Home

Use our global calendar of privacy events to locate an event near you.

 

FILTER BY

May
23
Tue
GDPR: DPIAs and Risk @ Online
May 23 @ 12:00 pm – 1:00 pm

9:00AM-10:00AM PT / 12:00PM-1:00PM ET

Register NOW for this webinar, as our speakers will discuss:

  • How to determine when a DPIA is required under GDPR
  • Risk assessment – evaluating likelihood and severity
  • Evaluating safeguards and other measures to mitigate the risks
  • Related risk assessment considerations under GDPR, such as legitimate interests and breach notifications

*Can’t make the webinar? Register anyway! We’ll send you a followup email with the slides and recording after the webinar!*


TRUSTe Webinar FAQs

Click here for answers to the most commonly asked webinar related questions!

MARTY ABRAMS
Executive Director & Chief Strategist, Information Accountability Foundation (IAF)
Martin Abrams has 35 years of experience as an information and consumer policy innovator. Multi-stakeholder collaboration has been a key for Abrams in developing practical solutions to dilemmas in information policy. His most recent work has been on big data governance and privacy compliance driven by demonstrable data stewardship. For the past five years, he has led the Global Accountability Project, which has refined the accountability principle that is part of various data protection laws and guidance documents. Abrams has also provided leadership in other policy areas. He worked on multi-layered privacy notices, which changed the way policy makers and organisations thought about privacy transparency. His work is generally reflected in new laws and regulatory guidance in jurisdictions from Asia, across Europe and in the Americas. He has led educational seminars on almost every continent and has been a key advisor to four International Conference of Data Protection and Privacy Commissioners. He has been deeply involved in the development of the APEC Cross Border Privacy Rules and has also been involved with the OECD Working Party on Information Security and Privacy.
HILARY WANDALL
General Counsel & Chief Data Governance Officer, TRUSTe
Hilary is General Counsel and Chief Data Governance Officer at TRUSTe. Previously, she led the Merck Privacy Office and the company’s global privacy program since 2004. She led Merck’s initiative to become the first health care company and second multinational to achieve APEC Cross Border Privacy Rules (CBPR) certification and the first company to achieve CBPR certification of its entire privacy program. Since 2014, Hilary has served on the Executive Committee of the Board of Directors of the International Association of Privacy Professionals, and in 2016 was elected Board Chairman. Hilary received her law degree and MBA from Temple University, Master of Bioethics from the University of Pennsylvania, and Bachelor of Science in Biology from Moravian College. She holds the CIPP/US, CIPP/EU and CIPM certifications.
May 2017 Privacy Lab – Privacy on the Blockchain: An Introduction to Zcash @ San Francisco
May 23 @ 5:30 pm – 7:30 pm
May 2017 Privacy Lab - Privacy on the Blockchain: An Introduction to Zcash @ San Francisco | San Francisco | California | United States

Zcash is the first open-source and decentralized cryptocurrency offering strong privacy in the form of shielded transactions, which are made possible by a novel form of zero-knowledge cryptography called zk-SNARKs. Like Bitcoin, Zcash payments are published on a public blockchain, except the sender, recipient, and amount of a transaction may remain fully private. In this talk, we will provide an uncomplicated overview of Zcash, how it works, the history of the protocol and its conception by a talented group of academics, cryptographers and scientists in the original “Zerocoin” paper, what’s happened since it finally launched in late 2016, and what’s in store for the future of ZEC. We’ll also look at the current state of the network and discuss the remarkable way we generated the public parameters required to construct and verify shielded transactions, in the so-called parameter generation ceremony.

Our speaker is Kevin Gallagher, DevOps Engineer for Zcash Company (@ageis)

May
24
Wed
Planning for the Future: A Conference About Identity Theft @ Washington, DC
May 24 all-day
Planning for the Future: A Conference About Identity Theft @ Washington, DC | Washington | District of Columbia | United States

CONSTITUTION CENTER

400 7th St SW, Washington, DC 20024 | Directions & Nearby

EVENT DESCRIPTION

Ten years ago, President Bush launched a new era in the fight against identity theft by issuing an executive order establishing the Identity Theft Task Force, which the Commission co-chaired. In the ensuing ten years, great strides have been made to combat identity theft but it remains a significant problem for American consumers. Last calendar year, the Federal Trade Commission received nearly 500,000 identity theft complaints and the Department of Justice reports that in 2014 17.6 million individuals – 7% of all U.S. residents age 16 and older – were victims of one or more incidents of identity theft.

On May 24, 2017, the Federal Trade Commission will host an all-day conference to take a comprehensive look at how identity theft has evolved over the last decade and what we can do to address this challenge in the future.

