Hi [[ session.user.profile.firstName ]]
Sort by:
    • Career Conversations w/ Debra J Farber - Privacy Guru
      Career Conversations w/ Debra J Farber - Privacy Guru Debra J. Farber, Privacy Guru and Jessica Gulick, WSC Vice President Recorded: Mar 22 2018 11:00 pm UTC 59 mins
    • Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

      Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

      Guest: Debra J Farber, CISSP-ISSMP, CIPP/US, CIPP/E, CIPT, CIPM, FIP | Executive Consultant & U.S. Chief Privacy Office, CRANIUM

      Hosted by: Jessica Gulick, WSC Vice President, CEO of Katzcy Consulting

      About the Speaker:
      Debra J. Farber (@privacyguru) is a data privacy and information security executive and entrepreneur with 13+ years of data strategy, operations, public policy, training, product, and compliance experience across industries and frameworks. She's Executive Consultant & U.S. Chief Privacy Officer, at CRANIUM, an EU-based privacy and security consulting firm with offices in Brussels, Utrecht, Budapest, NYC, & San Francisco. She also serves as an Executive Consultant and External DPO for CRANIUM's many clients.

      Based in San Francisco, Debra serves on several industry working groups and startup advisory boards. She is a member of the IEEE Data Privacy Process Standards Working Group, IAPP CIPT Exam Development Advisory Board, and privacy tech vendor BigID's Advisory Board. In addition, Debra serves as Editorial Board Member for Cyber Security: A Peer-Reviewed Journal. She also co-founded the SF-based non-profit project, Women in Security and Privacy (WISP).

      Read more >
    • IT Security & Privacy Governance in the Cloud
      IT Security & Privacy Governance in the Cloud Moderated by Rebecca Herold, The Privacy Professor; Jacqueline Cooney, BAH, Daniel Catteddu, CSA, Chris Griffith from HPE Recorded: Oct 18 2016 5:00 pm UTC 61 mins
    • After multiple newsworthy data breaches in recent times, IT security and privacy governance has gained importance across the globe. Most organizations have established security and compliance policies and procedures to protect their intellectual property and corporate assets, especially in the IT space. As companies transition their applications and data to the cloud, it is critical for them to maintain, or preferably surpass, the level of security they had in their traditional IT environment. Leaders are also responsible for defining policies to address privacy concerns and raise awareness of data protection within their organization, and for ensuring that their cloud providers adhere to the defined privacy policies. Failure to ensure IT Security when using cloud services could ultimately result in higher costs and potential loss of business, thus eliminating any of the potential benefits of the cloud.

      While security and privacy are related, they are also distinct. IT security is primarily concerned with defending against attacks, not all of which are aimed at stealing data, while privacy is specifically related to personal data held by an organization, which may be endangered by negligence or software bugs, not necessarily by malevolent persons. On this webinar our panel of experts will address some of the key distinctions, and discuss some best practices for managing IT security and implementing privacy governance for the cloud.

      Read more >
    • Cross-Border Data Transfers in the Real World – Privacy Shield, Now What?
      Cross-Border Data Transfers in the Real World – Privacy Shield, Now What? Tanya Forsheit, Partner & Co-Chair Privacy & Data Security Group, Frankfurt Kurnit Klein & Selz, PC Recorded: Oct 14 2016 3:00 pm UTC 45 mins
    • Personal data of individuals – consumers and employees – is in constant motion across international borders. Nonetheless, existing privacy laws purport to prohibit organizations in many countries from transferring data to another jurisdiction in the absence of adherence to various legal frameworks or contractual mechanisms designed to enhance the protection of personal data.

      Those legal frameworks suffered a blow last year when the European Court of Justice struck down the 15 year old Safe Harbor Framework. A year later, the EU-US Privacy Shield Framework has been approved as a replacement, and many companies have begun to certify, but the new Framework remains subject to potential legal challenge. Other European data transfer mechanisms – standard contractual clauses and Binding Corporate Rules – are also subject to legal challenge. And other jurisdictions around the globe in South America, Asia and elsewhere, are imposing restrictions on the transfer or personal data and in some cases even calling for data localization. Yet, data continues to flow in real-time.

      What does it mean in the real world? What are the real risks for multinational data owners and for service providers that process data of such data controllers? This presentation will distinguish fact from fiction and provide practical tools for companies that are struggling (understandably) to wrap their virtual arms around the world.

      Read more >
    • Challenges in Achieving Global Privacy: Latest Compliance Changes
      Challenges in Achieving Global Privacy: Latest Compliance Changes Jan-Boris Wojtan, EALA Data Privacy Lead, Accenture Recorded: Apr 8 2010 8:00 am UTC 48 mins
    • This session will look at some of the recent changes in the regulatory landscape as well as what we can anticipate in the near future. We will try to discern any trends in these developments and discuss how a global company could respond.

      Boris joined Accenture in April 2007 and is Responsible for data privacy compliance in the EALA (Europe Africa and Latin America) region. His duties include helping to establish and maintain a progressive Client Data Protection Programme, advising on client and vendor contracts, carrying out privacy impact assessments on new client offerings or new internal systems, managing a network of DPOs, liaising with regulators, promoting Accenture’s BCR application, anticipating regulatory changes and making sure the business stays compliant.

