grand Challenges, Then and Now will look at where we came from, and how our biggest challenges have shifted, and Forcepoint’s talk on Modern Strategies for Protecting Users and Data in a Borderless World will highlight why modern cybersecurity needs a mindset change. Splunk will be moderating a panel with experts from Intel and Starbucks on Modernizing the Security Operations Center, and Illumio will be highlighting why we need to approach the more powerful threats that we are seeing with a new approach — more powerful segmentation. Each of these sessions hits on a key theme that cybersecurity strategies are not what they used to be — and we need to take a new approach. 

As attackers become increasingly sophisticated, we’re also seeing researchers share in-depth insights into some of the most impactful attacks. In a session, SonicWall shares insights into a Two-Week Conversation with a Ransomware Cell which begins with the young leader of a Russian ransomware cell. Nicknamed “Twig,” SonicWall’s confidential contact unveils how alarmingly easy it is for their cell to find, target and attack modern networks.


The Era of DevSecOps

We are continuing to see the security and developer world overlap, as businesses look to shift left and make the transition from DevOps to DevSecOps. We’ll see a number of sessions providing businesses with best practices on bringing security into the development process, from GitLab’s talk on Best Practices for Adding Security to DevOps, to Veracode’s session on helping developers to understand security,  A Security Pro in Developer’s Clothing. From base-level “how to’s” to more technical instruction, the DevSecOps movement is here to stay, and security practitioners will be sharing their unique insights for businesses to be set up for success, including How to Harness Dev and Their Native Tools to Accelerate DevSecOps.


How Identity Impacts Security Strategies

Coinciding with RSAC’s human element theme, Code42 and One Identity will both host talks focused on how identity impacts the ways we approach cybersecurity. Insider threats aren’t going anywhere anytime soon, and they’re continuing to impact businesses — Code42 and One Identity outline how practitioners can better secure their organizations by mitigating these risks. 


AI and Machine Learning

New technologies are continuing to impact the ways organizations stay secure — particularly machine learning. Intel will focus on how ML can help from two different angles: how we can use ML to protect privacy in a data-driven world and How HW Telemetry and ML Can Make Life Tough for Exploits. They’ll share the benefits of implementing ML technologies into security frameworks and how it can better protect businesses.  

The #HWCyberSquad will be at RSAC to learn from the experts, connect with reporters and industry influencers, and gain an even deeper understanding of the pressing issues facing businesses in 2020 and beyond. 

Want to catch up at the show? Email, and stay tuned for more RSA content as we get closer to the event.


Be sure to stop by the Expo Hall to learn more about each of our clients, listed below: 

Client Booth Locations

  • Akamai: Booth #6153, North Expo
  • BitSight: Booth #1167, South Expo
  • Code42: Booth #6079, North Expo
  • Forcepoint: Booth #5965, North Expo
  • GitLab: No booth but see above for details on speaking sessions
  • Illumio: Booth #5459, North Expo
  • Intel Security: No booth but see above for details on speaking sessions
  • Interos: No booth, but will be on the show floor
  • MobileIron: Booth #1727, South Expo
  • One Identity: Booth #6271, North Expo
  • Qualys: Hosting QSC 2020 at Four Seasons on 2/25
  • SonicWall: Booth #5559, North Expo
  • Splunk: Booth #5865, North Expo
  • Veracode: Booth #5553, North Expo
  • vArmour: No booth, but will be on the show floor

Additionally, check out all of our clients’ events, parties, and speaking sessions throughout the week, listed below:


