PrivSec Global

 

Headline Sponsor

OneTrust

 

AGENDA

29th & 30th June 2022

 

REGISTER FOR PRIVSEC JUNE 2022

PrivSec Global brings together leading experts from around the globe, for a 2-day livestream experience that ensures attendees have access to the latest information, guidance and advice on data protection, privacy and security.

PrivSec Global returns on 29th & 30th June 2022, and will once again deliver a carefully curated agenda that taps into the expertise of subject matter experts, industry leaders and academics.

Session times shown below in Greenwich Mean Time (GMT). All sessions will be recorded and available on-demand.

Agenda - 29th June 2022

Day 1, Steam 1&2

(Timings shown in British Summer Time (BST)

Day 1 - Stream 1: Wednesday 29th June 2022

PrivSec Global Agenda | Timings shown in British Summer Time (BST)

Scroll left/right to view

BST Wednesday 29th June 2022
08:00

Data Protection Update: Asia-Pacific
08:00 AM - 08:45 AM

More information to follow shortly...

Speakers

08:15
08:30
08:45
09:00

Building a Privacy Management Program
09:00 AM - 09:45

More information to follow shortly...

Host

Speakers

09:15
09:30
09:45
10:00

Sponsored Session
10:00 AM - 10:30 AM

More information to follow shortly...

Speaker

10:15
10:30

Sponsored Session
10:30 AM - 11:00 AM

More information to follow

Speakers

10:45
11:00

Conducting a Transfer Impact Assessment: Best Practice
11:00 - 11:45

More information to follow shortly...

Speakers

11:15
11:30
11:45
12:00

Break
12:00 - 12:45

12:15
12:30
12:45
13:00

Why Effective Process and Governance is as Important as Technology When IAM issues arise
13:00 - 13:45

When IAM issues arise, organizations often lean too heavily on implementing technology with the idea that it will solve all issues related to identity and access. This leads to short-term solutions with an incomplete understanding of the real business need and accompanying requirements, and issues often resurface. Organizations investing too heavily in technology often have a limited view on the overall business value of IAM initiatives and thus struggle to realize maximum gains. Successful IAM programs look to focus efforts on the strategy, process and governance of an IAM program first, then tackle technology with all the right requirements in place.

Effective process and governance helps remediate elements outside of technology, such as organizational structure, risk management, and standard procedures and processes. Complying with existing IAM standards, such as managing privileged accounts through an enterprise IAM tool, can be enforced without the use of technology by utilizing existing enterprise gates, like change management processes, release management or a system development lifecycle. Root problems often lie within the process and governance in place (or the lack thereof), which make up organizations’ IAM. Increasing the focus on establishing IAM methodologies and governance frameworks, reengineering processes, improving standards, and employing playbooks will have long-term benefits to organizations.

Speakers

13:15
13:30
13:45
14:00

Sponsored Session
14:00 - 14:30

More information to follow shortly...

Speakers

14:15
14:30
14:45
15:00

Third-Party Risk: Ensuring Supply Chain Visibility
15:00 - 15:34

More information to follow shortly...

Host

  • Matt Collinge, Data Protection Lead, Royal & Sun Alliance Insurance Ltd.

Speakers

15:15
15:30
15:45
16:00

Privacy Enhancing Technologies (PETs): Looking Beyond the Hype and Leveraging the Benefits
16:00 - 16:45

More information to follow

Speakers

16:15
16:30
16:45
17:00

Nation-State Cyber Attacks: Russia, China and the Destabilised Future
17:00 - 17:45

More information to follow shortly...

Speakers

17:15
17:30
17:45
18:00

Break
18:00 - 18:45

18:15
18:30
18:45
19:00

Prepare for Schrems III? Unpacking the Trans-Atlantic Data Privacy Framework
19:00 - 19:45

More information to follow

Speakers

19:15
19:30
19:45
20:00

The Ukraine Refugee Crisis: Why Data Protection Matters
20:00 - 20:45

More information to follow

Speakers

20:15
20:30
20:45

Day 1 - Stream 2: Wednesday 29th June 2022

PrivSec Global Agenda | Timings shown in British Summer Time (BST)

Scroll left/right to view

BST Wednesday 29th June 2022
08:00

Vendor Risk Management: Can You Trust Vendor Risk Questionnaires?
08:00 AM - 08:45 AM

More information to follow shortly...

