Day 1 - Thursday, January 15, 2015

7:25
Privacy & Security of Consumer and Employee Information 101: Understanding the Technology & Key Laws and Regulations
8:10
Main Conference Registration & Continental Breakfast
8:40
Co-Chairs’ Welcoming Remarks
8:45
Federal Regulatory, Legislative, and Enforcement Landscape: Changes on the Horizon and Integrating New and Anticipated Initiatives Into Your Privacy and Compliance Program
10:30
Morning Break
10:35
Unique Regulatory and Enforcement Insights by State Attorneys General and Consumer Protection Agencies on Emerging Privacy Initiatives, Settlement and Enforcement Trends, Security Breach Notification Requirements, and More
12:05
Networking Lunch for Delegates and Speakers
1:00
INTERNATIONAL: Managing a Global Privacy Program and Preparing, Collecting, Using and Transferring Data Across Borders
2:00
The Internet of Things: Privacy, Security, New Risks and Developing Threats
3:30
Afternoon Break
3:35
The Cloud: Best Practices on Third-Party Vendor Compliance and Negotiating Terms of Cloud Services Contracts and Service Level Agreements
4:30
Class Actions & Litigation Roundup: Recent Data Breach Cases, Mega Privacy Actions, TCPA and Texting Suits, and Assessing What Claims Are Worth
5:45
The Intersection of Healthcare and Data Security: OCR, HHS, and HIPAA Cyber Security and Data Privacy and Protection
6:45
Conference Adjourns to Day Two

Day 2 - Friday, January 16, 2015

7:30
Continental Breakfast
8:00
Big Data in the Cyber Security and Privacy Protection Context: Aggregating Data, Data Analytics, Data Mining, and Privacy Rights
9:10
Practicing Privacy by Design: Ensuring Cyber Security and Data Privacy & Protection Don’t Become an Afterthought
10:05
Morning Break
10:10
Cyber Security Preparedness: Best Practices for Data Breach Incident Response Teams With a Focus on Preemptive Measures to Take and Rehabilitating Your Image
11:05
Ensuring Compliance With Privacy Requirements for Online Behavioral Advertising and Marketing Initiatives: Cookies, “Do-Not-Track”, and Other Behavioral Targeting Nuances
12:15
Privacy on Mobile Platforms and Privacy Disclosures for Mobile Apps: Best Compliance Practices
1:15
Mobile Devices (BYOD), Apps and the Workforce: Reducing Risk by Implementing Proven Security Measures and Procedures, and More
2:00
Main Conference Ends – Lunch for Workshop B Attendees
2:50
The Fundamentals of Cyber and Data Risk Insurance Coverage

Day 1 - Thursday, January 15, 2015

7:25
Privacy & Security of Consumer and Employee Information 101: Understanding the Technology & Key Laws and Regulations

Harry A. Valetk
Of Counsel
Baker & McKenzie LLP

Peter J. Reid
Privacy Officer, HP Business Groups & Global Functions
Hewlett-Packard Company

Lisa E. Branner
Senior Manager, Information Protection and Privacy
Marriott International

Adam Rubin
General Counsel
PrizeLogic, LLC

Jennifer Harkins Garone CIPT CHP
Global IT Director
Microsoft

Corey Dennis
Associate Counsel & Privacy Officer
Pharmaceutical Product Development, LLC (PPD)

This in depth focus session will create a foundation for those new to the world of privacy and information security and provide seasoned professionals with the latest changes and evolutions to the area.

Topics include:

  • Privacy, data breaches, and the key technological tools and experts behind them
    • Bridging the gap between legal and regulatory requirements regarding the protection of sensitive data, and the technology that protects such information
    • How does IT intersect with privacy?
    • Understanding IT systems utilized by companies to prevent breaches and data loss, including firewalls and private networks
    • The basics of a data breach
    • The basics of a data breach response
    • The role of forensic and audit teams
    • Best practices for assembling and working with a forensics and audit team
  • Key laws, regulators, and enforcement bodies to consider when dealing with privacy concerns and data breaches
    • A look at the current regulations and legislation which impact privacy & security
    • The role of regulators in the realm of privacy & security
    • Compliance and prior preparation: Steps to prevent data breaches; Policies and procedures in the event of a data breach

7:25 – 8:40 a.m. (separate registration required; registration opens at 7:10 a.m.)

