Find out what's inside the March 2021 edition of the Journal & download a free copy of this month's featured article
- This event has passed so registration is closed.
The user data you hold is now toxic — meaning the penalties for losing control of that data are now potentially very costly. Technical measures must be taken to protect the privacy of that user data, which means you probably need to adopt a PET. But what PET is appropriate? Join us as we discuss the limits of pseudonymization and the landscape of encryption options available. We’ll examine a few well-known companies that are using encryption to make privacy a first-class part of their product by embracing end-to-end encryption and customer held encryption keys. We’ll also touch on encryption techniques like secure multi-party computation, homomorphic encryption, and transform cryptography.
Janelle Hsia – Principal, Privacy SWAN Consulting
Janelle Hsia is a trusted advisor for strategic and tactical decision making within organizations of all sizes. She focuses on privacy and security while bringing a diverse background in leadership, business, security, privacy, and technology spanning over 20 years. Her experience integrating privacy with security and technology helps companies operationalize their privacy and security requirements. Her passion is creating comprehensive and tailored data governance programs for SMBs with a global presence. She is a National ISSA Privacy SIG Tri-Chair, CSA CO BoD, and an IAPP OTP. She holds the following certifications CIPM, CIPT, CIPP/US/E, CISA, PMP, and GSLC.
Patrick Walsh – Leader, IronCore Labs
Patrick Walsh has 20 years of experience building security products and Enterprise SaaS solutions. Most recently he ran an Engineering division at Oracle bringing productivity and insights to the world’s largest companies. Now Patrick leads IronCore Labs, a technology platform that helps businesses get back control of their data so they can meet increasingly stringent data protection requirements.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.