  1. Forcepoint RSA Welcome Reception 
    • Location: The St. Regis San Francisco, 125 3rd St, San Francisco, CA 94103, Yerba Buena Terrace, 4th Floor
    • Date: Monday, February 24
    • Time: 7:00 – 9:00 p.m. PT
  2. vArmour Concert Party with Nothing But Thieves
    • Location: The Grand, 520 4th Street, San Francisco, CA 94107
    • Date: Monday, February 24
    • Time: 8:30 p.m. – 12:00 a.m. PT
  3. vArmour + Digital Shadows Security Leaders RSA Party
    • Location: City View at Metreon, 135 4th St #4000, San Francisco, CA 94103, USA
    • Date: Wednesday, February 26
    • Time: 6:00 – 9:00 p.m. PT
  4. Qualys QSC Private Reception
    • Location: Veranda Ballroom on the 5th Floor, Four Seasons Hotel, San Francisco
    • Date: Wednesday, February 26
    • Time: 6:00 – 9:30 p.m. PT
  5. Securosis Disaster Recovery Breakfast
    • Location: Tabletop Tap House, 175 4th St, San Francisco, CA 94103, USA
    • Date: Thursday, February 25
    • Time: 8:00 – 11:00 a.m. PT

Speaking Sessions

  1. Veracode’s Javier Perez Talk on “Time to Spell Out Open Source Software Security”
    • Location Moscone West, 3022
    • Date: Tuesday, February 25
    • Time: 1:00 – 2:00 p.m. PT
  2. Qualys Security Conference 2020 San Francisco
    • Location: Veranda Ballroom on the 5th Floor, Four Seasons Hotel, San Francisco
    • Date: Tuesday, February 25
    • Time: 8:30 a.m. – 4:00 p.m. PT
    • Register here
  3. Splunk’s Oliver Friedrichs, Jac Noel, and Lee Peterson Talk on “Modernizing the Security Operations Center: A Security Leader Panel:
    • Location: Moscone South
    • Date: Tuesday, February 25
    • Time: 3:40 – 4:30 p.m. PT
  4. Code42’s Talk on “The Insider Threat: You’re Flying Blind”
    • Location: Moscone North Expo
    • Date: Tuesday, February 25
    • Time: 4:20-4:50 p.m. PT
  5. One Identity’s Talk on “Security Starts Here…Identity”
    • Location: Moscone South
    • Date: Tuesday, February 25
    • Time: 2:10 – 2:30 p.m. PT
  6. Intel’s Casimir Wierzynski Talk on “Protect Privacy in a Data-Driven World: Privacy-Preserving Machine Learning”
    • Location: Moscone West
    • Date: Tuesday, February 25
    • Time: 1:00 – 1:50 p.m. PT
  7. Intel’s Rahuldeva Ghosh and Dr. Zheng Zhang Talk on “Nowhere to Hide: How HW Telemetry and ML Can Make Life Tough for Exploits”
    • Location: Moscone West
    • Date: Tuesday, February 25
    • Time: 3:40 – 4:30 p.m. PT
  8. Forcepoint’s Homayun Yaqub Talk on “Modern Strategies for Protecting Users and Data in a Borderless World”
    • Location: Moscone South, 207
    • Date: Wednesday, February 26 
    • Time: 2:50 – 3:40 p.m. PT
  9. Veracode’s Chris Wysopal and Jay Jacobs Talk on “8 Million Findings in 1 Year: Fresh Look at the State of Software”
    • Location: Moscone West, 3014
    • Date: Wednesday, February 26
    • Time: 9:30 – 10:00 a.m. PT
  10. SonicWall’s Brook Chelmo Talk on “Mindhunter: My Two-Week Conversation with a Ransomware Cell”
    • Location: Moscone North Expo
    • Date: Wednesday, February 26
    • Time: 10:30 – 11:00 a.m. PT
  11. GitLab’s Cindy Blake Talk on “Best Practices for Adding Security to DevOps”
    • Location: Moscone West
    • Date: Wednesday, February 26
    • Time: 9:20 – 10:10 a.m. PT
  12. GitLab’s Cindy Blake Talk on “How to Harness Dev and Their Native Tools to Accelerate DevSecOps”
    • Location: Moscone West
    • Date: Thursday, February 27
    • Time: 1:30 – 2:20 p.m. PT
  13. Akamai’s Andy Ellis Talk on “20 Years In: Security’s Grand Challenges, Then and Now”
    • Location: Moscone West Street Level
    • Date: Thursday, February 27
    • Time: 10:35 – 10:55 a.m. PT
  14. Illumio’s Talk on “More Powerful Segmentation for More Powerful Threats”
    • Location: Moscone North Expo
    • Date: Thursday, February 27
    • Time: 10:30 – 11:00 a.m. PT
  15. Veracode’s Ryan O’Boyle Talk on “A Security Pro in Developer’s Clothing”
    • Location: Moscone North Expo
    • Date: Thursday, February 27
    • Time: 12:40 – 1:10 p.m. PT
  16. BitSight’s Jake Olcott Talk on “Do Investors Care About Cyber Risk?”
    • Location: Moscone West
    • Date: Thursday, February 27
    • Time: 2:50 – 3:40 p.m. PT
  17. Veracode’s Chris Wysopal and Katie Moussouris Talk on “Coordinated Vulnerability Disclosure – You’ve come a long way baby”
    • Location: Moscone South Esplanade
    • Date: Friday, February 28
    • Time: 8:30 – 9:00 a.m. PT