8:10
Main Conference Registration & Continental Breakfast
8:40
Co-Chairs’ Welcoming Remarks

Ashley L. Taylor Jr.
Partner, Executive Committee Member
Troutman Sanders LLP

Russell Schrader
Former Chief Privacy Officer & Senior Associate General Counsel, Global Enterprise Risk
Visa, Inc.

8:45
Federal Regulatory, Legislative, and Enforcement Landscape: Changes on the Horizon and Integrating New and Anticipated Initiatives Into Your Privacy and Compliance Program

Darren A. Bowie
Chief Privacy Officer and Associate General Counsel Global Legal, Compliance, and Regulatory
AIG

Mike Zaneis
Executive Vice President, Public Policy & General Counsel
Interactive Advertising Bureau

Daniel V. Shapiro
Computer Hacking and Intellectual Property Section
US Attorney’s Office, DNJ

Melinda Claybaugh
Staff Attorney
Federal Trade Commission

Gurbir S. Grewal
Chief, Economic Crimes Unit
US Attorney’s Office, DNJ

Aaron Burstein
Attorney Advisor
Federal Trade Commission

Neil Chilson
Attorney Advisor to Commissioner Maureen K. Ohlhausen
Federal Trade Commission

Janis Kestenbaum
Partner
Perkins Coie LLP

Nickolas Savage
Supervisory Special Agent, Cyber Branch
FBI

Co-Moderators:

Alfred J. Saikali
Partner
Shook, Hardy & Bacon, LLP

D. Reed Freeman Jr.
Partner
Wilmer Cutler Pickering Hale and Dorr LLP

  • An update on where federal agencies are heading with cyber security and data privacy & protection: enforcement and regulatory insights
  • Existing and prospective Congressional action
  • Cyber security legislation and White House Initiatives
  • FTC and privacy update
    • Scope of authority
    • Cyber security initiatives; audits; fines and penalties
    • Consumer Privacy Bill of Rights
    • “Do Not Track” and behavioral advertising
    • FACTA
    • Online privacy

10:30
Morning Break
10:35
Unique Regulatory and Enforcement Insights by State Attorneys General and Consumer Protection Agencies on Emerging Privacy Initiatives, Settlement and Enforcement Trends, Security Breach Notification Requirements, and More

Barbara Anthony Esq.
Undersecretary Consumer Affairs and Business Regulation
Commonwealth of Massachusetts

Nicole R. Beck
Deputy Attorney General
Pennsylvania Office of the Attorney General Bureau of Consumer Protection

Matthew Van Hise
Assistant Attorney General & Consumer Privacy Counsel
Office of the Illinois Attorney General

Suzanne B. Giorgi
Deputy Attorney General, Privacy Enforcement Protection Unit
California Department of Justice

Ryan G. Kriger
Assistant Attorney General Public Protection Division
Vermont Office of the Attorney General

Elizabeth Rogers
Chief Privacy Officer
Texas Comptroller of Public Accounts

Joyce Yeager Esq. CIPP/US, CIPM
Assistant Attorney General
Missouri Attorney General’s Office

Gene Fishel
Sr. Asst. AG
Virginia AG Office

Moderator:

Ashley L. Taylor Jr.
Partner, Executive Committee Member
Troutman Sanders LLP

  • Regulatory and enforcement insights
  • Security breach notification requirements
  • New trends and laws and how to manage compliance
  • Recent state settlement and enforcement trends
  • Current focuses for state AGs

