Home

Use our global calendar of privacy events to locate an event near you.

 

FILTER BY

May
10
Wed
GDPR Practitioner Certificate @ Leeds
May 10 @ 10:00 am – Jun 7 @ 4:30 pm
GDPR Practitioner Certificate @ Leeds | Leeds | England | United Kingdom

This course will teach you everything you need to know to be a successful Data Protection Officer as required by the GDPR. The course takes place over four days (one day per week) and involves lectures, discussion and practical exercises. This is followed by a written assessment on day 5. Candidates are then required to complete a project (in their own time) to achieve the certificate.

May
11
Thu
GDPR Practitioner Certificate @ Bristol
May 11 @ 10:00 am – Jun 8 @ 4:30 pm
GDPR Practitioner Certificate @ Bristol | Bristol | England | United Kingdom

This course will teach you everything you need to know to be a successful Data Protection Officer as required by the GDPR. The course takes place over four days (one day per week) and involves lectures, discussion and practical exercises. This is followed by a written assessment on day 5. Candidates are then required to complete a project (in their own time) to achieve the certificate.

May
17
Wed
Governance of Emerging Technology 2017 @ Phoenix
May 17 – May 19 all-day
Governance of Emerging Technology 2017 @ Phoenix | Phoenix | Arizona | United States

The Fifth Annual Conference on Governance of Emerging Technologies:

Law, Policy and Ethics held at the new

Beus Center for Law & Society in Phoenix, AZ

May 17-19, 2017!

Call for Abstracts – Now Closed

The conference will consist of plenary and session presentations and discussions on regulatory, governance, legal, policy, social and ethical aspects of emerging technologies, including (but not limited to) nanotechnology, synthetic biology, gene editing, biotechnology, genomics, personalized medicine, human enhancement technologies, telecommunications, information technologies, surveillance technologies, geoengineering, neuroscience, artificial intelligence, and robotics. The conference is premised on the belief that there is much to be learned and shared from and across the governance experience and proposals for these various emerging technologies.Some particular themes that will be emphasized at this year’s conference include cybersecurity, artificial intelligence, autonomous systems, drones, CRISPR/gene editing, big data, data analytics, transnational coordination, technology unemployment, internet of things, neuroscience, privacy, longevity, bitcoin/blockchain, and digital health.

Keynote Speakers:

Gillian HadfieldRichard L. and Antoinette Schamoi Kirtland Professor of Law and Professor of Economics USC Gould School of Law

Stuart Russell, Professor at Berkeley, is a computer scientist known for his contributions to artificial intelligence

Craig Shank, Vice President for Corporate Standards Group in Microsoft’s Corporate, External and Legal Affairs (CELA)

Plenary Panels:

Innovation – Responsible and/or Permissionless

Ellen-Marie Forsberg, Senior Researcher/Research Manager at Oslo and Akershus University College of Applied Sciences

Adam Thierer, Senior Research Fellow with the Technology Policy Program at the Mercatus Center at George Mason University

Wendell Wallach, Consultant, ethicist, and scholar at Yale University’s Interdisciplinary Center for Bioethics

Gene Drives, Trade and International Regulations

Gary Marchant, Regents’ Professor of Law, Professor of Law Faculty Director and Faculty Fellow, Center for Law, Science & Innovation, Arizona State University

Andrew Maynard, Senior Sustainability Scholar, Julie Ann Wrigley Global Institute of Sustainability Director, Risk Innovation Lab, School for the Future of Innovation in Society Professor, School for the Future of Innovation in Society, Arizona State University

Jennifer Kuzma / Goodnight-North Carolina GlaxoSmithKline Foundation Distinguished Professor in Social Sciences in the School of Public and International Affairs (SPIA) and co-director of the Genetic Engineering and Society (GES) Center at North Carolina State University

Greg Kaebnick, Director, Editorial Department; Editor, Hastings Center Report; Research Scholar, Hastings Center

Marc Saner, Inaugural Director of the Institute for Science, Society and Policy, and Associate Professor, University of Ottawa Department of Geography

Big Data

George Poste, Chief Scientist, Complex Adaptive Systems Initiative (CASI) (http://www.casi.asu.edu/), Regents’ Professor and Del E. Webb Chair in Health Innovation, Arizona State University

Pilar Ossorio, Professor of Law and Bioethics where she is on the faculties of the Law School and the Department of Medical History and Bioethics at the Medical School, University of Wisconsin

