PrivSecGlobal 2020 Nov. 30, 2020 to Dec. 3, 2020, London, UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Navigating Regulatory Compliance in APAC Through Effective Data Protection Strategy Avinash Lotke Looking at the progress and complexity of the regulatory landscape in APACand applying effective data ...
The Evolving Security Landscape: Trends to Expect in 2021 and Beyond Zoë Rose , Neil Sinclair , Richard Harrison , Catherine Chapman What is the current state of cybercrime and what are the common types of incidents ...
Engaging the Board on Cyber Security Scott Bridgen , Dimitro Chichlo , Goher Mohammad , Emma Wright , Mary-jo De Leeuw Engaging the board is an ongoing challenge in cyber security for a variety of reasons: ...
What Does a Successful Data Access Governance Programme Look Like? Joe Tidy , Rodolfo Grave , Dr. Staaij , Glenn Pinonggan , Ariel Zamir Strong walls only get you so far – the nature of a best practice approach ...
Data Discovery: What Skeletons are Hiding in Your Unstructured Data? Joel Molinoff , Catherine Chapman , Dr. Srijith Nair , Hala Elghawi , Christopher Muffat , Anthony Hemond Unstructured data is a compliance risk. Examples of this type of data can include the ...
Building Your Security Dream Team Greg Gaast , Dr Vasileios Karagiannopoulos , Rosanna Kurrer , Kathryn Cardose How can you guarantee that your security team has the right skills and resources to ...
How Diversity Can Enable Organisations to Combat Security Risks Joe Tidy , Elcin Biren , Mahbubul Islam , Diana Waithanji A diverse cybersecurity team is critical to generating ideas and processes needed to confront security ...
The Price of Non-Governance in Your Unstructured Data Malcolm Avidan What role does unstructured data play in your organization?What benefits can tight management of unstructured ...
Trends, Challenges and Lessons Learned in Third Party Risk Management, Business Resilience and Continuity in a Time of Uncertainty Dr Vasileios Karagiannopoulos , Bhaskar Chattoraj , Alastair Parr , Dr Emma Osborn Business continuity planning allows organisations to respond, resume and restore operations in the event of ...
Best Practice for Incident Response: Crisis Management, Response and Recovery Joe Tidy , Victoria Van Roosmalen , Jorge Fernandes , Mark Hendry Effective incident response is a key component of being able to contain and respond to ...
Keynote: Jeff Lanza on Cybercrime: Strategies to Prevent, Protect and Prevail Jeff Lanza From computer intrusions to ransomware, a 20-year veteran FBI special agent and cyber security expert ...
The Classification Conundrum: Why It’s Time to Rethink Your Approach to Data Classification Shai Gelbaum Data classification is embedded in the very DNA of successful data protection and privacy programs, ...
Investing in Your People: The Value of Security Awareness and Engagement Dr Vasileios Karagiannopoulos , Josué Delgado , Marion Rosenberg , Jan Weerdhof , Kathy Ahuja The best way to secure your network and keep your data safe is to invest ...
Embedding Security and Risk Management into Your Organisation Anahi Santiago , Nemi George , Oliver Carr , Catherine Chapman , Jörgen Mellberg , Matt Little Cyber security plays a critical role in helping digital businesses to flourish.How can organisations ensure ...
Best Practice Advice on Data Sharing Requests Policy Olumide Babalola , Ololade Shyllon , Mohammed Embaby , Stevan Stanojevic , Noris Ismail The regulatory regimes across the Middle East and North Africa are going through a stage ...
Implementing a Robust Data Protection Program Mohammad Khalaf , Ibrahim Krishan , Osama El-masry , Carlos Goncalves , Victoria Guilloit Building and maintaining strong data protection strategies faces specific challenges for organisations working in the ...
KeyBank’s Compliance Transformation: The Road to Operationalizing Security and Privacy Visibility and Controls Lynn Winiarczyk , Anhad Preet Sing Join our fireside chat, where Anhad will interview Lynn at KeyBank to dive into her ...
The Zero Trust Model: Securing Your Sensitive Data Kathy Wang N/A
Using Security as a Tool to Build Competitive Edge Fahim Afghan , Rosanna Kurrer , Adjunct Lau , Gareth Tranter , Martin Hopkins Security functions in some leading organisations are beginning to move beyond just their role as ...
