IAPP 2014 Sept. 17, 2014 to Sept. 19, 2014, san jose,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Case Study: Seagate’s OpenStack Swift Security Rodney D. Beede Join this review of the security design and hardening implementation as done by Seagate Technology ...
It’s Time to Go Public: Bringing Private Cloud Controls to the Public Cloud Mark Bower , David Vogel People will do whatever it takes to get their jobs done, and sometimes that means ...
Leveraging CHAOS (Controlling Havoc and Overhauling Security) Theory to Promote Cloud Adoption Evelyn De Souza , Richard Noguera Mobility and the cloud have transformed how we work but have unleashed havoc on IT ...
Asset Management in the Cloud Todd Mack With many companies using or looking to use cloud services, the ability to identify what ...
Close-up on Cloud Security Audit Douglas Barbin Clouds require a different mindset for audits and certification but do not need to be ...
Compliance and Risk Essentials for Financial Services CSPs Stacy Coleman , Ryan Smyth , Michael Spadea We will present a framework that cloud service providers (CSPs) servicing financial institutions can use ...
Compliance in the Cloud: A Pragmatic Approach to Achieving SOC2 and PCI Compliance Kevin Abbott We've all heard the idiom “compliance does not equal security,” and it is also true ...
Integrating IaaS into Enterprise Security Policies Jonathan Trull Organizations are adopting cloud services at a rapid pace, sometimes outside the scope of existing ...
Securing Cloud Apps at Pandora: What Today’s Enterprises Can Learn Doug Meier Innovative companies like Pandora take advantage of a diverse and ever-growing array of SaaS applications ...
Anatomy of a Cloud Data Breach Krishna Narayanaswamy Join this lively and approachable session on data breaches in the cloud. Drawing on unique ...
Bring Your Own Key to Accelerate Cloud Protection Willy Leichter Learn how highly regulated, security-conscious organizations are enabling cloud adoption by encrypting sensitive data while ...
Encryption for Cloud Services Security: Problem or Panacea? Zulfikar Ramzan One way to mitigate the security risks of cloud services involves data encryption. While encryption ...
Four Case Studies: Protecting Sensitive Data in Rackspace, FireHost, Microsoft Azure and AWS C.j. Radford Enterprise cloud deployments are now starting to include large amounts of protected personal data subject ...
Oil and Water? Agile Development and Secure Software Development Josh Daymont Here, we’ll examine adjustments to traditional SDLCs, including security testing driven by continuous integration, transcendental ...
Secure SDLC Practices for the Cloud Krishna Marella Don’t miss this discussion of design and development practices to address security and operational risks ...
What Are Your Top 25 Cloud Security Weaknesses? Randall Brooks Given a focus on “building security in” to one’s cloud application, a cloud architect must ...
Bitcoin—Virtual Currency, Real Risks Patrick Murck , Jason M. Weinstein The growth of bitcoin offers the potential for a revolution in both electronic and real-world ...
The CFPB’s Responsbilities and Approach to Privacy Protection Robert Belair , Corey Stone The Consumer Financial Protection Bureau (CFPB) has a number of tools at its disposal including ...
Counseling Your Board on Privacy, Security and Data Protection David Benkert , Sharon Klein , Justin Walker With data breaches, cyber-attacks and governmental enforcement on the rise and front and center in ...
How to Avoid Common Data Breach Pitfalls Celeste Lipworth , Brenda Sharton Data breaches are not a problem exclusive to high-profile companies and pose an increasing threat ...
Litigation: Standing Issues in Internet Privacy Cases David F. Mcdowell , John Nadolenco Angela Saverice-Rohan, CIPP/US, General Counsel & Chief Privacy Officer, Spokeo Leading people-search-engine Spokeo was sued ...
New Tools for Employee Monitoring—New Privacy Concerns? Karin Retzer , Monika Tomczak-górlikowska Join us to discuss the developments in IT tools aimed at monitoring and assessing employees ...
Regulatory Enforcement: Updates from North America and the EU Shaun Brown , Alysa Z. Hutnik , Eduardo Ustaran Take a journey through the latest regulatory enforcement trends on privacy and data security in ...
TCPA and Wireless Marketing at the FCC, the FTC and in the Courts William B. Baker This program will review the case law at the FCC, the FTC and in the ...
Healthcare Workarounds: Managing Risk in the Age of User Empowerment David Houlding Several research studies show that healthcare workers are increasingly using workarounds or procedures out of ...
The Challenges of Applying HIPAA to the Cloud Adam Greene In 2013, HHS clarified that an entity that maintains electronic protected health information (ePHI) on ...
What's Next for Healthcare Privacy and Security? Kirk Nahra The healthcare industry evolves quickly and constantly, while the rules for privacy and security move ...
Breaking Down the Silos: A 21st Century Approach to Information Governance David Ray With recent events in in both the privacy and cybersecurity realms, organizations are increasingly focusing ...
