GlobalPrivacySummit 2019 May 2, 2019 to May 2, 2019, Washington, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Marrying Privacy Engineering and User Experience | Jenn Behrens | Product development inextricably requires good user experience for successful launch. Dr. Behrens will provide the ... | |
Lessons Learned for Running a Successful Technology Proof of Concept | Kevin Murphy , Lynne Bird , Mike Tibodeau | As technology is being adopted for privacy management, more companies are assessing possible vendors by ... | |
The Challenges of Scanning Large Volumes of Personal Information | Will Ackerly , Christopher Glover , Martin Izenson , Subramanian Ramesh | New privacy technology solutions involve the scanning of large amounts of data to find personal ... | |
Constructing Identities From Data | Christopher Leizerov | Finding and confirming an identity in data is not always a clear-cut case. More often ... | |
Working Across Borders: Partnering and Vetting | Bret Cohen , Chantal Bernier , Eija Warma-lehtinen | Whether you’re working internally or externally, there comes a time in every lawyer’s work where ... | |
When Regulators Work Together | Brent Levisohn | While the consistency mechanism of the General Data Protection Regulation ensures that regulators across the ... | |
You Make the Call: Strategic Privacy War Game | Dan Caprio , Jonathan Litchman , Marylynn Stowers | What’s the most common phrase in privacy law? “It depends.” Learn from this interactive three-hour ... | |
AdTech 101: An Interactive Analysis of Online Advertising Tech & Privacy Policy | William Lee , Grant Nelson , Heather Egan Sussman | The advertising technology ecosystem is notoriously complicated, but this workshop will demystify it. Industry insiders ... | |
Fourth-Party Vendor Management: How to Manage Your Vendor’s Vendor | Web Hull | What you’ll take away:Get up to date on current best practicesLearn privacy, data protection, security ... | |
Strategic Privacy by Design: The Game | Carmen Buezo | Tired of listening to talking heads from the lectern? Come play Strategic Privacy by Design: ... | |
The UX Guide to Notice and Consent | Patricia Westerman | With the EU’s General Data Protection Regulation, which came into force in May of 2018, ... | |
Privacy Bootcamp | Kirk Nahra | Privacy can be a bewildering topic. With multiple laws, jurisdictions, technologies and business models converging ... | |
CCPA Scope and Important Definitions | Lothar Determann | Just when you thought you knew what a "business" or a "consumer" was, here comes ... | |
Out: GDPR; In: CCPA—Compare and Contrast | Ari Schwartz , Lothar Determann , Dominique Shelton Leipzig | So, you think you’ve mastered the GDPR? Before you even catch your breath, here comes ... | |
Gray Areas in the CCPA Come to Light | Ari Schwartz , D. Reed Freeman , Lothar Determann , Dominique Shelton Leipzig , Jeewon Serrato | First, hear the panelists offer their takes on hazy areas of the CCPA that so ... | |
Transparency and Consent: The User Experience Perspective | Jeewon Serwin | N/ADoes the CCPA really require companies to have buttons on their websites that say, "Do ... | |
How Enforcement Will Work: Private and Regulatory Action | Nicole Ozer , Travis Leblanc , Lisa Kim | While not setting up a European-style data protection authority, the CCPA empowers the California attorney ... | |
Data Protection Impact Assessments: The Full Picture | Sean Bamford , Shanshan Pa , Linda Spencer , Maarten Stassen | Data Protection Impact Assessments (DPIAs) are essential for any sustainable data protection compliance framework. DPIAs ... | |
Data Breach Bootcamp | Liisa Thomas | With the GDPR, the reality of data breach notification and response truly hits home for ... | |
Data Subject Access Rights Revolution: What Has Changed and What’s Next | Kate Colleary , Hazel Grant , Rocco Panetta | What you will take away:Clarity on how the shift in data subjects’ access rights will ... | |
GDPR vs. Technology | Christopher Watts | What you’ll take away:Understand the impact of GDPR on providers and users of key technologiesGain ... | |
Building a Global Privacy Program That Performs | Todd Redfoot , Kevin Kreuser , Serena Lai , Leticia Webb | In this interactive session, learn how to keep everyone happy—from customers to ICANN to international ... | |
