Hi [[ session.user.profile.firstName ]]

Emerging Data Privacy and Security for Cloud

Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data.

The good news is that these data privacy regulations compel businesses to get a handle on personal data — how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers.

Join this interactive webinar to learn more about:
- The latest trends and strategies for securing sensitive data in cloud and the enterprise
- How to discover and capture your data inventory
- What’s needed to prevent a data breach by securing your critical data and protect your reputation
Recorded Aug 19 2019 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ulf Mattsson, Head of Innovation, TokenEx
Presentation preview: Emerging Data Privacy and Security for Cloud

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Data Privacy in 2020 and Beyond Jun 17 2020 3:00 pm UTC 60 mins
    Mali Yared, Robert Razavi, Baber Amin, Lori Robinson & Elliot Dellys
    Is your organization aware of the main differences in data regulations around the world?

    Join this panel of industry leaders for an interactive Q&A roundtable to get a comprehensive look into the different data privacy and security requirements. The panel will also discuss what to expect in 2020 and beyond.

    Viewers will learn more about:
    - What's new on the data privacy and compliance landscape
    - Main differences between data regulations around the world and what this means for your organization
    - Expert recommendations regarding best tools and practices for achieving and maintaining compliance
    - The future of data privacy
    - What to expect in 2020 and beyond

    Mali Yared, Practice Director, Cybersecurity and Privacy, Coalfire (Moderator)
    Robert Razavi, Senior Security Architect CTO Office, IBM Canada
    Baber Amin, CTO West, Ping Identity
    Lori Robinson, Sr. Director, Product & Market Strategy, SailPoint
    Elliot Dellys, Director, Strategic Consulting, Trustwave
  • Privacy in the Time of COVID Recorded: May 22 2020 58 mins
    Chenxi Wang | Vishwanath Raman | Michelle Dennedy | Tom Pendergast
    In the fight against COVID-19, countries are taking urgent actions to address the crisis. Some are turning to tech to find solutions for containing the spread of the virus. Digital contact tracing, in particular, is gaining a lot of traction. For example, Apple and Google recently announced a rare collaboration to jointly facilitate contact tracing within their mobile platforms for public health monitoring applications.
    So, what does this mean for privacy? 
    While some efforts are being made to preserve user privacy, like not tracking user location or collecting other identifying information, digital contact tracing can still reveal more user information than necessary.

    Join this panel of security and privacy experts lead by Chenxi Wang to learn more about the different implications associated with digital contact tracing, how it is being used around the world, and the long-term effects of COVID-rushed decisions.

    - Chenxi Wang, Founder & General Partner of Rain Capital
    - Vishwanath Raman, Lead, Privacy Technologies, Oasis Labs
    - Michelle Dennedy, CEO Drumwave
    - Tom Pendergast, Chief Learning Officer, MediaPRO
  • The PCI Dream Team Celebrates GDPR's 2nd Anniversary Recorded: May 13 2020 61 mins
    Ben Rothke | David Mundhenk | Jeff Hall | Arthur Cooper "Coop"
    May 2020 marks the 2nd anniversary since EU's General Data Protection Regulation (GDPR) came into effect. How has the world of regulations changed in the last two years, and what else can we expect on the privacy and compliance landscape?

    Join the PCI Dream Team as they celebrate GDPR's 2nd birthday - while social distancing from home - with a fun and insightful Q&A discussion on all things GDPR, CCPA & PCI DSS.

    Grab a seat, eat some cake and bring us your toughest compliance-related questions.

    Our panelists are some of the top PCI QSA’s in the country, with decades of combined PCI and card processing experiences. They’ve seen it all: the good, bad and ugly; and lived to tell the tale.
  • Coronavirus & Surveillance: How To Protect Privacy Sensitive Data Recorded: Apr 29 2020 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    In Singapore, the Government launched an app using short-distance Bluetooth signals to connect one phone using the app with another user who is close by. It stores detailed records on a user's phone for 21 days decrypt the data if there is a public health risk related to an individual's movements.

    China used a similar method to track a person's health status and to control movement in cities with high numbers of coronavirus cases. Individuals had to use the app and share their status to be able to access public transportation.

