Home

Use our global calendar of privacy events to locate an event near you.

 

FILTER BY

Mar
31
Fri
picoCTF high school computer security competition @ Online
Mar 31 @ 12:00 pm – Apr 14 @ 5:00 pm
picoCTF high school computer security competition @ Online

picoCTF – a free, online computer security competition for students grades 6-12 – is coming March 31, 2017! The game is designed for total beginners *and* experts alike, and over 30,000 people have already played. Students can pre-register today on our website (https://picoctf.com/). Please take a moment to watch our orientation video (https://picoctf.com/about).

Overview
picoCTF is a computer security competition open to students grades 6-12. The competition is a series of challenges where students must reverse engineer, break, hack, decrypt, or do whatever it takes to solve the problem. The competition is open from March 31st to April 14th, 2017. Everything is exclusively on the Internet and completely free. Registration will not close until the end of the competition, and there is no penalty for registering later.

Eligibility
Anyone can play, but only eligible individuals will be able to win and receive prizes. An individual is eligible if they are attending a school in the United States and are a 6th to 12th grade student.

Prizes
We have received over $30,000 for prizes this year! Specific amounts cannot be announced at this time as we are finalizing funding with our sponsors.

Competing
Once the competition begins, participants will be able to log into picoctf.com using the username and password provided at registration. If participants have forgotten their username or password, a reset function will be available once competition opens.

Organization
To accommodate the diverse backgrounds participating in picoCTF, the competition is organized into four levels each significantly more difficult than the last. Level 1 is targeted at students with no programming experience but apt at using a computer. Level 2 is for students with introductory programming experience, perhaps in languages such as Visual Basic or Alice. Level 3 targets AP Computer Science students with a stronger background in programming. Level 4 features a diverse set of problems ranging from difficult to mind-bogglingly difficult.

Levels
A team need not solve every challenge in a level before unlocking the next level. The problems in each level have been designed such that a new level can be unlocked even while avoiding entire categories (e.g. cryptography).

Playing the Game
Similar to the preview, competition challenges will be presented in the context of a story-driven game. The *game* requires a modern web browser and a reasonably powerful computer to play. Each challenge is worth a fixed number of points. A competitor earns the respective number of points regardless of the progress of other teams. Scores are calculated independent of time, but time will be used as a tie breaker.

Hints and Lectures
Some problems have associated hints. Hints can contain text, links, and even entire video lectures relevant to solving the problem.

Restrictions
While there are no limitations on the resources or tools that you can use, only students can solve challenges. Others can only facilitate in solving problems (e.g. helping setup tools and providing resources). Additionally, competitors may not interfere with the progress of other competitors or the competition infrastructure. Breaking any of these rules will result in disqualification and notification of the affiliated school.

Sponsors
We would like to thank our diamond sponsor, Cognizant, for helping make picoCTF possible.

Contact
Any questions should be directed to [email protected]. Or, if it’s easier, you can chat with us on Twitter or Facebook.

Apr
9
Sun
33rd ACM Symposium on Applied Computing 2018 @ France
Apr 9 – Apr 13 all-day
33rd ACM Symposium on Applied Computing 2018 @ France | Pau | Nouvelle-Aquitaine | France
The Symposium
———————
For over thirty years has the ACM  Symposium on Applied Computing been a primary gathering forum for  applied computer scientists, computer engineers, software engineers, and  application developers from around the world. SAC 2018 is sponsored by  the ACM Special Interest Group on Applied Computing (SIGAPP 
www.acm.org/sigapp). Its proceedings are published by ACM; they are also available on the web through the ACM Digital Library www.acm.org/dl. More information about SAC 2018 can be found at www.sigapp.org/sac/sac2018/. 

The Privacy by Design in Practice track
—————————————————
The aim of this track  is to promote research on privacy-preserving technologies to be used in  practice. “Privacy by Design” is a requirement in the new EU data  protection regulation, which will be applied in the EU countries from  May 2018. Thus, privacy needs to be considered by engineers from the  beginning and built in to newly developed systems properly. 
The track seeks  submissions from academia, industry and public authorities (e.g. data  protection agencies) presenting novel research on how to implement  Privacy by Design in practice. Examples of successful projects where  Privacy by Design has been implemented in practice are especially  welcome. Legal researchers  bringing in their view on Privacy by Design are also very welcome to  submit papers to this track to foster multi-disciplinary research. 