INBOUND 2019: Key Takeaways

When I was given the last-minute opportunity to go to INBOUND 2019 on behalf of Highwire PR, I seized it. The star-studded lineup of entrepreneurs, philanthropists, not to mention my childhood idols, Katie Couric and Jennifer Garner, were right in front of me. 

INBOUND, hosted by HubSpot, is a conference for marketing professionals, entrepreneurs, and innovators alike. The four day conference boasts more than 24,000 attendees which includes speaker sessions with some of the world’s most successful leaders, philanthropists and business professionals. The goal of the event is to create a community of learning and collaboration. As I entered INBOUND and was greeted with Instagram-worthy swinging chairs, and Lil Nas’ “Old Town Road” on repeat, I knew I was in store for something much different than a typical conference. The show hosts more than 300 speaking sessions, I attended three that offered advice on everything from professional development to communicating more clearly. Here are the top three takeaways.  

The Importance of Believing In Your Work (and Yourself)

My favorite session was a spotlight series which was an interview style-discussion led by Katie Couric, along with Jennifer Garner and her business partner, John Foraker, around their organic food company, Once Upon a Farm. The session focused on the evolution of their business but it also highlighted Garner’s personal growth as she added “business owner” to her resume. Jennifer emphasized the importance of believing in not only your work, but yourself. She stated: “your success in finding work you can have an impact on is finding something you can really speak to.” It’s a simple statement but an important reminder that connecting to the work you do, and for PR professionals, investing in your client’s growth, is essential for success. 

Tell Stories that Will Elevate Meaningful Conversation 

In a similar spotlight series, the roles were reversed and Katie Couric was interviewed to discuss her journalism career, views on the news today and it’s future. 

Couric stressed the importance for journalists to “do something that has an impact beyond today’s traditional news cycle.” Every second, news is constantly cycling in and out so it’s important to take action. This is an important reminder for PR professionals to think like journalists and add value. One resounding statement echoed through INBOUND was “use your voice to elevate meaningful conversations.” Communication is much deeper than bullet points, and it’s important to tell a larger story for each client we serve. 

Find A Need and Fill It 

Outside of the sessions I attended, each speaker at INBOUND had one common path to success: they found a need, and they filled it. Sal Khan, Founder of Khan Academy, utilized YouTube to reach his goal of making education accessible and now has more than one million users of his academy. Katie Couric noticed a lack of solo female news broadcast and pushed to become the first female to anchor the CBS Evening News. Jennifer Garner created Once Upon a Farm because she saw that socioeconomic status dramatically impacted access to organic, non-GMO ingredients and food. Now, her products can be found at Target, Kroger and other major retailers.  These reminders from some of the most successful folks in their respective fields illustrates that there is always room at the table. 

Attending INBOUND opened my eyes to the guiding principles one should follow as I move forward in my career. I’m proud to work for a company that executes these principles on a daily basis, and encourages its employees to shoot for the stars. 

With Great Stories Come Great Responsibilities: #SMWNYC19

Authenticity. Data-driven. Storytelling. These were just a few key themes spread out amongst the presentations and roundtables at Social Media Week 2019.

