Videos, eBooks and other useful resources to address the challenges faced by data protection, privacy and cybersecurity leaders.
After almost 5 years of prevarication, mandatory data breach reporting is about to be implemented in Australia. The Office of the Australian Information Commissioner has also recently released a draft policy guide on Big Data. How do you ensure compliance if you are doing business in Australia?
ISO is developing the international standards for privacy matters at ISO/IEC JTC1/SC27 WG (Working Group) 5 to fit privacy and security in organizations. The first contribution from the WG was ISO/IEC 29100 Privacy framework. In this session, learn how IT security is an enabler for both of data privacy and secrecy.
The Encryption and Lawful Access Debate in Thailand and the U.S.: One Step Forward and Two Steps Back
In Thailand, the government is seeking to expand its authority to require access to encryption keys, account login information, as well as https secure websites. How will the government’s efforts impact ISPs and service operators, and what are the legal and commercial ramifications related to data privacy and security.
ICT vendors face privacy and security challenges from different points of view: they need to implement internally but also need to face customer requirements from a product, service and delivery point of view. We need a holistic approach which incorporate security and privacy into the DNA of the company
This session will discuss developments on the Personal Data Protection Act 2010 in Malaysia since its implementation in late 2013, including the 2015 Personal Data Protection Standards, highlights of the proposed provisions of various sector-specific Codes of Practice, and enforcement action/initiatives to date.
Grappling with the IoT, Disruptive Technology and Cloud of Things in the Context of Singapore’s Smart Nation
A common thread across Singapore's Smart Nation initiative and businesses going digital is the need to collect and comprehend vast amounts of data. How does this square with individuals’ growing concern over the privacy of their personal data and the ability to secure such data in this age of ‘data-terrorism’?
When it comes to personal data, you need to know who has access, who processes the data, what is the legal location, what are the considerations for law enforcement access, and answers to many other questions to avoid running afoul of data protection laws. How do you bring order to the chaos for better data governance?
In the past 36 months, five standards have been published to support Cyber Security Operations and Breach Response. How do you implement them within any organization size and what are the available technologies to automate and orchestrate incident management and response?
For most privacy laws across the globe, “identifiability” is a crucial threshold question that determines whether laws apply or not. In the age of big data, with improved techniques and technologies for re-identification, the collection and use of supposedly anonymous information is a growing challenge.
As a privacy professional responsible for GDPR, how do you determine the privacy impacts of your new products and services? A privacy impact assessment (PIA) in conjunction with data mapping practices to understand how data flows through an organization, is the perfect tool to document and track these new initiatives.