12:05
Networking Lunch for Delegates and Speakers
1:00
INTERNATIONAL: Managing a Global Privacy Program and Preparing, Collecting, Using and Transferring Data Across Borders

Christina Peters
Chief Privacy Officer
IBM Corporation

Dorene Stupski
Director, Information Protection and Privacy
Marriott International

Dori Anne Kuchinsky
Assistant General Counsel – Privacy
AOL, Inc

Heather Egan Sussman
Partner
Ropes & Gray LLP

Nancy L. Perkins
Counsel
Arnold & Porter LLP

  • “The Right to Be Forgotten”
  • APEC Cross Border Privacy Rules: A New Model for Interoperability?
  • Proposed EU data protection reform and what it means for those doing business in the EU
  • The future of the Safe Harbor Program
  • Privacy issues involved in conducting international investigation concerning discovery
  • Managing cross-border data transfers
  • International v. National v. Localized policies and breach response plans
  • Fitting corporate rules in the framework of international privacy regulatory requirements in a way that is practical, compliant, and cost effective.
  • A focus on regulation and events in Russia, Canada, Latin America, Germany, Singapore, and more

2:00
The Internet of Things: Privacy, Security, New Risks and Developing Threats

Israel A. Silverman
Vice President, Assistant General Counsel, and Assistant Corporate Secretary
SCOR Reinsurance Company

Christopher S. Lee M.S., J.D., CIPP/US/G
Directorate Privacy Officer, Science & Technology Directorate
Department of Homeland Security

Laura VanDruff
Assistant Director, Division of Privacy and Identity Protection
Federal Trade Commission

Asra Ali
Compliance and Risk Manager
Healthscape Advisors

Benjamin Berman
General Counsel
KAYAK Software Corporation

Erez Liebermann
Vice President and Senior Counsel, Cybersecurity and Privacy
Prudential Insurance Company of America

Wesley L. Hsu
Assistant United States Attorney Chief, Cyber and Intellectual Property Crimes Section
U.S. Attorney’s Office for the Central District of California

Seth B. Kosto
Assistant U.S. Attorney
U.S. Attorney’s Office for the District of Massachusetts

  • The rise of technology that connects to the internet and the opportunity to gather data and provide predictive analytics and IT automation
  • New threats and what to anticipate
  • Corporate espionage and theft of IP
  • Employee hack-backs
  • Ransom ware and the growing cyber-component to traditional crimes
  • Phishing and Spear Phishing
  • Doxing and Swatting
  • DDos

3:30
Afternoon Break
3:35
The Cloud: Best Practices on Third-Party Vendor Compliance and Negotiating Terms of Cloud Services Contracts and Service Level Agreements

Michael Povman
Assistant General Counsel Intellectual Property, Technology and Privacy
BNY Mellon

Barrie VanBrackle
Partner
Orrick, Herrington & Sutcliffe LLP

Nestor J. Rivera
Executive Privacy & IT Counsel HIPAA Privacy Officer
GE Healthcare

Vincent A. Campitelli II (ret.)
VP – Information Security & Risk Management
McKesson Corporation

  • International privacy in the age of the cloud
  • Cloud service agreements
  • Initiatives and privacy compliance programs around the cloud and big data
  • Third-party vendor concerns
  • Contract negotiation
  • Analyzing cloud transactions and virtual private clouds
  • NIST guidelines on technical and security guidance
    • Federal agencies’ use of cloud computing
    • How the NIST guidelines impact the industry
  • Forced data localization requirements
    • Restrictions and local data requirements

4:30
Class Actions & Litigation Roundup: Recent Data Breach Cases, Mega Privacy Actions, TCPA and Texting Suits, and Assessing What Claims Are Worth