At the heart of this conference was one central theme: stories. Not just how marketers, social media managers and strategists can tell better stories, but how they can and should take responsibility for the stories they’re creating. Yes, social media has shifted the way we approach our audiences, but no matter your title, we need to get back to a place where we’re telling the stories that matter. Not just for our clients, but for the people we’re so eagerly trying to connect with. We owe them this since they’re already inundated with irrelevant content every day (in fact, 51% feel brands give them too much irrelevant content, according to Socialbakers). The least we can do is give them the stories, products and services they care about.

So what did we walk away with? We heard from big brands, agencies and partners, and they all stressed how companies and agencies alike can launch better campaigns with more impactful messages. Start by asking yourself a few questions: Are you having a conversation in a space you shouldn’t be in? Have you inserted your messaging in a cultural movement that is a natural fit for your brand? Or, are you partnering with someone that aligns with your core values and more importantly, the stories you’re telling?

Here are four of our favorite takeaways and sessions from #SMWNYC19:

    1. Design Thinking: You’ve probably heard of Silicon Valley’s method for ideation, prototyping, testing, and sure-fire way to capture an audience’s mindset before bringing an MVP to market. But for those on the agency side, this method of thinking can be used to shift your focus to the people you’re creating for. It’s also a way to get quick feedback and develop concepts fast. One of our favorite parts was when someone in the audience asked the burning question on our minds: “how do I even get started with design thinking?” Matt Higgins, SVP and Head of Strategy + Innovation at SKYLABS, handed over a pen and pad of post-its. Once you’re armed with some basic tools, you’re one step closer to high-fidelity feedback and experiencing that AHA-moment.
    2. LinkedIn’s Roadmap: I’ve been personally interested in the development of LinkedIn’s platform. Over the course of this year, they’ve invested in features that will help brands reach their target audiences, create personalized engagements, and drive more results through automation. We listened to their roadmap beyond 2019, and there are a few exciting things on the horizon that we will no doubt be testing as LinkedIn programs and campaigns (for executives and brands) is an important part of the digital work we’re doing for clients today. I’m looking forward to testing LinkedIn Live (a new live broadcast service for video) when it reaches GA (right now only a select number of brands and influencers are testing this out), and I’m also looking forward to new features for video ads, including brand awareness, lead generation, and better insight into video performance (they’ve integrated with Moat, a SaaS analytics measurement provider, for better attention measurements). Plus, they’re starting to roll out LinkedIn Reactions to mobile and web users globally, so there’s even more ways to express how you feel about a post (for instance, we’d give this post right here a “celebrate” reaction!).
    3. Creativity and Cultural Relevance: Highwire attended a brand & agency leaders lunch featuring Viacom Velocity’s CMO Dario Spina, The Daily Show’s Desi Lydic, and UM Worldwide’s Strategy Manager Max Kabakov, to listen in on an engaging panel about using creativity and cultural messaging to authentically cut through the clutter of digital marketing. It started with a recap of The Daily Show and Twizzler’s commercial (which if you haven’t seen it, here it is). While it’s funny, relatable, and addresses a real cultural movement, the takeaway is pairing cultural issues with creative can be a risky road to travel. But, it can also be highly successful and impactful for brands to join today’s conversations. For both brands and partners involved, it needs to feel right. People (namely, millennials) are not afraid to call a brand out, so companies need to be wary of the cultural conversations and ask themselves, “Do we have the right?” For instance, if your company wants to take part in the anti-straw conversation but your business might not have the best reputation when it comes to reducing its carbon footprint, then you might want to sit this conversation out. And yet, stepping into cultural conversations can be good for business (think: Nike) and overall, humanizes the stories you’re telling.
    4. #OwnYourData: Remember the main whistleblower in the Facebook/Cambridge Analytica data scandal, Brittany Kaiser? She’s still advocating for data security (not just “data privacy”) and she had some important messages for us during her presentation. Her opinion is that the only model that works is one where data is your property. Think about it this way: if you had an Airbnb, would you just hand over your keys to any person? Or would you ask them basic questions like, what do you plan on doing with my Airbnb? What will you pay me for this Airbnb? What are your intentions, and do I support them? As individuals, we opt-in to giving our data away several times a day without thinking. Would you walk into a room and flip to the last page in a contract and sign your name without reading anything else in the document? Well, that’s exactly what we do when we’re downloading an app or signing up for a service – we opt-in immediately. The way Kaiser sees it, if people understand what they’re opting into, and if our data is used properly, they’ll be more inclined to share their data. In fact, we can change the world by sharing our data, for things like medical research, humanitarian issues, and much more!