Designing Notice and Consent for the Internet of Things | Lorrie Faith Cranor | Privacy notices are often long, difficult to understand and don’t appear at opportune times. Constrained ... | |
America’s Code War: Tales From the Front Line and Where to Go From Here | David Sanger , John Carlin , Sean Joyce , Rebecca Richards | From foreign interference in its elections to the theft of its companies’ valuable trade secrets, ... | |
Back to the Future: Will the FTC Staff Report Become the U.S. Privacy Framework? | Jim Halpert , Jon Leibowitz , Davis Polk | 2019-2020 are critical years in the evolution of the U.S. privacy framework. This panel will ... | |
Health Care in an Evolving Cyber Threat Landscape: FDA and Industry Perspectives | Suzanne Schwartz , Luke Dembosky , Gregory Stein , Grace Wiechman | No area of cybersecurity and data privacy presents higher stakes than medical devices. Underlying the ... | |
How Blockchain Technology Will Transform Data Privacy | Stuart Levi , Alice Nawfal , Elizabeth Renieris | Blockchain, the technology underlying bitcoin, has been heralded as the most important technological development since ... | |
The Ethics of Geolocation Data Collection, Use and Sharing | Nicole Ozer , Jeremy Greenberg , Kara Selke , Limor Shmerling Magazanik | Geolocation data collection can be a valuable tool for serving commercial and humanitarian interests. Retailers ... | |
A Convention 108-CBPR Guide to Trans-Border Data Flows | Florence Raynal , Josh Harris , Sophie Kwasny , Gabriela Zanfir-fortuna | The Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data ... | |
Constructive Engagement vs. Enforcement: Initial DPA Experiences Under the GDPR | Simon Mcdougall , Sophie Nerbonne , Andrea Jelinek , Annamorgan | One year into the GDPR, EU DPAs will discuss their supervisory and enforcement experiences so ... | |
Innovating in the Midst of Change: How Privacy Pros Can Drive Differentiation | Kate Demopulos , Kim Howell , Enza Iannopollo , Greg Roberts | According to a recent survey published by Forrester, 43 percent of U.S. consumers are likely ... | |
International Response to Global Privacy Alarm: Facebook/Cambridge Analytica/AIQ | Michael Mcevoy , James Dipple-johnstone , Daniel Therrien | Consumer Privacy, Enforcement, Ethics, Social Networking, Trans-Border Data FlowSalon J, Level M4 James Dipple-Johnstone, Deputy ... | |
Letting the Machine Decide? Privacy Risks Associated With AI Technologies | Ruby A. Zefo , Alexis Goltra , Christine Lyon | From scouring applicants’ resumes to detecting insider threats, AI technology is already revolutionizing the workplace. ... | |
72 Hours and Counting: Do's and Don'ts of Global Data Security Incident Response | Brian Hengesbaugh , Mary Fort , Shea Wynn | Global data security incidents pose critical challenges for companies in all industry sectors. Companies are ... | |
Is This the Year? Legislative Update on Data Privacy With Stu Ingis | Tony Hadley , Stu Ingis , Jason Van Beek , Joseph Wender | Catch up on the latest legislative developments in privacy with Stu Ingis during this luncheon ... | |
Privacy as a Movement: A Conversation on Privacy Shield, GDPR and CCPA | Julie Brill , Justin Antonipillai , Alastair Mactaggart | The last several years have seen significant movements not only in the laws around privacy ... | |
The Globalization of Privacy and Considerations Affecting the Cloud | Albert Talreja | The adoption rate of cloud computing continues to accelerate, providing immense value to society by ... | |
Chief Data Officer—What Does This Emerging Role Mean for Privacy Professionals? | Sagi Leizerov , Guy Lehman , Igor Perisic | With more organizations adding to their management ranks the chief data officer position, privacy professionals ... | |
Demystifying the DSR Process: Handling Difficult Data Subject Rights Requests | Shahab Asghar , Roy Kamp , Barbara Sondag | Can your organization’s privacy operations pass the tests of the most challenging and nuanced data ... | |
Ethical Use of Employee Data: Improving Your Workplace the Right Way | Tom Moore , Sooji Seo , John Verdi | Employee data can provide insights into workplace trends and productive behaviors. As a result, revenue ... | |