Douglas H. Meal
Partner
Ropes & Gray LLP

Ian C. Ballon
Shareholder
Greenberg Traurig, LLP

Ronald I. Raether
Partner
Troutman Sanders LLP

Dr. John Johnson
Chief Executive Officer
Edgeworth Economics

  • Litigation trends: future of class actions and how the decisions shake out state by state
  • Data breach litigation
  • Assessing harm
  • Statutory penalties, remedies
  • Collection of data
  • Retailers asking for zip code, phone numbers, etc.
  • Mega privacy actions
  • Civil litigation associated with free or low cost services that touch millions of people
  • Statutory liability claims
  • Privacy statutes with statutory damages and uniform privacy practices
  • What happens when the litigation doesn’t settle?
  • Assessing harm; how important is harm when law applies to statutory damages?
  • Strategies for when to fight and when to settle privacy and security
  • Class action suits: latest trends on TCPA and other texting cases

5:45
The Intersection of Healthcare and Data Security: OCR, HHS, and HIPAA Cyber Security and Data Privacy and Protection

Laura Merten
Chief Privacy and Compliance Officer
Advocate Healthcare

Adam H. Greene
Partner
Davis Wright Tremaine LLP

Seth M. Wolf
Associate General Counsel
University Hospitals Health System

Dawn Morgenstern
Senior HIPAA Privacy Analyst
White Stone Consulting, LLC

Healthcare data protection, risk assessment, HIPAA, HITECH, OCR enforcement, and more, including:

  • The 2014 audit program taking effect in October of 2014
  • Enforcement trends
  • Compliance challenges
  • Mitigation measures

6:45
Conference Adjourns to Day Two

Day 2 - Friday, January 16, 2015

7:30
Continental Breakfast
8:00
Big Data in the Cyber Security and Privacy Protection Context: Aggregating Data, Data Analytics, Data Mining, and Privacy Rights

Katrina A. Blodgett
Staff Attorney
Federal Trade Commission

Corey Miller
Sr Privacy Strategist
Microsoft

Jeanette Fitzgerald

Epsilon

Reece Hirsch
Partner
Morgan, Lewis & Bockius LLP

Cynthia Sarno CIPP/US, CIPP/IT
Chief Privacy Counsel
Farmers Group, Inc.

Patrick Dillon-Hughes
Legal Counsel
Google Inc.

  • Data anonymization: what does it really mean to be anonymous? What does it look like?
  • Data aggregation: Concern over privacy rights
  • Implementing best practices for data governance
    • Layers of control for employees who access data
    • The monetization of data
    • Data sold for research
    • Informed consent

9:10
Practicing Privacy by Design: Ensuring Cyber Security and Data Privacy & Protection Don’t Become an Afterthought

Naomi Lefkovitz
Senior Privacy Policy Advisor
NIST

Christine Szafranski
Director, Information Risk Management
Northwestern Mutual

Joanna Levin CIPP/US
Privacy Counsel
Pfizer

Kathy Harman-Stokes J.D., CIPP/US, CIPP/G
Chief Privacy Officer Office of the Executive Director
U.S. Commodity Futures Trading Commission

  • Best practices for implementing cyber security and data protection from the start
  • Working with your development team to incorporate privacy protection into all aspects of business
  • Privacy engineering: Taking Privacy by Design concepts and executing them in the day-to-day practices

10:05
Morning Break
10:10
Cyber Security Preparedness: Best Practices for Data Breach Incident Response Teams With a Focus on Preemptive Measures to Take and Rehabilitating Your Image

J. Andrew Valentine
RISK Team
Verizon

Korin Neff
Senior Vice President & Corporate Compliance Officer
Wyndham Worldwide Corporation

Christopher Pierson
Chief Security Officer & General Counsel
Viewpost

Carly L. Huth
Associate Privacy Officer/Global Data Privacy and Security Counsel
The Coca-Cola Company

  • Incident preparedness
    • Proactive crisis communications training
    • Risk assessments and vulnerability audits
  • The cyber defense response team and who it should include
    • Managing the crisis through comprehensive crisis communications
  • Post-incident recovery
    • Reputation management
    • Public relations and impact assessments
    • Stakeholder communications, and more