At Highwire, we’re already applying these learnings in the work that we do, for our clients and our agency. For example, we had a taste of design thinking and fast development during our Shark Tank at kickoff this year (we only had a few minutes to bring an idea to life and pitch it in real time!). And as a brand, we’re taking steps to join relevant cultural conversations — like reducing our carbon footprint as an agency and across all four of our offices (and remote workers).

Consider these takeaways and you’ll be on your way to responsible, better storytelling!




Recycling Smarter and Other Tips To Reduce Your Footprint On Earth Day

We’ve all heard the phrase, “reduce, reuse and recycle,” but what’s equally as important is learning how to recycle right. While we have the best intentions, when life gets busy and compost bins aren’t within reach, we’ve all been known to make a bad recycling decision.

This Earth Day at Highwire, our agency is renewing our commitment to mother earth by making a pledge to reduce our footprint and to be earth-wise all year round.

Highwire SF is pledging to consume less plastic overall. Our employees are pledging to make better decisions by using the silverware in the office that can be tossed into the dishwasher, rather than using one-time plastic utensils that might come with our Monday bagel delivery.

Highwire NY is committing to educating Highwire employees, and holding themselves accountable. This means skipping the plastic bag that might come along with that to-go lunch order, and saying no to plastic knives to spread their favorite schemar. Additionally, the New York office is going to print out labels for their recycling bins to remind employees what goes into what bin.

Those Chicago winters get cold, and Highwire Chicago is pledging to pay extra attention to unplugging those life-changing space heaters when they aren’t being used. Even more, the Chicago office is going to cut down on the usage of lights when not needed, and will make sure that all electronics are unplugged at the end of the day.

Highwire Boston is trying to go without plastic as well. The team is ordering a set of silverware to cut down on the need to use plastic cutlery, and a set of stainless-steel straws to avoid reaching for a plastic straw.

Our offices will also be participating in an Earth Day event this month. Highwire SF will be joining a handful of other Bay Area PR agencies to Rock the Earth by participating in a clean up at Mountain Lake. On the other side of the country, Highwire Chicago will be participating in its annual clean up of Lincoln Park while Highwire NY will be participating in a Central Park clean-up in May. Highwire Boston has a couple initiatives to better the community. They will be holding an “office planting” event, as well as donating to a local conservation charity.

While this annual reminder is a great way to remember the importance of doing our part to protect our earth, here are a few ways you can do your part all year long:

  • Choose paper or reusable straws with your iced coffee. Better yet, skip the straw all together
  • Use compostable trash bags in your kitchen, like these.
  • Learn how to recycle correctly— did you know that your greasy pizza box or your plastic bag should not be recycled?
  • Compost paper products like paper towels, newspaper and tissues
  • Participate in “Meatless Monday.” Just one ¼ lb. of beef requires 425 gallons of water to produce
  • Reduce food waste: learn how to properly chop vegetables to maximize what you are using
  • Use reusable mugs, bring them with you to Starbucks and get a discount.
  • Turn off lights you’re not using and when you leave the room. Replace incandescent light bulbs with compact fluorescent or LED ones.
  • Eat organic food, and food from local farms that aren’t using pesticides (talk to your farmers, at places like Green City Market in Chicago!) It has been estimated that 13% of U.S. greenhouse gas emissions result from the production and transport of food.

