Hi [[ session.user.profile.firstName ]]
Sort by:
    • IT Security & Privacy Governance in the Cloud IT Security & Privacy Governance in the Cloud Moderated by Rebecca Herold, The Privacy Professor; Jacqueline Cooney, BAH, Daniel Catteddu, CSA, Chris Griffith from HPE Recorded: Oct 18 2016 5:00 pm UTC 61 mins
    • After multiple newsworthy data breaches in recent times, IT security and privacy governance has gained importance across the globe. Most organizations have established security and compliance policies and procedures to protect their intellectual property and corporate assets, especially in the IT space. As companies transition their applications and data to the cloud, it is critical for them to maintain, or preferably surpass, the level of security they had in their traditional IT environment. Leaders are also responsible for defining policies to address privacy concerns and raise awareness of data protection within their organization, and for ensuring that their cloud providers adhere to the defined privacy policies. Failure to ensure IT Security when using cloud services could ultimately result in higher costs and potential loss of business, thus eliminating any of the potential benefits of the cloud.

      While security and privacy are related, they are also distinct. IT security is primarily concerned with defending against attacks, not all of which are aimed at stealing data, while privacy is specifically related to personal data held by an organization, which may be endangered by negligence or software bugs, not necessarily by malevolent persons. On this webinar our panel of experts will address some of the key distinctions, and discuss some best practices for managing IT security and implementing privacy governance for the cloud.

      Read more >
    • Cross-Border Data Transfers in the Real World – Privacy Shield, Now What? Cross-Border Data Transfers in the Real World – Privacy Shield, Now What? Tanya Forsheit, Partner & Co-Chair Privacy & Data Security Group, Frankfurt Kurnit Klein & Selz, PC Recorded: Oct 14 2016 3:00 pm UTC 45 mins
    • Personal data of individuals – consumers and employees – is in constant motion across international borders. Nonetheless, existing privacy laws purport to prohibit organizations in many countries from transferring data to another jurisdiction in the absence of adherence to various legal frameworks or contractual mechanisms designed to enhance the protection of personal data.

      Those legal frameworks suffered a blow last year when the European Court of Justice struck down the 15 year old Safe Harbor Framework. A year later, the EU-US Privacy Shield Framework has been approved as a replacement, and many companies have begun to certify, but the new Framework remains subject to potential legal challenge. Other European data transfer mechanisms – standard contractual clauses and Binding Corporate Rules – are also subject to legal challenge. And other jurisdictions around the globe in South America, Asia and elsewhere, are imposing restrictions on the transfer or personal data and in some cases even calling for data localization. Yet, data continues to flow in real-time.

      What does it mean in the real world? What are the real risks for multinational data owners and for service providers that process data of such data controllers? This presentation will distinguish fact from fiction and provide practical tools for companies that are struggling (understandably) to wrap their virtual arms around the world.

      Read more >
    • GDPR: La violazione dei dati nel nuovo Regolamento Europeo sulla Privacy GDPR: La violazione dei dati nel nuovo Regolamento Europeo sulla Privacy Gloria Marcoccio, Senior Advisor IT and International Privacy & Security Compliance, Simone Mola Sr Sales Engineer at Gemalto Recorded: Jun 15 2016 9:00 am UTC 64 mins
    • Fino a poco tempo fa, le leggi europee riguardanti la protezione dei dati erano principalmente focalizzate sul consenso della persona, limitazione delle finalità e trasparenza nei trattamenti, etc. mentre gli aspetti inerenti la sicurezza delle informazioni erano considerati, in linea generale, questioni squisitamente tecniche più che di conformità legale.

      Questo quadro ora cambia profondamente con l'entrata in vigore il 25 maggio 2016 del nuovo Regolamento Privacy Europeo (GDPR), e con la prossima direttiva europea sulla sicurezza delle reti e dei sistemi informativi (NIS Directive). Tra le nuove e importanti prescrizioni in tema di sicurezza del GDPR spicca in modo particolare quella della violazione dei dati personali, che richiede alle aziende di tutti i settori di effettuare in tali casi la comunicazione al Garante privacy entro 72 ore e, in particolari condizioni, anche la comunicazione senza indebito ritardo a tutte le persone interessate dalla violazione a meno che i dati non siano stati resi inintellegibili (per esempio per mezzo di crittografia). Inoltre la direttiva NIS, una volta recepita nei Paesi Membri della UE, richiederà tra l'altro agli Operatori dei Servizi Essenziali (Energia, Trasporti, Sanità, etc.) e agli Operatori di Servizi Digitali (e-commerce, motori di ricerca on line, Cloud Computing) di comunicare alle autorità competenti nazionali i casi di incidenti di sicurezza.

      L’Unione Europea vuole che la conformità alle nuove normative in materia di protezione dei dati diventi una questione prioritaria e ha così prescritto che queste regole siano soggette a pesanti multe (sono previste sanzioni fino a 20 milioni di euro, e per le imprese fino a 4% del fatturato mondiale, se superiore).

      Partecipa al webinar organizzato da Symbolic e Gemalto che si terrà il prossimo 15 giugno alle ore 11:00 per conoscere il quadro normativo applicabile e le misure da predisporre per una corretta gestione dei casi di violazioni dati.