The unauthorized disclosure of personal information can result in identity theft and other frauds. Data breaches, lost equipment, and insiders have made sensitive consumer information available for identity thieves to use in a variety of ways. Because consumers often reuse their usernames and passwords, identity thieves with access to this information may have access to additional consumer accounts. Identity thieves are using the information they obtain to perpetrate fraud against consumers, businesses and the government; obtain employment and medical care; and hide from law enforcement.

Identity theft can have ramifications beyond financial harm. For example, consumers may be denied access to crucial services or medical care. Identity theft can also pose a threat to public safety, particularly when used to create fraudulent identity documents that facilitate criminal activity or enable individuals to hide from law enforcement.

The conference will gather input from academics, business and industry representatives, government experts and consumer advocates. We’ll look at the current state of identity theft, examine potential future challenges, and discuss how to address these issues. The conference will be open to the public and take place at the FTC’s Constitution Center building, 400 7th St., S.W., Washington, DC. The FTC invites comment from the public on the issues.

The event will address questions such as:

  • What types of information do identity thieves steal? How do identity thieves obtain this information? What can the private sector and government do to inhibit access to this information?
  • How much of this information comes from the dark or deep web? What types of information is available? How do these markets operate? How much does it cost identity thieves to obtain this information? How have these markets changed in recent years? How will these markets change in the next few years?
  • How do identity thieves use this information? How have identity theft related frauds evolved? What are some of the potential new frauds? How do we quantify the magnitude and the impact on consumers, businesses, and the government?
  • What threats to public safety can result from identity theft? How will these threats evolve? What can be done to protect against these threats?
  • How are identity thieves utilizing synthetic identities? What are the challenges associated with identifying synthetic identities? Are current identity monitoring tools effective in notifying individuals that a synthetic identity associated with some of their information exists?
  • Are certain populations more vulnerable to identity theft? What can the private sector and the government do to protect these vulnerable populations? How do we quantify the magnitude and the impact on these vulnerable populations?
  • What resources are available to help identity theft victims? What are the limitations of these resources? What additional tools are needed to protect individuals from becoming victims of identity theft, mitigating the harm caused by identity theft, and restoring individuals’ identities? What is the role of the private sector, non-profits, academia, and the government in developing these tools?
  • How effective are current monitoring and restoration services? How will these services evolve?
  • How can the private sector, non-profits, academia, and government work together to address all these issues?

The conference will be available online via webcast. A webcast link will be added to this page on the day of the event.

CONTACT
If you have questions about the workshop, please email [email protected](link sends e-mail) or contact John Krebs at (202) 326-2692.

Boston Bar Association’s Inaugural Privacy & Cybersecurity Conference @ Boston
May 24 @ 9:00 am – 4:00 pm
Boston Bar Association’s Inaugural Privacy & Cybersecurity Conference @ Boston | Boston | Massachusetts | United States

The Boston Bar Association’s inaugural Privacy Conference will bring together attorneys from private practice and in-house legal departments to network and discuss key topics and trends in privacy and cybersecurity.

This full-day conference will cover a wide range of topics from data breach response and litigation to compliance and transactional issues. Panelists will discuss new developments in the legal and regulatory landscape, while providing strategies to effectively prepare and respond to your client’s needs and offer insights into challenges and opportunities ahead.

May
25
Thu
2017 International Workshop on Privacy Engineering – IWPE’17 @ San Jose
May 25 all-day
2017 International Workshop on Privacy Engineering – IWPE'17 @ San Jose | San Jose | California | United States

Abstract and paper submission deadlines have been extended. Check here the new dates.

Privacy engineering research has never been a more timely endeavor. Ongoing news reports regarding global surveillance programs, massive personal data breaches in corporate databases, and notorious examples of personal tragedies due to privacy violations have intensified societal demands for privacy-friendly systems. In response, current legislative and standardization processes worldwide are seeking to strengthen individuals’ privacy by introducing legal and organizational frameworks that personal data collectors and processors must follow. As a result, engineers are increasingly expected to build and maintain systems that preserve privacy and comply with data protection standards in different ICT domains (such as health, energy, transportation, social computing, law enforcement, and public services) and on different infrastructures and architectures (such as cloud, grid, or mobile computing).

Although there is a consensus on the benefits of an engineering approach to privacy, few concrete proposals exist for models, methodologies, techniques and tools to support engineers and organizations in this endeavor. Work that focuses on helping organizations and software developers to identify and adopt appropriate privacy engineering methods, techniques and tools in their daily practices is also missing. Furthermore, it is difficult to systematically evaluate whether the systems developed using privacy engineering methodologies comply with legal frameworks, provide necessary technical assurances, and fulfill users’ privacy requirements.