What will you be doing to reduce your own footprint this year?

Real Interns of Highwire PR – Top Tips On All Things PR

Highwire’s Internship Program helps college graduates build the foundation for a long-term career in PR. This internship provides opportunities to work directly with client teams and to gain relevant hands-on experience. Across our four offices, our interns help create content to help tell our client’s stories and develop a strong foundation of skills for a career in PR. Learn about a few of our current Highwire interns below!

previous arrow
next arrow

Privacy and Security Policy

Highwire Public Relations, Inc. (“us”, “we”, or “our”) operates the website (our “Site”) that allows (i) access to and download of certain information we provide through the Site and (ii) the ability of users of our Site to contact us electronically (collectively, the “Service”). This document sets out of privacy and security policy (the “Policy”) and, among other things, informs you of our policies regarding the collection, use and disclosure of Personal Information (as defined below) when you access our Site (whether directly or indirectly) or in any manner use our Service.

By visiting our Site, by using the Service, or by in any manner communicating with us via our Site or Service, you accept our practices described in this Policy, and you consent to our collection, use and disclosure of your information, including personally identifiable information, as described in this Policy.  If you do not wish to agree to the practices and uses described in this Policy, please do not access our Site or use the Service.

1.              Overview of this Policy

The following information in this Policy is designed to help you better understand what information we gather from you and through your access of the Site or use of our Service, how we use and disclose this information, who we might share this information with, and to describe generally what security steps we take. By accessing our Site, downloading any information made available via our Site (e.g., whitepapers, etc.), and/or by using our Service in any manner, you are accepting the practices described in this Policy and expressly consent to our collection, use and disclosure of all information transmitted or otherwise received by us (including all Personal Information) in the manner described in this Policy.

Except as expressly stated herein, this Policy does not apply to any third party applications or technologies that integrate with our Service (e.g., social media sites, etc.), or any other third party products, services, or businesses, or to third party websites that you access via links or otherwise while using the Site or the Service (“Third Party Services”).  This Policy does not apply to data collected from, or provided by you to, Third Party Services, and instead such data is subject to the practices of the provider(s) of the applicable Third Party Services.  You should review the privacy policies of such Third Party Services (and any other applicable terms and conditions) to determine how your data will be used before sharing any of your data with them.

This Policy is incorporated into and subject to the terms of our Terms of Use posted on our Site (collectively, the “Terms of Use”).

2.         Information We Collect

While using our Service, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you. You may also elect to send us information in your discretion about yourself or others.

Personally identifiable information may include, but is not limited to, your email address, name, phone number, postal address, IP address, employer, job title, and any other information that can in any manner identify you, individually (“Personal Information”). For example, before being able to download a whitepaper on our Site, you may be required to fill out an electronic form stating your name, email address, phone number, work address, and employer name.

Your information, including your Personal Information, and any other information you input via use of our Service may be collected by us through your direct interactions with our Site, use of our Service via text messaging, email or written correspondence, telephone calls, or web based forms or from third party providers.

We may also collect other information from you related to your use of the Site or the Service and your interactions with our Site or Service (while this information may not typically contain Personal Information, we are not responsible for the content of such information).  This information includes any such information that you affirmatively provide to us, and may include the following:

  • Log Data.  Like most websites and web-based technology services, our servers may automatically collect data when you access or use the Service and record it in log files.  Such may include your Internet Protocol (IP) address, Internet service provider (ISP), geographic location, browser type and settings, information about browser plugins, language preference, default email application, referring/exit websites, operating system, date and time stamp, cookie data, and certain user activities.
  • Technical Data.  We may collect technical data, such as information about devices accessing the Service, including the type of device, device settings, operating system, application software, peripherals, and unique device identifiers, phone number, country, location, and any other data you choose to provide. We do not intentionally relate this to any individual user of the Service.
  • Cookies.  Cookies are files with a small amount of data, which may include an anonymous unique identifier. Cookies are sent to your browser from a web site and transferred to your device. We use cookies to collect information in order to improve our services for you. You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. The Help feature on most browsers provide information on how to accept cookies, disable cookies or to notify you when receiving a new cookie. If you do not accept cookies, you may not be able to use some features of our Service and we recommend that you leave them turned on.

