Hi [[ session.user.profile.firstName ]]
Sort by:
    • IT Security & Privacy Governance in the Cloud
      IT Security & Privacy Governance in the Cloud Moderated by Rebecca Herold, The Privacy Professor; Jacqueline Cooney, BAH, Daniel Catteddu, CSA, Chris Griffith from HPE Recorded: Oct 18 2016 5:00 pm UTC 61 mins
    • After multiple newsworthy data breaches in recent times, IT security and privacy governance has gained importance across the globe. Most organizations have established security and compliance policies and procedures to protect their intellectual property and corporate assets, especially in the IT space. As companies transition their applications and data to the cloud, it is critical for them to maintain, or preferably surpass, the level of security they had in their traditional IT environment. Leaders are also responsible for defining policies to address privacy concerns and raise awareness of data protection within their organization, and for ensuring that their cloud providers adhere to the defined privacy policies. Failure to ensure IT Security when using cloud services could ultimately result in higher costs and potential loss of business, thus eliminating any of the potential benefits of the cloud.

      While security and privacy are related, they are also distinct. IT security is primarily concerned with defending against attacks, not all of which are aimed at stealing data, while privacy is specifically related to personal data held by an organization, which may be endangered by negligence or software bugs, not necessarily by malevolent persons. On this webinar our panel of experts will address some of the key distinctions, and discuss some best practices for managing IT security and implementing privacy governance for the cloud.

      Read more >
    • Cross-Border Data Transfers in the Real World – Privacy Shield, Now What?
      Cross-Border Data Transfers in the Real World – Privacy Shield, Now What? Tanya Forsheit, Partner & Co-Chair Privacy & Data Security Group, Frankfurt Kurnit Klein & Selz, PC Recorded: Oct 14 2016 3:00 pm UTC 45 mins
    • Personal data of individuals – consumers and employees – is in constant motion across international borders. Nonetheless, existing privacy laws purport to prohibit organizations in many countries from transferring data to another jurisdiction in the absence of adherence to various legal frameworks or contractual mechanisms designed to enhance the protection of personal data.

      Those legal frameworks suffered a blow last year when the European Court of Justice struck down the 15 year old Safe Harbor Framework. A year later, the EU-US Privacy Shield Framework has been approved as a replacement, and many companies have begun to certify, but the new Framework remains subject to potential legal challenge. Other European data transfer mechanisms – standard contractual clauses and Binding Corporate Rules – are also subject to legal challenge. And other jurisdictions around the globe in South America, Asia and elsewhere, are imposing restrictions on the transfer or personal data and in some cases even calling for data localization. Yet, data continues to flow in real-time.

      What does it mean in the real world? What are the real risks for multinational data owners and for service providers that process data of such data controllers? This presentation will distinguish fact from fiction and provide practical tools for companies that are struggling (understandably) to wrap their virtual arms around the world.

      Read more >
    • Protect Your Data Privacy with Data-Centric Security
      Protect Your Data Privacy with Data-Centric Security Stuart McIrvine Vice President, Mainframe Security Product Management Recorded: Sep 27 2017 5:00 pm UTC 42 mins
    • Data privacy isn’t an easy task, you need to ensure the security of sensitive information while complying with a variety of regulations. But data privacy never ends and the laws are constantly changing. The answer? A data-centric security strategy covers all corporate data, so you can connect everyone to everything while staying in complete control. The challenge? Knowing where all your mainframe data is located, how it’s being used, who has access to it, and whether it’s compliant with industry regulations.
      Join Stuart McIrvine, Vice President of Mainframe Security Product Management to cover the foundation of building data-centric security strategies that cover all corporate data, simplify regulatory compliance, and outline how to leverage security as a competitive advantage, from mobile to mainframe.