      Read more >
    • Top 5 Things Marketers Need to Understand about Location and Privacy Top 5 Things Marketers Need to Understand about Location and Privacy Greg Sterling, Opus Research; Jules Polonetsky, Future of Privacy Forum Recorded: Jul 2 2014 5:00 pm UTC 47 mins
    • Consumers are ambivalent about online privacy. Some surveys suggest outright hostility to mobile-location tracking; others argue users are happy to share personal information for clear rewards and benefits. Consumers also express a desire for greater personalization of online, mobile and shopping experiences. How can these contradictory positions be reconciled?

      The privacy landscape is evolving rapidly with Apple making location privacy changes in iOS 8 and state governments getting involved in regulating privacy in the absence of federal action.

      Rather than an “issue that will blow over,” privacy has become a central discussion for marketers and brands. It’s the flipside of “big data.” But timidity, passivity and denial won’t work. Stakeholders must proactively tackle the issue head on.

      Join Greg Sterling, Senior Analyst with Opus Research, and Future of Privacy Forum founder Jules Polonetsky for an informative, interactive webinar about the latest developments in location and privacy on Wednesday, July 2, 10 am PDT /1 pm EDT.

      Read more >
    • Challenges in Achieving Global Privacy: Latest Compliance Changes Challenges in Achieving Global Privacy: Latest Compliance Changes Jan-Boris Wojtan, EALA Data Privacy Lead, Accenture Recorded: Apr 8 2010 8:00 am UTC 48 mins
    • This session will look at some of the recent changes in the regulatory landscape as well as what we can anticipate in the near future. We will try to discern any trends in these developments and discuss how a global company could respond.

      Boris joined Accenture in April 2007 and is Responsible for data privacy compliance in the EALA (Europe Africa and Latin America) region. His duties include helping to establish and maintain a progressive Client Data Protection Programme, advising on client and vendor contracts, carrying out privacy impact assessments on new client offerings or new internal systems, managing a network of DPOs, liaising with regulators, promoting Accenture’s BCR application, anticipating regulatory changes and making sure the business stays compliant.

      Before moving to Accenture, Boris spent three years at the UK regulator, the Information Commissioner, looking at the world through the eyes of the game keeper, where he advised on data privacy and freedom of information case work and liaised with other European regulators to kick start an unprecedented approvals process known as ‘Binding Corporate Rules’.

      His other experience includes six years in private practice as a commercial lawyer specialising in Data Privacy matters and three years in Brussels including spells as press officer of a parliamentary group, an assistant to an MEP, a paralegal at Lovell White Durrant and a stagiaire at the Internal Market Directorate General of the European Commission.

      Read more >
    • Privacy Law Changes are Looming – Do You Have a Game Plan? Privacy Law Changes are Looming – Do You Have a Game Plan? Jim Parker, Dell Inc. Recorded: May 24 2016 7:45 am UTC 23 mins
    • Proposed new privacy regulations in Europe threaten harsh fines for mismanaging digital customer data across international borders. Many believe it is only a matter of time before these type of strict regulations come to the U.S. What can global brands do to protect themselves and stay ahead of the game? Attend this session to learn what Dell is doing to navigate global legislation, protect consumers, and provide a safe and secure online consumer experience. In this session, you will learn how privacy laws are evolving, and what the key considerations are for implementing an effective online privacy framework.

      Read more >
    • Privacy and/or Security – It’s a Matter of Perspective! Privacy and/or Security – It’s a Matter of Perspective! Michael Lester, Chairman & Co-founder of SecretValet LLC Recorded: Oct 13 2016 5:00 pm UTC 41 mins
    • Germany and France have “Declared War” on encryption in the name of national security and fighting terrorism at the same time that Apple and Microsoft have increased their encryption to ensure privacy. The twin concepts of Privacy and Security seem to be at odds with each other with governments primarily pushing for less personal privacy to provide greater national security while private corporations are pushing for more personal privacy claiming that personal privacy has little to no effect on national security or the fight against terrorism. How can both be right/wrong? How is it trending? Join us for a look at where we are now, how we got here, why most people are asking the wrong questions, and how the outcome of this battle will affect individuals, corporations, and countries alike.

      Read more >
    • The Web Browser: A Security & Privacy Train Wreck The Web Browser: A Security & Privacy Train Wreck Brian Zaugg, Director Information Security at Authentic8 Recorded: Oct 11 2016 6:00 pm UTC 49 mins
    • The web browser is arguably the most utilized software on any given endpoint. The browser has evolved into a feature-rich tool used to consume & create content of all kinds, conduct financial transactions, access sensitive health care information -- you name an application and data type and someone has a browser based solution.

      Browsers are also the least managed software in the enterprise. Most IT shops have abdicated control of the browser. Bolt-on browser security solutions, like proxies and application firewalls, rest on the enterprise perimeter and, in our mobile BYOD world, ultimately still leave the endpoint, the user, and the user's data exposed.

      There is a natural tension between the browser, enterprise IT security, and privacy. The browser exposes the user and the user's data to both security and privacy risks. Security and privacy objectives may overlap; but, they are just as often at odds. For example, most enterprises conduct content inspection and blocking of user browsing activity; few enterprises encourage or allow a user to take advantage of TOR and other anonymization and privacy technologies. Meanwhile, enterprise and user confidential data is the treasure that bad guys are hunting.

      Read more >