GlobalPrivacySummit 2019 May 2, 2019 to May 2, 2019, Washington, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Marrying Privacy Engineering and User Experience Jenn Behrens Product development inextricably requires good user experience for successful launch. Dr. Behrens will provide the ...
Lessons Learned for Running a Successful Technology Proof of Concept Kevin Murphy , Lynne Bird , Mike Tibodeau As technology is being adopted for privacy management, more companies are assessing possible vendors by ...
The Challenges of Scanning Large Volumes of Personal Information Will Ackerly , Christopher Glover , Martin Izenson , Subramanian Ramesh New privacy technology solutions involve the scanning of large amounts of data to find personal ...
Constructing Identities From Data Christopher Leizerov Finding and confirming an identity in data is not always a clear-cut case. More often ...
Working Across Borders: Partnering and Vetting Bret Cohen , Chantal Bernier , Eija Warma-lehtinen Whether you’re working internally or externally, there comes a time in every lawyer’s work where ...
When Regulators Work Together Brent Levisohn While the consistency mechanism of the General Data Protection Regulation ensures that regulators across the ...
You Make the Call: Strategic Privacy War Game Dan Caprio , Jonathan Litchman , Marylynn Stowers What’s the most common phrase in privacy law? “It depends.” Learn from this interactive three-hour ...
AdTech 101: An Interactive Analysis of Online Advertising Tech & Privacy Policy William Lee , Grant Nelson , Heather Egan Sussman The advertising technology ecosystem is notoriously complicated, but this workshop will demystify it. Industry insiders ...
Fourth-Party Vendor Management: How to Manage Your Vendor’s Vendor Web Hull What you’ll take away:Get up to date on current best practicesLearn privacy, data protection, security ...
Strategic Privacy by Design: The Game Carmen Buezo Tired of listening to talking heads from the lectern? Come play Strategic Privacy by Design: ...
The UX Guide to Notice and Consent Patricia Westerman With the EU’s General Data Protection Regulation, which came into force in May of 2018, ...
Privacy Bootcamp Kirk Nahra Privacy can be a bewildering topic. With multiple laws, jurisdictions, technologies and business models converging ...
CCPA Scope and Important Definitions Lothar Determann Just when you thought you knew what a "business" or a "consumer" was, here comes ...
Out: GDPR; In: CCPA—Compare and Contrast Ari Schwartz , Lothar Determann , Dominique Shelton Leipzig So, you think you’ve mastered the GDPR? Before you even catch your breath, here comes ...
Gray Areas in the CCPA Come to Light Ari Schwartz , D. Reed Freeman , Lothar Determann , Dominique Shelton Leipzig , Jeewon Serrato First, hear the panelists offer their takes on hazy areas of the CCPA that so ...
Transparency and Consent: The User Experience Perspective Jeewon Serwin N/ADoes the CCPA really require companies to have buttons on their websites that say, "Do ...
How Enforcement Will Work: Private and Regulatory Action Nicole Ozer , Travis Leblanc , Lisa Kim While not setting up a European-style data protection authority, the CCPA empowers the California attorney ...
Data Protection Impact Assessments: The Full Picture Sean Bamford , Shanshan Pa , Linda Spencer , Maarten Stassen Data Protection Impact Assessments (DPIAs) are essential for any sustainable data protection compliance framework. DPIAs ...
Data Breach Bootcamp Liisa Thomas With the GDPR, the reality of data breach notification and response truly hits home for ...
Data Subject Access Rights Revolution: What Has Changed and What’s Next Kate Colleary , Hazel Grant , Rocco Panetta What you will take away:Clarity on how the shift in data subjects’ access rights will ...
GDPR vs. Technology Christopher Watts What you’ll take away:Understand the impact of GDPR on providers and users of key technologiesGain ...
Building a Global Privacy Program That Performs Todd Redfoot , Kevin Kreuser , Serena Lai , Leticia Webb In this interactive session, learn how to keep everyone happy—from customers to ICANN to international ...
Designing Notice and Consent for the Internet of Things Lorrie Faith Cranor Privacy notices are often long, difficult to understand and don’t appear at opportune times. Constrained ...
