Advanced Data, Digital and Security Symposium

 


Call For Speakers & Contributors

The final decision for speaker selection will be made based on a
peer review of submitted abstracts by the steering committee.

 

 

Steering Committee

The symposium steering committee will be chaired by Stewart Room.

The selected speaker community will be drawn from a broad cross-section of leading experts and will be expected to provide a detailed conference paper on their topic of circa 5000 words.

Benefits for speakers and return on investment

This symposium takes a unique approach to speaker benefits. As well as being subject to a rigorous selection process involving peer review, which emphasises the truly expert status of the speakers, by providing a written paper you will further cement your expert status in the market.

Your paper can act as a calling card for the help and assistance that you will be able to provide others, such as the buyers of expert services and support, and a reference point for press and media inquiries. We expect that speakers will gain a meaningful return on investment for their efforts in preparing a paper, in comparison to less advanced conferences.

Stewart Room

Stewart Room

Global Head of Data Protection, Privacy and Cyber Security Legal, Strategy and Consulting Services at DWF Law LLP and Technology, Media and Communications Sector Leader.

Stewart Room is a Partner at DWF, and is also a past winner of the Financial Times Legal Innovator of the Year award, co-founder of The Cyber Security Challenge UK and President of the National Association of Data Protection Officers.

Conference Tracks

To ensure that the content provides takeaways that are new, exciting and relevant to the conference we have created some sample sessions below:

Inside view

Perspectives on how an organisation or sector addresses or deals with matters of advanced legal compliance or business operations, provided by a person with deep inside knowledge or other insights of the organisation or sector being analysed. Examples of candidate speakers will include: Data Protection Officers, CISOs and Regulators.

How things work

Analysis of how network and information systems, data processing systems and technologies operate, from a functionality and purpose perspective. Examples of candidate speakers will include: Technology vendors and engineers.

Law dissected

Unpacking and deep critical analysis of a significant law or legal development, including scope and impacts. Examples of candidate speakers will include: Lawyers, Regulators and Government Policy Advisors.

Methodologies and tools

Explanation and critiques of methodologies and tools that are used for supporting the delivery of specific objectives for legal compliance and operational outcomes, including benefits and limitations. Examples of candidate speakers will include: Management Consultants and Auditors.

In comparison

A critical comparison and appraisal of options and alternatives for regulation, legal compliance and operational outcomes, with similarities and distinctions identified. Examples of candidate speakers will include: Data Protection Officers, CISOs, Regulators, Technology vendors, Lawyers, Government Policy Advisors etc.

State of the Nation

Analysis of the current state of things, such as threat and vulnerabilities, technology landscape, norms, including insights into likely medium to long term trajectory. Examples of candidate speakers will include: Data Protection Officers, CISOs, Regulators, Technology vendors, Lawyers, Government Policy Advisors etc.

Make it better

Identification of a significant problem with proposals for workable solutions and remedies, including benefits analysis and likely results. Examples of candidate speakers will include: Data Protection Officers, CISOs, Regulators, Technology vendors, Lawyers, Government Policy Advisors etc.