- This event has passed so registration is closed.
Overview
In privacy, as security, many people throw around terms like frameworks, models, standards, certifications and codes of conduct. But what do they mean? How are they different and in what situations can they be used? Join the ISSA Privacy Sig Co-Chair and Chair of the Institute of Operational Privacy Design (IOPD) Jason Cronk as he explains these important concepts and outlines the new draft standard from the IOPD.
Moderator
Henry Nduka Onyiah
Henry Nduka Onyiah is an Information Security & Privacy Consultant who, for well over a decade, has provided leadership and direction while working collaboratively with cross-functional teams on information security & privacy related engagements within the Europe, Middle East & Africa (EMEA) region.
Amongst others, the scope of his engagements has included developing & maintaining strong engagement with technology & risk functions, business owners & other relevant stakeholders to –
- develop & improve operational cyber risk frameworks;
- advise on the management of risk and the effectiveness of mitigating controls;
- provide subject matter expertise against the backdrop of various IT Risk & Governance related frameworks; and
- the development and facilitation of tailored training and awareness programmes on risk management in relation to information security & privacy.
He holds and maintains certifications from several professional bodies amongst which include Fellow of Information Privacy (FIP), Certified Information Privacy Professional/Europe (CIPP/E), Certified Information Privacy Manager (CIPM) & Certified Data Privacy Solutions Engineer (CDPSE).
Professional bodies in which he maintains Professional Membership &/or active participation include the British Computer Society (Chartered Institute of IT) (BCS), Chartered Institute of Information Security (CIISec), Information Systems and Controls Association (ISACA), Information Systems Security Association (ISSA), Institute of Risk Management (IRM), International Association of Privacy Professionals (IAPP) and International Information Systems Security Certification Consortium (ISC2).
He currently one of the Co-Chairs of ISSA’s Privacy Special Interest Group and a Founding Ambassador of the Institute of Operational Privacy Design (IOPD). He is also involved in advocacy and research involving the analysis of risks to privacy arising from ‘emerging’ technology which aims to highlight issues that may undermine respective legislative and regulatory data privacy/protection frameworks as well as cause harms to the fundamental right to privacy of individuals.
Aside enjoying the company of his wife and son, especially given the improved opportunities to achieve better work-life balance in a post pandemic world, he enjoys an ongoing struggle to develop the consistency required to reduce his golf handicap as well as reading and travelling. He also actively supports charity work especially within the Province of Bedfordshire in the United Kingdom.
Speaker/s
R. Jason Cronk – President, Institute of Operational Privacy Design
With over two decades of experience in principle and trust consulting, R. Jason Cronk is a seasoned privacy engineer, developer, lawyer, author of the IAPP textbook “Strategic Privacy by Design,” Section Leader of the IAPP’s Privacy Engineering Section, and founder and president of the Institute of Operational Privacy Design, a non-profit organization of privacy professionals which seeks to define and drive the adoption of common and comprehensive standards to protect individuals’ privacy.
His knowledge and involvement reaches across the spectrum as an active member of the academic, engineering, legal and professional privacy communities and a pioneering voice in the development of privacy by design. Whether it is writing books, developing models and frameworks, or training companies and individuals alike, he is tirelessly advocating for privacy across the globe.
Recent On-Demand Web Conferences
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.