Responsible Development of AI

Wendell Wallach, Consultant, Ethicist, and Scholar at Yale University’s Interdisciplinary Center for Bioethics

Kay Firth-Butterfield, Barrister and part-time Judge who has worked as a mediator, arbitrator, business owner and professor in the United Kingdom

Kate Crawford, Principal Researcher at Microsoft Research New York City, a Visiting Professor at MIT’s Center for Civic Media, and a Senior Fellow at NYU’s Information Law Institute

Subbarao Kambhampati, Senior Sustainability Scientist, Julie Ann Wrigley Global Institute of Sustainability, Professor, School of Computing, Informatics and Decision Systems Engineering, Ira A. Fulton Schools of Engineering, Arizona State University

  Existential and Catastrophic Ricks

Julius Weitzdoerfer, the 2014 Charles & Katharine Darwin Research Fellow and Director of Studies in law at Darwin College, and an affiliated lecturer teaching EU Environmental and Sustainable Development Law, CSER, University of Cambridge

Catherine Rhodes, Academic Project Manager, Centre for the Study of Existential Risk at CSER, University of Cambridge

Margaret E. Kosal,  Associate Director of the Sam Nunn Security Program, Georgia Institute of Technology

Tony Barrett, Co-Founder and Director of Research of the Global Catastrophic Risk Institute

Cybersecurity (half-day) — more coming soon!

May
22
Mon
FPF Advisory Board Annual Meeting @ Middleburg
May 22 – May 24 all-day

Members only event that gathers Future of Privacy Forum‘s (FPF) leading academic, advocacy and corporate stakeholders.  By invitation only. For FPF membership information, please contact Barbara Kelly at [email protected].

38th IEEE Symposium on Security and Privacy @ San Jose
May 22 – May 24 all-day
38th IEEE Symposium on Security and Privacy @ San Jose | San Jose | California | United States

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. The 2017 Symposium will mark the 38th annual meeting of this flagship conference.

The Symposium will be held on May 22-24, 2017, and the Security and Privacy Workshops will be held on May 25, 2017. Both events will be in San Jose, CA at the Fairmont Hotel.

Detecting and Blocking Bots and Non Human Visitors (Workshop) @ San Francisco
May 22 @ 5:30 pm – 8:00 pm

Women in Security and Privacy (WISP) is proud to partner with PerimeterX to offer a 90 minutes hands-on web security workshop that discusses the threats from the latest generation of malicious Bots (nonhuman automated tools) and puts you into the drivers’ seat to learn on how to protect your web application.

Today up to 50% of a company’s web traffic can come from Bots and create a real threat to websites and applications. Bots are ideal workers for repetitive and complex tasks and can easily and efficiently run on different hosts and cloud services—or invisible as malware on infected machines. Bad Bots are participating in different types of attacks impacting all types of applications and businesses—performing the entire scale of attacks from web scraping, account abuse (account creation or account takeover), credit card and coupon guessing scalping, and click fraud. Bots range in complexity and abilities from simple scripts to full browser-based tools that can render complex pages and even solve CAPTCHA challenges.

Please feel free to invite your fellow privacy and security colleagues, but hurry! Space is limited.

Prerequisite Knowledge:

  • Comfortable installing packages and running simple scripts and tools.
  • Basic medium programming skills:
    • We’ll be using Python for examples and exercises in the workshop
    • Installing packages different modules
  • A basic understanding Web services – specifically HTTP request/response.

Agenda:

5:30 – 6:00 pm – Registration, Networking, Food & Drinks

6:00 – 6:05 pm – Welcome

6:05 – 6:30 am – Presentation

6:30 – 8:00 am – Workshop

We will discuss / examine how Bots work, explain how to operate a few common Bots, and, most importantly, show what you can do to detect and block malicious activity while enabling your users and good Bots to work uninterrupted. We’ll introduce a few common Bots used by attackers, like PhantomJS and Selenium, to create a testing environment and verify that you can efficiently detect such tools. Then we’ll explore a variety of techniques and open source tools and libraries you can use in order to detect different Bots and outline the things to consider when you suspect a request is being originated by a Bot, such as:

  • Blocking users not supporting JavaScript and cookies
  • Sending hidden challenges that will bother bots but won’t affect real users’ experience
  • Honeypots and traps to catch malicious automatic tools
  • Detecting and whitelisting the good Bots

Presenters:

  • Ido Safruti, Founder and CTO

  • Corinna Krueger, VP of Marketing

  • Christopher Federico, Lead Solutions Architect

Materials or Downloads Needed in Advance

What You Will Learn

  • Gain an awareness of threats from malicious Bots
  • Learn how some of these bots operate
  • Explore open source tools and techniques to detect and better manage Bots

Disclaimer: Photography

From time to time WISP uses photographs of its events in its promotional materials (e.g., the wisporg.com website). Unless this permission is revoked in writing to WISP, by virtue of their attendance, event attendees, volunteers, and speakers agree to the use of their likeness in such materials.