      Before moving to Accenture, Boris spent three years at the UK regulator, the Information Commissioner, looking at the world through the eyes of the game keeper, where he advised on data privacy and freedom of information case work and liaised with other European regulators to kick start an unprecedented approvals process known as ‘Binding Corporate Rules’.

      His other experience includes six years in private practice as a commercial lawyer specialising in Data Privacy matters and three years in Brussels including spells as press officer of a parliamentary group, an assistant to an MEP, a paralegal at Lovell White Durrant and a stagiaire at the Internal Market Directorate General of the European Commission.

      Read more >
    • Unpacking the Hype: What do the new privacy laws really mean to your business?
      Unpacking the Hype: What do the new privacy laws really mean to your business? Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan Recorded: Mar 20 2018 2:00 am UTC 60 mins
    • With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 now in effect, many Australian businesses and government agencies are starting to take action to ensure their data protection and breach response plans are up to date and comply with the new scheme. However, knowing how to avoid the higher penalties and reputational damage caused by data breaches is a tough challenge for any business.

      Don't miss this opportunity to join Symantec's privacy expert Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan to learn more about the new laws and what you can do to ensure your business is not making headlines for all the wrong reasons.

      " Hear about new challenges introduced by the Australian mandatory data breach notification laws and the wide reaching General Data Protection Regulation (GDPR)
      " Learn about key steps in the journey towards privacy compliance and why most Australian businesses have approached privacy wrong
      "Understand how these regulations can enable you to gain trust and enhance customer experiences

      Read more >
    • Symantec and Deloitte discuss “Trust” and Data Privacy in Australia
      Symantec and Deloitte discuss “Trust” and Data Privacy in Australia Brian Fletcher, Director, Government Affairs, Symantec; Marta Ganko, National Privacy and Data Lead, Risk Advisory, Deloitte Recorded: Aug 17 2017 1:00 am UTC 60 mins
    • With the advent of Big Data comes not only new ways to optimise business and marketing processes, but also new concerns over the control and privacy of personal data.

      These have given rise to local and regional data protection laws and regulations such as the General Data Protection Regulation (GDPR), a modernisation of data protection laws in the European Union, and the Australian data breach notification law, an amendment to the Privacy Act 1988 (Cth) which introduces a mandatory scheme for eligible organisations and federal agencies to report data breaches.

      Data breach notifications give individuals greater control over their personal data and promote transparency over information handling practices, fostering consumer trust in businesses. The law requires businesses to prepare and assess risks to maintain brand confidence even if an incident becomes the next data breach headline.

      Join this webinar to learn about:

      - New challenges introduced by the Australian mandatory data breach notification law
      - Key steps in the journey towards data privacy compliance
      - How to monitor insider threats
      - How to leverage these regulations to gain trust and ensure great customer experiences

      We look forward to your participation in this free webinar.

      Read more >
    • How to Design your Data Supply Chain for GDPR
      How to Design your Data Supply Chain for GDPR Ted Sfikas, Director of US Engineering, Tealium & Jason Koo, Developer Evangelist, Tealium Recorded: May 8 2018 5:00 pm UTC 48 mins
    • While the dawn of massive change approaches with GDPR, it’s critical for brands to be transparent and ethical with the customer data they’re handling. They must ensure that the data being collected is only used for the purposes of transforming interactions and creating better customer experiences.

      And as brands scramble to orchestrate and execute their compliance plans before May 25th, many are unsure which tools, processes, internal groups and roles their organization should employ.

      Sound familiar? Join to discover how to design your data supply chain for GDPR, plus:

      - 4 critical components of GDPR that every brand needs to know
      - 3 key GDPR roles every company should assign internally
      - Best-in-class solutions to top mobile data challenges with GDPR
      - Real-world examples of how employing data privacy efforts has led other brands to increased customer access to privacy controls and increased transparency to 3rd party tools

      It’s crucial that data, marketing and analyst professionals focus on overall data governance, rather than just legal ramifications, and the effect that leakage and security events can have on the brand itself when it comes to GDPR compliance. Safeguard your brand and consumer trust by ensuring your compliance today.

      Read more >
    • GDPR: Data Privacy Assessment and Information Risk
      GDPR: Data Privacy Assessment and Information Risk Greg Clark, Director, WW Market Strategy Secure Content Management, Micro Focus Recorded: Apr 11 2018 6:05 pm UTC 15 mins
    • Where is the information and sensitive personal data that may fall under these regulations?

      You need to be able to quickly and cost efficiently determine what data falls in scope with GDPR, and then apply policies to move, redact, encrypt and dispose of personal data in accordance with GDPR articles.

      In this session we cover:
      - The regulatory challenges for Personal Data management – the seen and the unseen
      - Technical implications of both Data Discovery and Programme execution
      - Unstructured Data file analysis and Structured Data file analysis
      - Architectural requirements to support the legal policy and compliance procedure
      - How the application and enforcement of policies to manage information throughout its lifecycle can be achieved using the Micro Focus Secure Content Management suite.

      Read more >