Speakers

Speakers

08:15
08:30
08:45
09:00

Data Retention and Minimisation: Best Practice
09:00 AM - 09:45

More information to follow shortly...

Host

Speakers

09:15
09:30
09:45
10:00

Break
10:00 AM - 10:45 AM

10:15
10:30
10:45
11:00

Choosing the Right Cybersecurity Framework
11:00 AM - 11:45 AM

More information to follow

Speakers

  • Agnidipta Sarkar, Group CISO, Biocon Ltd.
  • Andreas von Grebmer, Information Security & Risk Advisor, Wizlynx Group and interim Head Information Security Sefar (CISO), Sefar Group
11:15
11:30
11:45
12:00

Sponsored Session
12:00 AM - 12:45

More information to follow shortly...

Speakers

12:15
12:30
12:45
13:00

Digital Identity: Will We Ever See a World Without Passwords?
13:00 - 13:45

More information to follow shortly...

Speaker

13:15
13:30
13:45
14:00

Break
14:00 - 14:45

14:15
14:30
14:45
15:00

Security Risks in Web3 and the Metaverse
15:00 PM - 15:45

More information to follow shortly...

Speakers

  • Justin Daniels, General Counsel/Cybersecurity/Data Protection, Baker Donelson
15:15
15:30
15:45
16:00

Maintaining an Effective and Efficient Record of Processing Activities (ROPA)
16:00 - 16:45

More information to follow shortly...

Host

Speakers

16:15
16:30
16:45
17:00

Should Everyone Have a Digital Identity?
17:00 - 17:45

More information to follow

Speakers

17:15
17:30
17:45
18:00

Sponsored Session
18:00 - 18:45

More information to follow shortly...

Speakers

18:15
18:30
18:45
19:00

Should Society Tolerate Widespread Use of Facial Recognition?
19:00 - 19:45

More information to follow shortly...

Host

Speakers

19:15
19:30
19:45
20:00

Data Protection Update: United States
20:00 - 20:45

More information to follow

Speakers

20:15
20:30
20:45

Agenda - 30th June 2022

Day 2, Steam 1&2

(Timings shown in British Summer Time (BST)

Day 2 - Stream 1: Thursday 30th June 2022

PrivSec Global Agenda | Timings shown in British Summer Time (BST)

Scroll left/right to view

BST Thursday 30th June 2022
08:00

Insider Threats: Detecting and Mitigating the Threat From Within
08:00 AM - 08:45 AM

More information to follow shortly...

Speakers

08:15
08:30
08:45
09:00

Data Protection Update: United Kingdom
09:00 AM - 09:45

More information to follow shortly...

Host

Speakers

09:15
09:30
09:45
10:00

Sponsored Session
10:00 AM - 10:30 AM

More information to follow shortly...

Speaker

10:15
10:30

Sponsored Session
10:30 AM - 11:00 AM

More information to follow

Speakers

10:45
11:00

Beyond the US: A Look At Transfers to Other Third Countries
11:00 AM - 11:45

More information to follow shortly...

Speakers

11:15
11:30
11:45
12:00

Break
12:00 - 12:45

12:15
12:30
12:45
13:00

Using First-Party Data In the Post-Cookie Landscape
13:00 - 13:45

More information to follow shortly...

Speakers

13:15
13:30
13:45
14:00

Sponsored Session
14:00 - 14:30

More information to follow shortly...

Speakers

14:15
14:30
14:45
15:00

Can Privacy Enhancing Technologies (PETs) Solve the Data Transfer Puzzle?
15:00 - 15:34

More information to follow shortly...

Host

Speakers

15:15
15:30
15:45
16:00

Cyber Insurance: The Looming Systemic Crisis
16:00 - 16:45

More information to follow

Speakers

  • Bill Mew, Founder and CEO, Crisis Team
16:15
16:30
16:45
17:00

Break
17:00 - 17:45

17:15
17:30
17:45
18:00

NFTs: Just a Craze or Here to Stay?
18:00 - 18:45

More information to follow shortly...

Speakers

  • Luca Egitto LL.M., Avvocato specializzato in proprietà intellettuale e information technology at RP Legal & Tax
18:15
18:30
18:45
19:00

Data Centres: Just How Bad Is the Environmental Impact?
19:00 - 19:45

Data minimisation and storage limitation are key principles of data protection. But alongside the impact on privacy, minimising the amount of personal data you're processing has another benefit: reducing carbon emissions.