Thank you, Autodesk, for hosting us! Thank you, PerimeterX, for sponsoring the event, food and drinks!

Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries.

PerimeterX™ is a provider of scalable, behavior-based threat protection technology for the web, cloud and mobile. Its security service PerimeterX Bot Defender™ accurately protects commerce, media and enterprise websites from all types of automated or non-human attacks, at any scale. Unlike other security solutions which place a proxy between customer and website, PerimeterX can detect and stop any automated threats with integration that is as simple as adding a JavaScript tag. For more information, please visit https://www.perimeterx.com.

 

May
23
Tue
GSMA Mobile 360 Series – Privacy & Security @ The Hague
May 23 – May 24 all-day
GSMA Mobile 360 Series – Privacy & Security @ The Hague | Den Haag | Zuid-Holland | Netherlands

Are data privacy and security your top corporate priorities? Find out why they should be on 23-24 May, 2017 in The Hague, Netherlands.

The GSMA, in cooperation with The Hague Security Delta and The Municipality of The Hague, is hosting the second annual Mobile 360 – Privacy & Security event to address the inevitable challenges that enterprises face with digital transformation. This event will address these challenges and focus on building digital-oriented businesses on trust, security and privacy. Across two days, these topics will be highlighted through keynotes, panel discussions, workshops, and technology demonstrations.

Space is limited; register today at www.mobile360series.com.

.

GDPR: DPIAs and Risk @ Online
May 23 @ 12:00 pm – 1:00 pm

9:00AM-10:00AM PT / 12:00PM-1:00PM ET

Register NOW for this webinar, as our speakers will discuss:

  • How to determine when a DPIA is required under GDPR
  • Risk assessment – evaluating likelihood and severity
  • Evaluating safeguards and other measures to mitigate the risks
  • Related risk assessment considerations under GDPR, such as legitimate interests and breach notifications

*Can’t make the webinar? Register anyway! We’ll send you a followup email with the slides and recording after the webinar!*


TRUSTe Webinar FAQs

Click here for answers to the most commonly asked webinar related questions!

MARTY ABRAMS
Executive Director & Chief Strategist, Information Accountability Foundation (IAF)
Martin Abrams has 35 years of experience as an information and consumer policy innovator. Multi-stakeholder collaboration has been a key for Abrams in developing practical solutions to dilemmas in information policy. His most recent work has been on big data governance and privacy compliance driven by demonstrable data stewardship. For the past five years, he has led the Global Accountability Project, which has refined the accountability principle that is part of various data protection laws and guidance documents. Abrams has also provided leadership in other policy areas. He worked on multi-layered privacy notices, which changed the way policy makers and organisations thought about privacy transparency. His work is generally reflected in new laws and regulatory guidance in jurisdictions from Asia, across Europe and in the Americas. He has led educational seminars on almost every continent and has been a key advisor to four International Conference of Data Protection and Privacy Commissioners. He has been deeply involved in the development of the APEC Cross Border Privacy Rules and has also been involved with the OECD Working Party on Information Security and Privacy.
HILARY WANDALL
General Counsel & Chief Data Governance Officer, TRUSTe
Hilary is General Counsel and Chief Data Governance Officer at TRUSTe. Previously, she led the Merck Privacy Office and the company’s global privacy program since 2004. She led Merck’s initiative to become the first health care company and second multinational to achieve APEC Cross Border Privacy Rules (CBPR) certification and the first company to achieve CBPR certification of its entire privacy program. Since 2014, Hilary has served on the Executive Committee of the Board of Directors of the International Association of Privacy Professionals, and in 2016 was elected Board Chairman. Hilary received her law degree and MBA from Temple University, Master of Bioethics from the University of Pennsylvania, and Bachelor of Science in Biology from Moravian College. She holds the CIPP/US, CIPP/EU and CIPM certifications.
May 2017 Privacy Lab – Privacy on the Blockchain: An Introduction to Zcash @ San Francisco
May 23 @ 5:30 pm – 7:30 pm
May 2017 Privacy Lab - Privacy on the Blockchain: An Introduction to Zcash @ San Francisco | San Francisco | California | United States

