PrivSec North Agenda | Timings shown in British Summer Time (BST)
BST | Tuesday 27th June 2023 |
---|---|
09:00 | Event Opens & Registration |
09:15 | |
09:30 | |
09:45 | |
10:00 | Privacy Program Management: How Companies Can Best Juggle Their Compliance Requirements
In today's digital landscape, companies must navigate a complex array of privacy laws and regulations. This panel discussion will explore the challenges and opportunities of managing a privacy program, and provide insights on how companies can best juggle their compliance requirements. The panelists will discuss the key components of a privacy program, including conducting risk assessments, implementing appropriate policies and procedures, training employees on privacy best practices, and the role of technology in privacy program management. As an attendee, you will learn about the latest trends and developments in privacy program management, and gain practical advice on how to effectively manage your own company's privacy program. You will also have the opportunity to engage with the panelists and ask questions about privacy program management and compliance. Speakers
|
10:15 | |
10:30 | |
10:45 | Sponsored Session Further information to follow... Speakers |
11:00 | |
11:15 | Break |
11:30 | Strategic Business Decisions to Implement a Data Protection and Security Culture
In this panel, industry experts will discuss the key decisions you need to make to create a culture of data protection and security. Panellists will discuss identifying vulnerabilities, implementing security protocols and policies that stick, and training employees on best practices. You'll learn about the benefits of having a strong culture of data protection. You'll also have a chance to ask questions and get advice from the experts. By the end of the session, you'll have a better idea of what steps you can take to protect your company's data. Speakers
|
11:45 | |
12:00 | |
12:15 | Best Practices to Fix the Broken Vendor Risk Management Process Sean O’Brien Co-Chair of Global Best Practice Committee, Shared Assessments and MD, DVV Solutions will look at how organizations are addressing growing compliance and operational pressures and creating scalable and efficient models for third-party risk management and reduction including: · Managing vendors in an ever-changing regulatory environment,· Mitigating tedious manual processes that are prone to error, · Assessing the impact, reliability and maturity of new risk assessment technologies, and · Leveraging crucial data, automated workflows, and managed services Speakers
|
12:30 | |
12:45 | |
13:00 | Lunch |
13:15 | |
13:30 | |
13:45 | Third Party Risk Management: Strategies and Tools to Mitigate Cyber Threats As more and more organisations rely on third parties to provide services and support, managing the potential risks to cyber security has become increasingly important. This session will explore third-party risk management, and the strategies and tools available to mitigate cyber threats. The expert speakers on the panel will discuss the importance of third-party risk management, and provide in-depth insights into the strategies and tools that can you can use to identify and mitigate potential threats. They will also discuss the role of risk assessments, contract negotiations, and ongoing monitoring in effective third-party risk management. As an attendee, you'll gain a comprehensive understanding of the potential risks associated with third parties and how to manage them effectively. You'll also gain valuable insights and strategies for identifying and mitigating cyber threats in your organisation. Speakers
|
14:00 | |
14:15 | |
14:30 | A New Era of AI Governance More than ever before, everyone’s talking about AI: From image generation to task automation to chatbots that come pretty close to passing the “Turing test”. As AI technology becomes increasingly advanced and widespread, it is essential to consider the guidelines, regulations and ethical frameworks that ensure its responsible and ethical use. And with new laws such as the EU’s AI Act around the corner, getting this right is imperative. This session will explore the challenges and opportunities associated with AI governance, and propose strategies for addressing them in the coming years. You’ll learn Ideas and strategies for promoting responsible and ethical use of AI technology—and for addressing potential challenges in the governance of AI. Speakers
|
14:45 | |
15:00 | |
15:15 | Break |
15:30 | Data Protection Regulations Worldwide: Overview of Current Horizon in 2023 and Beyond Data protection regulations are evolving rapidly around the world, with new laws and frameworks being introduced to address the increasing risks of data breaches and security threats. In this panel discussion, experts will provide an overview of the current state of global data protection regulations, highlighting key trends and developments. As an attendee, you’ll learn about the latest trends and developments in global data protection regulations, and gain a better understanding of the challenges and opportunities that businesses face in this landscape. Speakers
|
15:45 | |
16:00 | |
16:15 | The Future of Cybersecurity: Emerging Threats and Innovative Defenses As the threat landscape continues to evolve, it's essential to stay up-to-date. This session will explore the future of cybersecurity, highlighting the threats most likely to emerge or increase in coming years—and new ways to defend against them. Panellists will discuss the latest security trends and developments, and provide their views on the most significant emerging threats that organisations need to be aware of. They will also explore the innovative technologies and strategies that are being developed to defend against these threats, and provide guidance on how organizations can stay ahead of the curve. As an attendee, you'll learn about the most serious emerging threats and how you can protect against them. Speakers
