Find out what's inside the March 2020 edition of the Journal & download a free copy of this month's featured article
- This event has passed so registration is closed.
No Rest for the Weary: The Continued Convergence of Privacy and Security
This June we provide you an opportunity to learn from industry experts and explore the ever-changing and dynamic world at the intersection of Privacy and Security! The ISSA Executive Forum series is proud to be partnering with the International Association of Privacy Professionals (IAPP), the world’s largest privacy organization with nearly 50,000 members worldwide. With Europe’s landmark GDPR legislation less than a year old, newly proposed legislation from several US states (most prominently California) promises to make 2019 an even more crucial year for obtaining a greater understanding of the privacy landscape. Together, ISSA and IAPP are working to exchange knowledge and experiences in order for all to make sense of these changes — adding a deeper knowledge to each other’s skill-set is now no longer a “nice to have” — it is essential!
This is an event focused on benefiting our Executive members and qualified guests. The ISSA Executive Forum is your chance to escape from the blizzard of buzzwords to meet up with your peers, industry experts, and specially selected security vendors in a relaxed and confidential environment. In this session, we will discuss real privacy and security programs, share real-world scenarios, and learn from each other.
Finally, attendees at the June 2019 event will have a chance to help shape the content and format for future meetings of the ISSA Executive Forum in 2019 and beyond.
Interested in Attending No Rest for the Weary: The Continued Convergence of Privacy and Security?
Click on the button to check out your registration options
|5:00 PM to 8:00 PM|
Opening Reception & Dinner: Instituting a Data Privacy and Data Protection Program from ScratchThe steps needed to institute an effective data privacy and protection program will be discussed. Understanding regulations, privacy acts, HIPAA, GDPR, discovery of what you have, where it is, Shadow IT, where is it, how to control it. Classifying the data, what you need to protect, Access Control who has access to it, Restricting Access, Stopping it from leaving, Cloud Access Security Brokers (CASB), Splunk, and Data Loss Prevention (DLP).
|7:30 AM to 8:45 AM|
Registration and Breakfast
|8:45 AM to 9:00 AM|
Opening Comments and Welcome Address
|9:00 AM to 10:00 AM|
Intersection of Privacy & SecurityTrevor Hughes will kick off the day’s event by providing a “30,000 foot view” of the intersection of privacy and security—what the differences are but how the similarities make having knowledge of privacy a crucial requirement for InfoSec pros. The constantly shifting landscape of US state privacy regimes make this an even more complex environment to negotiate. Buckle up!
|10:00 AM to 10:30 AM|
|10:30 AM to 11:15 AM|
Third Party Risk: Lions & Tigers & Bears…Oh My!Diana Kelley leads a fireside chat with Edna Conway about the looming risk of our growing digital third party ecosystem. They will have a frank discussion on exactly what a value chain is and who is in the third party ecosystem that comprises it. Diana will explore Edna’s views on the key security threats and impacts for the information and communications technology (ICT) value chain, practical approaches and technologies to address those threats and impacts, and public-private efforts on cyber supply chain risk management.
|11:15 AM to 12:00 PM|
Machine Learning: Addressing the Disillusionment to Bring Actual Business Benefit‘Machine learning’ is one of those cringy phrases, almost (if not already) taboo in the world of high-tech SaaS. Applying true machine learning to an organization’s product(s), however, can have real benefit for the business, their clients, and the industry as a whole. From credit card fraud investigations to the way that a car is built, machine learning has permeated our everyday life without a common understanding of what it is and how to implement it.
|12:00 PM to 1:00 PM|
|1:00 PM to 1:45 PM|
Embracing AI for Cyber DefenseOnline crime cost the world more than half a trillion dollars in 2018, recent data breaches and attacks have managed to influence elections, and even our energy grids face the threat of cyber-attack. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks on a daily basis. These attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.
|1:45 PM to 2:45 PM|
Security is About Breach; Privacy is About CreepyOmer Tene will give a privacy expert’s view on the fundamental differences between privacy and security, and how the Venn Diagram between these two disciplines has shifted towards more commonality. As privacy laws take security explicitly into mind, security practitioners will need to know more.
|2:45 PM to 3:15 PM|
|3:15 PM to 4:45 PM|
Discovering Synergies Between the CISO & CPO – Exploring the Relationship Between Privacy and Cybersecurity
|4:45 PM to 5:00 PM|
Sponsor Prize Drawing
|5:00 PM to 6:00 PM|
2 Forbes Road, Woburn, MA 01801
Register for No Rest for the Weary: The Continued Convergence of Privacy and Security
ISSA CISO Executive Members
Complimentary meeting registration and 1 complimentary night of hotel accommodations.
CISO Member is responsible for making his or her own hotel reservations. Reservations must be made at the host hotel in the ISSA room block to qualify for complimentary one (1) night lodging.
Registration for eligible returning guests is $400.
Upon verification of eligibility, guest will be invoiced for the $400 registration fee.
Registration for eligible first-time guests is complimentary.
Not a Member of the CISO Executive Forum Yet?
Join today and get free access to CISO Forum (including 1-night complimentary accommodation) as well as other exclusive benefits.