Including
-
Mobile Devices (BYOD), Apps and the Workforce: Reducing Risk by Implementing Proven Security Measures and Procedures, and More
Mobile Devices (BYOD), Apps and the Workforce: Reducing Risk and Implementing Proven Security Measures - January 2015
by Kimberly Hancher, Chief Information Officer at U.S. Equal Employment Opportunity Commission (EEOC), Brian Mannion, Managing Counsel, Office of Privacy, Technology, Information and Contract at Nationwide, Brian J. Dusek, Partner at McCullough, Campbell & Lane LLP -
Privacy on Mobile Platforms and Privacy Disclosures for Mobile Apps: Best Compliance Practices
Privacy on Mobile Platforms and Privacy Disclosures for Mobile Apps: Best Compliance Practices - January 2015
by James Trilling, Staff Attorney at Federal Trade Commission, Jim Lai, Certified Information Privacy Professional, Attorney, Privacy Officer at HERE, Sunni Yuen, Corporate Counsel at Google, Kathryn A. Reid CIPP/E, CIPP/US, AVP & Senior Counsel at Unum, Brian Chase, Foursquare Labs, Inc. -
Ensuring Compliance With Privacy Requirements for Online Behavioral Advertising and Marketing Initiatives: Cookies, “Do-Not-Track”, and Other Behavioral Targeting Nuances
The FTC Perspective: Regulation and Enforcement - January 2015
by Jarad Brown, Staff Attorney at Federal Trade Commission -
Cyber Security Preparedness: Best Practices for Data Breach Incident Response Teams With a Focus on Preemptive Measures to Take and Rehabilitating Your Image
Data Breach Incident Response Teams With a Focus on Preemptive Measures to Take and Rehabilitating Your Image - January 2015
by J. Andrew Valentine, RISK Team at Verizon, Korin Neff, Senior Vice President & Corporate Compliance Officer at Wyndham Worldwide Corporation, Christopher Pierson, Chief Security Officer & General Counsel at Viewpost -
Practicing Privacy by Design: Ensuring Cyber Security and Data Privacy & Protection Don’t Become an Afterthought
Privacy By Design Ensuring Cyber Security and Data Privacy Don’t become an Afterthought - January 2015
by Naomi Lefkovitz, Senior Privacy Policy Advisor at NIST, Christine Szafranski, Director, Information Risk Management at Northwestern Mutual, Joanna Levin CIPP/US, Privacy Counsel at Pfizer -
Big Data in the Cyber Security and Privacy Protection Context: Aggregating Data, Data Analytics, Data Mining, and Privacy Rights
Big Data in the Cyber Security and Privacy Protection Context: Aggregating data, Data Analytics, Data Mining and Privacy Rights - January 2015
by Katrina A. Blodgett, Staff Attorney at Federal Trade Commission, Corey Miller, Sr Privacy Strategist at Microsoft, Jeanette Fitzgerald, Epsilon -
Class Actions & Litigation Roundup: Recent Data Breach Cases, Mega Privacy Actions, TCPA and Texting Suits, and Assessing What Claims Are Worth
Cyber Presentation: Developments in private litigation and regulatory enforcement stemming from data security breaches - January 2015
by Douglas H. Meal, Partner at Ropes & Gray LLP -
Class Actions & Litigation Roundup: Recent Data Breach Cases, Mega Privacy Actions, TCPA and Texting Suits, and Assessing What Claims Are Worth
Data Privacy, Security Breach and TCPA Class Action Suits - January 2015
by Ian C. Ballon, Shareholder at Greenberg Traurig, LLP -
Class Actions & Litigation Roundup: Recent Data Breach Cases, Mega Privacy Actions, TCPA and Texting Suits, and Assessing What Claims Are Worth
Text Messaging and the Requirements of the Telephone Consumer Protection Act - January 2015
by Ian C. Ballon, Shareholder at Greenberg Traurig, LLP -
Class Actions & Litigation Roundup: Recent Data Breach Cases, Mega Privacy Actions, TCPA and Texting Suits, and Assessing What Claims Are Worth
Data Privacy Class Action Litigation - January 2015
by Ian C. Ballon, Shareholder at Greenberg Traurig, LLP -
Class Actions & Litigation Roundup: Recent Data Breach Cases, Mega Privacy Actions, TCPA and Texting Suits, and Assessing What Claims Are Worth