Leadership in Privacy—And Beyond | Liisa Thomas , Agnes Bundy Scanlan , Katherine Licup , Cindy Van Ort | Part of Women Leading Privacy programming. Privacy professionals are increasingly finding themselves part of the ... | |
Privacy Challenges in the Globalization of Criminal Evidence | Tjabbe Bos , Richard Downing , Nicole Jones | With cloud computing, law enforcement investigations increasingly seek evidence that is held in a different ... | |
Risky Business: A Privacy and Security Team’s Guide to Risk Scoring | N/a | What you’ll take away:Understand various approaches to conducting risk assessmentsLearn how to define risk criteria ... | |
Shaping the Future of Global Privacy | Betsy Broder , Teki Akuetteh Falconer , Bruno Gencarelli , Abigail Slater , Shaundra Watson | A robust global dialogue on best practices for developing data protection frameworks continues in the ... | |
APAC Privacy: Five Things You Should Know About Privacy’s Most Diverse Region | Tharishni Arumugam , Aon Anna Gamvros , Yi Lin Seng , Rachel Thompson , Noboru Yamaji | As more and more organizations globalize and expand their operations to the East, the challenge ... | |
Emerging Privacy Solutions for Genomic Data | Deven Mcgraw , Khaled El Emam , Elissa Levin , Carson Martinez | Genomic data is an invaluable source of information that has transformed biomedical research, personalized medicine ... | |
Financial Forum 2.0: Bank CPOs Discuss Hot Topics in Financial Privacy | Christine Frye , Zoe Strickland , Kimberly Genobles , Ron Whitworth | During last year's Summit, a group of major bank CPOs gathered to discuss challenges and ... | |
GDPR in LatAm: Corporate Concerns in Dealing With (Applicable?) Foreign Law | Juanita Acosta , Pablo Palazzi , Dirceu Santa Rosa , Paulina Silva | Latin American privacy regulations in Argentina, Brazil, Chile and Colombia have different levels of maturity, ... | |
Reorienting How the Private Sector and Government Defend Against Data Breaches | Michael Daniel , Leonard Bailey , Megan Stifel | The panel will discuss how we can reorient the roles that the private sector and ... | |
Successful Pro-Privacy Competitors to Collect-It-All Behemoths | Brendan Eich , Kim Hart , Gabriel Weinberg , Andy Yen | The public has awoken to the high price—to individuals and society at large—of the collect-it-all ... | |
The Long Arm of the GDPR—The Who, What and Where for Non-European Companies | Ruby A. Zefo , Edward Mcnicholas , Corey M. Dennis , Felicity Fisher | Programmed by the IAPP Privacy Bar Section Advisory Board. The extraterritorial applicability of the GDPR ... | |
Build Your Foundation: Strategies for Managing Retention and Personal Data Risk | Shannon Dahn , Carole Larochelle , Kelly Matoney | Nothing is certain but change. Changing regulatory requirements, customer expectations and business needs all necessitate ... | |
EU Overview: Regulator and Legislative Update | Eija Warma-lehtinen , Rocco Panetta , Yann Padova , Jeroen Terstegge | With the GDPR coming up on its first birthday, we now have a bank of ... | |
Privacy UX: Marketing in the Age of Compliance | Darren Guarnaccia | What you’ll take away:What is privacy user experience (UX) and how to plan for itHow ... | |
Privacy, Data Ethics and Digital Risk: Predicting the Future of Privacy | Jules Polonetsky , Peter Lefkowitz , Sharon Anolik , Barbara Lawler | Personal data is increasingly central to the mission of every organization, and the use of ... | |
Threading the Needle: Harmonizing Global Privacy Practices | Patrice Ettinger , Sarah Branam , Beth Magnuson | GDPR, PIPA, PIPEDA, APPI and now CCPA; the alphabet soup of data protection laws around ... | |
A Regulators’ Conversation: The View From the CNIL and the FTC | Marie-laure Phillips | Two of the leading technology regulatory agencies in the world, the French Commission nationale de ... | |
Applying Privacy Principles to the ABA Rules of Professional Conduct | Austin Anderson , Stephen Fraley , Richard Hogg , Danielle Sheer | As security risks target law firms and clients, attorneys and technologists who assist them are ... | |
Audit Is Coming: Prepare for the White Walkers (aka Customers and Regulators) | Aaron Mendelsohn , Francisco Padilla Borallo , Felix Wittern | Many controller-to-processor data processing agreements contain strong audit clauses, and we have only started to ... | |