Topics of the track include, but are not limited to:
 Privacy Engineering
 Privacy-enhancing Technologies
– Anonymization and Pseudonymization
 Privacy in the Internet of Things (e.g. Smart Home, Smart City, Connected Cars, Smart TV, Smart Grid, etc.)
 Privacy and Quantified Self
 Privacy Laws and their impacts on technology
– Conflict between Privacy and Security

Important Dates
———————-
September 15, 2017: Submission of regular papers and SRC research abstracts
November 10, 2017: Notification of paper and SRC acceptance/rejection
November 25, 2017: Camera-ready copies of accepted papers/SRC
December 10, 2017: Author registration due date
April 9 – 13, 2018: SAC 2018 in Pau, France

Track Program Chairs
—————————–
– Ronald Petrlic, Commissioner for Data Protection Baden-Württemberg
– Christoph Sorge, CISPA, Saarland University

Program Committee
—————————-

Christoph Bösch, Ulm University, Germany
Claude Castelluccia, INRIA France
Tooska Dargahi, University of Rome Tor Vergata, Italy
Martin Degeling, CMU USA
Isao Echizen, National Institute of Informatics, Japan
Felix Gomez Marmol, Universidad de Murcia, Spain
Bart Knijnenburg, Clemson University, USA
Sebastian Pape, Goethe University Frankfurt, Germany
Andreas Reiter, TU Graz, Austria
Burkhard Schafer, University of Edinburgh, GB
Francesc Sebe Feixas, University of Lleida, Spain
Dirk Westhoff, University of Applied Sciences Offenburg, Germany 

 
Submission Guidelines
——————————
The submission guidelines must be strictly followed for a paper to be considered.
Original papers from  the above mentioned or other related areas will be considered. Only full  papers about original and unpublished research are sought. Parallel  submission to other conferences or other tracks of SAC 2018 is  forbidden. Each paper must be BLIND in the sense that it must only  include its title but not mention anything about its authors.  Self-citation must be in third person, such as “Smith et al. [citation]  showed…”. All submissions must be formatted using the ACM  conference-specific LaTeX style, which can be obtained from the  symposium web page. All papers must be submitted by the deadline stated  above. 
Papers must be submitted through the symposium-wide paper management system for SAC 2018 athttps://www.softconf.com/h/sac2018.

Review and publication of accepted papers
———————————————————
Each paper will be  fully refereed and undergo a blind review process by at least three  referees. Accepted papers will be published in the ACM SAC 2018  proceedings. Some papers may only be accepted as poster papers, and will  be published as extended abstracts in the proceedings. 
 
Student research abstract competition
—————————————————
Graduate students are invited to submit research abstracts at www.softconf.com/h/sac-src2018 following the instructions published at SAC 2018 website. Submission of the same abstract to multiple tracks is not allowed.

 

More information can be found at: www.legalinf.de/pbd2018

Apr
13
Thu
Technology, Accountability, and International Law @ Washington, DC
Apr 13 @ 10:00 am – 12:00 pm
Technology, Accountability, and International Law @ Washington, DC | Washington | District of Columbia | United States

While the potential benefits of collecting vast amounts of metadata for governments and businesses are obvious, this data collection also poses a number of difficulties regarding internationally recognized rights to privacy, information, expression, and association. Confusion over the boundaries between “good” and “bad” uses of the World Wide Web is growing, with different national authorities intervening to regulate and mediate areas of conflict and competition with little to no normative consensus at the international level. Moreover, while experts recognize the need for greater international cooperation to facilitate investigation and prosecution of a wide range of violations—from cyber theft to terrorist attacks and war crimes–the necessary standards and protocols for applying technology to facilitate effective accountability are lacking.

On April 13, the fourth annual Justice Stephen Breyer Lecture hosted by the Foreign Policy program at Brookings and The Hague Institute for Global Justice will seek to address these issues, focusing on the intersection of technology, accountability, and international law. Keynote remarks will be made by John Carlin, former U.S. assistant attorney general for national security, to be followed by a panel discussion featuring Alexa Koenig, executive director of the University of California Berkeley School of Law’s Human Rights Center; Malika Saada Saar, senior counsel for civil and human rights at Google; and moderated by Jeroen van den Hoeven, professor of ethics and technology at the Delft University in The Netherlands. After the program, the speakers will take questions from the audience.

This event will be webcast live. Join the conversation on Twitter at #BreyerLecture.

