Home

Use our global calendar of privacy events to locate an event near you.

 

FILTER BY

May
10
Wed
GDPR Practitioner Certificate @ Leeds
May 10 @ 10:00 am – Jun 7 @ 4:30 pm
GDPR Practitioner Certificate @ Leeds | Leeds | England | United Kingdom

This course will teach you everything you need to know to be a successful Data Protection Officer as required by the GDPR. The course takes place over four days (one day per week) and involves lectures, discussion and practical exercises. This is followed by a written assessment on day 5. Candidates are then required to complete a project (in their own time) to achieve the certificate.

May
11
Thu
GDPR Practitioner Certificate @ Bristol
May 11 @ 10:00 am – Jun 8 @ 4:30 pm
GDPR Practitioner Certificate @ Bristol | Bristol | England | United Kingdom

This course will teach you everything you need to know to be a successful Data Protection Officer as required by the GDPR. The course takes place over four days (one day per week) and involves lectures, discussion and practical exercises. This is followed by a written assessment on day 5. Candidates are then required to complete a project (in their own time) to achieve the certificate.

May
22
Mon
FPF Advisory Board Annual Meeting @ Middleburg
May 22 – May 24 all-day

Members only event that gathers Future of Privacy Forum‘s (FPF) leading academic, advocacy and corporate stakeholders.  By invitation only. For FPF membership information, please contact Barbara Kelly at [email protected].

38th IEEE Symposium on Security and Privacy @ San Jose
May 22 – May 24 all-day
38th IEEE Symposium on Security and Privacy @ San Jose | San Jose | California | United States

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. The 2017 Symposium will mark the 38th annual meeting of this flagship conference.

The Symposium will be held on May 22-24, 2017, and the Security and Privacy Workshops will be held on May 25, 2017. Both events will be in San Jose, CA at the Fairmont Hotel.

May
23
Tue
GSMA Mobile 360 Series – Privacy & Security @ The Hague
May 23 – May 24 all-day
GSMA Mobile 360 Series – Privacy & Security @ The Hague | Den Haag | Zuid-Holland | Netherlands

Are data privacy and security your top corporate priorities? Find out why they should be on 23-24 May, 2017 in The Hague, Netherlands.

The GSMA, in cooperation with The Hague Security Delta and The Municipality of The Hague, is hosting the second annual Mobile 360 – Privacy & Security event to address the inevitable challenges that enterprises face with digital transformation. This event will address these challenges and focus on building digital-oriented businesses on trust, security and privacy. Across two days, these topics will be highlighted through keynotes, panel discussions, workshops, and technology demonstrations.

Space is limited; register today at www.mobile360series.com.

.

May
24
Wed
Planning for the Future: A Conference About Identity Theft @ Washington, DC
May 24 all-day
Planning for the Future: A Conference About Identity Theft @ Washington, DC | Washington | District of Columbia | United States

CONSTITUTION CENTER

400 7th St SW, Washington, DC 20024 | Directions & Nearby

EVENT DESCRIPTION

Ten years ago, President Bush launched a new era in the fight against identity theft by issuing an executive order establishing the Identity Theft Task Force, which the Commission co-chaired. In the ensuing ten years, great strides have been made to combat identity theft but it remains a significant problem for American consumers. Last calendar year, the Federal Trade Commission received nearly 500,000 identity theft complaints and the Department of Justice reports that in 2014 17.6 million individuals – 7% of all U.S. residents age 16 and older – were victims of one or more incidents of identity theft.

On May 24, 2017, the Federal Trade Commission will host an all-day conference to take a comprehensive look at how identity theft has evolved over the last decade and what we can do to address this challenge in the future.

The unauthorized disclosure of personal information can result in identity theft and other frauds. Data breaches, lost equipment, and insiders have made sensitive consumer information available for identity thieves to use in a variety of ways. Because consumers often reuse their usernames and passwords, identity thieves with access to this information may have access to additional consumer accounts. Identity thieves are using the information they obtain to perpetrate fraud against consumers, businesses and the government; obtain employment and medical care; and hide from law enforcement.