Clearly, more research is needed in developing methods that can help translate legal and normative concepts, as well as user expectations, into systems requirements. There is also a growing need for techniques and tools to support organizations and engineers in developing and maintaining (socio-)technical systems that meet these requirements. In an effort to close the gaps in research, the topics of IWPE’17 include all aspects of privacy engineering, ranging from its theoretical foundations, engineering approaches and support infrastructures to its practical application in projects of different scales.

Specifically, we are seeking the following kinds of papers:
1) technical solution papers that illustrate a novel formalism, method or other research finding with preliminary evaluation;
2) experience and practice papers that describe a case study, challenge or lessons learned in a specific domain;
3) early evaluations of tools and techniques that support engineering tasks in privacy requirements, design, implementation, testing, etc.;
4) interdisciplinary studies or critical reviews of existing privacy engineering concepts, methods and frameworks;
5) vision papers that take a clear position informed by evidence based on a thorough literature review.

Workshop on Technology and Consumer Protection (ConPro ’17) @ San Jose
May 25 all-day
Workshop on Technology and Consumer Protection (ConPro ’17) @ San Jose | San Jose | California | United States

Advances in technology come with countless benefits for society, but these advances sometimes introduce new risks as well. Various characteristics of technology, including its increasing complexity, may present novel challenges in understanding its impact and addressing its risks. Regulatory agencies have broad jurisdiction to protect consumers against certain harmful practices (typically called “deceptive and unfair” practices in the United States), but sophisticated technical analysis may be necessary to assess practices, risks, and more. Moreover, consumer protection covers an incredibly broad range of issues, from substantiation of claims that a smartphone app provides advertised health benefits to the adequacy of practices for securing sensitive customer data.

The Workshop on Technology and Consumer Protection (ConPro ’17) will explore computer science topics with an impact on consumers. This workshop has a strong security and privacy slant, with an overall focus on ways in which computer science can prevent, detect, or address the potential for technology to deceive or unfairly harm consumers. Attendees will skew towards academic and industry researchers but will include researchers from government agencies with a consumer protection mission, including the Federal Trade Commission—the U.S. government’s primary consumer protection body. Research advances presented at the workshop may help improve the lives of consumers, and discussions at the event may help researchers understand how their work can best promote consumer welfare given laws and norms surrounding consumer protection.

For more information, see the call for papers.

May
29
Mon
32nd International Conference on ICT Systems Security and Privacy Protection – IFIP SEC 2017 @ Rome
May 29 – May 31 all-day
32nd International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2017 @ Rome | Roma | Lazio | Italy

Welcome to the IFIP International Information Security and Privacy Conference Web Site. The SEC conferences are a series of well-established international conferences on Security and Privacy. SEC is the flagship event of the International Federation for Information Processing (IFIP) Technical Committee 11 (TC-11).

The 10th World Information Security Education Conference – WISE10 (hosted by IFIP WG 11.8) is co-located with IFIP SEC 2017. It will take place between Monday May 29th an Wednesday May 31st. Please visit the WISE10 website for more details.

The IFIP WG11.4 Workshop – iNetSec on “Open Problems in Network Security” is co-located with IFIP SEC 2017. It will take place between Tuesday May 30th and Wednesday May 31st 2017, which will be included in the schedule of the IFIP SEC conference program. Please visit the iNetSec website for the call for paper.

The conference will be hosted at the National Research Council of Italy (CNR) that is located in Rome, Piazzale Aldo Moro 7 (zipcode 00185, Rome, Italy), in the city centre of Rome, and near the main train station (Termini). The place is in front of the main University in Rome (“La Sapienza”).

GDPR Countdown event – the 1st conference dedicated to Privacy in Luxembourg @ Luxembourg
May 29 @ 10:00 am – 8:00 pm
GDPR Countdown event - the 1st conference dedicated to Privacy in Luxembourg @ Luxembourg | Luxembourg | District de Luxembourg | Luxembourg

MGSI and NautaDutilh are pleased to invite you to the first show entirely dedicated to data protection in Luxembourg.

Come and meet with experts on this day and prepare your compliance before the implementation of the general regulations on data protection, May 25, 2018!

Program (10 a.m. to 8 p.m.)

Keynotes, conferences, workshops
European Privacy Seal presentation Sebastian Meissner, Head of the Certification Authority EuroPriSe (FR)
Feedback customer experience – gap analysis Johan Bierebeeck, Finance & Performance Director at Editus
Panel Discussion
Closing Cocktail

Official launch of new EuroPriSe certification service MGSI
MGSI is the first company in Luxembourg to offer legal services and expert technical EuroPriSe.