Introductions

Ted Piccone, Senior Fellow, The Brookings Institution
Saskia Bruines, Deputy Mayor, The Hague

Keynote speaker

John Carlin, Chair, Global Risk and Crisis Management, Morrison & Foerster, LLP

Panelists

Alexa Koenig, Director, Human Rights Center, University of California Berkeley School of Law
Malika Saada Saar, Senior Counsel for Civil and Human Rights, Google
Moderator: Jeroen van den Hoeven, Professor of Ethics and Technology, Delft University

Practical Privacy Practices @ Online
Apr 13 @ 2:00 pm – 3:00 pm
Practical Privacy Practices @ Online

This webinar will highlight some actions that libraries can take to protect patron privacy in three important areas:

  • How to configure and manage the integrated library system
  • How to install free HTTPS certificates on your websites using Let’s Encrypt
  • How to provide anonymous web browsing using TOR and other tools

Join us for this fast-paced presentation to get practical ideas on how to improve privacy at your library.

Apr
17
Mon
CLaw 2017 @ Vancouver
Apr 17 all-day
CLaw 2017 @ Vancouver | Vancouver | British Columbia | Canada

With cloud computing continuing to revolutionise the provision of IT services, and the promises and threats of the Internet of Things (IoT) growing by the day, legal and policy concerns surrounding technology are increasing salience and prominence. Existing and proposed regulatory and governance regimes place obligations on those who manage (process, analyse, use, and collect) data. The end-users of applications provisioned in the cloud and IoT also have certain rights that must be respected – various parties all bear varying degrees of responsibility, which must be properly managed.

Managing these rights and responsibilities is becoming increasingly complex, both technically and legally, particularly due to the emergence of new cloud services and models, as well as because of movements towards collaborative, decentralised and mobile clouds. For instance, the cloud will play an integral role in supporting the evolving IoT, which exacerbates issues of scale and data management while bringing real (physical) world considerations. The increasing prevalence of machine learning technology adds another degree of complexity.

Building on the successes of the previous workshops, CLaw 2017 aims to facilitate an interdisciplinary exploration of tech-legal challenges as regards emerging systems technologies.

SmartPrivacy Washington @ Washington, DC
Apr 17 @ 11:00 am – 4:30 pm
SmartPrivacy Washington @ Washington, DC

SmartPrivacy is a practitioner-focused, half day local workshop where privacy professionals can learn from each other about tools and best practices to operationalize their privacy programs.

The workshop is hosted by OneTrust, however is open to any privacy professional regardless of tool or template of choice.

A combination or structured educational sessions, peer-lead discussions, and networking allow organizations to share practical tips on topics such as GDPR compliance, how to perform a data inventory, identifying the key stakeholders/privacy champions within your organization, and how to get buy-in from executives.

Attendees can expect to receive access to free software tools, how-to guides, and best practices documents on the topics covered.

Workshop Agenda

12:00pm Lunch & Attendee Use Cases

12:30pm PIA/DPIA Workshop and Peer Panel

2:00pm Data Mapping Workshop and Peer Panel

3:30pm Topics of Interest and Discussion

4:30pm Networking and Cocktails

Apr
18
Tue
Global Privacy Summit 2017 @ Washington, DC
Apr 18 – Apr 21 all-day

The Global Privacy Summit is the largest—and most anticipated—gathering of privacy and data protection professionals in the world. Each spring, the privacy community converges on Washington, DC, for world-class education, policy discussion and networking.

The 2nd Annual FPF Tech Lab Open House @ Washington, DC
Apr 18 @ 5:30 pm – 7:30 pm
The 2nd Annual FPF Tech Lab Open House @ Washington, DC | Washington | District of Columbia | United States

The 2nd Annual FPF Tech Lab Open House is an opportunity for us to welcome our members, friends, and colleagues in town for the IAPP Global Privacy Summit. Hosted at our home office in Washington, DC, this event provides a rare occasion for policymakers, regulators, and thought leaders to interact with the latest in privacy-impacting gadgets and new technologies.

Join us on Tuesday, April 18th, from 5:30 -7:30pm at the FPF Office and check out the latest in tech:

– Play with Smart Toys: CognitToys Dino, ChiP Robot, and more

– Outsmart our Smart Home gadgets

– Learn how Wi-Fi and Proximity Sensors can be used to track smartphones in our space

– Come face to face with facial recognition

– Experience virtual reality

– Share fun moments with Snap Spectacles

– And more!