Security Breach Class Action Litigation - January 2015
by Ian C. Ballon, Shareholder at Greenberg Traurig, LLP -
Class Actions & Litigation Roundup: Recent Data Breach Cases, Mega Privacy Actions, TCPA and Texting Suits, and Assessing What Claims Are Worth
15th Annual Global Legal & Compliance Forum on Cyber Security & Data Privacy and Protection - January 2015
by Ronald I. Raether, Partner at Troutman Sanders LLP -
The Cloud: Best Practices on Third-Party Vendor Compliance and Negotiating Terms of Cloud Services Contracts and Service Level Agreements
The Cloud: Best Practices on Third-Party Vendor Compliance - January 2015
by Barrie VanBrackle, Partner at Orrick, Herrington & Sutcliffe LLP -
The Cloud: Best Practices on Third-Party Vendor Compliance and Negotiating Terms of Cloud Services Contracts and Service Level Agreements
Outsourced Cloud Computing - January 2015
by Michael Povman, Assistant General Counsel Intellectual Property, Technology and Privacy at BNY Mellon -
The Internet of Things: Privacy, Security, New Risks and Developing Threats
Corporate Cyber Vulnerabilities - January 2015
by Israel A. Silverman, Vice President, Assistant General Counsel, and Assistant Corporate Secretary at SCOR Reinsurance Company -
The Internet of Things: Privacy, Security, New Risks and Developing Threats
The Internet of Things: Privacy, Security, New Risks and Developing Threats - January 2015
by Asra Ali, Compliance and Risk Manager at Healthscape Advisors -
The Internet of Things: Privacy, Security, New Risks and Developing Threats
The Internet of Things and Consumer Protection - January 2015
by Laura VanDruff, Assistant Director, Division of Privacy and Identity Protection at Federal Trade Commission -
The Internet of Things: Privacy, Security, New Risks and Developing Threats
The search engine for the Internet of Things - January 2015
by Christopher S. Lee M.S., J.D., CIPP/US/G, Directorate Privacy Officer, Science & Technology Directorate at Department of Homeland Security -
INTERNATIONAL: Managing a Global Privacy Program and Preparing, Collecting, Using and Transferring Data Across Borders
INTERNATIONAL: Managing a Global Privacy Program and Preparing, Collecting, Using and Transferring Data Across Borders - January 2015
by Christina Peters, Chief Privacy Officer at IBM Corporation, Dorene Stupski, Director, Information Protection and Privacy at Marriott International, Dori Anne Kuchinsky, Assistant General Counsel – Privacy at AOL, Inc, Heather Egan Sussman, Partner at Ropes & Gray LLP, Nancy L. Perkins, Counsel at Arnold & Porter LLP -
Unique Regulatory and Enforcement Insights by State Attorneys General and Consumer Protection Agencies on Emerging Privacy Initiatives, Settlement and Enforcement Trends, Security Breach Notification Requirements, and More
2013 Data Privacy Report - January 2015
by Barbara Anthony Esq., Undersecretary Consumer Affairs and Business Regulation at Commonwealth of Massachusetts -
Unique Regulatory and Enforcement Insights by State Attorneys General and Consumer Protection Agencies on Emerging Privacy Initiatives, Settlement and Enforcement Trends, Security Breach Notification Requirements, and More
201 CMR 17.00: Standards for the Protection of Personal Information of Residents of the Commonwealth - January 2015
by Barbara Anthony Esq., Undersecretary Consumer Affairs and Business Regulation at Commonwealth of Massachusetts -
Unique Regulatory and Enforcement Insights by State Attorneys General and Consumer Protection Agencies on Emerging Privacy Initiatives, Settlement and Enforcement Trends, Security Breach Notification Requirements, and More
Massachusetts Data Privacy and Security Law - January 2015
by Barbara Anthony Esq., Undersecretary Consumer Affairs and Business Regulation at Commonwealth of Massachusetts
Part of the Conference
January 15 – 16, 2015
Washington, DC