America’s Code War: Tales From the Front Line and Where to Go From Here David Sanger , John Carlin , Sean Joyce , Rebecca Richards From foreign interference in its elections to the theft of its companies’ valuable trade secrets, ...
Back to the Future: Will the FTC Staff Report Become the U.S. Privacy Framework? Jim Halpert , Jon Leibowitz , Davis Polk 2019-2020 are critical years in the evolution of the U.S. privacy framework. This panel will ...
Health Care in an Evolving Cyber Threat Landscape: FDA and Industry Perspectives Suzanne Schwartz , Luke Dembosky , Gregory Stein , Grace Wiechman No area of cybersecurity and data privacy presents higher stakes than medical devices. Underlying the ...
How Blockchain Technology Will Transform Data Privacy Stuart Levi , Alice Nawfal , Elizabeth Renieris Blockchain, the technology underlying bitcoin, has been heralded as the most important technological development since ...
The Ethics of Geolocation Data Collection, Use and Sharing Nicole Ozer , Jeremy Greenberg , Kara Selke , Limor Shmerling Magazanik Geolocation data collection can be a valuable tool for serving commercial and humanitarian interests. Retailers ...
A Convention 108-CBPR Guide to Trans-Border Data Flows Florence Raynal , Josh Harris , Sophie Kwasny , Gabriela Zanfir-fortuna The Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data ...
Constructive Engagement vs. Enforcement: Initial DPA Experiences Under the GDPR Simon Mcdougall , Sophie Nerbonne , Andrea Jelinek , Annamorgan One year into the GDPR, EU DPAs will discuss their supervisory and enforcement experiences so ...
Innovating in the Midst of Change: How Privacy Pros Can Drive Differentiation Kate Demopulos , Kim Howell , Enza Iannopollo , Greg Roberts According to a recent survey published by Forrester, 43 percent of U.S. consumers are likely ...
International Response to Global Privacy Alarm: Facebook/Cambridge Analytica/AIQ Michael Mcevoy , James Dipple-johnstone , Daniel Therrien Consumer Privacy, Enforcement, Ethics, Social Networking, Trans-Border Data FlowSalon J, Level M4 James Dipple-Johnstone, Deputy ...
Letting the Machine Decide? Privacy Risks Associated With AI Technologies Ruby A. Zefo , Alexis Goltra , Christine Lyon From scouring applicants’ resumes to detecting insider threats, AI technology is already revolutionizing the workplace. ...
72 Hours and Counting: Do's and Don'ts of Global Data Security Incident Response Brian Hengesbaugh , Mary Fort , Shea Wynn Global data security incidents pose critical challenges for companies in all industry sectors. Companies are ...
Is This the Year? Legislative Update on Data Privacy With Stu Ingis Tony Hadley , Stu Ingis , Jason Van Beek , Joseph Wender Catch up on the latest legislative developments in privacy with Stu Ingis during this luncheon ...
Privacy as a Movement: A Conversation on Privacy Shield, GDPR and CCPA Julie Brill , Justin Antonipillai , Alastair Mactaggart The last several years have seen significant movements not only in the laws around privacy ...
The Globalization of Privacy and Considerations Affecting the Cloud Albert Talreja The adoption rate of cloud computing continues to accelerate, providing immense value to society by ...
Chief Data Officer—What Does This Emerging Role Mean for Privacy Professionals? Sagi Leizerov , Guy Lehman , Igor Perisic With more organizations adding to their management ranks the chief data officer position, privacy professionals ...
Demystifying the DSR Process: Handling Difficult Data Subject Rights Requests Shahab Asghar , Roy Kamp , Barbara Sondag Can your organization’s privacy operations pass the tests of the most challenging and nuanced data ...
Ethical Use of Employee Data: Improving Your Workplace the Right Way Tom Moore , Sooji Seo , John Verdi Employee data can provide insights into workplace trends and productive behaviors. As a result, revenue ...
Leadership in Privacy—And Beyond Liisa Thomas , Agnes Bundy Scanlan , Katherine Licup , Cindy Van Ort Part of Women Leading Privacy programming. Privacy professionals are increasingly finding themselves part of the ...
