Hi [[ session.user.profile.firstName ]]

Legislation

  • Digital Transformation Discussion with Forcepoint Connectivity and Security
    Digital Transformation Discussion with Forcepoint Connectivity and Security
    Jim Fulton, Forcepoint Solution Director & David LePage, Forcepoint Solution Engineering Manager Recorded: Aug 21 2019 64 mins
    Digital transformation is driving change across the world, creating new opportunities to boost business productivity, while cutting the costs of infrastructure and operations. Increasingly distributed organizations are re-architecting their networks and security to move their most valuable data and applications to the cloud, in order to give their users much richer, faster, less expensive access than ever before. Enabling remote sites and off-network users to securely connect direct-to-cloud is the new challenge facing enterprises and government agencies. 

    How can distributed organizations achieve the reliable, secure connectivity to the cloud they need? Many are now using internet technologies for connect all of their users to cloud-based applications more productively and cost-effectively than ever before.

    Included in this session:

    • How to accelerate the adoption of productivity-enhancing SaaS/cloud apps
    • How to overcome MPLS limitations including costs and issues with speed
    • How to quickly add security to direct-to-cloud SD-WAN deployment to keep intruders out and protect use of web content and cloud apps
    • How to streamline operations by integrating connectivity and security across thousands of sites in the cloud and on-premises from one console
    • Demonstrations of Forcepoint SD-WAN Connectivity, Securing Internet Access and Use, Operating at Scale to Drive Better Business Outcomes
  • 30 Ideas In 30 Minutes, Creative Ways To Foster an Emotionally Connected Culture
    30 Ideas In 30 Minutes, Creative Ways To Foster an Emotionally Connected Culture
    Tanya Fish - Strategy Advisor - ITA Group Inc. Recorded: Jul 30 2019 51 mins
    The workplace is quickly becoming society’s social hub and, for some, the only way to commune. But the quality of those interactions is often lacking, leading to an overwhelming epidemic of loneliness. This loneliness—and its detrimental side effects, including declining physical and psychological health—impacts employees, both at work and in their personal lives.

    Join us for a fast-paced exploration of how you can infuse opportunities for high-quality connection points throughout the employee experience. We’ll share insights about this alarming trend, discuss how it’s impacting the health and wellbeing of your workforce and—most importantly—share a variety of ideas that your organization can immediately implement.

    You’ll learn:
    • Why social relationships are crucial for maintaining strong physical and psychological wellbeing
    • How building meaningful connections among employees promotes workplace satisfaction and productivity
    • New ideas for facilitating meaningful team member interaction in a variety of workplace environments
    • Lessons learned from others who have successfully created highly-connected cultures
    • How to anticipate—and manage—c-suite objections to the added investment for these activities.
    • How organizations can determine the right combination of initiatives to deliver the key psychological benefits that ultimately drive talent retention
  • New Research to Elevate and Transform Employee Engagement Efforts
    New Research to Elevate and Transform Employee Engagement Efforts
    Erica Carranza, Ph.D. VP of Consumer Psychology Chadwick Martin Bailey & Christina Zurek Insights & Strategy Leader ITA Recorded: Jul 11 2019 51 mins
    Enriching compensation packages is an effective but expensive way to engage individual employees, and as recent research has revealed, many of the most common employee wellness and engagement initiatives are not yielding their promised impact. What are these initiatives missing?

    Join us to learn more about the results of a landmark study that seeks to answer this question by uncovering what engagement initiatives must accomplish for employees—on a psychological level—to be effective.

    Using scientific insight into human motivation and advanced analytic techniques, we will share several key findings from our research, including:
    •How tapping in to five critical psychological benefits can provide a framework for true, sustainable engagement
    •Why wellness and other popular programs aren’t delivering on the promise of employee engagement—and where organizations must focus instead
    •How organizations can determine the right combination of initiatives to deliver the key psychological benefits that ultimately drive talent retention
  • Using Risk Analysis to Enhance Compliance
    Using Risk Analysis to Enhance Compliance
    Andras Cser, Vice President and Principal Analyst, Forrester Recorded: Jan 30 2019 20 mins
    For most organizations, compliance is a bottomless pit of cost and effort. Too many infrastructure components and configuration points, too much data and too many places to put it—there are just too many places for threats to hide.