Zcash is the first open-source and decentralized cryptocurrency offering strong privacy in the form of shielded transactions, which are made possible by a novel form of zero-knowledge cryptography called zk-SNARKs. Like Bitcoin, Zcash payments are published on a public blockchain, except the sender, recipient, and amount of a transaction may remain fully private. In this talk, we will provide an uncomplicated overview of Zcash, how it works, the history of the protocol and its conception by a talented group of academics, cryptographers and scientists in the original “Zerocoin” paper, what’s happened since it finally launched in late 2016, and what’s in store for the future of ZEC. We’ll also look at the current state of the network and discuss the remarkable way we generated the public parameters required to construct and verify shielded transactions, in the so-called parameter generation ceremony.

Our speaker is Kevin Gallagher, DevOps Engineer for Zcash Company (@ageis)

May
24
Wed
Planning for the Future: A Conference About Identity Theft @ Washington, DC
May 24 all-day
Planning for the Future: A Conference About Identity Theft @ Washington, DC | Washington | District of Columbia | United States

CONSTITUTION CENTER

400 7th St SW, Washington, DC 20024 | Directions & Nearby

EVENT DESCRIPTION

Ten years ago, President Bush launched a new era in the fight against identity theft by issuing an executive order establishing the Identity Theft Task Force, which the Commission co-chaired. In the ensuing ten years, great strides have been made to combat identity theft but it remains a significant problem for American consumers. Last calendar year, the Federal Trade Commission received nearly 500,000 identity theft complaints and the Department of Justice reports that in 2014 17.6 million individuals – 7% of all U.S. residents age 16 and older – were victims of one or more incidents of identity theft.

On May 24, 2017, the Federal Trade Commission will host an all-day conference to take a comprehensive look at how identity theft has evolved over the last decade and what we can do to address this challenge in the future.

The unauthorized disclosure of personal information can result in identity theft and other frauds. Data breaches, lost equipment, and insiders have made sensitive consumer information available for identity thieves to use in a variety of ways. Because consumers often reuse their usernames and passwords, identity thieves with access to this information may have access to additional consumer accounts. Identity thieves are using the information they obtain to perpetrate fraud against consumers, businesses and the government; obtain employment and medical care; and hide from law enforcement.

Identity theft can have ramifications beyond financial harm. For example, consumers may be denied access to crucial services or medical care. Identity theft can also pose a threat to public safety, particularly when used to create fraudulent identity documents that facilitate criminal activity or enable individuals to hide from law enforcement.

The conference will gather input from academics, business and industry representatives, government experts and consumer advocates. We’ll look at the current state of identity theft, examine potential future challenges, and discuss how to address these issues. The conference will be open to the public and take place at the FTC’s Constitution Center building, 400 7th St., S.W., Washington, DC. The FTC invites comment from the public on the issues.

The event will address questions such as:

  • What types of information do identity thieves steal? How do identity thieves obtain this information? What can the private sector and government do to inhibit access to this information?
  • How much of this information comes from the dark or deep web? What types of information is available? How do these markets operate? How much does it cost identity thieves to obtain this information? How have these markets changed in recent years? How will these markets change in the next few years?
  • How do identity thieves use this information? How have identity theft related frauds evolved? What are some of the potential new frauds? How do we quantify the magnitude and the impact on consumers, businesses, and the government?
  • What threats to public safety can result from identity theft? How will these threats evolve? What can be done to protect against these threats?
  • How are identity thieves utilizing synthetic identities? What are the challenges associated with identifying synthetic identities? Are current identity monitoring tools effective in notifying individuals that a synthetic identity associated with some of their information exists?
  • Are certain populations more vulnerable to identity theft? What can the private sector and the government do to protect these vulnerable populations? How do we quantify the magnitude and the impact on these vulnerable populations?
  • What resources are available to help identity theft victims? What are the limitations of these resources? What additional tools are needed to protect individuals from becoming victims of identity theft, mitigating the harm caused by identity theft, and restoring individuals’ identities? What is the role of the private sector, non-profits, academia, and the government in developing these tools?
  • How effective are current monitoring and restoration services? How will these services evolve?
  • How can the private sector, non-profits, academia, and government work together to address all these issues?

The conference will be available online via webcast. A webcast link will be added to this page on the day of the event.

CONTACT
If you have questions about the workshop, please email [email protected](link sends e-mail) or contact John Krebs at (202) 326-2692.

Subscribe to receive updates from FPF