Privacy Challenges in the Globalization of Criminal Evidence Tjabbe Bos , Richard Downing , Nicole Jones With cloud computing, law enforcement investigations increasingly seek evidence that is held in a different ...
Risky Business: A Privacy and Security Team’s Guide to Risk Scoring N/a What you’ll take away:Understand various approaches to conducting risk assessmentsLearn how to define risk criteria ...
Shaping the Future of Global Privacy Betsy Broder , Teki Akuetteh Falconer , Bruno Gencarelli , Abigail Slater , Shaundra Watson A robust global dialogue on best practices for developing data protection frameworks continues in the ...
APAC Privacy: Five Things You Should Know About Privacy’s Most Diverse Region Tharishni Arumugam , Aon Anna Gamvros , Yi Lin Seng , Rachel Thompson , Noboru Yamaji As more and more organizations globalize and expand their operations to the East, the challenge ...
Emerging Privacy Solutions for Genomic Data Deven Mcgraw , Khaled El Emam , Elissa Levin , Carson Martinez Genomic data is an invaluable source of information that has transformed biomedical research, personalized medicine ...
Financial Forum 2.0: Bank CPOs Discuss Hot Topics in Financial Privacy Christine Frye , Zoe Strickland , Kimberly Genobles , Ron Whitworth During last year's Summit, a group of major bank CPOs gathered to discuss challenges and ...
GDPR in LatAm: Corporate Concerns in Dealing With (Applicable?) Foreign Law Juanita Acosta , Pablo Palazzi , Dirceu Santa Rosa , Paulina Silva Latin American privacy regulations in Argentina, Brazil, Chile and Colombia have different levels of maturity, ...
Reorienting How the Private Sector and Government Defend Against Data Breaches Michael Daniel , Leonard Bailey , Megan Stifel The panel will discuss how we can reorient the roles that the private sector and ...
Successful Pro-Privacy Competitors to Collect-It-All Behemoths Brendan Eich , Kim Hart , Gabriel Weinberg , Andy Yen The public has awoken to the high price—to individuals and society at large—of the collect-it-all ...
The Long Arm of the GDPR—The Who, What and Where for Non-European Companies Ruby A. Zefo , Edward Mcnicholas , Corey M. Dennis , Felicity Fisher Programmed by the IAPP Privacy Bar Section Advisory Board. The extraterritorial applicability of the GDPR ...
Build Your Foundation: Strategies for Managing Retention and Personal Data Risk Shannon Dahn , Carole Larochelle , Kelly Matoney Nothing is certain but change. Changing regulatory requirements, customer expectations and business needs all necessitate ...
EU Overview: Regulator and Legislative Update Eija Warma-lehtinen , Rocco Panetta , Yann Padova , Jeroen Terstegge With the GDPR coming up on its first birthday, we now have a bank of ...
Privacy UX: Marketing in the Age of Compliance Darren Guarnaccia What you’ll take away:What is privacy user experience (UX) and how to plan for itHow ...
Privacy, Data Ethics and Digital Risk: Predicting the Future of Privacy Jules Polonetsky , Peter Lefkowitz , Sharon Anolik , Barbara Lawler Personal data is increasingly central to the mission of every organization, and the use of ...
Threading the Needle: Harmonizing Global Privacy Practices Patrice Ettinger , Sarah Branam , Beth Magnuson GDPR, PIPA, PIPEDA, APPI and now CCPA; the alphabet soup of data protection laws around ...
A Regulators’ Conversation: The View From the CNIL and the FTC Marie-laure Phillips Two of the leading technology regulatory agencies in the world, the French Commission nationale de ...
Applying Privacy Principles to the ABA Rules of Professional Conduct Austin Anderson , Stephen Fraley , Richard Hogg , Danielle Sheer As security risks target law firms and clients, attorneys and technologists who assist them are ...
Audit Is Coming: Prepare for the White Walkers (aka Customers and Regulators) Aaron Mendelsohn , Francisco Padilla Borallo , Felix Wittern Many controller-to-processor data processing agreements contain strong audit clauses, and we have only started to ...