    In this session, Forrester Vice President and Principal Analyst Andras Cser will share how to prioritize security and compliance efforts. Specific topics include:

    - How your auditors are behaving
    - Why risk-based prioritization is the only way to find threats
    - The importance of context
    - Forrester’s recommendations and best practices

    Watch this webcast and learn how to make your organization’s journey to the cloud as safe as possible.
  • Post Perimeter Security 101 - Protecting a border-less world
    Post Perimeter Security 101 - Protecting a border-less world
    Aaron Cockerill, Chief Strategy Officer Recorded: Jan 22 2019 29 mins
    What is currently happening the world of security?

    Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*

    The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.

    During this webinar Aaron Cockrill, CSO at Lookout will talk about:

    - What does a post-perimeter world mean to enterprise security?
    - Why mobility changes the enterprise security paradigm?
    - How to protect data when accessed from outside the corporate perimeter?
    - What are the current and emerging threats?

    * Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
  • Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
    Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
    Doug Landoll, CEO, Lantego Recorded: Jan 16 2019 35 mins
    Some approaches to information security simply won’t deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy.

    In this session, Doug Landoll, CEO of information security compliance consulting firm Lantego, will discuss how to take a risk-first approach to addressing information security. Specific topics include:

    - How to define cybersecurity success
    - Common approaches that fall short
    - Risk-based cybersecurity strategy planning

    Find out how a proactive approach to information security now can help your organization avoid compliance issues later.
  • Mobile Threat Management: Addressing endpoint security’s biggest blind spot
    Mobile Threat Management: Addressing endpoint security’s biggest blind spot
    Phil Hochmuth, Program Director, Enterprise Mobility at IDC Recorded: Jan 14 2019 41 mins
    Lookout invited a special guest, Phil Hochmuth, Program Director, Enterprise Mobility at IDC to talk about the rising implications of employees accessing business data and apps with smartphones.

    On the agenda:

    - The latest research in enterprise mobility adoption

    - Security and the top challenges sourced by IDC

    - How mobile threat management fits into an enterprise endpoint security architecture
  • Comparing CASB Solutions from Microsoft and Forcepoint
    Comparing CASB Solutions from Microsoft and Forcepoint
    Mike Osterman, CEO, Osterman Research Recorded: Dec 13 2018 46 mins
    CASBs (Cloud Access Security Brokers) can provide visibility and protection for the myriad of sanctioned and unsanctioned cloud applications being used by employees in organizations today. Office 365 is undoubtedly one of the most popular, with most business-grade email and collaboration now taking place in this cloud environment.

    In this session, CEO and Osterman Research founder Mike Osterman will discuss how a CASB can help secure Office 365 and review the solutions from Microsoft and Forcepoint. He will:

    - Compare Microsoft’s built-in Office 365 Cloud App Security, offered in the Office 365 Enterprise E5 plan, to Forcepoint CASB
    - Provide a detailed analysis of how both products compare over 13 key feature areas
    - Consider coverage of third-party apps beyond Office 365

    Attend this session to explore the best route to full Office 365 security.
  • The State of the CASB Market
    The State of the CASB Market
    Mike Osterman, CEO, Osterman Research Recorded: Dec 13 2018 38 mins
    CASBs (Cloud Access Security Brokers), or CSGs (Cloud Security Gateways), are part of the rapid rise of emerging security technologies designed to enable digital transformation. With these solutions, organizations can experience the benefits of innovation and collaboration that cloud applications bring while maintaining visibility and control of their data.

    In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASB solutions. The survey’s main focus points include:

    -Key cloud adoption concerns
    -Most valued CASB features
    -Levels of confidence in controlling data and maintaining compliance

    Attend this session to learn more about the need for and use of CASBs in today’s organizations.
  • Forcepoint Cyber Experts Discuss Our 2019 Cybersecurity Predictions
    Forcepoint Cyber Experts Discuss Our 2019 Cybersecurity Predictions
    Raffael Marty, VP of Research & Intelligence and colleagues Recorded: Nov 20 2018 7 mins
    Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely. This intersection of people interacting with data and technology will also drive cyber risk to all-time highs, according to new insights from Forcepoint researchers and data scientists.