Data Protection and Security in the Cloud Paul Simmonds , David Barnett , Catherine Chapman , Angela Wet , Sawan Joshi , Sarah Armstrong-smith As the cloud environment continues to develop and new mechanisms are introduced which affect organisations’ ...
Understanding Security Regulations and Compliance Fredrik Forslund , Catherine Chapman , Emma Wright , Andy Watkin-child , Manal Al Sarraf Cyber compliance requirements can vary in complexity and be imposed by law enforcement, regulatory bodies ...
Keynote: The Future Cyber Threat Landscape Robert Hannigan The creator of the UK National Cyber Security Centre in 2016, former GCHQ director Robert ...
A Strong Finish: Disposing of Data Securely & Completely in a Post-Covid World Fredrik Forslund Drawing on industry research, best practices and case studies, we’ll explore why enterprises must address ...
Keynote:Geopolitics, Cybersecurity and the Future of Organised Crime Misha Glenny The subtitle of Misha Glenny’s worldwide best-seller, MacMafia was ‘Seriously Organised Crime’ and this award ...
To Trust, or Not to Trust the Cloud; That is Your Compliance and Risk Question Niamh Vianney Muldoon Many organizations struggle with digital transformation and cloud computing particularly when implementing a framework to ...
The Deployment of AI, ML and Emerging Technologies in Cyber Defence and Attack Hoda Alkhzaimi , Dr Vasileios Karagiannopoulos , Trevor Luker , Joseph Davis The deployment of new and cutting-edge technologies like Machine Learning and Artificial Intelligence can help ...
Identifying Risky Vendors: 7 Warning Signs You Shouldn't Ignore Randy Ferree For individuals managing third-party risk, there is one primary question that needs answering: Are your ...
Keynote: Edgar Perez in Conversation Edgar Room One of the world’s foremost experts on how organisations can harness bleeding edge technologies to ...
Protecting Data and Ensuring Compliance Posture in the Hybrid Work Environment Sachin Gupta , Mavi Etzyon-grizer , Sandeep Karan We have seen two years' worth of digital transformation in only a few months. Most ...
Data Discovery as a Platform Ariel Zamir Learn how AI boosts data discovery to manage data governance, data privacy and data protection ...
Harmonisation of Data Protection Regulations Across the Region Irish Salandanan-almeida , Sandy Chan , Leah Parker , Raka Roy Harmonisation of regulation across the major APAC economies continues to be a major theme of ...
Artificial Intelligence, Data Privacy & Cyber Security Assurance João Torres Barreiro , Noris Ismail , Ryan Rubin , Salman Waris , Alec Christie The region’s economic growth and technical innovation over the last two decades has resonated through ...
The Biggest Challenges for Indian Data Protection Professionals in 2021 Tripti Dhar , Abhik Chaudhuri , Na. Vijayashankar (naavi) , Meenal Maheshwari From the coronavirus pandemic to changing regulation in the region, India faces special challenges over ...
Staying Competitive while Maintaining Global Regulatory Compliance Stephen Cavey , Victoria Guilloit , David Hamilton , Dr. Simi Wang , Rigo Broeck , Alexandra Ebert From managing risk to creating edge: how data protection practitioners are helped to build competitive ...
Financial Data and the Ethical Issues of Technical Innovation Jaya Handa , Donal Garvey , Richard Merrygold , James Wilde Financials services is one of the most innovative sectors in they way organisations source and ...
Building a Risk Management Framework for the Future Orrie Dinstein , Heather Federman , Heather Dean Bennington , Liene Sulce-revele , Mike Mason , Annick O'brien Managing risk is at the heart of any data protection programme and building a strategy ...
Schrems II and Beyond: the Future of Data Transfers Constantine Karbaliotis , Christopher A. Lee , Matthew Newman , Lynn Goldstein , Gary Lafever The case brought by activist lawyer Max Schrems to the European Court of Justice has ...
The 2020 Presidential Election and the Prospects for Change Kirk Nahra , David Harris , Debbie Reynolds , Erinn D. Martin , Abigail Dubineicki The US presidential election will be the most contentious and era-defining of the modern age ...