    The keys to addressing privacy concerns about high-tech surveillance by the state is de-identifying the data and giving individuals control over their own data. Personal details that may reveal your identity such as a user's name should not be collected or should be protected with access to be granted for only specific health purposes, and data should be deleted after its specific use is no longer needed.

    We will discuss how to protect privacy sensitive data that is collected to control the coronavirus outbreak.
  • Data Protection & Privacy During the Coronavirus Pandemic Recorded: Apr 2 2020 61 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    Remote work is quickly becoming the new normal and criminals are taking advantage of this chaotic situation.

    The EU Agency for Cybersecurity's providing guidance for the huge increases in the number of people working remotely, using tele-health it is vital that we also take care of our cyber hygiene.

    Viewers will learn more about:
    - How to use encryption, controlling new storage of regulated data and data sharing in this new situation.
    - Anonymization leaves personal data open to re-identification, which exposes firms to GDPR non-compliance risks.
    - How are the HIPAA rules changing in this situation?
    - GDPR prescribing pseudonymization and how is that work.
    - How is CCPA changing the rules?
    - How to secure wi-fi connections preventing snooping of your traffic and fully updated anti-virus and security software, also on mobile phones.
    - How important files can be backed up remote or locally. In a worst case scenario, staff could fall foul of ransomware for instance.
    - What apps are secure to use in this new era?
    - Should we use MFA, PW managers or local PW management?

    We will also discuss how to use the CERT-EU News Monitor to stay updated on the latest threats and check the following basics.
  • CCPA Compliance Beyond Deadline Day Recorded: Mar 10 2020 58 mins
    Guy Cohen | Lisa Hawke | Joanne Furtsch | Laura Koulet
    The California Consumer Privacy Act (CCPA) went into effect on January 1st 2020, yet there is still confusion and uncertainty regarding this data regulation, especially for businesses operating in a post-GDPR world.

    Are you familiar with the CCPA's privacy requirements? Is your organization ready for the most far-reaching data privacy regulation in the U.S. to date? 

    Join this panel of privacy experts for an interactive Q&A session to learn more about how CCPA will impact your organization, as well as dive into the main differences between CCPA and GDPR.
    - The CCPA privacy requirements- CCPA checklist beyond deadline day
    - Data mapping: how and why it is important for CCPA and GDPR
    - Data Subject Access Requests 
    - Other key similarities and differences between GDPR vs. CCPA
    - The future of privacy and compliance in 2020 and beyond

    - Guy Cohen, Strategy and Policy Lead, Privitar
    - Lisa Hawke, VP Security and Compliance, Everlaw
    - Joanne Furtsch, Director, Privacy Intelligence Development, TrustArc
    - Laura Koulet, Vice President, Head of Legal & Privacy, Tapad
  • [PANEL] IoT Security in 2020 Recorded: Feb 12 2020 61 mins
    Peter Wood, Terence Jackson, Brian Russell & Alexandre Blanc
    With the proliferation of the Internet of Things, IoT devices are often added into enterprise environments without due consideration for the security and privacy risks they pose to the business. Oftentimes, IT security teams do not have full visibility into how many IoT devices are connected to the network. This creates security gaps, as IoT devices are notoriously vulnerable to hacks and attacks.

    Join this interactive panel experts to learn about how enterprises can enhance endpoint, and therefore IoT security.

    Attendees will learn more about:
    - IoT and today's enterprise
    - What's on your network? How do you evaluate IoT devices?
    - Why visibility is key
    - Controlling access to your IoT environment
    - Vendor risk and holding vendors accountable for their IoT equipment
    - Areas for automation and where to reduce your IT security team's involvement
    - Patching and upgrading
    - Expert recommendations for enhancing IoT security

    Peter Wood, Partner, Naturally Cyber LLP (Moderator)
    Terence Jackson, CISO, Thycotic
    Brian Russell, IoT Working Group Co-Chair, Cloud Security Alliance (CSA)
    Alexandre Blanc, Director of Security, Adaware (an Avanquest company)
  • Stopping Cyber Attacks From The Inside Recorded: Feb 11 2020 56 mins
    Dan Lohrmann Chief Strategist & Chief Security Officer at Security Mentor, Inc
    How can you deal with insider threats? IBM's new insider threat report found 204 companies surveyed experienced a total of 4,716 insider attacks in one year. Incidents continue to increase in frequency and cost. The frequency of incidents per company has tripled since 2016 and the average cost is now $871,686.