    Watch this video as our Cyber Experts discuss their contributions to the 2019 Forcepoint Cybersecurity Predictions Report, including:

    - How attacks on industrial IoT could lead to widespread power outages
    - When credential theft moves to cloning your face to bypass biometric authentication
    - What happens in a world incentivized to commit intellectual property theft at scale
  • Answers to the World’s Scariest Employment Law Questions
    Answers to the World’s Scariest Employment Law Questions
    Mark Toth, Chief Legal Officer of ManpowerGroup™ North America, and Neil Alexander, of Littler Mendelson. Recorded: Oct 31 2018 62 mins
    Join ManpowerGroup for a complimentary webinar designed to reduce your employment law nightmares.
    In this engaging and interactive webinar, Mark Toth of ManpowerGroup and guest Neil Alexander of Littler Mendelson will answer the world’s most terrifying employment law questions. Mark and Neil will not only address the questions that keep you awake at night but also ensure that you get all the latest employment law news on everything from hiring to firing and beyond.

    After this fast-paced hour, you’ll walk away with:
    -Answers to difficult legal questions
    -Up-to-the-minute information on the latest employment law developments
    -Tips and tools on everything from hiring to firing
    -Practical solutions based on real-life examples

    Your host is Mark Toth, Chief Legal Officer of ManpowerGroup™ North America, a former partner in a major employment law firm, and widely known for his ability to present legal and HR issues in a uniquely entertaining style.

    Special guest Neil Alexander, of Littler Mendelson, has represented companies in employment disputes all across the U.S. for the last 25 years. Neil’s practice focus includes unfair competition disputes, whistle blower and retaliation claims, ADA and FMLA disputes, wrongful termination claims and allegations of harassment or discrimination.

    ManpowerGroup is recognized by SHRM to offer Professional Development Credits (PDCs) for the SHRM-CPSM or SHRMSCPSM. This program is valid for 1 PDC for the SHRM-CPSM or SHRM-SCPSM. For more information about certification or recertification, please visit www.shrmcertification.org

    This webinar is approved for 1 HRCI credit. The use of the HRCI seal confirms that this activity has met HR Certification Institute’s® (HRCI®) criteria for recertification credit pre-approval.
  • The Evolution of Mobile Threat Actors
    The Evolution of Mobile Threat Actors
    Michael Flossman, Head of Threat Intelligence, Lookout Recorded: Jul 19 2018 37 mins
    Cybercriminals and nation states are consistently using mobile threat tooling as part of their espionage or financially motivated attacks and campaigns. The Lookout Threat Intelligence team has noticed this increase as we research and protect against these adversaries. These actors are increasingly seeing value from having an offensive mobile capability in their toolkit and we have even seen low sophistication groups break into this space and successfully steal gigabytes of data from compromised devices. As BYOD and the prevalence of mobile devices in corporate environments continue to blur the traditional enterprise perimeter, the ability to understand the risks to mobile endpoints is critical.

    Join Michael Flossman, Head of Threat Intelligence at Lookout, for this informative webinar as he covers the evolution of threat actors on mobile, discusses several recent high-profile cases, and explains why gaining visibility into your mobile endpoints and proactively securing them is key for today’s organizations."
  • Mobile Phishing, the biggest unsolved problem in cybersecurity
    Mobile Phishing, the biggest unsolved problem in cybersecurity
    Lookout Recorded: Jun 13 2018 1 min
    It only takes one errant tap to compromise a mobile device. This short video clip highlights the threats and how inconspicuous a phishing attack on a mobile device can be. You will also be able to download our latest whitepaper to understand mobile phishing facts that will help you make informed decisions on how to protect corporate data.
  • GDPR compliance on mobile devices, how secure is your organization?
    GDPR compliance on mobile devices, how secure is your organization?
    Aaron Cockerill, Chief Strategy Officer, Lookout Recorded: May 29 2018 50 mins
    Since 25 May, the General Data Protection Regulation (GDPR) is now officially enforceable. By now, most of the companies dealing with data should have taken the necessary steps to comply with the regulation and stay out of trouble. And this is all good but, have you thought about how your employees are using their mobile phones or devices to access your company data? How do you protect your organization from an employee's phone being hacked? The risk of GDPR fines & brand reputation damage has made the security of personal data on mobile an urgent priority for CISOs, and executive boards.

    By popular demand, we're replaying this webinar hosted by Aaron Cockerill, Chief Strategy Officer at Lookout and his guest, Kabir Barday, CEO at OneTrust.

    On the agenda:
    - Why mobile is a problem for GDPR compliance
    - Understanding the threats & risks to GDPR compliance from mobile
    - Finding & stopping mobile threats to GDPR compliance

    Did you know?