      Read more >
    • GDPR Data Protection: Your Checklist for Email and File Sharing Protections
      GDPR Data Protection: Your Checklist for Email and File Sharing Protections Timothy Edgar, Privacy Attorney & Brett Dorr, Director of Solutions Engineering at Virtru Upcoming: Feb 21 2018 9:00 pm UTC 45 mins
    • Featuring Timothy Edgar, former national security and intelligence official, cybersecurity expert, privacy attorney and civil liberties activist; and Brett Dorr, Director of Solutions Engineering at Virtru.

      You've got until May 25, 2018 to comply with GDPR guidelines. Are your email and file sharing systems ready?

      In this session, privacy attorney Timothy Edgar and data protection advisor Brett Dorr will provide valuable insights and actionable advice to help you ensure you’re prepared.

      Join us, to understand the relevant areas of concern — especially if you are considering or have already made a move to the cloud.

      Attend this webinar to learn:
      - How GDPR affects all companies doing business in the EU
      - Why email protection is important in GDPR
      - Key areas related to data protection for emails and files
      - What GDPR says specifically about encryption, key management, and access control
      - Technical solutions to help you enable compliance when exchanging personal data by email

      We’re looking forward to answering your GDPR data protection questions.

      Read more >
    • Protecting Corporate Data When an Employee Leaves
      Protecting Corporate Data When an Employee Leaves Michael Osterman of Osterman Research and Drew Neilson of Druva Recorded: Nov 2 2017 4:00 pm UTC 56 mins
    • Employees leave organizations each year, but did your sensitive data leave with them? Osterman Research found that 39% of companies are not sure that they have recovered all corporate data assets, posing a significant risk in terms of data breach, regulatory and compliance implications, while leaving IT trying to locate and contain sensitive information.

      This presentation with Michael Osterman, president of Osterman Research, as he shares new research, and Drew Nielsen, Director of Enterprise Security, Druva. Key learnings include:

      * Understanding your organization's data vulnerabilities for data exfiltration
      * Recommended technologies, policies, and procedures to protect critical information
      * Preparation that can save IT time from potential audits, investigations or litigation

      Read more >
    • GDPR: The Intersection of Compliance and Customer Satisfaction
      GDPR: The Intersection of Compliance and Customer Satisfaction Lewis Barr, General Counsel and VP, Privacy at Janrain, David Fowler, Head of Digital Compliance at Act-On Software Recorded: Aug 17 2017 8:00 pm UTC 57 mins
    • In the age of the customer and data hacks a brand’s reputation can come down to their ability to protect customer data. The transparency that will develop between brand and consumer with the upcoming General Data Protection Regulation (GDPR) will provide organizations with an opportunity to empower and build trust with their customer.

      Armed with a unified and single view of the customer, brands will be able to truly personalize the customer journey while maintaining compliance and securing customer data.

      Hear from Lewis Barr and David Fowler as they discuss how to turn the GDPR into business opportunity while focusing on the following topics:
      - Heightened consent requirements and consent lifecycle management
      - Expanded privacy notice requirements
      - Data subject access rights (SARs) and fulfillment requirements
      - Business exposure and liability for failing to meet these GDPR requirements
      - Practical next steps to achieve operational readiness

      About the Presenters:
      Lewis manages Janrain’s legal compliance and privacy functions as the company continues its international expansion. He brings more than 15 years of leadership in a wide range of legal and privacy-related matters for growing technology companies. Lewis also utilizes his diverse background as a litigator in private practice, federal appeals court staff attorney, and teacher.

      David is the Head of Digital Compliance at Act-On Software and is responsible for all issues pertaining to digital compliance, including email deliverability, privacy compliance, and industry stewardship in regard to our customers and our corporate objectives. David has over 20 years’ experience providing senior leadership in the marketing industry. In the last nine years, he has been strictly focused on issues associated with email marketing, deliverability, digital marketing, and privacy compliance.