|
16:30 | |
16:45 | |
17:00 |
PrivSec North Agenda | Timings shown in British Summer Time (BST)
BST | Wednesday 28th June 2023 |
---|---|
09:00 | Event Opens & Registration |
09:15 | |
09:30 | |
09:45 | |
10:00 | International Data Transfers: Technical Solutions, ICO Guidelines and the Future International data transfers remain among data protection’s hardest problems. And even though a solution to US transfers might be in sight, it might not last long. A broader, longer-term approach is required to ensure that data transfers can continue unimpeded as your organisation grows and changes. In this session, experts will look at the state of play for data transfers, with an emphasis on the UK’s situation as it gradually diverges from the EU. Panellists will consider the technical approaches that might supplement standard contractual clauses (SCCs), and look at the ICO’s interpretations and guidance. You’ll learn more about how the international transfers system is developing, and take away actionable advice on how to better ensure compliance in this complicated area. Speakers
|
10:15 | |
10:30 | |
10:45 | Sponsored Session Further information to follow... Speakers |
11:00 | |
11:15 | Break |
11:30 | The Role of Cybersecurity in Disaster Recovery and Business Continuity Planning Cybersecurity is an essential component of any disaster recovery and business continuity plan. This session will explore how organisations ensure their resilience and overcome setbacks. Panellists will discuss how cybersecurity contributes to disaster recovery and business continuity planning, and provide insight into the strategies and tools that can be used to protect against cyber threats. They will also discuss the importance of regular testing and updating of these plans, and provide guidance on how organisations can ensure their resilience in the face of disasters. As an attendee, you'll gain valuable insights and strategies for using cybersecurity to enhance your organisation's resilience and business continuity programme. Speakers
|
11:45 | |
12:00 | |
12:15 | Keeping Up with the Pace of Data Collection: Best Practices for Reducing Data Breach Risks As data collection practices continue to evolve, organisations must be proactive and rigorous to avoid data breaches. This session will explore best practices for reducing data breach risks and keeping up with the pace of data collection. The expert speakers on the panel will discuss the current state of data collection and data breach risks, and provide insight into the strategies and tools that organisations can use to reduce their risks. They will also discuss the importance of regular monitoring and assessments, and provide guidance on how to implement effective data protection policies and procedures. As an attendee, you'll learn about the latest trends in data collection and data breach risks, and gain valuable insights into the best practices for reducing these risks. Speakers
|
12:30 | |
12:45 | |
13:00 | Lunch |
13:15 | |
13:30 | |
13:45 | |
14:00 | Sponsored Session |
14:15 | |
14:30 | How AI Is Transforming Cybersecurity: Both For Security Teams and Cybercriminals In this session, our expert panel will explore how AI is transforming the field of cybersecurity. Security teams are using AI to improve their ability to detect and respond to threats. But cybercriminals are also leveraging AI to launch increasingly sophisticated attacks. The panel will discuss the implications of this development and explore the latest trends in the use of AI in cybersecurity. Topics will include the role of AI in threat intelligence, the potential for AI-powered tools to automate some security tasks, and the challenges and opportunities presented by AI. As an attendee, you'll learn about the latest developments in the use of AI in cybersecurity and how they could impact your business or organisation. Speakers
|
14:45 | |
15:00 | |
15:15 | Break |
15:30 | Emerging Privacy-Enhancing Technologies (PETs): What Works? Privacy-enhancing technologies (PETs) are a growing area of interest as organisations look for better ways to protect personal information. This session will explore the emerging landscape of PETs, and discuss which technologies are most effective. Speakers will discuss the latest developments in PETs, and provide insight into the technologies that are currently available. They will also discuss the challenges and opportunities presented by PETs, and provide guidance on how organizations can implement these technologies effectively. As an attendee, you'll learn about the latest trends in PETs, and gain a better understanding of which technologies are most effective. Speakers
|
15:45 | |
16:00 | |
16:15 | The Future of Cyber Security is Neurodiverse With the need for digital connection increasing by the minute so is our vulnerability to cyber threats. This problem is amplified when there is lack of suitably skilled and qualified candidates available tacke these threats. Studies often claim that this is the primary reason for the cyber security skills gap. Is this really true? This session will cover: Are we creating an artificial skills/talent gap by putting an excessive focus on technical skills? Are there other untapped pools of talent that are being overlooked for Cyber Security roles? What role does Neurodiversity play in creating and developing a robust talent pipeline of security professionals to tackle today’s security issues? What’s been done so far and what can we do better to develop a neurodiverse workforce in cyber security? Speakers
|
16:30 | |
16:45 | |
17:00 |
Site powered by Webvision Cloud