Plus, network with locals and out-of-towners, engage in lively discussions about privacy, all while enjoying drinks and hors d’oeuvres.

Doors open at 5:30 pm; a short program begins at 6:00 pm with remarks from special visiting guests.

By invitation only. Please contact [email protected] for more information.

Apr
20
Thu
April CISO Forum Washington DC 2017 @ Washington, DC
Apr 20 – Apr 21 all-day
April CISO Forum Washington DC 2017 @ Washington, DC | Washington | District of Columbia | United States

Theme: Information Security, Privacy and Legal Collaboration
Date: April 20-21, 2017
Location: Hotel Monaco, 700 F Street SW, Washington D.C. 20004

CISOs are encouraged to bring their General Counsel or Chief Privacy Officer to this event for a collaborative learning experience. 

Information Security, Privacy and Legal programs must be closely aligned to be successful in today’s world. Customer and vendor contracts require strong security language. Privacy has moved to the forefront of a global stage. Response to data breaches are often coordinated through Legal departments to protect privilege. Increasing global regulations drives change to Information Security and Privacy practices. Join your Information Security, Legal and Privacy leadership peers to discuss timely issues in these areas.
Note:  This CISO Executive Forum directly follows the IAPP Global Privacy Summit being held within walking distance on April 19-20.  Consider taking advantage of this opportunity to attend both events!

Registration:

Type Fees and Benefits Registration Link
ISSA CISO Executive Members Complimentary meeting registration and one complimentary night of hotel accommodations* click here to register

learn about CISO Executive Membership here

First Time CISO Guests or General Counsel/ Privacy Officer Guests Complimentary meeting registration click here to apply
(attendance is subject to approval)
Returning Guests $400 click here to apply**
(attendance is subject to approval)

*CISO Member is responsible for making his or her own hotel reservations. Reservations must be made at the host hotel in the ISSA room block to qualify for complimentary one (1) night lodging.

**Upon verification of eligibility, guest will be invoiced for the $400 registration fee


Hotel Monaco:

Click here to reserve your room at the Hotel Monaco. The daily rate is $289 plus state and local taxes. Reservations are available until March 31, 2017 or until the block sells out, whichever comes first. Space is limited.

Transportation:
New to Uber? Join here to earn up to $15 off your first ride!

Agenda:

April 20, 2017
4:30 p.m. – 5:00 p.m. Registration and Cocktails
 5:00 p.m. – 7:00 p.m. Opening Dinner
7:00 p.m. – 10:00 p.m. Opening Reception at the Spy Museum
Sponsored by HP

April 21, 2017

 

8:00 a.m. – 8:50 a.m. Registration and Breakfast
8:50 a.m. – 9:15 a.m. Opening Comments and Welcome Address
9:15 a.m. – 10:30 a.m. Morning Presentation
10:30 a.m. – 11:00 a.m. Networking Break
11:00 a.m. – 12:00 p.m. Second Presentation
12:00 p.m. – 1:15 p.m. Lunch Presentation
1:15 p.m. – 2:15 p.m. Presentation
2:15 p.m. – 2:30 p.m. Networking Break
2:30 p.m. – 3:30 p.m. Presentation
3:30 p.m. – 3:45 p.m. Networking Break
3:45 p.m. – 4:00 p.m. Sponsor Prize Drawing
4:00 p.m. – 5:00 p.m. The Inspector General’s Emerging Role in Privacy
Theresa Grafenstine: Inspector General of the US House of Representatives

 

Questions? Please contact Leah Lewis: 1 866 349 5818 extension 4082.

Sponsors:

For sponsorship opportunities, please contact Joe Cavarretta: 1 866 349 5818 extension 4095.

CDT Tech Prom @ Washington, DC
Apr 20 @ 7:00 pm – 10:00 pm
CDT Tech Prom @ Washington, DC

CDT’s 2017 Annual Dinner will take place on the evening of April 20, 2017, at the Washington Hilton. The evening, fondly known as Tech Prom, will feature the most influential minds of today’s tech policy world, and will highlight the most pressing issues in the field. It will also provide opportunities to mingle, connect, and exchange views with a variety of attendees from all sectors.

Event Details
Cocktail Reception
Dinner
Dessert Reception

Please contact [email protected] with any questions about next year’s event.

Subscribe to receive updates from FPF