There are many challenges for data privacy legislation within a boundary-less cloud computing and World Wide Web environment. Despite its importance, there is limited research around data privacy law gaps and alignment, and the legal side of the security ecosystem seems to constantly be playing catch-up.
This research is supported by STRATUS (Security Technologies Returning Accountability, Trust and User-Centric Services in the Cloud) (https://stratus.org.nz),
This webinar with Eve Maler, VP Innovation and Emerging Technology, covers the transformation of privacy and consent into a business tool in 2017 as well as the evolving regulatory scene. Eve also conducts a Q&A with the New Zealand Department of Internal Affairs, on their POC of User-Managed Access. Finally, she discusses the key elements of the ForgeRock Identity Platform related to privacy and consent.Read more >
Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?
Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!
Guest: Debra J Farber, CISSP-ISSMP, CIPP/US, CIPP/E, CIPT, CIPM, FIP | Executive Consultant & U.S. Chief Privacy Office, CRANIUM
Hosted by: Jessica Gulick, WSC Vice President, CEO of Katzcy Consulting
About the Speaker:
Debra J. Farber (@privacyguru) is a data privacy and information security executive and entrepreneur with 13+ years of data strategy, operations, public policy, training, product, and compliance experience across industries and frameworks. She's Executive Consultant & U.S. Chief Privacy Officer, at CRANIUM, an EU-based privacy and security consulting firm with offices in Brussels, Utrecht, Budapest, NYC, & San Francisco. She also serves as an Executive Consultant and External DPO for CRANIUM's many clients.
Based in San Francisco, Debra serves on several industry working groups and startup advisory boards. She is a member of the IEEE Data Privacy Process Standards Working Group, IAPP CIPT Exam Development Advisory Board, and privacy tech vendor BigID's Advisory Board. In addition, Debra serves as Editorial Board Member for Cyber Security: A Peer-Reviewed Journal. She also co-founded the SF-based non-profit project, Women in Security and Privacy (WISP).
Privacy vs. security, security vs. privacy… the debate is ongoing. Why can’t we have both? Good news: by leveraging the appropriate mix of policies, procedures and enabling technologies, it is possible to secure data AND control access to it in a way that ensures proper application of privacy policies.Read more >
Data Privacy has once again vaulted to the forefront with Facebook and other large companies grappling with data breaches and the use (or misuse) of personal data. We are charting new frontiers in data privacy and legislation alone will not mitigate the data challenges that lay ahead. Brand loyalty and brand trust can take years to build, but can be lost in an instant with one data privacy misstep. There are a number of regulatory challenges facing enterprises globally that need to be considered as well including The US Patriot Act and the upcoming GDPR requirementRead more >
After multiple newsworthy data breaches in recent times, IT security and privacy governance has gained importance across the globe. Most organizations have established security and compliance policies and procedures to protect their intellectual property and corporate assets, especially in the IT space. As companies transition their applications and data to the cloud, it is critical for them to maintain, or preferably surpass, the level of security they had in their traditional IT environment. Leaders are also responsible for defining policies to address privacy concerns and raise awareness of data protection within their organization, and for ensuring that their cloud providers adhere to the defined privacy policies. Failure to ensure IT Security when using cloud services could ultimately result in higher costs and potential loss of business, thus eliminating any of the potential benefits of the cloud.
While security and privacy are related, they are also distinct. IT security is primarily concerned with defending against attacks, not all of which are aimed at stealing data, while privacy is specifically related to personal data held by an organization, which may be endangered by negligence or software bugs, not necessarily by malevolent persons. On this webinar our panel of experts will address some of the key distinctions, and discuss some best practices for managing IT security and implementing privacy governance for the cloud.
Personal data of individuals – consumers and employees – is in constant motion across international borders. Nonetheless, existing privacy laws purport to prohibit organizations in many countries from transferring data to another jurisdiction in the absence of adherence to various legal frameworks or contractual mechanisms designed to enhance the protection of personal data.