Please be aware that our Site and Service does not support Do Not Track (“DNT”). Do Not Track is a preference you can set in your web browser to inform websites that you do not want to be tracked. You can enable or disable Do Not Track by visiting the Preferences or Settings page of your web browser.

3.         Use of Data We Collect.

The information we collect is used, generally, to provide the Service, identify and communicate with you (including sending you marketing messages), respond to your requests/inquiries, improve our services, and ensure compliance with applicable laws, inclusive of all intellectual property laws.  We also use Personal Information, to the extent necessary, to enforce the Terms of Use, monitor adherence to the Terms of Use, to attempt to prevent and/or detect fraud, to allow third parties to carry out technical, logistical or other functions on our behalf as long as those third parties have agreed to use the level of privacy protections commensurate with industry norms, and to help prevent and investigate security issues and abuse.  Examples of our use of your information include the following:

  • CommunicationsWe may use your Personal Information to contact you with marketing or promotional materials and other information that may be of interest to you. You may opt out of receiving any, or all, of these communications from us by following the unsubscribe link or instructions provided in any email we send.
  • Compliance With Laws.  We will disclose your Personal Information where required to do so by law or subpoena or if we believe that such action is necessary to comply with the law and the reasonable requests of law enforcement or to protect the security or integrity of our Service.
  • Analytics.  In connection with our use of cookies described above, we may also partner with third party providers, as described below, to allow tracking technologies and remarketing services related to our Service through the use of first party cookies and third-party cookies, to, among other things, analyze and track users’ use of the Service, and to better understand online activity.  By accessing the Service, you consent to the collection and use of your information by these third-party vendors.  You are encouraged to review such vendors’ privacy policies and contact them directly for responses to your questions.  While we do not transfer Personal Information to these third-party vendors, if you do not want any information to be collected and used by tracking technologies, you can install and/or update your settings control such use.
  • Security Purposes.  Using information collected to help prevent and investigate security issues and abuse and to ensure compliance with this Policy and the Terms of Use.
  • Improving the Service. We may use your information to test features, manage landing pages, heat mapping, traffic optimization, data analysis and research, including profiling and the use of machine learning and other techniques over your data and in some cases using third party providers to do this.

4. Use of Third Parties and Third Party Services.

We may employ third-party companies and individuals to facilitate our Service and manage our Site and to provide the Service on our behalf. These third parties have access to your Personal Information only to perform specific tasks on our behalf and are obligated not to disclose or use your information for any other purpose.  Moreover, we may use third-party services, such as that collect, monitor and analyze this type of information in order to increase our Service’s functionality. These third-parties may use cookies to help us analyze how our users are using the Service and they have their own Privacy Policies addressing how they use such information.

5.         Security.

The security of your Personal Information is important to us, and we strive to implement and maintain reasonable, commercially acceptable security procedures and practices appropriate to the nature of the information we store, in order to protect it from unauthorized access, destruction, use, modification, or disclosure. Substantially all information we receive from you or via your use of the Service are copied, stored and managed through computer servers owned or controlled by us.  While we attempt to employ security techniques commensurate with industry norms to protect your Personal Information and other Hosted Info from unauthorized access by users inside and outside the organization, you should be aware that “perfect security” does not exist on the internet or any other method of electronic transmission or storage; third parties may unlawfully or improperly intercept or access transmissions, personal information, or private communications. As such, we cannot make any assurances or guarantee in any manner that a security breach will not occur that may expose your personally identifiable information to others.

For example, our servers are not located at our principal place of business but rather are managed and located at a third-party Infrastructure-as-a-Service provider (an “IAAS”).  We have taken commercially reasonable steps to choose a professional IAAS provider but we cannot guarantee the performance of the IAAS provider, its security measures, or the actions or inactions it takes in the future.  By using our Service, you understand and agree that we have no liability for the action, behaviors or failings of our IAAS provider.