    84% of security & IT executives say personal data accessed on employee mobile devices could put their company at risk for GDPR noncompliance.

    31% of enterprise employees that have a title of Vice President or higher say their mobile devices have been hacked or compromised.

    63% of enterprise employees say they access their organization's customer, partner, data and employee data while on their mobile device.
  • Subject Access Rights: GDPR Implementation Guide
    Subject Access Rights: GDPR Implementation Guide
    Brian Philbrook, Privacy Counsel at OneTrust | Dr Andreas Splittgerber, Partner, Reed Smith Recorded: May 23 2018 66 mins
    The GDPR grants data subjects new rights including: data portability, access to their data, erasure or “the right to be forgotten”, and rectification. For data controllers, there are specific record-keeping requirements around the time to respond, the ability to request an extension, the requirement to validate the identity, and securely transmitting the response to the individual.

    Join us for this educational web conference to hear about the new rights of data subjects and how organizations can use privacy management software to streamline and automate requests, validation, and notification processes.

    About the presenters:

    Brian Philbrook serves as Privacy Counsel at OneTrust where he provides guidance on global privacy regulations to assist compliance efforts and drive product innovation. Philbrook also conducts training and workshops on the GDPR and contributes to various publications and web-conferences on a regular basis. Prior to OneTrust, Philbrook served on the Privacy Team for RxAnte, a leading predictive analytics and clinical services company committed to improving medication use. He also worked as an extern on the IAPP’s training and publications teams. Philbrook earned his JD from the University of Maine School of Law, where he was the first recipient of the Certificate in Information Privacy Law.

    Dr Andreas Splittgerber is a partner in the Munich office of Reed Smith and member of the IP, Tech & Data Group.

    Andreas specialises in IT law, data protection/privacy, social media law and internet law (Germany and EU). He is passionate about technology and privacy and thought-leader when it comes to legally evaluating new technologies (e.g. internet of things, artificial intelligence).
  • What are the full spectrum of mobile risks in 2018?
    What are the full spectrum of mobile risks in 2018?
    Burak Agca - System Engineer Recorded: Feb 28 2018 35 mins
    Mobile has become the primary espionage target. Everyday employee behaviors can jeopardize your data, systems, and compliance policies.

    With over 120M mobile devices using our endpoint security products, Lookout has unparalleled global insight into the full spectrum of mobile risks, threats, and vulnerabilities.

    Register to today's webinar to learn about:
    - The threat landscape
    - The evolution of mobile threats
    - How does that impact your organization?
    - How other organizations are doing?
    - The impact of a breach post GDPR
    - How to protect your enterprise data?

    Live Q&A session at the end.
  • The Evolving Mobile Threat Landscape
    The Evolving Mobile Threat Landscape
    Mike Murray, VP of Security Intelligence at Lookout Recorded: Feb 22 2018 18 mins
    For nearly two decades, Mike has focused on high-end security research, first as a researcher and penetration tester and then building and leading teams of highly skilled security professionals. He previously led Product Development Security at GE Healthcare, where he built a global team to secure the Healthcare Internet of Things. Prior to that, he co-founded The Hacker Academy and MAD Security, and has held leadership positions at companies including nCircle Network Security, Liberty Mutual Insurance and Neohapsis.
  • Spectrum of Mobile Risk
    Spectrum of Mobile Risk
    Lookout Recorded: Feb 7 2018 3 mins
    Short advertorial showing the potential risks and consequences of a company's mobile phone being hacked.
  • Threat intelligence briefing: Advanced Persistent Threat targeting mobile device
    Threat intelligence briefing: Advanced Persistent Threat targeting mobile device
    Michael Murray - VP of Research and Response, Lookout Recorded: Jan 26 2018 32 mins
    Lookout and Electronic Frontier Foundation (EFF) have discovered Dark Caracal, a campaign attributed to the cyber-warfare arm of the Lebanese General Security Directorate.

    This actor is prolific and has engaged in widespread APT-style attack campaigns around the world — with mobile devices as the primary target.

    This joint research effort has obtained hundreds of gigabytes of exfiltrated data across thousands of victims in over 21 countries. Stolen data include enterprise intellectual property and personally-identifiable information.

    Register to the webinar to find out:

    - the latest details about Dark Caracal, the first globally-active mobile APT
    - whether your organisation has been impacted
    - the steps you should take to protect data on mobile devices.