Is the environment paying an unacceptable price for the expansion of the digital ecosystem and the increasingly vital role of data to many businesses? Or is the shift to the cloud creating a more efficient way to process large amounts of data?

Speakers

19:15
19:30
19:45
20:00

How to Avoid Software Supply Chain Attacks
20:00 - 20:45

More information to follow

Speakers

20:15
20:30
20:45

Day 2 - Stream 2: Thursday 30th June 2022

PrivSec Global Agenda | Timings shown in British Summer Time (BST)

Scroll left/right to view

BST Thursday 30th June 2022
08:00

The Dangers of AI-Driven Mass Surveillance
08:00 AM - 08:45 AM

Artificial intelligence is driving huge improvements in fields as diverse as medicine and climate monitoring. But from biometric identification to "social credit" scoring systems, AI is also providing new ways for governments and large corporations to track and surveil people—with significant implications for their privacy and freedom.

How is AI contributing to the mass surveillance of vulnerable populations? What role is the private sector playing in supporting—and resisting—such activities? And can regulation catch up with the worrying advancements already made in this field?

Speakers

08:15
08:30
08:45
09:00

Exploring the Updates to ISO/IEC 27001
09:00 AM - 09:45

More information to follow shortly...

Host

Speakers

09:15
09:30
09:45
10:00

Break
10:00 AM - 10:45 AM

10:15
10:30
10:45
11:00

Is Google Analytics Now Illegal in the EU?
11:00 AM - 11:45 AM

More information to follow

Speakers

  • Dotan Hammer, Partner - Internet, Cyber & Copyright Practice Group
11:15
11:30
11:45
12:00

Sponsored Session
12:00 AM - 12:30

More information to follow shortly...

Speakers

12:15
12:30

Sponsored Session
12:30 - 13:00

More information to follow shortly...

Speaker

12:45
13:00

To Manage or Not to Manage: Reconciling Bring Your Own Device (BYOD) with the Corporate Network
13:00 - 13:45

To manage or not to manage—there really is no choice between the two for today’s enterprises. Employees, contractors, partners, and others are bringing in personal devices and connecting to the corporate network for professional and personal reasons.

The challenge with BYOD is not whether outside devices are brought into the enterprise network, but whether IT can react quickly enough to protect the organization’s business assets—without disrupting employee productivity and while offering freedom of choice.

Nearly every company has some sort of BYOD policy that allows users to access secure resources from their own devices. However, accessing internal and SaaS applications on a mobile device can be more cumbersome than doing so from a networked laptop or desktop workstation. In addition, IT staff may struggle to manage who has access privileges to corporate data and which devices they’re using to access it.

Speakers

  • Alexis Perdereaux-Weekes, CISA, CISM, CRISC, Msc, Associate Reserch Fellow, Americas Institute for Cybersecurity Leadership.
  • Joel Schwarz, J.D., CIPP, CDPSE, Director, Privacy & Data Protection Lead, MBL Technologies
  • Manuel Garat Loureiro, Head of IAM (Identity and Access Management), booking.com
13:15
13:30
13:45
14:00

Break
14:00 - 14:45

14:15
14:30
14:45
15:00

The Changing Role of the CISO
15:00 - 15:45

More information to follow shortly...

Host

Speakers

  • Jigar Shah, Head of Identity Access Management, R1RCM.
15:15
15:30
15:45
16:00

Best Practices for Detecting, Preventing and Recovering From Ransomware
16:00 - 16:45

More information to follow

Speakers

16:15
16:30
16:45
17:00

Sponsored Session
17:00 - 17:45

More information to follow shortly...

Speakers

17:15
17:30
17:45
18:00

Data Protection Update: Latin America
18:00 - 18:45

More information to follow shortly...

Host

  • Andrezza H. Oikawa, Msc, Senior Partner, Advocacia Correa de Castro - ACC
  • Paula Bauer, Partner & Head of IP Department at C.R. & F. ROJAS ABOGADOS

Speakers

18:15
18:30
18:45
19:00

Diversity, Equity, and Inclusion in Security: Closing the Gap
19:00 - 19:45

More information to follow

Host

  • Toni McLelland, Director, Management Consultant, Business Mentor, 1st Life Group.

Speakers

19:15
19:30
19:45
20:00

Complying With State Privacy Laws Across the US
20:00 - 20:45

More information to follow

Host

Speakers

20:15
20:30
20:45