Speakers
- To Be Announced!, More information to follow.
Headline Sponsor:
PrivSec Amsterdam will take place on 5th-6th July 2022. The event will also be available on-demand for global viewing as part of the Digital Trust Europe Series.
PrivSec Amsterdam Agenda - Timings shown in Central European Summer Time (CEST)
CEST | Tuesday 27th September 2022 |
---|---|
09:00 | Registration Speakers
|
09:15 | |
09:30 | |
09:45 | |
10:00 | Is Google Analytics Banned in the Netherlands? More information to follow shortly... Host
Speakers
|
10:15 | |
10:30 | Re-Thinking Trusted Data The explosive growth of data and the value it creates calls on data professionals to level up their programs to build, demonstrate, and maintain trust. The days of fine print, pre-ticked boxes, and data hoarding are gone and strong collaboration from data, privacy, marketing and ethics teams is necessary to design trustworthy data-driven practices. Join us for a discussion on the latest trends in trusted data and how you can take critical steps to build trust in data practices by: Embedding privacy by design into data operations, Respecting individual choice and optimizing the ongoing relationship with consumers, Preparing for future data challenges including responsible AI and sustainability Speaker
|
10:45 | |
11:00 | |
11:05 | Break |
11:15 | |
11:20 | Breaking Down Barriers: How Data Protection and Security Teams Can Work Together More information to follow shortly... Host
Speakers
|
11:30 | |
11:45 | |
12:05 | |
12:10 | Know your Data and let it go: find it, catalogue it, destroy it! Data Retention and disposal requirements have been long oversimplified or underestimated and put aside by controllers to focus on other priorities of their Data Protection programs. The infamous line “we will keep your data for as long as it is needed” is frequently found in privacy notices in websites. Records of Processing Activities (ROPAs) have been often created in a rush and are not as complete as they could be. It is time for controllers to review their ROPAs and to bring consideration to retention. Even better, to systematise and automate the way they manage data disposal. There are plenty of collateral benefits to doing this: new or reviewed ROPAs, improved readiness to DSAR and better intelligence and damage control when Data Breaches occur. Speaker
|
12:15 | |
12:30 | |
12:40 | Lunch |
12:45 | |
13:00 | |
13:25 | Keynote: Max Schrems Keynote on The Future of Online Privacy, GDPR Enforcement and The Battle Against Surveillance More information to follow Host
Speakers
|
13:30 | |
13:45 | |
14:10 | |
14:15 | Consumer Trust and the GDPR's Transparency Requirements More information to follow shortly... Host
Speakers
|
14:30 | |
14:45 | |
15:00 | Break |
15:10 | |
15:15 | A Fresh Perspective on Data Privacy Does a good data privacy program equate to “checking the box” on compliance? Not anymore. Today’s consumers are smarter than ever, using their wallets to tell businesses what they value and who they trust. To meet people’s privacy expectations, businesses must involve key stakeholders across the organization for a multi-dimensional approach. In this packed session, we’ll unveil our latest research on what consumers care about and how it impacts the bottom line, and share a fresh approach to creating a data privacy strategy that checks ALL the boxes. Speakers
|
15:30 | |
15:45 | Data Protection Impact Assessments (DPIAs): Implementing a Target Operating Model More information to follow shortly... Host
Speakers
|
16:00 | |
16:15 | |
16:30 | Deep-Sea Phishing: Why is Phishing Gaining Sophistication and What Can Businesses Do? More information to follow shortly... Speakers
|
16:45 | |
17:00 | |
17:15 |
PrivSec Amsterdam Agenda - Timings shown in Central European Summer Time (CEST)
CEST | Wednesday 28th September 2022 |
---|---|
09:00 | Registration Speakers
|
09:15 | |
09:30 | |
09:45 | |
10:00 | Leadership and lessons learned from a military environment applied in risk management |
10:15 | |
10:30 | SaaS innovation & data exposure, the shocking truth about your cloud innovation tools The last 18 months have caused many organisations to re-examine their data security processes and policies. Cloud services are now likely to form a critical part of your operations, with many CISO’s looking out for the next Solar Winds or Log4J that has the potential to compromise their data. Our annual data risk report and latest research carried out by Forrester, unearthed some shocking truths about the state of SaaS data protection in Europe. Join John as they discuss how organisations should be approaching SaaS data security and protection, including: From ransomware attacks to data breaches, cybersecurity and data security continue to make headline news. So what’s the next “New Normal” look like for security leaders?, What are today’s strategies for bridging the needs of information security with business innovation - especially where they intersect with Salesforce, Microsoft Dynamics, and other cloud platforms?, What’s on the horizon for security leaders, such as fostering a culture of compliance, and planning ahead for audits, certifications, security remediation and more? Speaker
|
10:45 | |
11:00 | |
11:05 | Break |
11:15 | |
11:20 | Attracting the Female Leaders of Tomorrow in Data Protection and Data Security More information to follow shortly... Speakers
|
11:30 | |
11:45 | |
12:05 | |
12:10 | Make Compliance an Opportunity -Use cases from Various Industries The world generates 1,000 petabytes of data per day. Data has become a limitless resource. Data is at the core of both value and risk. Privacy is a human right and 71% of countries now have privacy laws. IT organizations need new approaches to enable privacy compliance aligned with secure and consent-based use of data assets. But why not make compliance a business opportunity while at the same time adhering to regulations? Join Cumhur Keles and hear how you can you monetise compliance. Through a series of real-world examples, you will gain insight and practical recommendations on how to grow your business by making the most of one of your most powerful and risky assets: your data. Speaker
|
12:15 | |
12:30 | |
12:40 | Lunch |
12:45 | |
13:00 | |
13:25 | Not Another DSAR: Consumer Trust, Data Subject Rights and 'Weaponised' Access Requests More information to follow shortly... Speakers
|
13:30 | |
13:45 | |
14:10 | |
14:15 | Insider Threats: Just How Trustworthy Are Your Employees? More information to follow shortly... Speakers
|
14:30 | |
14:45 | |
15:00 | Break |
15:10 | |
15:15 | International Data Transfers: Are Strict Transfer Rules Creating a "Splinternet"? More information to follow shortly... Speakers
|
15:30 | |
15:45 | |
16:00 | |
16:05 | What If Privacy Shield 2.0 Never Happens? Practical Advice On Lawful International Data Transfers More information to follow shortly... Speakers
|
16:15 | |
16:30 | |
16:45 | |
16:50 | Closing Remarks |
16:55 | |
17:00 |