Privacy, Governance & Security

  •  TYPE: Track    START DATE:  Thursday, October 10, 2019     START TIME: 14:30    LOCATION:  Ballroom
Parent Track

Moderator(s):

The increasing number of data breaches has resulted in the loss of personal information of millions of people. Apart from the loss of credibility, companies can be facing huge fines. Many companies in Europe made changes in the way they collect and process data in the light of the General Dara Protection Regulation (GDPR) which came into effect in 2018. But it has not been smooth sailing and we have now seen huge companies being tripped up and now facing the scrutiny from the government and the media. The state of California signed the California Consumer Protection Act (CCPA) which will come into effect in 2020. In this session, we will talk about the learned lessons and will try to predict the state of our privacy and security in the coming years. 

Sessions:

Identity in Local Government - Case Study of How Fairfax County Bridges Enterprise and Resident Identity

Date: Thursday, October 10, 2019 Time: 14:30-15:30

Identity in Local Government - Case Study of How Fairfax County Bridges Enterprise and Resident Identity
Robert Barr, Fairfax County, VA

Fairfax County, VA needed the ability to register residents to pay their taxes online and provide management for applications in the courts used by both residents and county employees. These needs needed to be met in a way that didn't sacrifice security for usability and recognized that some of the most important tasks for security required automation. The county also wanted to build a solution that avoided vendor lock-in by supporting standard protocols. Finally, the system had to work...

Panel - The Movement of Security Controls to the Cloud - How Far Can We Go?
Matthew Gardiner, Mimecast • Morey J. Haber, BeyondTrust • Peter Dougherty, Mantis Networks

It is no secret that IT infrastructures are well underway in their transition to cloud-based deployments, whether SaaS or IaaS. But what about security controls? With some security controls, such as email, web, and identity management, deploying via the cloud is becoming the standard approach, but what about endpoint, SIEM, network monitoring, and other more traditionally on-premises areas? With security, nothing is easy! Also are we at risk of simply recreating on-premises security controls...

The Reverse Engineering of Trust - Why More Tech Is Not the Answer

Date: Thursday, October 10, 2019 Time: 15:30-16:00

The Reverse Engineering of Trust - Why More Tech Is Not the Answer
Philipp Schneidenbach, Ventum Consulting

We are at the gate to the all-digital age and see cultures, biases and routines clash with compliance, privacy regulations and governance. While social engineering attacks are being refined on a daily basis, the education of users is often falling behind. New threats are addressed with tech, the next breach calls for even more tech and so on. But is that really all it takes to make our digital lives safer, more trustworthy or even resilient? What are the key aspects to focus on when...


Washington, D.C. - USA

Conference

CyberNext Summit 2019

Language:
English
Registration fee:
€1000.00 $1250.00 S$1600.00 11000.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Oct 08 - 10, 2019 Washington, D.C. - USA