Binding Corporate Rules—Gold Standard Within Reach Eduardo Ustaran , Helen Dixon , Brock Wanless The legal restrictions affecting international data flows continue to be one of the most difficult ...
Challenges & Opportunities in Government Approaches to Cross-Border Data Flows Bruno Gencarelli , Joshua Meltzer , Jim Sullivan The growth of the global digital economy holds incredible promise for businesses and consumers, but ...
Digital Identity—Lifting the Password Plague Bo Holland What you’ll take away:How using a digital identity replaces the password to create a better ...
Industry Best Practices in Algorithmic Bias Detection and Mitigation Norberto Andrade , Genie Barton , Paul Resnick , Nicol Turner-lee Algorithmic decision-making processes can perpetuate existing biases or create new biases, generate harmful categorizations, or ...
Latin American Regulatory Update Eduardo Bertoni , Marcelo Drago Aguirre , Melissa Higuera Pérez , Fabricio Alves Latin American countries feature privacy regulation in various states of maturity, which have been pushed, ...
Quantifying Forgiveness Julia Angwin Algorithms are increasingly arbiters of forgiveness. They are used to decide who will get let ...
Taming Compliance With Growing Global Breach Regulations Mahmood Sher-jan , Linda Spencer , Todd Daubert The breadth and complexity of new and amended global data breach and cyber security regulations, ...
We Are Generous! "Free" Flow of Data and Data Sharing in China and Hong Kong Grace Chen , Sandra Liu , Clarice Yue , Anna Zeiter Data protection regulations in Mainland China are fast developing, and companies doing business in Mainland ...
Address CCPA Compliance Requirements While Building a Global Privacy Program Jennifer Hargrove , Mark Sward , Teresa Troester-falk Most organisations approach privacy and data protection legal requirements as a project to complete. For ...
Artificial Intelligence in Enterprise Systems: Tech Advances and Privacy Risks Barbara Cosgrove , James Denvil , Sarah Pipes , Andrew Shaxted Organizations are rapidly adopting applied artificial intelligence (AI) to optimize internal systems and business processes. ...
Baking It In: Privacy Governance by Design in Large Organizations Alexander Joel , Jonathan Cantor , Peter Winn This panel will discuss how privacy and civil liberties officers help ensure that their large ...
Balancing Transparency and Privacy in Open Access to Public Records Cindy Van Ort , Christopher Calabrese , David Cuillier , Sara Depaul Programmed by the IAPP Privacy Bar Section Advisory Board. Perhaps inadvertently, the California Consumer Privacy ...
California Consumer Privacy Act of 2018: Action Items for Companies Worldwide Lothar Determann Effective January 1, 2020, businesses have to issue new and specific disclosures regarding their data ...
Harnessing Privacy, Security and Transparency to Enable Data Innovation Joann C. Stonier , Noriswadi Ismail , Dana Simberkoff Data is like water; it is rising all around us. It seems that the choppy ...
Not Grand’s Privacy Law: Fundamental Questions for Comprehensive U.S. Regime David Hoffman , Sheila Colclasure , Melissa Froelich , Katharina Kopp The United States Congress may well enact privacy legislation that will be unlike the sector-specific ...
Privacy Advisor Podcast Live: Class-Action, State Action and Litigation Trends Jay Meal There’s no shortage of U.S. privacy news of late. Lawmakers on Capitol Hill are considering ...
The Security & Privacy Bunch, aka “NIST RMF 2.0” Ellen Pilliterri Here’s the story of a lovely security publication, the Risk Management Framework (RMF). It’s the ...
What Next? Changes to Consumer Protection and Antitrust Law May Reshape Privacy Ashkan Soltani , Terrell Mcsweeny , Christian D'cunha Policymakers and regulators in the U.S. and Europe are actively considering changes to data and ...
Advertising in the Post-GDPR World Ari Levenfeld , Alice Lincoln , Matthias Matthiesen , Noga Rosenthal This Conversations in Privacy session will explore advertising in the post-GDPR world. What have we ...