Identity theft can have ramifications beyond financial harm. For example, consumers may be denied access to crucial services or medical care. Identity theft can also pose a threat to public safety, particularly when used to create fraudulent identity documents that facilitate criminal activity or enable individuals to hide from law enforcement.

The conference will gather input from academics, business and industry representatives, government experts and consumer advocates. We’ll look at the current state of identity theft, examine potential future challenges, and discuss how to address these issues. The conference will be open to the public and take place at the FTC’s Constitution Center building, 400 7th St., S.W., Washington, DC. The FTC invites comment from the public on the issues.

The event will address questions such as:

  • What types of information do identity thieves steal? How do identity thieves obtain this information? What can the private sector and government do to inhibit access to this information?
  • How much of this information comes from the dark or deep web? What types of information is available? How do these markets operate? How much does it cost identity thieves to obtain this information? How have these markets changed in recent years? How will these markets change in the next few years?
  • How do identity thieves use this information? How have identity theft related frauds evolved? What are some of the potential new frauds? How do we quantify the magnitude and the impact on consumers, businesses, and the government?
  • What threats to public safety can result from identity theft? How will these threats evolve? What can be done to protect against these threats?
  • How are identity thieves utilizing synthetic identities? What are the challenges associated with identifying synthetic identities? Are current identity monitoring tools effective in notifying individuals that a synthetic identity associated with some of their information exists?
  • Are certain populations more vulnerable to identity theft? What can the private sector and the government do to protect these vulnerable populations? How do we quantify the magnitude and the impact on these vulnerable populations?
  • What resources are available to help identity theft victims? What are the limitations of these resources? What additional tools are needed to protect individuals from becoming victims of identity theft, mitigating the harm caused by identity theft, and restoring individuals’ identities? What is the role of the private sector, non-profits, academia, and the government in developing these tools?
  • How effective are current monitoring and restoration services? How will these services evolve?
  • How can the private sector, non-profits, academia, and government work together to address all these issues?

The conference will be available online via webcast. A webcast link will be added to this page on the day of the event.

CONTACT
If you have questions about the workshop, please email [email protected](link sends e-mail) or contact John Krebs at (202) 326-2692.

Boston Bar Association’s Inaugural Privacy & Cybersecurity Conference @ Boston
May 24 @ 9:00 am – 4:00 pm
Boston Bar Association’s Inaugural Privacy & Cybersecurity Conference @ Boston | Boston | Massachusetts | United States

The Boston Bar Association’s inaugural Privacy Conference will bring together attorneys from private practice and in-house legal departments to network and discuss key topics and trends in privacy and cybersecurity.

This full-day conference will cover a wide range of topics from data breach response and litigation to compliance and transactional issues. Panelists will discuss new developments in the legal and regulatory landscape, while providing strategies to effectively prepare and respond to your client’s needs and offer insights into challenges and opportunities ahead.

May
25
Thu
2017 International Workshop on Privacy Engineering – IWPE’17 @ San Jose
May 25 all-day
2017 International Workshop on Privacy Engineering – IWPE'17 @ San Jose | San Jose | California | United States

Abstract and paper submission deadlines have been extended. Check here the new dates.

Privacy engineering research has never been a more timely endeavor. Ongoing news reports regarding global surveillance programs, massive personal data breaches in corporate databases, and notorious examples of personal tragedies due to privacy violations have intensified societal demands for privacy-friendly systems. In response, current legislative and standardization processes worldwide are seeking to strengthen individuals’ privacy by introducing legal and organizational frameworks that personal data collectors and processors must follow. As a result, engineers are increasingly expected to build and maintain systems that preserve privacy and comply with data protection standards in different ICT domains (such as health, energy, transportation, social computing, law enforcement, and public services) and on different infrastructures and architectures (such as cloud, grid, or mobile computing).