Binding Corporate Rules—Gold Standard Within Reach | Eduardo Ustaran , Helen Dixon , Brock Wanless | The legal restrictions affecting international data flows continue to be one of the most difficult ... | |
Challenges & Opportunities in Government Approaches to Cross-Border Data Flows | Bruno Gencarelli , Joshua Meltzer , Jim Sullivan | The growth of the global digital economy holds incredible promise for businesses and consumers, but ... | |
Digital Identity—Lifting the Password Plague | Bo Holland | What you’ll take away:How using a digital identity replaces the password to create a better ... | |
Industry Best Practices in Algorithmic Bias Detection and Mitigation | Norberto Andrade , Genie Barton , Paul Resnick , Nicol Turner-lee | Algorithmic decision-making processes can perpetuate existing biases or create new biases, generate harmful categorizations, or ... | |
Latin American Regulatory Update | Eduardo Bertoni , Marcelo Drago Aguirre , Melissa Higuera Pérez , Fabricio Alves | Latin American countries feature privacy regulation in various states of maturity, which have been pushed, ... | |
Quantifying Forgiveness | Julia Angwin | Algorithms are increasingly arbiters of forgiveness. They are used to decide who will get let ... | |
Taming Compliance With Growing Global Breach Regulations | Mahmood Sher-jan , Linda Spencer , Todd Daubert | The breadth and complexity of new and amended global data breach and cyber security regulations, ... | |
We Are Generous! "Free" Flow of Data and Data Sharing in China and Hong Kong | Grace Chen , Sandra Liu , Clarice Yue , Anna Zeiter | Data protection regulations in Mainland China are fast developing, and companies doing business in Mainland ... | |
Address CCPA Compliance Requirements While Building a Global Privacy Program | Jennifer Hargrove , Mark Sward , Teresa Troester-falk | Most organisations approach privacy and data protection legal requirements as a project to complete. For ... | |
Artificial Intelligence in Enterprise Systems: Tech Advances and Privacy Risks | Barbara Cosgrove , James Denvil , Sarah Pipes , Andrew Shaxted | Organizations are rapidly adopting applied artificial intelligence (AI) to optimize internal systems and business processes. ... | |
Baking It In: Privacy Governance by Design in Large Organizations | Alexander Joel , Jonathan Cantor , Peter Winn | This panel will discuss how privacy and civil liberties officers help ensure that their large ... | |
Balancing Transparency and Privacy in Open Access to Public Records | Cindy Van Ort , Christopher Calabrese , David Cuillier , Sara Depaul | Programmed by the IAPP Privacy Bar Section Advisory Board. Perhaps inadvertently, the California Consumer Privacy ... | |
California Consumer Privacy Act of 2018: Action Items for Companies Worldwide | Lothar Determann | Effective January 1, 2020, businesses have to issue new and specific disclosures regarding their data ... | |
Harnessing Privacy, Security and Transparency to Enable Data Innovation | Joann C. Stonier , Noriswadi Ismail , Dana Simberkoff | Data is like water; it is rising all around us. It seems that the choppy ... | |
Not Grand’s Privacy Law: Fundamental Questions for Comprehensive U.S. Regime | David Hoffman , Sheila Colclasure , Melissa Froelich , Katharina Kopp | The United States Congress may well enact privacy legislation that will be unlike the sector-specific ... | |
Privacy Advisor Podcast Live: Class-Action, State Action and Litigation Trends | Jay Meal | There’s no shortage of U.S. privacy news of late. Lawmakers on Capitol Hill are considering ... | |
The Security & Privacy Bunch, aka “NIST RMF 2.0” | Ellen Pilliterri | Here’s the story of a lovely security publication, the Risk Management Framework (RMF). It’s the ... | |
What Next? Changes to Consumer Protection and Antitrust Law May Reshape Privacy | Ashkan Soltani , Terrell Mcsweeny , Christian D'cunha | Policymakers and regulators in the U.S. and Europe are actively considering changes to data and ... | |
Advertising in the Post-GDPR World | Ari Levenfeld , Alice Lincoln , Matthias Matthiesen , Noga Rosenthal | This Conversations in Privacy session will explore advertising in the post-GDPR world. What have we ... | |