We endeavor to only require the collection of as much Personal Information as required to provide you access to our Service, ensure our ability to send you the communications described above, and meet our legal obligations.  In addition, we will use commercially reasonable efforts to attempt to store Personal Information in a secure location.  We do not represent that any Personal Information provided to us will be encrypted in any manner.

6.         United States Use Only; International Transfer.

Our Service is intended solely for use within the United States.  You agree not to access the Service or provide any Personal Information to us if you are outside the United States. If you are located outside United States and still provide information to us, please note that we transfer the information, including Personal Information, to the United States and process it in the United States.  If we discover that you are located outside the United States, we will attempt to immediately delete all information you have provided to us and you agree to hold us harmless for your violation of this section.   Your consent to this Policy followed by your submission of such information represents your agreement to abide by the restrictions contained herein.

7.         Business Transaction

If we are involved in a merger, acquisition or asset sale, your Personal Information may be transferred as a business asset. In such cases, we will attempt in good faith to provide notice before your Personal Information is transferred and/or becomes subject to a different Policy.

8.         Links To Other Sites

Our Service and our Site may contain links to other sites that are not operated by us. If you click on a third-party link, you will be directed to that third-party’s site. We strongly advise you to review the Policy of every site you visit.  We have no control over, and assume no responsibility for the content, privacy policies or practices of any third-party sites or services.

9.         Children’s Privacy 

Only persons age 18 or older have permission to access our Service. Our Service is meant for working professionals only and, therefore, are not meant to be used or accessed in any manner by anyone under the age of 13 (“Children”).  We do not knowingly collect personally identifiable information from Children. If you are a parent or guardian and you learn that your Children have provided us with Personal Information, please contact us. If we become aware that we have collected Personal Information from a children under age 13 without verification of parental consent, we take steps to remove that information from our servers.

10        Enforcement

We will actively monitor its relevant privacy and security practices to verify adherence to this Privacy Policy. Any agents, contractors, service providers, or other third parties subject to this Policy that we determine to be in violation of this Policy or applicable data protection laws will be subject to disciplinary action up to and including termination of applicable services. Please contact us immediately at if you believe there has been a material violation of this Privacy Policy.

11.       Changes To This Policy

This Policy is effective as of the date listed at the top of this Policy and will remain in effect except with respect to any changes in its provisions in the future, which will be in effect immediately after being posted on this page.

We reserve the right to update or change our Policy at any time and you should check this Policy periodically. Your continued use of the Service after we post any modifications to the Policy on this page will constitute your acknowledgment of the modifications and your consent to abide and be bound by the modified Policy.

If we make any material changes to this Policy, we will notify you either through the email address you have provided us, or by placing a prominent notice on our website.

12. Opt Out Policy and Your California Privacy Rights.

Users can prevent future disclosures for direct marketing purposes of his or her Personal Information, at no charge, by exercising his or her “opt out” rights by using the “opt out” procedures described below:

Send an email to:, or

Send mail to the following postal address:

Highwire Public Relations, Inc.
Attn: Privacy Policy Agent
727 Sansome Street
San Francisco, CA, 94111
Telephone: 415-963-4174

Additionally, upon receipt of any electronic communication from us to you, to unsubscribe from future communications, you can click on the link that says words substantially to the effect of “If you do not wish to receive these emails in the future, You can click here to unsubscribe.”

Because we provide our California users with the ability to exercise his or her “opt out” rights as described above, pursuant to Section 1798.83(c)(2) of the California Civil Code, we are in compliance with the California “Shine the Light” law and are not obligated to provide California users with the names and addresses of all the third parties that received personal information from the Company for the third parties’ direct marketing purposes during the preceding calendar year.

13.       Contact Us

Please do not hesitate to contact us with any questions, complaints, or requests with respect to your Personal Information, this Privacy Policy, and/or our privacy practices.

You may contact us at:



Highwire Public Relations, Inc.
Attn: Amy Tsui
727 Sansome Street
San Francisco, CA, 94111