Although there is a consensus on the benefits of an engineering approach to privacy, few concrete proposals exist for models, methodologies, techniques and tools to support engineers and organizations in this endeavor. Work that focuses on helping organizations and software developers to identify and adopt appropriate privacy engineering methods, techniques and tools in their daily practices is also missing. Furthermore, it is difficult to systematically evaluate whether the systems developed using privacy engineering methodologies comply with legal frameworks, provide necessary technical assurances, and fulfill users’ privacy requirements.

Clearly, more research is needed in developing methods that can help translate legal and normative concepts, as well as user expectations, into systems requirements. There is also a growing need for techniques and tools to support organizations and engineers in developing and maintaining (socio-)technical systems that meet these requirements. In an effort to close the gaps in research, the topics of IWPE’17 include all aspects of privacy engineering, ranging from its theoretical foundations, engineering approaches and support infrastructures to its practical application in projects of different scales.

Specifically, we are seeking the following kinds of papers:
1) technical solution papers that illustrate a novel formalism, method or other research finding with preliminary evaluation;
2) experience and practice papers that describe a case study, challenge or lessons learned in a specific domain;
3) early evaluations of tools and techniques that support engineering tasks in privacy requirements, design, implementation, testing, etc.;
4) interdisciplinary studies or critical reviews of existing privacy engineering concepts, methods and frameworks;
5) vision papers that take a clear position informed by evidence based on a thorough literature review.

Workshop on Technology and Consumer Protection (ConPro ’17) @ San Jose
May 25 all-day
Workshop on Technology and Consumer Protection (ConPro ’17) @ San Jose | San Jose | California | United States

Advances in technology come with countless benefits for society, but these advances sometimes introduce new risks as well. Various characteristics of technology, including its increasing complexity, may present novel challenges in understanding its impact and addressing its risks. Regulatory agencies have broad jurisdiction to protect consumers against certain harmful practices (typically called “deceptive and unfair” practices in the United States), but sophisticated technical analysis may be necessary to assess practices, risks, and more. Moreover, consumer protection covers an incredibly broad range of issues, from substantiation of claims that a smartphone app provides advertised health benefits to the adequacy of practices for securing sensitive customer data.

The Workshop on Technology and Consumer Protection (ConPro ’17) will explore computer science topics with an impact on consumers. This workshop has a strong security and privacy slant, with an overall focus on ways in which computer science can prevent, detect, or address the potential for technology to deceive or unfairly harm consumers. Attendees will skew towards academic and industry researchers but will include researchers from government agencies with a consumer protection mission, including the Federal Trade Commission—the U.S. government’s primary consumer protection body. Research advances presented at the workshop may help improve the lives of consumers, and discussions at the event may help researchers understand how their work can best promote consumer welfare given laws and norms surrounding consumer protection.

For more information, see the call for papers.

May
29
Mon
32nd International Conference on ICT Systems Security and Privacy Protection – IFIP SEC 2017 @ Rome
May 29 – May 31 all-day
32nd International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2017 @ Rome | Roma | Lazio | Italy

Welcome to the IFIP International Information Security and Privacy Conference Web Site. The SEC conferences are a series of well-established international conferences on Security and Privacy. SEC is the flagship event of the International Federation for Information Processing (IFIP) Technical Committee 11 (TC-11).

The 10th World Information Security Education Conference – WISE10 (hosted by IFIP WG 11.8) is co-located with IFIP SEC 2017. It will take place between Monday May 29th an Wednesday May 31st. Please visit the WISE10 website for more details.

The IFIP WG11.4 Workshop – iNetSec on “Open Problems in Network Security” is co-located with IFIP SEC 2017. It will take place between Tuesday May 30th and Wednesday May 31st 2017, which will be included in the schedule of the IFIP SEC conference program. Please visit the iNetSec website for the call for paper.

The conference will be hosted at the National Research Council of Italy (CNR) that is located in Rome, Piazzale Aldo Moro 7 (zipcode 00185, Rome, Italy), in the city centre of Rome, and near the main train station (Termini). The place is in front of the main University in Rome (“La Sapienza”).

Subscribe to receive updates from FPF