U.S. Privacy Laws: State-Level Approaches to Data Privacy Dean Gonsowski , Arielle Garcia , Ross Parker , Jeff Gary The development of state-level regulation on data protection is likely to upend the current paradigm ...
How to Turn Privacy into Your Business Differentiation and Social Responsibility Kim Stout 53% of countries will have GDPR-like regulations within the coming two years. With increasing complexity ...
Opening Keynote Wojciech Wiewiorowki The European Data Protection Supervisor, Wojciech Wiewiórowski will give introductory remarks to the privacy stream ...
Effective Strategies to Manage Global Data Challenges Stevan Stanojevic , Nina Bryant , Kajen Subramoney , Sally Annereau Establishing successful strategies for managing and governing data compliantly can prove difficult even for large, ...
Shaping the Future of Data Privacy: Upcoming Global Regulations in 2021 James Mccarthy , Glen Hymers , Sjoera Nas , Ivana Bartoletti , Andreas Klug This year has been a major one for regulatory change, with major changes in the ...
Post Schrems-II: Completing a Transfer Risk Assessment Paul Breitbarth Following the Schrems-II decision, organisations are obliged to assess all International data transfers on a ...
The Future of Work: Short and Long Term Upheavals in How Work is Done and Delivered Anna Thomas , Ivana Bartoletti , Andrea Glorioso , Andrew Pakes , Jay Reddy The COVID-19 crisis has hugely accelerated changes in the way society thinks about the basic ...
Cookie Consent After Brexit - What to Expect in 2021 Hanna O'brien After years of political toing and froing, Brexit day had finally arrived on January 31, ...
Data Ethics: The Implications of AI, Facial Recognition and Public Privacy Stewart Room , Ed Bridges , Rasha Abdul Rahim , Taavi Kotka , Keily Blair The growing use of artificial intelligence, machine learning and related technologies will have deep effects ...
Where’s the Data? How to Find Your Biggest Governance, Security, and Privacy Risks Sam Gillespie Over the last decade, data has become the driving force behind businesses, economies, and daily ...
Keynote: An Interview with Daniel Solove Ivana Bartoletti , Daniel Solove Daniel J. Solove is the John Marshall Harlan Research Professor of Law at the George ...
Simplifying Privacy Compliance: Using Technology to Build User Trust Through Data Transparency and Control Moiz Kohari N/A
Online Privacy in a Post-COVID World Aonghus Fraser The coronavirus pandemic has had seismic effects across society and business as a whole and ...
Privacy Leaders: Creating a Team Fit for the Future Ruby A. Zefo , Ivana Bartoletti , Holly Amorosana , Noemí Alonso Calvo The skills and behaviours that were the foundations of a successful team are never static.Our ...
Extortionware: Your Privacy Problems Made Public Lonnie Benavides Over the last decade, ransomware has increasingly become the most popular option for hackers to ...
International Study: Benefits, Attributes and Habits of Mature Privacy and Data Protection Programs Robin Hackney Despite worldwide privacy regulations changing and security threats increasing, privacy and data protection programs are ...
Securing Your Digital Transformation Power By Low-Code Developers Julie Strauss By 2024, and estimated 65% of enterprise application will be built using low-code platforms. Citizen ...
Data Privacy Challenges in Recruitment Richard Merrygold , Ivor Frater , Michael Buchler , Kobus Saayman The data privacy challenges created by the enormous increase in remote working have been well ...
Employee’s Right to Privacy: Remote Working and Beyond Annick O'brien , Yasmin Hinds , Lesley Holmes , Temi Awofala , Philipp V. Bülow , Peter Barker An employee’s right to privacy when remote working has asked new questions of organisations’ relationship ...
Your Privacy Awareness Training Program: Instilling a Culture of Compliance Steve Wright , Mark Jaffe , Chris Hatch , Emma Green Your staff are both your biggest weakness and strength. If your employees don’t know how ...
Third Party Tracking Cookies: The Case Against Victoria Guilloit , Rebecca Rumbul Rebecca Rumbul is the UK claimant in a potentially landmark case against Oracle and Salesforce ...
Consumer Trust, Consent and Privacy Rights Konrad Shek , Romain Gauthier , Conan Chitham , Julia Porter From “fake news” to election tampering, the political and ethical aspects of advertising technology have ...
ePrivacy 2020: Cookies and Analytics Stewart Room , Ethan Sailers , Anna Longo , Ben Hayes The EU’s e-Privacy Directive and GDPR impact how your website may use cookies to track ...