      Read more >
    • Challenges in Achieving Global Privacy: Latest Compliance Changes
      Challenges in Achieving Global Privacy: Latest Compliance Changes Jan-Boris Wojtan, EALA Data Privacy Lead, Accenture Recorded: Apr 8 2010 8:00 am UTC 48 mins
    • This session will look at some of the recent changes in the regulatory landscape as well as what we can anticipate in the near future. We will try to discern any trends in these developments and discuss how a global company could respond.

      Boris joined Accenture in April 2007 and is Responsible for data privacy compliance in the EALA (Europe Africa and Latin America) region. His duties include helping to establish and maintain a progressive Client Data Protection Programme, advising on client and vendor contracts, carrying out privacy impact assessments on new client offerings or new internal systems, managing a network of DPOs, liaising with regulators, promoting Accenture’s BCR application, anticipating regulatory changes and making sure the business stays compliant.

      Before moving to Accenture, Boris spent three years at the UK regulator, the Information Commissioner, looking at the world through the eyes of the game keeper, where he advised on data privacy and freedom of information case work and liaised with other European regulators to kick start an unprecedented approvals process known as ‘Binding Corporate Rules’.

      His other experience includes six years in private practice as a commercial lawyer specialising in Data Privacy matters and three years in Brussels including spells as press officer of a parliamentary group, an assistant to an MEP, a paralegal at Lovell White Durrant and a stagiaire at the Internal Market Directorate General of the European Commission.

      Read more >
    • Security at Work: Driving Microsoft's Digital Transformation [CXO Summit]
      Security at Work: Driving Microsoft's Digital Transformation [CXO Summit] Bret Arsenault, Worldwide Corporate Vice President & CISO, Microsoft Recorded: Jun 6 2017 9:20 pm UTC 31 mins
    • Join Bret Arsenault, Worldwide Corporate Vice President and Chief Information Security Officer, Microsoft for a technical deep dive into why security should be at the core of your digital transformation strategy.

      Digital transformation presents a host of security challenges for the modern enterprise, from increasingly sophisticated external threats to the internal challenges of new technology adoption and changing business strategies. In this 30-minute presentation, Bret Arsenault, Microsoft CVP and CISO, will discuss how security is at the center of Microsoft’s digital transformation. Sharing the learnings and lessons gleaned from his unique role within Microsoft, from dealing with demanding executive leadership to keeping the enterprise secure in an ever-evolving landscape, Arsenault will touch on the security issues that need be top-of-mind for every C-level executive.

      Read more >
    • Why do corporate breaches continue to succeed?
      Why do corporate breaches continue to succeed? Robert Johnston, CISSP, Adlumnin, Co-Founder & Chief Executive Officer Recorded: Oct 5 2017 5:00 pm UTC 38 mins
    • Corporate breaches continue to succeed because attackers can steal the legitimate identities of your employees and use those identities to attack your infrastructure. Far deadlier than malware based attacks, identity based attacks can go undetected for months or years because perpetrators impersonate the methods used by your various privileged accounts as if they were that user. Attackers have changed their methods from the now outdated malware based attacks to the evolved identity based attacks. Learn how analytics, deception, and data streams are saving the security industry, or would have at least saved the Democratic National Committee.

      Robert Johnston, CISSP
      Behavior Analytics, Active Defense, President & CEO Adlumin.com, Technology Entrepreneur

      Previously Mr. Johnston worked in the private sector as a principal consultant at CrowdStrike, Inc as an incident response expert conducting engagements against nation state, criminal, and hacktivist organizations across a variety of industry sectors.

      Previously Mr. Johnston served as an officer in the United States Marine Corps. As a Marine Officer he was the Team Lead of 81 National Cyber Protection Team, Cyber National Mission Force and the Director of the Marine Corps Red Team. He is an accomplished leader and technical expert within the cyber security community. Mr. Johnston is a 2008 United States Naval Academy graduate with a degree in Information Technology.