Embedding Privacy Into the Use of Facial Recognition to Combat Terrorism | Christopher Pierson , Debra Danisek , Michael Hardin | To protect the nation from foreign terrorists trying to enter the United States, the U.S. ... | |
Fireside Chat With Andrew Smith, Director, FTC Bureau of Consumer Protection | D. Smith | This session will explore the FTC's priorities for privacy and data security enforcement and consumer ... | |
Future-Proofing Privacy Programs in an Evolving Regulatory Landscape | Lindsay Yates | As personal data use and management continues to capture the attention of the media, consumers ... | |
Leveraging GDPR to Comply With CCPA | Fatima Khan , Karen Schuler , Shannon Yavorsky | This session will focus on the similarities and differences between the GDPR and the CCPA ... | |
Operationalizing Privacy and Security: Data Governance and Strategy Post-GDPR | Elaine Call , Renard Franҫois , Jeanne Sheahan , Ryan Vinelli | May 25, 2018, has come and gone. How does a privacy professional maintain momentum? Attend ... | |
Privacy Threat Modeling: Moving Beyond Compliance to Meet Consumer Needs | Maritza Johnson , Danielle Leong , Samm Sacks , Zach Singleton | While global regulatory requirements grow, consumer expectations about privacy are also shifting, creating new incentives ... | |
Privacy and Antitrust: Regulating a Digital Economy | Maureen Slaughter | Over the past few years, with technology companies growing to unprecedented size, policymakers have begun ... | |
Save Your (Cyber) Bacon: Keeping CISOs and C-Suiters off the Witness Stand | Jason Swaminathan | In the wake of the most recent wave of data breaches, the Department of Justice, ... | |
The CARIN Trust Framework: Enabling Consumer Access to Health Information | Deven Mcgraw , Kristen Erbes , Ryan Howells , Michelle Leiker | The CARIN Alliance includes health systems, hospitals, physicians, health technology vendors, consumers and caregivers, all ... | |
The Right to Be Let Alone: Privacy and #MeToo | Lindsey Barrett , Cynthia Cole , Carrie Goldberg , Karyn Smith | How is privacy, and a growing awareness of the inadequacy of existing protections for it, ... | |
Big Data, AI and U.S. Privacy | Brock Wanless , Jasbir Khalsa , Lindsey Tonsager | Programmed by the IAPP Privacy Bar Section Advisory Board. The California Consumer Privacy Act (CCPA) ... | |
Brexit: Who Knows What Is Going On? If Anyone Can Tell You, We Will | Ruth Boardman , John Bowman , Bruno Gencarelli | In recent months, there has been a great deal of uncertainty and controversy about Brexit ... | |
China’s Social Credit System Project: Promises and Challenges | Xin Dai | What you’ll take away:Although often conflated with high-tech surveillance operations, China’s Social Credit System Project ... | |
Data Sharing, APIs and Privacy in the Financial Services Industry | Adrienne Allen , Sara Hoffman , Gretchen Ramos | Data sharing has been part of the financial industry for years and is often accomplished ... | |
Digital Identification, Privacy and Economic Development | Elizabeth Renieris , Rory Macmillan , David Satola | A billion people have no means to prove identity. Many more lack reliable means of ... | |
GDPR, CCPA and Beyond—Benchmarking Data Across Regulation Compliance | Hilary Wandall | The GDPR took center stage in the world of privacy in 2017-18. And GDPR II, ... | |
Privacy at Scale: Building and Growing a Privacy Program | Janis Kestenbaum , Will Devries , Damien Kieran , Manas Mohapatra | Privacy programs aren’t one size fits all. Come hear from industry experts who have experience ... | |
Product Counseling: Privacy in the Product Development Process | Partner , Kenesa Ahmad , Hilary Lane , Andy Roth , Farah Zaman | Previously a challenge reserved mainly for tech companies, privacy risks have now permeated into products ... | |
The Privacy Web Woven by Autonomous Vehicles | Jenn Behrens , Kelsey Finch , Kevin Gay | Widespread development of autonomous vehicles is triggering significant privacy concerns about surveillance technology within the ... | |
Transparency and Ethical Use of Artificial Intelligence: The Road Ahead | Samm Sacks , Aline Darbellay , Rui Guo | As artificial intelligence (AI)-based technologies are still in their nascent stages globally, there is very ... |