- This event has passed so registration is closed.
Some privacy regulations now have privacy by design/privacy by default obligation, and in the past, these have been difficult for engineers to define and implement. We will explore the history of how to translate these vague legal obligations into concrete design requirements. This session will explain how privacy design strategies were developed and how they break down into actionable tactics. We will provide real-world examples of how to apply the tactics in practice. You will walk away with knowledge of privacy-friendly processing techniques and how to process personal data responsibly.
R. Jason Cronk – Privacy Engineer, Enterprivacy Consulting Group
R. Jason Cronk is the author of Strategic Privacy by Design, one of the textbooks for the IAPP's privacy technologist certification (CIPT). He was designated in 2014 as a privacy by design ambassador by the Ontario Information and Privacy Commissioner's office and has been a leading figure in privacy by design and privacy engineering ever since. Currently he works as a consultant and trainer for a boutique firm Enterprivacy Consulting Group. He can be found tweeting @privacymaverick
Jaap-Henk Hoepman – Associate Professor Computer Science, Radboud University and IT Law, University of Groningen
Jaap-Henk Hoepman is an associate professor at the Digital Security group of the Radboud University, Nijmegen, the Netherlands, working for the iHub, the interdisciplinary research hub on Security, Privacy, and Data Governance. He is also an associate professor in the IT Law section of the Transboundary Legal Studies department of the Faculty of Law of the University of Groningen. Moreover, he is a principal scientist (and former scientific director and co-founder) of the Privacy & Identity Lab. His research focuses on privacy by design and privacy-friendly protocols for identity management and the Internet of Things. He speaks on these topics at national and international congresses and publishes papers in international journals. He also appears in the media as a security and privacy expert and writes about his research in the popular press. He is actively involved in the public debate concerning security and privacy in our society.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.