Price: Free

Places limited, registration subject to approval

May
30
Tue
The Potential for Impact Assessments in eHealth and mHealth Projects @ Brussels
May 30 @ 12:00 pm – 2:00 pm
The Potential for Impact Assessments in eHealth and mHealth Projects @ Brussels | Bruxelles | Bruxelles | Belgium

The use of Impact assessments has gradually become more common in areas of technological innovation or novel practices where questions of privacy arise. This trend will likely take further root given the requirement set forth by article 35 of the General Regulation on Data Protection (GDPR). This article requires that data controllers conduct an impact assessment in a number of instances, including where the rights and freedoms of data subjects are at risk. As this BPH presentation will discuss, the nature of such an impact assessment and the situations in which it is required make it ideal for use in projects related to eHealth and mHealth. Such projects frequently make use of large amounts of sensitive data and raise risks in terms of a number of important rights, including but not limited to rights linked to data protection. The broad nature of the impact assessment invoked in article 35 GDPR is suitable for not only considering questions linked to data protection and privacy but also issues related to stigmatisation, discrimination and other ethical issues that are often linked to health care projects. This presentation will discuss the potential use of impact assessments in such instances and discuss the benefits they can bring. It will also discuss the challenges that such a requirement will possess.

The programme is now available.

The workshop will be held from 12:00 – 14:00 at the Institute of European Studies. Lunch will be included.

The event is free to attend but capacity is limited, so registration is required. For more information please contact [email protected].

May
31
Wed
Maximum Overdrive: a discussion on AI and self driving vehicles @ San Francisco
May 31 @ 6:00 pm – 8:30 pm
Maximum Overdrive: a discussion on AI and self driving vehicles @ San Francisco | San Francisco | California | United States

On the road to self-driving cars, privacy and security concerns present potential speed bumps and opportunities to reach new heights. Industry players are handling emerging federal, state and international regulatory requirements, creating industry standards in infrastructure, communications, etc., as well as being challenged to obtain and maintain customer trust.

Join Women in Security and Privacy (WISP) for a lively and thoughtful panel discussion with leaders across the self-driving car industry to learn about developments in addressing these and other topics important to self-driving cars.

Please feel free to invite your fellow privacy and security colleagues, but hurry! Space is limited.

Agenda:

6:00 – 6:30 pm – Registration, Networking, Food & Drinks

6:30 – 6:35 pm – Welcome

6:35 – 7:35 pm – Panel Discussion

7:35 – 7:50 pm – Q&A

7:50 – Closing

Moderator:

Sarah Pipes, KPMG

Presenters:

Michelle Avary, Aeris

Stephanie (Steffi) Bryson, Uber

Chenxi Wang, the Jane Bond Project

Disclaimer: Photography

From time to time WISP uses photographs of its events in its promotional materials (e.g., the wisporg.com website). Unless this permission is revoked in writing to WISP, by virtue of their attendance, event attendees, volunteers, and speakers agree to the use of their likeness in such materials.
Thank you, KPMG, for hosting and for sponsoring the event, food, and drinks!

KPMG is a global network of professional firms providing Audit, Tax and Advisory services. We have 189,000 outstanding professionals working together to deliver value in 152 countries. With a worldwide presence, KPMG continues to build on our successes thanks to clear vision, defined values and, above all, our people. Our industry focus helps KPMG firms’ professionals develop a rich understanding of clients’​ businesses and the insight, skills and resources required to address industry-specific issues and opportunities. The independent member firms of the KPMG network are affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. Each KPMG firm is a legally distinct and separate entity and describes itself as such.

TAGS

Things To Do In San Francisco, CA Seminar Science & Tech

SHARE WITH FRIENDS

DATE AND TIME

Wed, May 31, 2017

6:00 PM – 8:30 PM PDT

Add to Calendar

LOCATION

KPMG

1111 (11th floor)

55 2nd St.

San Francisco, CA 94105

View Map

FRIENDS WHO ARE GOING

Connect to Facebook

Organizer:Women in Security and Privacy

Organizer of Maximum Overdrive: a discussion on AI and self driving vehicles

Our Mission: WISP is a fiscally sponsored project of Community Initiatives. We are a 501(c)(3) public charity recognized by the IRS. WISP advances women to lead the future of privacy and security.  Currently, we are serving Bay Area women, and we have plans to expand nationally over the next few years.

Our Objectives:

  • Education: Help women identify and achieve the level of education and skills required to succeed in security and privacy positions across multiple industries.
  • Mentoring & Networking: Foster a community for knowledge-sharing, collaboration, mentorship, and networking.
  • Advancement: Support the career advancement of women in security and privacy.
  • Leadership: Increase thought leadership by women in security and privacy.
  • Research: Conduct independent research related to recruitment, retention, and advancement of women in security and privacy.

 

Connect with us via our LinkedIn Group PageTwitter or Facebook!

ORGANIZERPROFILE CONTACTTHE ORGANIZER

Subscribe to receive updates from FPF