    Speakers
    Michael Flossman Security Researcher, Lookout
    Eva Galperin Eva Galperin Director of Cybersecurity, EFF
  • Finding risks to GDPR compliance in a mobile-first world
    Finding risks to GDPR compliance in a mobile-first world
    Aaron Cockerill, Chief Strategy Officer, Lookout Recorded: Dec 20 2017 50 mins
    Many organizations are now racing against the May 25, 2018 GDPR enforcement deadline to extend security controls to personal data in their control. The risk of GDPR fines & brand reputation damage has made the security of personal data on mobile an urgent priority for CISOs, and executive boards.

    In today's webinar Aaron and Kabir will cover:

    - Why mobile is a problem for GDPR compliance
    - Understanding the threats & risks to GDPR compliance from mobile
    - Finding & stopping mobile threats to GDPR compliance

    OUR SPEAKERS
    Kabir Barday, CEO, OneTrust
    Aaron Cockerill, Chief Strategy Officer, Lookout


    INTERESTING FACTS:

    84% of security & IT executives say personal data accessed on employee mobile devices could put their company at risk for GDPR noncompliance.

    31% of enterprise employees that have a title of Vice President or higher say their mobile devices have been hacked or compromised.

    63% of enterprise employees say they access their organization's customer, partner, and employee data while on their mobile device.
  • CISO Top Security Priorities: Why Visibility Into Mobile Risk Is Critical
    CISO Top Security Priorities: Why Visibility Into Mobile Risk Is Critical
    Aaron Cockerill - Chief Strategy Officer, Lookout Recorded: Dec 18 2017 29 mins
    According to a recent survey, 75% of today’s security professionals believe their organizations need to increase visibility into mobile risks.

    With a spectrum of issues facing the mobile enterprise – including targeted attacks, disruptive malware, and noncompliant data-leaking apps – it is critical to understand the full range of threats and vulnerabilities, especially as organizations begin to prepare for GDPR compliance.

    Watch the webinar to:

    - Get visibility into the full spectrum of mobile risk and the latest security intelligence

    - Dive into IDG’s “Security Priorities 2017” latest research to hear about what is at the top of the CISOs agenda

    - Hear real-world scenarios about what organizations are doing today to secure their mobile devices

    - Learn how to protect personal data on mobile to prepare for GDPR compliance in May 2018


    SPEAKERS
    Bob Bragdon - SVP & Publisher, IDG/CSOonline.com
    Aaron Cockerill - Chief Strategy Officer, Lookout
  • 2018 Security Predictions
    2018 Security Predictions
    Bob Hansmann, Director, Security Technologies, Forcepoint Recorded: Nov 30 2017 53 mins
    New security challenges in 2018

    Hackers are already scheming their next wave of targets: will they replicate the colossal Equifax breach and cash in on reams of personal data or freeze up IoT devices simply in order to disrupt critical systems?

    Join Forcepoint's Bob Hansmann, Director, Security Technologies for a Forcepoint 2018 Security Predictions Report webcast on the most pressing security issues for the upcoming year.

    You’ll receive an advance copy of the Forcepoint 2018 Security Predictions Report just for attending.
  • The Total Economic Impact of Forcepoint Web Security And Email Security Cloud
    The Total Economic Impact of Forcepoint Web Security And Email Security Cloud
    Bob Hansmann, Director, Security Technologies, Forcepoint & Jon Erickson, VP, TEI, Forrester Recorded: Sep 26 2017 25 mins
    Today’s technology decisions require “next-level” business case justification. Forrester’s Total Economic Impact™ framework identifies all factors that affect a significant technology investment decision. For this commissioned study, Forrester Consulting recently examined inputs from a Forcepoint Web Security Cloud and Email Security Cloud client to determine the benefits, costs, flexibility and risks. The results are notable.

    This webcast outlines a three-year impact, including:
    • 122% ROI
    • $895,000 benefits
    • $492,000 NPV
    • 6 month payback

    Join this webcast to understand the framework and how Forcepoint delivers value.
  • Rx For Healthcare Talent
    Rx For Healthcare Talent
    Raleen Gagnon and Sara McCarville of ManpowerGroup Solutions and Chris Vaughan of Boston University School of Medicine Recorded: Feb 22 2017 60 mins
    Healthcare candidates are one of today’s most competitive talent markets. In order to attract and retain these candidates, employers need to understand their job search preferences and motivators for career change.