    This session will cover some recent cyberattacks against people, organizations and governments. How they were successful? Also, this webinar covers solutions on phishing, emails, and important actions organizations can take to protect themselves and build a culture of security.
  • Mitigating the Cyber Security Risk with SIEM and SOC Recorded: Feb 10 2020 43 mins
    Senthil Palaniappan, Kumar Kanniappan & Kalai Chellappan
    Securing sensitive information is the top priority and organizations are investing in the best approaches to reduce breaches. One of the best ways to minimize cyber security threats is through implementing SOC/SIEM in your network. With cyber attacks evolving rapidly, SOC focuses on the best approach to tackle these threats.

    - SOC as a service
    - Core components of SOC/SIEM?
    - How SOC helps to stop or mitigate Ransomware attacks
    - Best approach to deploy and mature SOC services
    - How to choose the right SOC vendor for your organization

    Senthil Palaniappan, Founder and CEO, Sennovate Inc
    Kumar Kanniappan, Lead Solution Architect, Sennovate Inc
    Kalai Chellappan, Solution Architect, Sennovate Inc
  • Holistic InfoSec: Achieving Real Information Security Program Results Recorded: Jan 29 2020 36 mins
    Diane Jones, Director of Cyber Risk, Kalles Group
    Too often, Information Security means technical point solutions. This approach leaves enterprises exposed and management and customers disillusioned.

    Join us to learn:

    - Why security programs remain on the margins of business adoption in spite of heightened threats and acknowledged need
    - Why security by technology alone is a dead end
    - The secret sauce for a vibrant, effective information security program
  • What to expect in 2020: Regulatory Compliance in Privacy & Cybersecurity Recorded: Jan 28 2020 46 mins
    Kevin Kim, CIPP/C, CIPT, CIPM, FIP former Chief Privacy Officer, Canadian Western Bank Financial Group
    The General Data Protection Regulation (GDPR) has been making far more influence on the privacy landscape online than expected since its enactment by the European Union (EU) on May 25th, 2018.

    Google and Facebook, two of the most powerful digital platforms, were heavily scrutinized and penalized with hefty fines for their non-compliance in the European market. GDPR has also driven many countries, such as Japan, Brazil, and South Korea, to follow suit by strengthening their privacy laws. All 50 states in the United States have also joined the camp by amending their privacy laws - albeit to varying degrees - to make privacy breach reporting mandatory.

    Most notably, the State of California developed its own GDPR-style privacy law called “California Consumer Protection Act” (CCPA) and will enact in January 2020. Moreover, two federal privacy bills were recently submitted to the Congress aiming to be the very first federal-level, comprehensive privacy law in the U.S. Canada is no exception in this privacy-aware trend. The ruling liberal party made clear that modernizing privacy legislation to protect citizens online will be one of the party’s priorities.

    This presentation will talk about current trends in privacy field in terms of regulatory requirements in the U.S., Canada, and Europe, discuss what to expect in 2020, and what to do to make sure that all the organizations and institutions are compliant with applicable laws and regulations in their jurisdiction.
  • Holistic InfoSec: Achieving Real Information Security Program Results Recorded: Jan 28 2020 37 mins
    Diane Jones, Director of Cyber Risk, Kalles Group
    Too often, Information Security means technical point solutions. This approach leaves enterprises exposed and management and customers disillusioned.

    Join us to learn:

    - Why security programs remain on the margins of business adoption in spite of heightened threats and acknowledged need
    - Why security by technology alone is a dead end
    - The secret sauce for a vibrant, effective information security program
  • Data Privacy Day - Emerging PCI DSS v4 Data Security & Privacy for Hybrid Cloud Recorded: Jan 28 2020 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    The upcoming PCI DSS version 4.0 will include many new or revised requirements and compensating controls will be removed It will include support for a range of evolving payment environments, technologies, and methodologies for achieving security. PCI DSS v4.0 further supports the use of different new technologies. The new validation option gives organizations the flexibility to take a customized approach to demonstrate how they are meeting the security intent of each PCI DSS requirement. This customized approach supports organizations using security approaches that may be different than traditional PCI DSS requirements.