Embedding Privacy Into the Use of Facial Recognition to Combat Terrorism Christopher Pierson , Debra Danisek , Michael Hardin To protect the nation from foreign terrorists trying to enter the United States, the U.S. ...
Fireside Chat With Andrew Smith, Director, FTC Bureau of Consumer Protection D. Smith This session will explore the FTC's priorities for privacy and data security enforcement and consumer ...
Future-Proofing Privacy Programs in an Evolving Regulatory Landscape Lindsay Yates As personal data use and management continues to capture the attention of the media, consumers ...
Leveraging GDPR to Comply With CCPA Fatima Khan , Karen Schuler , Shannon Yavorsky This session will focus on the similarities and differences between the GDPR and the CCPA ...
Operationalizing Privacy and Security: Data Governance and Strategy Post-GDPR Elaine Call , Renard Franҫois , Jeanne Sheahan , Ryan Vinelli May 25, 2018, has come and gone. How does a privacy professional maintain momentum? Attend ...
Privacy Threat Modeling: Moving Beyond Compliance to Meet Consumer Needs Maritza Johnson , Danielle Leong , Samm Sacks , Zach Singleton While global regulatory requirements grow, consumer expectations about privacy are also shifting, creating new incentives ...
Privacy and Antitrust: Regulating a Digital Economy Maureen Slaughter Over the past few years, with technology companies growing to unprecedented size, policymakers have begun ...
Save Your (Cyber) Bacon: Keeping CISOs and C-Suiters off the Witness Stand Jason Swaminathan In the wake of the most recent wave of data breaches, the Department of Justice, ...
The CARIN Trust Framework: Enabling Consumer Access to Health Information Deven Mcgraw , Kristen Erbes , Ryan Howells , Michelle Leiker The CARIN Alliance includes health systems, hospitals, physicians, health technology vendors, consumers and caregivers, all ...
The Right to Be Let Alone: Privacy and #MeToo Lindsey Barrett , Cynthia Cole , Carrie Goldberg , Karyn Smith How is privacy, and a growing awareness of the inadequacy of existing protections for it, ...
Big Data, AI and U.S. Privacy Brock Wanless , Jasbir Khalsa , Lindsey Tonsager Programmed by the IAPP Privacy Bar Section Advisory Board. The California Consumer Privacy Act (CCPA) ...
Brexit: Who Knows What Is Going On? If Anyone Can Tell You, We Will Ruth Boardman , John Bowman , Bruno Gencarelli In recent months, there has been a great deal of uncertainty and controversy about Brexit ...
China’s Social Credit System Project: Promises and Challenges Xin Dai What you’ll take away:Although often conflated with high-tech surveillance operations, China’s Social Credit System Project ...
Data Sharing, APIs and Privacy in the Financial Services Industry Adrienne Allen , Sara Hoffman , Gretchen Ramos Data sharing has been part of the financial industry for years and is often accomplished ...
Digital Identification, Privacy and Economic Development Elizabeth Renieris , Rory Macmillan , David Satola A billion people have no means to prove identity. Many more lack reliable means of ...
GDPR, CCPA and Beyond—Benchmarking Data Across Regulation Compliance Hilary Wandall The GDPR took center stage in the world of privacy in 2017-18. And GDPR II, ...
Privacy at Scale: Building and Growing a Privacy Program Janis Kestenbaum , Will Devries , Damien Kieran , Manas Mohapatra Privacy programs aren’t one size fits all. Come hear from industry experts who have experience ...
Product Counseling: Privacy in the Product Development Process Partner , Kenesa Ahmad , Hilary Lane , Andy Roth , Farah Zaman Previously a challenge reserved mainly for tech companies, privacy risks have now permeated into products ...
The Privacy Web Woven by Autonomous Vehicles Jenn Behrens , Kelsey Finch , Kevin Gay Widespread development of autonomous vehicles is triggering significant privacy concerns about surveillance technology within the ...
Transparency and Ethical Use of Artificial Intelligence: The Road Ahead Samm Sacks , Aline Darbellay , Rui Guo As artificial intelligence (AI)-based technologies are still in their nascent stages globally, there is very ...