Fact or Fiction? U.S. Government Surveillance in a Post-Snowden World Bret Cohen Since the 2013 disclosure of government surveillance methods by NSA contractor Edward Snowden, American and ...
The Human Element to Data Security Emily Duke , Thomas Wei If thieves want to get into your business systems, they will find a way...regardless of ...
Connected Vehicles, Cybersecurity and Privacy: The Way Forward Laura Berger , David Strickland , Harry Lightsey , Kevin Vincent There is no doubt that the future of connected cars offers significant safety benefits for ...
Express Yourself: Wear That Technology, Baby! Chris Sellers , Ruby A. Zefo What do you get when you cross Madonna with data-collecting clothing? Data breeches! The original ...
Machine-to-Machine Communications: The Rise of Skynet Beth Hill , Richard Purcell , Matt Silva , Gerard Stegmaier Machine-to-machine communications represent the next great frontier in privacy and data governance issues. 2014 marks ...
Privacy in the Aisles: The New Age of Analytics Kashmir Hill , Steve Russell , Adam Silverman Robust tracking capabilities are not just a tool for online businesses. New in-store analytics are ...
The FTC’s View of the Internet of Things Dan Caprio , Maureen Ohlhausen , Andy Serwin Big data and the Internet of Things (IoT) represent transformative 21st century technology that promises ...
What You Need to Know Today about FTC Privacy Enforcement Trends Laura Berger , Alison Pepper , Stuart Ingis In tandem with rapid innovations in data practices and technologies, the FTC’s privacy enforcement approach ...
Fear and Loathing in Data Monetization: How Privacy Officers Can Help Organizations Responsibly Monetize Their Data Nathalie Holmes , Marcus Morrisette According to Booz & Company, revenue from monetizing data could represent up to $300 billion ...
The Future of Maintaining State: Business and Policy Considerations for Next-generation Tracking in the Mobile Environment D. Reed Freeman , Marc Groman Though developed over two decades ago as a state management tool, the HTTP cookie has ...
Data Brokers Demystified Emilio Cividanes , Pam Dixon , Jennifer Glasgow , Janis Kestenbaum Come discuss the findings of the 2014 Federal Trade Commission (FTC) paper on data brokers ...
The Costs and Benefits of Regulating Big Data Alan Raul , Berin Szoka , Adam Thierer , Lee Tien The object of public policy is to enhance net social benefits and protect fundamental rights. ...
The Meaning and Impact of the White House Study of Big Data Omer Tene , Cameron F. Kerry , Sara R. , Andrew H. Tisch , Christopher Wolf Earlier this year, in connection with his speech to the nation on NSA issues, President ...
Understand (and Avoid) “Creepy” in Online Communication Michael Mccullough , Jules Polonetsky , Arlonda Stevens , Ilana Westerman These days, vast amounts of personal information being generated online combined with powerful big data ...
Building YOUR Privacy Program: One Size Does Not Fit All Justine Young Gottshall , Adam Nelson Drawing from experience in setting up multiple privacy programs from the ground up for organizations ...
Essentials for Building a Scalable Privacy Breach Response Strategy Jay Loder The majority of consumers believe that organizations are failing in their obligations in responding to ...
Measuring Privacy at Microsoft Tracy Ann Kosa , Jennifer Garone , Thu Le , Marisa Rogers How do we prove compliance—prove to a regulator, or a CEO, that privacy is in ...
Search and Seizure in the Workplace: Is Your Organization Prepared to Seize an Employee's Smart Phone? Michael Collins , Erik Werfel Most U.S. privacy professionals stand unprepared to decide when, how and why to search and/or ...
When the Regulators Come Knocking or Other Bad Stuff Happens Chris Cwalina , Maggie Mobley , Heidi Salow When your company or client receives an inquiry from a state or federal regulator, it ...
All the Right Moves: Ways You Can Boost Trust in the Cloud Francoise Gilbert How do you ensure that data in your custody are receiving the proper level of ...
Cloud Security and Identifying Bring Your Own Cloud (BYOC) Risks Jared Hamilton This two-part presentation will discuss an approach to perform a review of cloud security from ...
Maintaining Ownership and Control of Data On the Cloud Elad Yoran The emergence of cloud computing as a mainstream IT strategy has created an extra layer ...
Real-life Tips (That Actually Work) for “Selling” Security to Employees Eran Feigenbaum In this fireside chat, we’ll dive into how IT can effectively change end-user behavior and ...
Tips for Mitigating Cloud Risk with Contract Negotiation and Vendor Management Thomas Trappler The use of cloud computing services comes with a unique set of risks. This presentation ...
Why Should You Trust Your Broker More Than Your Banker? Top 5 3/4 Lessons Learned from Brokering Clouds Jon-michael C. Brook If analyzing a move to a public cloud service provider has you scared, hold onto ...