    Through customized validation, entities can show how their specific implementation meets the intent and addresses the risk. Unlike compensating controls, customized validation will not require a business or technical justification for meeting the requirements using alternative methods, as the requirements will now be outcome-based.

    We will discuss how PCI DSS v4 may impact:

    - Implementation of the new “Customized Controls”
    - Cloud implementations
    - Compliance cost
    - Changes in liability
    - Relation to the 49 new US State Laws
    - PII and PI privacy
    - Measure data re-identifiability for pseudonymization.
    - Apply data protection to discovered sensitive data
  • Data De-identification: Protecting Privacy While Preserving Utility Recorded: Jan 28 2020 48 mins
    John Noltensmeyer, Head of Privacy and Compliance Solutions, TokenEx
    As organizations evaluate their de-identification and data minimization practices to satisfy an expanding landscape of regulatory obligations there are a number of factors to consider. Various technologies will be considered as part of a data-centric security strategy for de-identifying and securing sensitive information such as statistical tools, cryptographic solutions, suppression, pseudonymization, generalization, and randomization. Further, we will examine the capability of these technologies to preserve business utility within a Zero Trust data security model.

    Listen to this session and you will take away:

    • An understanding of the definition of de-identification as it relates to international and industry privacy regulations, including the difference between pseudonymization and anonymization
    • A strategy for balancing privacy and security concerns with business needs, such as evaluating and prioritizing risk
    • How various methods of de-identification can help meet the privacy requirements of applicable compliance obligations
  • Data Privacy Day - PCI Dream Team: Ask Us Your Toughest Questions Recorded: Jan 28 2020 60 mins
    Ben Rothke | David Mundhenk | Jeff Hall | Arthur Cooper "Coop"
    The PCI Dream Team is back for another interactive Q&A session.

    Join us with your toughest questions and learn more about the various Payment Card Industry (PCI) standards and requirements, with a focus on PCI DSS v4.0.

    Our panelists are some of the top PCI QSA’s in the country, with decades of combined PCI and card processing experiences. They’ve seen it all: the good, bad and ugly; and lived to tell the tale.

    Join Ben Rothke, David Mundhenk, Arthur Cooper, and Jeff Hall for an interactive Q&A session, and get answers to your most vexing PCI questions. No PCI question is out of bounds.

    - Ben Rothke, Senior Information Security Specialist at Tapad
    - David Mundhenk, Senior Security Consultant at Herjavec Group
    - Jeff Hall, Senior Consultant with Online Business Systems
    - Arthur Cooper "Coop", Senior Security Consultant at NuArx
  • How Private is My Healthcare Data? Surprise! Recorded: Jan 28 2020 59 mins
    Debra Baker | Ellie Daw | Michelle Finneran Dennedy | Karen Schnell | Anna Kirkland Smith
    Join well-known women in privacy and cybersecurity for an exclusive keynote panel on ransomware and IoT threats to healthcare data, and steps to take in 2020 to better secure it.

    Viewers will also learn about Google’s Project Nightingale, as well as have the opportunity to ask questions during the live webinar.

    - Debra Baker, CISSP CCSP, Host and Technical Program Manager at RedSeal
    - Ellie Daw, Research Scientist at Crimson Vista, Inc.
    - Michelle Finneran Dennedy, CEO at DrumWave
    - Karen Schnell, Cybersecurity Business Architect and Adjunct Professor in Computer Science
    - Anna Kirkland Smith, Data Scientist, MetLife

    This keynote panel is part of International Data Privacy Day 2020 and will be available Live on January 28th, as well as an on-demand.

    Data Privacy Day is an international effort to create awareness about the importance of respecting privacy, safeguarding data and enabling trust.
  • The Emerging PCI DSS and NIST Standards Recorded: Jan 28 2020 61 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    The Payment Card Industry Data Security Standard (PCI DSS) and the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework share the common goal of enhancing data security. This session maps PCI DSS to the NIST Framework and discuss how to align security efforts to meet objectives in both PCI DSS and the NIST Framework.

    PCI DSS is focused on the unique security threats and risks present in the payments industry

    The NIST Framework provides an overarching security and risk-management structure with security Functions, Categories, and Subcategories of actions. These Subcategories reference globally recognized standards for cybersecurity.

