
- This event has passed so registration is closed.
Overview
The user data you hold is now toxic — meaning the penalties for losing control of that data are now potentially very costly. Technical measures must be taken to protect the privacy of that user data, which means you probably need to adopt a PET. But what PET is appropriate? Join us as we discuss the limits of pseudonymization and the landscape of encryption options available. We’ll examine a few well-known companies that are using encryption to make privacy a first-class part of their product by embracing end-to-end encryption and customer held encryption keys. We’ll also touch on encryption techniques like secure multi-party computation, homomorphic encryption, and transform cryptography.
Moderator
Janelle Hsia – Principal, Privacy SWAN Consulting
Janelle is the Founder and President of Privacy SWAN Consulting. She is focused on privacy and data protection and has a diverse background with strong leadership, technical, and business skills spanning over 20 years. Because she is not a lawyer, she brings a unique perspective to integrating privacy with security and technology which helps companies operationalize their privacy requirements.
She holds the following certifications: CIPM, CIPT, CIPP/US, CIPP/E, CDPSE, CISA, GSLC, and PMP. She is a member of the following associations: IAPP, ISACA, PMI, ISSA and IEEE. She is the Vice President of the IOPD, a past ISSA Privacy Special Interest Group Tri-Chair, and a past CSA Colorado Board Member.
Contact her at https://www.linkedin.com/in/janellehsia
Speaker/s
Patrick Walsh – Leader, IronCore Labs
Patrick Walsh has 20 years of experience building security products and Enterprise SaaS solutions. Most recently he ran an Engineering division at Oracle bringing productivity and insights to the world’s largest companies. Now Patrick leads IronCore Labs, a technology platform that helps businesses get back control of their data so they can meet increasingly stringent data protection requirements.
Recent On-Demand Web Conferences
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.