      He has published multiple projects and articles in industry relevant magazines and peer reviewed journals. An avid speaker within the cyber security community (ISC)2 awarded him runner up for the best up-and-coming cyber security professional in North, Central, and South America and the winner of the 2015 Community Awareness Government Information Security Leadership Award. Mr. Johnston can be followed on Twitter at @dvgsecurity.

      Read more >
    • Privacy vs. Security: Balancing Vulnerability Awareness & Incident Prevention
      Privacy vs. Security: Balancing Vulnerability Awareness & Incident Prevention Keith Moulsdale, Partner with Whiteford Taylor Preston LLP, Tim Vogel: CEO & CISO, Xtium; Kevin Lancaster, CEO, ID Agent Recorded: Oct 14 2016 5:00 pm UTC 59 mins
    • Join us for this timely discussion with privacy and data security experts. With ever looming environmental threats such as of ransomware, data theft, denial-of- service attacks, every organization and every industry must be focused on IT security. However, there is a delicate balance and frequent conflicts between the idea of information privacy and security.

      How much individual privacy can be expected in an inter-connected world? How much should be sacrificed for the sake of maximizing corporate security? And where (if anywhere) can the lines between personal and corporate be drawn? How do these issue impact policies, training and security surrounding even the most simple of business communication tools: email.

      This presentation will provide an overview of the privacy vs. security challenges and explore specifically how these issues are impacting the issue of user email credentials and email vulnerabilities. This is especially critical given that emails are the number one contributor to data breaches. In fact, 63% of breaches in the US last year were the result of a compromised email credential.

      We will then a) discuss common misperceptions and security holes that can lead to ransomware and other malware vulnerabilities, b) compare the various alternatives for proactively addressing these vulnerabilities, and c) discuss strategies for preventing and responding to cyberattacks.

      Read more >
    • Cloud Privacy: What You Need To Know
      Cloud Privacy: What You Need To Know David Fowler, Chief Privacy & Deliverability Officer, Act-On Software Recorded: Jul 24 2012 5:00 pm UTC 43 mins
    • Not a day seems to go by without an announcement of a brand and a recent data compromise. Will yours be next?

      In this session, David Fowler, Chief Privacy & Deliverability Officer, Act-On Software will discuss ways to protect your brand, provide a “State of the State” of commercial email and provide information on tools you can use to protect your reputation.

      David is responsible for all issues pertaining to Email Deliverability and Privacy compliance pertaining to our clients and corporate objectives alike.

      David brings over 20 years of experience of senior leadership in the marketing industry including the last nine years strictly focused on the issues associated with email marketing, deliverability, digital marketing and privacy compliance.

      Prior to joining Act-On, David held US and European based Senior Management positions focused on Deliverability, Digital Privacy, Sales, Marketing, Business Development and Product Management with such companies as: Marketfish, Lyris Technologies, Blue Hornet / Digital River and Yesmail.

      David graduated from Marlyhurst College, Portland Oregon.

      Read more >
    • Inherent Conflicts - U.S. Investigations & E.U. Data Privacy Laws
      Inherent Conflicts - U.S. Investigations & E.U. Data Privacy Laws FTI Consulting and Main Justice Recorded: May 5 2011 5:00 pm UTC 61 mins
    • From whistle blower allegations, government inquiries and subpoenas, to corporate due diligence, Foreign Corrupt Practices Act (“FCPA”) violations, and financial fraud – corporate counsel must collect and produce greater amounts of data from around the globe. Besides basic logistical issues, various tiers of data privacy restrictions complicate the process, requiring an in-depth knowledge of data storage technology and practices, multinational data transfer regulations, and general e-discovery best practices. For example, if data is required in response to a regulatory request in the United States, yet the custodians are based in France and Germany, how can the data be collected and reviewed in a defensible manner in compliance with EU as well as French and German data privacy laws? This program will outline the key considerations and best practices for collecting and assessing data in a defensible and secure manner.

      Read more >