Those legal frameworks suffered a blow last year when the European Court of Justice struck down the 15 year old Safe Harbor Framework. A year later, the EU-US Privacy Shield Framework has been approved as a replacement, and many companies have begun to certify, but the new Framework remains subject to potential legal challenge. Other European data transfer mechanisms – standard contractual clauses and Binding Corporate Rules – are also subject to legal challenge. And other jurisdictions around the globe in South America, Asia and elsewhere, are imposing restrictions on the transfer or personal data and in some cases even calling for data localization. Yet, data continues to flow in real-time.
What does it mean in the real world? What are the real risks for multinational data owners and for service providers that process data of such data controllers? This presentation will distinguish fact from fiction and provide practical tools for companies that are struggling (understandably) to wrap their virtual arms around the world.
This session will look at some of the recent changes in the regulatory landscape as well as what we can anticipate in the near future. We will try to discern any trends in these developments and discuss how a global company could respond.
Boris joined Accenture in April 2007 and is Responsible for data privacy compliance in the EALA (Europe Africa and Latin America) region. His duties include helping to establish and maintain a progressive Client Data Protection Programme, advising on client and vendor contracts, carrying out privacy impact assessments on new client offerings or new internal systems, managing a network of DPOs, liaising with regulators, promoting Accenture’s BCR application, anticipating regulatory changes and making sure the business stays compliant.
Before moving to Accenture, Boris spent three years at the UK regulator, the Information Commissioner, looking at the world through the eyes of the game keeper, where he advised on data privacy and freedom of information case work and liaised with other European regulators to kick start an unprecedented approvals process known as ‘Binding Corporate Rules’.
His other experience includes six years in private practice as a commercial lawyer specialising in Data Privacy matters and three years in Brussels including spells as press officer of a parliamentary group, an assistant to an MEP, a paralegal at Lovell White Durrant and a stagiaire at the Internal Market Directorate General of the European Commission.
With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 now in effect, many Australian businesses and government agencies are starting to take action to ensure their data protection and breach response plans are up to date and comply with the new scheme. However, knowing how to avoid the higher penalties and reputational damage caused by data breaches is a tough challenge for any business.
Don't miss this opportunity to join Symantec's privacy expert Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan to learn more about the new laws and what you can do to ensure your business is not making headlines for all the wrong reasons.
" Hear about new challenges introduced by the Australian mandatory data breach notification laws and the wide reaching General Data Protection Regulation (GDPR)
" Learn about key steps in the journey towards privacy compliance and why most Australian businesses have approached privacy wrong
"Understand how these regulations can enable you to gain trust and enhance customer experiences
How can telecoms innovate with data and at the same time ensure the privacy of their customers' sensitive information?
The vast quantities of customer data held by telecoms companies present a largely untapped opportunity for business intelligence, but how can telecoms innovate with data whilst ensuring the privacy of their customers' sensitive information?
Watch this short video of Privitar Senior Account Director for Telecommunications, James Kenney, in which he talks about the privacy challenges facing telecoms companies today.
Recent legal debates about the encryption of mobile devices have elevated the topic of enterprise security and its implications on end-user privacy. For example, in the aftermath of the San Bernardino tragedy, we learned that enterprise-managed mobile devices can be remotely unlocked by the IT administrator.
To provide more insight on this complex topic, MobileIron is hosting a panel discussion with mobile security and privacy experts to share what CIOs need to know about mobile security and end-user privacy. Panelists will discuss the implications of the San Bernardino case and how this case helps illustrate best practices for balancing the need for enterprise security with respect for employee privacy.
GDPR and Beyond: The real Security and Data Life Cycle Management challenges posed and opportunities identified
This webinar covers key topics including:
-GDPR and why it matters
-Best practises framework for data privacy regulations – GDPR and others
-How to get Senior Management “on board”
-How to get started with GDPR infrastructure
-View of befits beyond GDPR
With the advent of Big Data comes not only new ways to optimise business and marketing processes, but also new concerns over the control and privacy of personal data.