    During this webinar, experts from ManpowerGroup Solutions and the Boston University School of Medicine will discuss the evolving healthcare marketplace as well as new workforce and recruiting strategies — and how this is raising the bar for patient care.

    By participating in this webinar, you will:
    1. Understand key workforce trends related to talent supply and demand in healthcare
    2. Learn how healthcare employers can attract and retain talent in a competitive marketplace
    3. Find out how hospitals and clinics are shifting their workforce strategy

    Presented by Raleen Gagnon and Sara McCarville of ManpowerGroup Solutions and Chris Vaughan of Boston University School of Medicine

    * Please note this webinar is not eligible for HRCI credit.
  • Quarterly Market Report: Global Workforce Analytics
    Quarterly Market Report: Global Workforce Analytics
    Raleen Gagnon, Mikey McPhail and Dave McGonegal of ManpowerGroup Solutions Recorded: Mar 31 2015 60 mins
    Whether you’re investing in a global initiative or just want to better understand global trends, this complimentary TAPFIN webinar will provide expert insights to help navigate you to success.

    We’ll share our latest Quarterly Market Report – an analysis of current trends, opportunities, global market indicators and considerations for tracking talent globally, with an emphasis on how these market conditions can impact hiring activity and business outcomes. The webinar will also provide insights into which market dynamics have the most impact on workforce activity and how best to measure that workforce activity within your organization.

    As organizations increasingly recognize their global workforce as means to improving business performance and efficiency, it is important to have visibility into what is happening both inside and outside of your organization with regard to workforce activity and performance. Subject Matter Experts Mikey McPhail, Director of Business Intelligence at ManpowerGroup Solutions and Dave McGonegal, VP, Strategic Client Solutions at ManpowerGroup Solutions, will join us for a discussion on driving competitive advantage through workforce analysis.

    By participating in this webinar, you will learn:
    + How workforce productivity and performance shifts globally.
    + How different views of your workforce data can yield new insights.
    + How you can compare your workforce to the market to identify opportunities and challenges.
  • CCPA: What you Need to Know & Tools to Prepare
    CCPA: What you Need to Know & Tools to Prepare
    Brian Philbrook, Data Privacy Counsel CIPP/E, CIPP/US, CIPM, CIPT, FIP, OneTrust Sep 5 2019 9:05 am UTC 40 mins
    Prepare for the CCPA by understanding the law. Our CCPA experts will discuss the tools you can utilize to tackle the regulatory requirements. Get a peek at our centralized resource library, OneTrust DataGuidance™, which includes the full CCPA text, as well as summaries, comprehensive guides, and regulatory guidance. OneTrust DataGuidance™ is continually updated by the OneTrust global research team and includes the latest amendments, news, and guidance.

    We will also discuss the importance of conducting a readiness assessment that can help assess your organization’s CCPA gaps and offer remediation recommendations to minimize risks.

    Speaker Biography:
    Brian Philbrook serves as Privacy Counsel at OneTrust, where he provides guidance on privacy and data protection issues to assist with compliance and product innovation efforts. Philbrook is also a member of OneTrust’s Information Security Management System (ISMS) Committee.

    Prior to OneTrust, Philbrook served on the Privacy Team for RxAnte, a leading predictive analytics and clinical services company committed to improving medication use. He also worked as an extern on the IAPP’s training and publications teams.

    Philbrook earned his JD from the University of Maine School of Law, where he was the inaugural recipient of the Certificate in Information Privacy Law. He holds CIPP/E, CIPP/US, CIPM and CIPT certifications, and is a Fellow of Information Privacy (FIP).
  • Adapting for CCPA Consumer Rights Management & "Do Not Sell"
    Adapting for CCPA Consumer Rights Management & "Do Not Sell"
    Ethan Sailers, Privacy Engineer CIPP/E, CIPM, OneTrust Sep 5 2019 9:50 am UTC 45 mins
    Our CCPA experts will discuss some of the new rights California residents have under the CCPA and how these rights will likely impact your privacy program. We will also offer solutions to handle consumer requests for information within the CCPA-stipulated 45-day response timeline, as well as how you can maintain records of consent and adapt your cookie consent and website scanning to help comply with the consumer right to opt out of the collection and sale of personal information.

    We will also discuss how you can easily update and centrally store your disclosure notices to comply with the CCPA.