    Both PCI DSS and the NIST Framework are solid security approaches that address common security goals and principles as relevant to specific risks.

    We will discuss how the NIST Framework identifies general security outcomes and activities, and how PCI DSS provides specific direction and guidance on how to meet security outcomes for payment environments.

    This session will also discuss the interesting attribute based access control (ABAC) as a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, environment conditions against policy, rules, or relationships that describe the allowable operations for a given set of attributes. This session also provides considerations for using ABAC to improve information sharing within organizations and between organizations while maintaining control of that information.
  • Data Privacy Day - Privacy 2020: A Millennial Perspective Recorded: Jan 28 2020 41 mins
    Deveeshree Nayak, IT Security Professional
    Webinar Take-Aways:

    - What millennials think about privacy and What’s their expectation?
    - Diversity in Privacy in 2020
    - Impact on Criminology and Criminal Justice System in Privacy.
    - Career in Privacy

    About the Speaker:
    Deveeshree Nayak
    Faculty, School of Engineering & Technology (SET)
    University of Washington, Tacoma

    Disclaimer: My views in this webinar are my own.
  • Data Privacy Day - Privacy of Health Information, an IFHIMA Global Perspective Recorded: Jan 28 2020 38 mins
    Lorraine M. Fernandes, RHIA | Jean L. Eaton, Practical Privacy Coach, Information Managers
    The increasingly mobile, rapidly digitizing world of data is transforming all aspects of information and leading to new policies and regulations to support data privacy.

    Beyond its primary purpose of improving personal healthcare outcomes, health data is being used for a wide range of purposes from improving population health, disease surveillance and the study of health economics. There are dramatic changes in how patients, consumers, or individuals access and use their health data. And, new technologies such as machine learning, artificial intelligence and biometric authentication are further compounding health information privacy challenges. Now more than ever, it is critical that the privacy of health information be protected.

    Lorraine Fernandes and Jean L. Eaton will share:

    - The role of The International Federation of Health Information Management Associations (IFHIMA)
    - he need for a privacy information sharing agreement (ISA) explored in the IFHIMA healthcare whitepaper
    - High level overview of global privacy trends impacting healthcare
    - Why privacy is a priority for business leaders in 2020
    - The importance of a privacy management program and privacy awareness training to protect personal information and secure critical data assets
    - Prepare for emerging privacy trends

    Register here (https://ifhima.org/sign-up-for-ifhima-global-news-whitepaper-and-events/) to receive this free white paper and learn more about IFHIMA.

    Lorraine M. Fernandes, RHIA, Principal, Fernandes Healthcare Insights
    President, International Federation of Health Information Management Associations (IFHIMA)

    Jean L. Eaton, BA Admin (Healthcare), CHIM, Practical Privacy Coach, Information Managers Ltd.
  • When Privacy Compliance "Gets Stuck": Dos and Don'ts of Privacy Operations Recorded: Jan 28 2020 22 mins
    Adrienne Allen, Head of Security GRC and Privacy, Coinbase
    Companies today are increasingly aware of their privacy compliance obligations, including the emerging requirements from recent regulations like GDPR and California's CCPA. Most companies that invest in a privacy compliance uplift spend time on policy revisions, data subject rights tooling, training, and data discovery. But after the first rush of compliance activities, the challenges of privacy operations evolve:

    - How do you get beyond point in time compliance into managing repeatable processes?
    - What existing teams and operations should privacy leverage right away, and how should this change over time?
    - How do you prioritize updates to your data subject rights tooling, whether you've custom built or outsourced?
    - How do you avoid privacy fatigue?

    This webinar will cover common areas where privacy compliance can "get stuck," and discuss ways to successfully operationalize a growing privacy program at the speed of business.

    Presenter Info: Adrienne Allen, Head of Security GRC and Privacy, Coinbase
Expert interviews, panels and webinar presentations on Privacy
Learn all about privacy and what it means to different professionals. Discover why investing in privacy and cyber security makes business sense.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Emerging Data Privacy and Security for Cloud
  • Live at: Aug 19 2019 12:00 pm
  • Presented by: Ulf Mattsson, Head of Innovation, TokenEx
  • From:
Your email has been sent.
or close