Agenda
- Jump to:
- At a Glance
- Day 1
- Day 2
- Print-friendly Format
Day 1 - Thursday, January 15, 2015
Day 2 - Friday, January 16, 2015
Day 1 - Thursday, January 15, 2015
7:25 |
Privacy & Security of Consumer and Employee Information 101: Understanding the Technology & Key Laws and RegulationsHarry A. Valetk Peter J. Reid Lisa E. Branner Adam Rubin Jennifer Harkins Garone CIPT CHP Corey Dennis This in depth focus session will create a foundation for those new to the world of privacy and information security and provide seasoned professionals with the latest changes and evolutions to the area. Topics include:
7:25 – 8:40 a.m. (separate registration required; registration opens at 7:10 a.m.) |
8:10 |
Main Conference Registration & Continental Breakfast |
8:40 |
Co-Chairs’ Welcoming RemarksAshley L. Taylor Jr. Russell Schrader |
8:45 |
Federal Regulatory, Legislative, and Enforcement Landscape: Changes on the Horizon and Integrating New and Anticipated Initiatives Into Your Privacy and Compliance ProgramDarren A. Bowie Mike Zaneis Daniel V. Shapiro Melinda Claybaugh Gurbir S. Grewal Aaron Burstein Neil Chilson Janis Kestenbaum Nickolas Savage Co-Moderators:Alfred J. Saikali D. Reed Freeman Jr.
|
10:30 |
Morning Break |
10:35 |
Unique Regulatory and Enforcement Insights by State Attorneys General and Consumer Protection Agencies on Emerging Privacy Initiatives, Settlement and Enforcement Trends, Security Breach Notification Requirements, and MoreBarbara Anthony Esq. Nicole R. Beck Matthew Van Hise Suzanne B. Giorgi Ryan G. Kriger Elizabeth Rogers Joyce Yeager Esq. CIPP/US, CIPM Gene Fishel Moderator:Ashley L. Taylor Jr.
|
12:05 |
Networking Lunch for Delegates and Speakers |
1:00 |
INTERNATIONAL: Managing a Global Privacy Program and Preparing, Collecting, Using and Transferring Data Across BordersChristina Peters Dorene Stupski Dori Anne Kuchinsky Heather Egan Sussman Nancy L. Perkins
|
2:00 |
The Internet of Things: Privacy, Security, New Risks and Developing ThreatsIsrael A. Silverman Christopher S. Lee M.S., J.D., CIPP/US/G Laura VanDruff Asra Ali Benjamin Berman Erez Liebermann Wesley L. Hsu Seth B. Kosto
|
3:30 |
Afternoon Break |
3:35 |
The Cloud: Best Practices on Third-Party Vendor Compliance and Negotiating Terms of Cloud Services Contracts and Service Level AgreementsMichael Povman Barrie VanBrackle Nestor J. Rivera Vincent A. Campitelli II (ret.)
|
4:30 |
Class Actions & Litigation Roundup: Recent Data Breach Cases, Mega Privacy Actions, TCPA and Texting Suits, and Assessing What Claims Are WorthDouglas H. Meal Ian C. Ballon Ronald I. Raether Dr. John Johnson
|
5:45 |
The Intersection of Healthcare and Data Security: OCR, HHS, and HIPAA Cyber Security and Data Privacy and ProtectionLaura Merten Adam H. Greene Seth M. Wolf Dawn Morgenstern Healthcare data protection, risk assessment, HIPAA, HITECH, OCR enforcement, and more, including:
|
6:45 |
Conference Adjourns to Day Two |
Day 2 - Friday, January 16, 2015
7:30 |
Continental Breakfast |
8:00 |
Big Data in the Cyber Security and Privacy Protection Context: Aggregating Data, Data Analytics, Data Mining, and Privacy RightsKatrina A. Blodgett Corey Miller Jeanette Fitzgerald Reece Hirsch Cynthia Sarno CIPP/US, CIPP/IT Patrick Dillon-Hughes
|
9:10 |
Practicing Privacy by Design: Ensuring Cyber Security and Data Privacy & Protection Don’t Become an AfterthoughtNaomi Lefkovitz Christine Szafranski Joanna Levin CIPP/US Kathy Harman-Stokes J.D., CIPP/US, CIPP/G
|
10:05 |
Morning Break |
10:10 |
Cyber Security Preparedness: Best Practices for Data Breach Incident Response Teams With a Focus on Preemptive Measures to Take and Rehabilitating Your ImageJ. Andrew Valentine Korin Neff Christopher Pierson Carly L. Huth
|
11:05 |
Ensuring Compliance With Privacy Requirements for Online Behavioral Advertising and Marketing Initiatives: Cookies, “Do-Not-Track”, and Other Behavioral Targeting NuancesJarad Brown David Wainberg Edward Klaris Marc M. Groman Mark Faber Becky Burr
|
12:15 |
Privacy on Mobile Platforms and Privacy Disclosures for Mobile Apps: Best Compliance PracticesJames Trilling Jim Lai Sunni Yuen Kathryn A. Reid CIPP/E, CIPP/US Brian Chase
|
1:15 |
Mobile Devices (BYOD), Apps and the Workforce: Reducing Risk by Implementing Proven Security Measures and Procedures, and MoreKimberly Hancher Brian Mannion Brian J. Dusek
|
2:00 |
Main Conference Ends – Lunch for Workshop B Attendees |
2:50 |
The Fundamentals of Cyber and Data Risk Insurance CoverageLinda D. Kornfeld Laura A. Foggan John Merchant
2:50 – 4:50 p.m. (separate registration required; registration opens at 2:30 p.m.) |