11:05
Ensuring Compliance With Privacy Requirements for Online Behavioral Advertising and Marketing Initiatives: Cookies, “Do-Not-Track”, and Other Behavioral Targeting Nuances

Jarad Brown
Staff Attorney
Federal Trade Commission

David Wainberg
Privacy & Policy Counsel
AppNexus

Edward Klaris
Senior Vice President
Condé Nast

Marc M. Groman
President & CEO
Network Advertising Initiative

Mark Faber
Vice President, Senior Regulatory Counsel, Privacy
Prudential Financial

Becky Burr
Deputy General Counsel & Chief Privacy Officer
NeuStar, Inc.

  • The latest developments in “Do-Not-Track” and other regulatory enforcement trends
  • Litigation update on cookies/tracking
  • Managing consumer perception on tracking and data collection
  • Tracking and sharing online consumer behavior by social media companies
  • The regulator perspective
  • Unfair and deceptive practices using online behavioral advertising

12:15
Privacy on Mobile Platforms and Privacy Disclosures for Mobile Apps: Best Compliance Practices

James Trilling
Staff Attorney
Federal Trade Commission

Jim Lai
Certified Information Privacy Professional, Attorney, Privacy Officer
HERE

Sunni Yuen
Corporate Counsel
Google

Kathryn A. Reid CIPP/E, CIPP/US
AVP & Senior Counsel
Unum

Brian Chase

Foursquare Labs, Inc.

  • Privacy notices on mobile devices
  • Collecting and using information from mobile apps
  • Laws, regulatory guidance, industry self-regulation
  • Drafting a privacy notice for mobile devices
  • Solutions proposed by consumer advocates, including their proposal for series of icons for privacy notices
  • Tools to promote compliance
  • Different requirements and ability to display disclosures among app stores/platforms
  • Reconciling differing global requirements when releasing an app in multiple markets

1:15
Mobile Devices (BYOD), Apps and the Workforce: Reducing Risk by Implementing Proven Security Measures and Procedures, and More

Kimberly Hancher
Chief Information Officer
U.S. Equal Employment Opportunity Commission (EEOC)

Brian Mannion
Managing Counsel, Office of Privacy, Technology, Information and Contract
Nationwide

Brian J. Dusek
Partner
McCullough, Campbell & Lane LLP

  • Examining the business and technological drivers behind the “bring your own device” trend
  • Understanding the privacy implications and risk exposures of a BYOD program
  • What tools are in place to provide control measures and oversight for a BYOD program?
  • Data loss prevention programs
  • Training, audits and other ways to ensure compliance
  • Identifying the risk when an employee uses company data on their personal computer
  • Assessing discovery issues
  • Who has control of content/data?

2:00
Main Conference Ends – Lunch for Workshop B Attendees
2:50
The Fundamentals of Cyber and Data Risk Insurance Coverage

Linda D. Kornfeld
Managing Partner
Kasowitz, Benson, Torres & Friedman LLP

Laura A. Foggan
Partner
Wiley Rein LLP

John Merchant
Senior Vice President, Cyber Liability Underwriter
Validus

  • What is Cyber insurance? And why isn’t my current insurance enough?; Why traditional insurance policies such as CGL don’t work; Why your current property insurance may not cover the direct costs of the data breach
  • How cyber and data risk insurance really works: Basics of cyber insurance policies
  • Understanding the language used in the policies to better communicate to your clients: Key provisions to look for (coverage, definitions and exclusions)
  • Overview on guidance from claim to post-breach costs
  • Cyber Risk Insurance Nuances: Usage based insurance (UBI); General liability policies; What policyholders should be looking for in a cyber policy; Key considerations for cyber liability coverage; Pricing, selling and marketing cyber risk policies; New coverage options

2:50 – 4:50 p.m. (separate registration required; registration opens at 2:30 p.m.)