- This event has passed so registration is closed.
The user data you hold is now toxic — meaning the penalties for losing control of that data are now potentially very costly. Technical measures must be taken to protect the privacy of that user data, which means you probably need to adopt a PET. But what PET is appropriate? Join us as we discuss the limits of pseudonymization and the landscape of encryption options available. We’ll examine a few well-known companies that are using encryption to make privacy a first-class part of their product by embracing end-to-end encryption and customer held encryption keys. We’ll also touch on encryption techniques like secure multi-party computation, homomorphic encryption, and transform cryptography.
Janelle Hsia – Principal, Privacy SWAN Consulting
Janelle Hsia is a trusted advisor for strategic and tactical decision-making within organizations of all sizes. She focuses on privacy and security while bringing a diverse background in leadership, business, security, privacy, and technology spanning over 20 years. Her experience integrating privacy with security and technology helps companies operationalize their privacy and security requirements. She creates comprehensive and tailored data governance programs for SMBs with a global presence. Her passion is privacy and data protection training and awareness. This fall, she is teaching a class on Privacy and Technology at the University of Colorado in Boulder. She is an ISSA Privacy SIG Tri-Chair and one of our 2022 Volunteers of the Year. She is a member of the IEEE Digital Privacy Working Group and an IAPP Official Training Partner. She holds the following certifications CIPM, CIPT, CIPP/US/E, CISA, PMP, and GSLC.
Patrick Walsh – Leader, IronCore Labs
Patrick Walsh has 20 years of experience building security products and Enterprise SaaS solutions. Most recently he ran an Engineering division at Oracle bringing productivity and insights to the world’s largest companies. Now Patrick leads IronCore Labs, a technology platform that helps businesses get back control of their data so they can meet increasingly stringent data protection requirements.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.