    Speaker Biography:
    Ethan Sailers serves as a Privacy Engineer at OneTrust – the largest and most widely used dedicated privacy management technology platform to operationalize privacy, security and third-party risk management. In his/her role, Last name advises companies large and small on EU GDPR, California Consumer Privacy Act (CCPA), Brazil LGPD, and hundreds of the world's privacy laws, focused on formulating efficient and effective responses to data protection requirements as well as building and scaling privacy programs. Sailers is a Certified Information Privacy Professional (CIPP/E, CIPM) and earned an engineering degree from Georgial Institute of Technology.
  • Streamline your Privacy Management Program to Adhere to Unique CCPA Requirements
    Streamline your Privacy Management Program to Adhere to Unique CCPA Requirements
    Ethan Sailers, Privacy Engineer CIPP/E, CIPM, OneTrust Sep 5 2019 10:45 am UTC 45 mins
    Our CCPA experts will discuss ways to adhere to data minimization and purpose limitation considerations outlined under the CCPA; best practices for meeting mandatory disclosure requirements; how to streamline responses and quickly remedy violations within the CCPA’s 30-day cure period, in the result of a data breach; and the importance of communicating with third-party vendors to meet consumer requests for data access and deletion.

    Speaker Biography:
    Ethan Sailers serves as a Privacy Engineer at OneTrust – the largest and most widely used dedicated privacy management technology platform to operationalize privacy, security and third-party risk management. In his/her role, Last name advises companies large and small on EU GDPR, California Consumer Privacy Act (CCPA), Brazil LGPD, and hundreds of the world's privacy laws, focused on formulating efficient and effective responses to data protection requirements as well as building and scaling privacy programs. Sailers is a Certified Information Privacy Professional (CIPP/E, CIPM) and earned an engineering degree from Georgial Institute of Technology.
  • Q&A Session EMEA
    Q&A Session EMEA
    Stephanie Hanson | Ethan Sailers | Brian Philbrook Sep 5 2019 12:00 pm UTC 30 mins
    Join our expert team for an open question and answer session geared towards EMEA audiences. This 30-min session is dedicated to answering commonly asked questions about the CCPA, including live questions from the audience.

    Speakers:
    Stephanie Hanson, Offering Manager, OneTrust PreferenceChoice, One Trust
    Ethan Sailers, Privacy Engineer, CIPP/E, CIPM, OneTrust
    Brian Philbrook, Data Privacy Counsel CIPP/E, CIPP/US, CIPM, CIPT, FIP, OneTrust
  • Keynote: The Impact of CCPA to Your Global Privacy Program
    Keynote: The Impact of CCPA to Your Global Privacy Program
    Blake Brannon, Vice President of Product, OneTrust Sep 5 2019 4:30 pm UTC 30 mins
    The California Consumer Privacy Act (CCPA) introduces new rights for California residents – requiring organizations that fall within the scope of the CCPA to make structural changes to their privacy programs. The law is set to take effect on January 1, 2020 and two of the biggest obstacles organizations face when it comes to CCPA preparedness is a lack of time and bandwidth, followed by the complexity of the law and uncertainty as to what the final requirements will be. As a result, organizations are looking for ways to start preparing now.

    With emerging global regulations, increasing data misuse, and the reputational damage associated with a privacy breach, many organizations are taking a broader approach, leveraging the CCPA as a stepping stone to building a comprehensive privacy program.

    Speaker Biography:
    As Vice President of Product, Blake oversees all aspects of OneTrust’s product and is responsible for defining the privacy management and marketing compliance software market and OneTrust’s product capabilities. Brannon evaluates industry trends and analyst research, while driving product planning, design, customer advisory testing, and product launch activities. Prior to OneTrust, Brannon was one of the first employees at AirWatch, where he served as Global Director of Sales Engineering and Vice President of Product Marketing.
    Join us for a half-day online CCPA summit where we address key areas the CCPA is impacting privacy compliance. Our panel of CCPA experts will outline specific sections within the law expected to make the most impact on your business and discuss how a holistic approach to CCPA compliance can set you on the right trajectory for supporting a global privacy program.
  • CCPA: What you Need to Know & Tools to Prepare
    CCPA: What you Need to Know & Tools to Prepare
    Brian Philbrook, Data Privacy Counsel CIPP/E, CIPP/US, CIPM, CIPT, FIP, OneTrust Sep 5 2019 5:05 pm UTC 40 mins
    Prepare for the CCPA by understanding the law. Our CCPA experts will discuss the tools you can utilize to tackle the regulatory requirements. Get a peek at our centralized resource library, OneTrust DataGuidance™, which includes the full CCPA text, as well as summaries, comprehensive guides, and regulatory guidance. OneTrust DataGuidance™ is continually updated by the OneTrust global research team and includes the latest amendments, news, and guidance.