How to Gain Your Customers’ Trust in the Cloud Francoise Gilbert , Daniele Catteddu To deserve the trust of their customers and others, companies that provide or use cloud ...
Privacy and Security Management in an Agile Environment Maritza Johnson , Bhavesh Advani , Kenesa Ahmad , Babak Siavoshy Today, many successful firms run their IT development using an agile model. However, risk managers, ...
Building a Case for Privacy Investment to Your C-Level Abhishek Agarwal Welcome to the C-Suite. Now that you have the job, title and a budget, how ...
Cloud Security 101 for the Privacy Pro Cherise Campos Cloud computing is everywhere, and terms and acronyms can seem confusing. What is real and ...
Cloud Storage Data Protection Jim Reavis , Eran Feigenbaum , Harshul Joshi , Cory Louie , Chad Woolf Get various perspectives from leading cloud service providers on cloud storage data protection topics, including ...
Coming Face-to-Face with the Many Facets of a Data Breach Steve Kim , Raymond O. Aghaian , Jeffrey S. Miller , Jason N. Smolanoff Join these hands-on industry experts to address top incident response protocols, like the importance of ...
Corralling Shadow IT and Enabling Secure Adoption of Cloud Services Harold Byun , Andy Radle The word is out on shadow IT. The extent may vary from company to company, ...
Cyber Due Diligence: A Pre-purchase Check Up Reveals Data Risk Hot Spots Khoa D. Do , Jonathan Fairtlough , Mauricio Paez For potential investors in early- or mid-stage companies, the reality is that the target organization’s ...
Data-centric Security for a Data-centric World Amit Walia Data represents the lifeblood of an organization: customer, partner, product, trade information and secrets that ...
Developments in Private Litigation and Regulatory Enforcement Stemming from Data Security Breaches Douglas Meal Litigation and regulatory investigation are virtually inevitable when a major consumer data security breach occurs. ...
Educating the Educators: Privacy Lessons from inBloom Omer Tene , Virginia Bartlett , Bill Fitzgerald Ed tech is revolutionizing learning environments from K–12 to higher education, from apps for toddlers ...
How Data Mining Discriminates Solon Barocas In a May 2014 report on big data, the White House expressed unique concern about ...
International Espionage and Privacy Law—FUD and Facts Lothar Determann Since Snowden’s revelations, U.S. companies in the information-technology sector are scrutinized regarding data processing practices, ...
Is It Time to Trust the Cloud? Unpacking the “Notorious Nine” Jonathan Trull The development and adoption of cloud computing has forever changed the information security landscape. But ...
Keeping Your Data Safe and Secure in the Cloud Steve Holly , Rob May , Steve Peltzman , Tsahy Shapsa IDC Research projects that the cloud market will grow 23% by 2018. It’s clear the ...
New Findings from the IAPP’s Privacy Industry Index Sam Pfeifle In 2013, the IAPP tackled the role that privacy professionals play in privacy spending—how much ...
Privacy 101 for the Cloud Security Pro Jc Cannon Privacy? That’s like Edward Snowden and stuff, right? Are you thinking you’re all set because ...
Privacy Gold Rush—Finding the Elusive ROI on Privacy Marcus Morrisette , Chris Babel , Sachin Kothari What are the benefits, costs and risks associated with investing in privacy programs? How can ...
Privacy as an Enabler: 5 Things Privacy Pros Can Do to Help Their Companies Thrive Lael Bellamy , Patrice Ettinger , James Koenig Privacy is a critical dependency for future business models, global expansions and new technologies. After ...
Protecting Application Infrastructure with Software Defined Perimeter Brent Bilger , Junaid Islam Software Defined Perimeter (SDP) is a research project by the CSA to define a multi-layer ...
Ready to Handle a Data Breach? A Live, Step-by-Step Data Breach Scenario Ozzie Fonseca , Katherine Keefe , Ted Kobus Iii. , Steve Visser Come try your hand at data breach response. The session includes a mock breach scenario ...
SOC2, CSA STAR Attestation and the Future of Cloud Assurance Mark Lundin Over the past three years, many cloud providers have adopted SOC2 reporting as a primary ...
Same Planet, Different Worlds: Getting IT and Privacy Teams to Work Together Leslie Lambert , Jonathan Fox , Phil Lee Privacy professionals know what they want to achieve: Fair and proportionate data processing, no-longer-than-necessary storage ...
The Market for Privacy-enhancing Technology Nico Sell , Mike Janke , Sam Pfeifle The last year has seen some high-profile investments in firms bringing privacy-enhancing technologies to market. ...
The Notorious Nine Cloud Computing Threats: Overview and Case Studies Moshe Ferber Cloud computing is evolving fast, and so are the threats and defense tactics. Cloud consumers ...
Today’s Complicated Breach Landscape: Managing the Response and Consumer Expectations Michael Bruemmer , David Chamberlin Tony Hadley, Senior Vice President, Government Affairs & Public Policy, Experian In a few short ...