Technical Innovation and Virtual Public Service Delivery Jonathan Craven , Tash Whitaker , Natalya Spuling , Ele Harwich The coronavirus pandemic has accelerated developments in how clinical services are delivered.When healthcare staff interact ...
US Privacy and Security: Healthcare After a Crisis Stacy Swinton , Ali Loveys , Danika Brinda , Sharleen Matheson , Ken Galvin The US experience of the coronavirus pandemic represents a special case in terms of a ...
Data Risks and Challenges in M&A Transactions Sonia Cheng , Ahmed Baladi , Linda Nichualladh For the last 10 years, global M&A activity has been booming. Over the same period ...
Building A Culture of Privacy Steve Bond , Gemma Witham , Alan Turner , Dondi Mapa , Jutta Sonja Oberlin Privacy by design won’t work without it being based on a strong and sustainable culture ...
Ethics Moving Beyond Privacy Linda Thielova Promoting a culture of trust that strengthens your brand both internally and externally is no ...
COVID-19: Track and Trace and Surveillance Tripti Dhar , Dr. Ashad Kabir , Lynn Wyeth , Oliver Lewis This panel session will take a global perspective on the development of track and trace ...
Big Brands and Breaches Danny Jenkins , Joe Tidy , Dr Abed , Cosimo Monda , Gal Ringel , Simon Taylor With the ever-increasing use of data and number of digital threats to organisations, data breaches ...
UK Data Protection Index Panel Rob Masson , Iain Humphries , Anjeli Bajaj , Alison Mackinnon , Ben Seretny The UK Data Protection Index was launched by the Data Protection World Forum and The ...
GDPR Maturity Framework - A Tool for Benchmarking Steve Wright How can an organisation effectively measure its performance in terms of GDPR compliance, and identify ...
Delivering Strong Information Protection in the Cloud Sarah Armstrong-smith Many organizations have accelerated the adoption of cloud services to meet the increased demand for ...
Keynote: Biology is the New is Software and What This Means for Data Privacy David Rowan Recent keynote talks have included events for banks, governments and Fortune 100 companies, and recent ...
Data Is Your Competitive Advantage and Your Biggest Risk. So Why Don’t You Know Where It Is? Stephen Moore It starts with data, it’s no longer an outcome of what we do. When we ...
Diversity in Privacy – Practical Steps to Drive Change Rowenna Fielding , Tash Whitaker , Jamal Ahmed , Craig Clark , Benjamin Klafter , Channin Gladden None
Privacy at the Margins: Data Protection Issues for Vulnerable Groups Scott Skinner-thompson In this session, Scott Skinner Thompson, author of the new book ‘Privacy at the Margins’, ...
World Trends: Trust in Technology Phillipa Leighton Jones , Rudra Mitra In this session, Phillipa Leighton Jones, Editor at Large, The Trust at The Wall Street ...
The Future of Data Transfers Vivienne Artz , Stewart Room , Paul Breitbarth , Hiroshi Miyashita , Joe Jones As the UK nears its exit from the EU, organisations on both the UK and ...
Brexit and Data Protection: How to Prepare in a State of Uncertainty Roxanne Morison , Richard Merrygold , Keily Blair , Lewis Lloyd , Arnold Roosendaal Every sector – from retail to financial services, BigTech to media – is affected in ...
Fireside Chat James Snook , Joe Tidy In this fireside chat, we discuss with James Snook Director at Department for Digital, Culture, ...
Solving Data Retention Once and for All Through Smart Decisions and Meaningful Implementation Wanne Pemmelaar , Timothy Smith , Michael Morrissey In a data driven world, an organization largely depends on the data it has and ...
Surviving the Data Explosion: Practical Steps for Successfully Managing Unstructured Data Peter Baumann , Brittany Roush , Kayla Williams , Jamie Specter Are we experiencing a data explosion or data implosion? With data growth not slowing down ...
Technological Development and the Impact on Children's Data Privacy Niamh Vianney Muldoon , Hillary Brill , Alex Hutchison , Jürgen Bänsch The education sector faces some unique challenges involved in protecting data, with a large proportion ...