These have given rise to local and regional data protection laws and regulations such as the General Data Protection Regulation (GDPR), a modernisation of data protection laws in the European Union, and the Australian data breach notification law, an amendment to the Privacy Act 1988 (Cth) which introduces a mandatory scheme for eligible organisations and federal agencies to report data breaches.
Data breach notifications give individuals greater control over their personal data and promote transparency over information handling practices, fostering consumer trust in businesses. The law requires businesses to prepare and assess risks to maintain brand confidence even if an incident becomes the next data breach headline.
Join this webinar to learn about:
- New challenges introduced by the Australian mandatory data breach notification law
- Key steps in the journey towards data privacy compliance
- How to monitor insider threats
- How to leverage these regulations to gain trust and ensure great customer experiences
We look forward to your participation in this free webinar.
Ensuring a digital presence is essential in Financial Services today. People expect a level of speed, relevance and intelligence from their banks that is unprecedented. But keeping up with the changes driven by leaner, smaller companies in a fast adapting space is a real challenge.
So how does your organization measure up? How can you reach both your retail and corporate customers to provide a seamless, relevant and efficiency experience for them? And how can you innovate with so much red-tape to get through?
Join this presentation and discover how you can:
- Break down silos preventing your digital transformation
- Analyze your security, compliance and privacy issues
- Utilize business intelligence to gain real insights
What are some of the key challenges that organisations face when adopting a Data as a Service (DaaS) approach?
How can Privacy Engineering help?
Here you can find a short video interview with David Roberts, Technical Sales at Privitar, in which he talks about some of the challenges of adopting a Data as a Service (DaaS) approach, and how best to overcome them.
Join security expert Kalani Enos for an interactive Q&A webinar on the latest trends in IoT security. Discover how effective IoT threat modeling and data privacy affects your organization.
Viewers will learn more about:
- Current IoT challenges
- How businesses are and are not recognizing security and IoT
- How IoT Threat Modeling is imperative for businesses who utilize, or plan to utilize IoT products and services within their organization
- Data Flow Diagrams and specific use cases where IoT Security is necessary
- IoT Security requirements from a regulatory / data privacy perspective
While the dawn of massive change approaches with GDPR, it’s critical for brands to be transparent and ethical with the customer data they’re handling. They must ensure that the data being collected is only used for the purposes of transforming interactions and creating better customer experiences.
And as brands scramble to orchestrate and execute their compliance plans before May 25th, many are unsure which tools, processes, internal groups and roles their organization should employ.
Sound familiar? Join to discover how to design your data supply chain for GDPR, plus:
- 4 critical components of GDPR that every brand needs to know
- 3 key GDPR roles every company should assign internally
- Best-in-class solutions to top mobile data challenges with GDPR
- Real-world examples of how employing data privacy efforts has led other brands to increased customer access to privacy controls and increased transparency to 3rd party tools
It’s crucial that data, marketing and analyst professionals focus on overall data governance, rather than just legal ramifications, and the effect that leakage and security events can have on the brand itself when it comes to GDPR compliance. Safeguard your brand and consumer trust by ensuring your compliance today.
Where is the information and sensitive personal data that may fall under these regulations?
You need to be able to quickly and cost efficiently determine what data falls in scope with GDPR, and then apply policies to move, redact, encrypt and dispose of personal data in accordance with GDPR articles.
In this session we cover:
- The regulatory challenges for Personal Data management – the seen and the unseen
- Technical implications of both Data Discovery and Programme execution
- Unstructured Data file analysis and Structured Data file analysis
- Architectural requirements to support the legal policy and compliance procedure
- How the application and enforcement of policies to manage information throughout its lifecycle can be achieved using the Micro Focus Secure Content Management suite.