    We will also discuss the importance of conducting a readiness assessment that can help assess your organization’s CCPA gaps and offer remediation recommendations to minimize risks.

    Speaker Biography:
    Brian Philbrook serves as Privacy Counsel at OneTrust, where he provides guidance on privacy and data protection issues to assist with compliance and product innovation efforts. Philbrook is also a member of OneTrust’s Information Security Management System (ISMS) Committee.

    Prior to OneTrust, Philbrook served on the Privacy Team for RxAnte, a leading predictive analytics and clinical services company committed to improving medication use. He also worked as an extern on the IAPP’s training and publications teams.

    Philbrook earned his JD from the University of Maine School of Law, where he was the inaugural recipient of the Certificate in Information Privacy Law. He holds CIPP/E, CIPP/US, CIPM and CIPT certifications, and is a Fellow of Information Privacy (FIP).
  • Adapting for CCPA Consumer Rights Management & "Do Not Sell"
    Adapting for CCPA Consumer Rights Management & "Do Not Sell"
    Ethan Sailers, Privacy Engineer CIPP/E, CIPM, OneTrust Sep 5 2019 5:50 pm UTC 45 mins
    Our CCPA experts will discuss some of the new rights California residents have under the CCPA and how these rights will likely impact your privacy program. We will also offer solutions to handle consumer requests for information within the CCPA-stipulated 45-day response timeline, as well as how you can maintain records of consent and adapt your cookie consent and website scanning to help comply with the consumer right to opt out of the collection and sale of personal information.

    We will also discuss how you can easily update and centrally store your disclosure notices to comply with the CCPA.

    Speaker Biography:
    Ethan Sailers serves as a Privacy Engineer at OneTrust – the largest and most widely used dedicated privacy management technology platform to operationalize privacy, security and third-party risk management. In his/her role, Last name advises companies large and small on EU GDPR, California Consumer Privacy Act (CCPA), Brazil LGPD, and hundreds of the world's privacy laws, focused on formulating efficient and effective responses to data protection requirements as well as building and scaling privacy programs. Sailers is a Certified Information Privacy Professional (CIPP/E, CIPM) and earned an engineering degree from Georgial Institute of Technology.
  • Streamline your Privacy Management Program to Adhere to Unique CCPA Requirements
    Streamline your Privacy Management Program to Adhere to Unique CCPA Requirements
    Ethan Sailers, Privacy Engineer CIPP/E, CIPM, OneTrust Sep 5 2019 6:45 pm UTC 45 mins
    Our CCPA experts will discuss ways to adhere to data minimization and purpose limitation considerations outlined under the CCPA; best practices for meeting mandatory disclosure requirements; how to streamline responses and quickly remedy violations within the CCPA’s 30-day cure period, in the result of a data breach; and the importance of communicating with third-party vendors to meet consumer requests for data access and deletion.

    Speaker Biography:
    Ethan Sailers serves as a Privacy Engineer at OneTrust – the largest and most widely used dedicated privacy management technology platform to operationalize privacy, security and third-party risk management. In his/her role, Last name advises companies large and small on EU GDPR, California Consumer Privacy Act (CCPA), Brazil LGPD, and hundreds of the world's privacy laws, focused on formulating efficient and effective responses to data protection requirements as well as building and scaling privacy programs. Sailers is a Certified Information Privacy Professional (CIPP/E, CIPM) and earned an engineering degree from Georgial Institute of Technology.
  • Q&A Session USA
    Q&A Session USA
    Stephanie Hanson | Ethan Sailers | Kelsey Naschek | Brian Philbrook Sep 5 2019 8:00 pm UTC 30 mins
    Join our expert team for an open question and answer session geared towards North American audiences. This 30-min session is dedicated to answering commonly asked questions about the CCPA, including live questions from the audience.

    Speakers:
    Stephanie Hanson, Offering Manager, OneTrust PreferenceChoice, One Trust
    Ethan Sailers, Privacy Engineer, CIPP/E, CIPM, OneTrust
    Brian Philbrook, Data Privacy Counsel CIPP/E, CIPP/US, CIPM, CIPT, FIP, OneTrust