BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Institute of Operational Privacy Design - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Institute of Operational Privacy Design
X-ORIGINAL-URL:https://instituteofprivacydesign.org
X-WR-CALDESC:Events for Institute of Operational Privacy Design
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Denver
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20220313T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20221106T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20230312T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20231105T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20240310T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20241103T080000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Halifax
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:ADT
DTSTART:20220313T060000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:AST
DTSTART:20221106T050000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:ADT
DTSTART:20230312T060000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:AST
DTSTART:20231105T050000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:ADT
DTSTART:20240310T060000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:AST
DTSTART:20241103T050000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240319T130000
DTEND;TZID=America/New_York:20240319T140000
DTSTAMP:20260503T115402
CREATED:20240228T223025Z
LAST-MODIFIED:20240228T223025Z
UID:6276-1710853200-1710856800@instituteofprivacydesign.org
SUMMARY:ISSA Privacy SIG: 50 Shades of Data
DESCRIPTION:Summary \nIt’s all about the data.  Whether it’s Data Subject Request or a Data Breach the amount of effort\, cost and impact on a company’s reputation depend on the quantity and the type of personal data involved.  The more personal data\, the larger the consequences.  This presentation is a practical approach to privacy and data protection that includes strategies to help you stay compliant with the evolving privacy regulations.  No legalese or technical jargon\, just a talk about applicability. \n\nDate and Time \nMarch 19 @ 1:00 pm – 2:00 pm EDT \n\nModerator \nZachary Miller – Information Security Engineer\, Kratos Defense and Security Solutions \nZach is a skilled information security professional committed to safeguarding digital landscapes. Beyond his corporate role\, he dedicates himself to supporting small businesses and non-profits\, actively contributing to their organizational resilience. \nHe looks forward to collaborating with fellow members and contributing to the success of the Privacy Special Interest Group\, the ISSA\, and its members. \n\nSpeaker/s \nJanelle Hsia – Principal\, Privacy SWAN Consulting \nJanelle Hsia is a trusted advisor for strategic and tactical decision-making within organizations of all sizes. She focuses on privacy and security while bringing a diverse background in leadership\, business\, security\, privacy\, and technology spanning over 20 years. Her experience integrating privacy with security and technology helps companies operationalize their privacy and security requirements. She creates comprehensive and tailored data governance programs for SMBs with a global presence. Her passion is privacy and data protection training and awareness. This fall\, she is teaching a class on Privacy and Technology at the University of Colorado in Boulder. She is an ISSA Privacy SIG Tri-Chair and one of our 2022 Volunteers of the Year. She is a member of the IEEE Digital Privacy Working Group and an IAPP Official Training Partner. She holds the following certifications CIPM\, CIPT\, CIPP/US/E\, CISA\, PMP\, and GSLC.
URL:https://instituteofprivacydesign.org/event/issa-privacy-sig-50-shades-of-data/
LOCATION:Virtual
CATEGORIES:Speaking Engagements,Webinar
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/image_967120.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240318T090000
DTEND;TZID=America/New_York:20240319T160000
DTSTAMP:20260503T115402
CREATED:20240212T233739Z
LAST-MODIFIED:20240304T172042Z
UID:6045-1710752400-1710864000@instituteofprivacydesign.org
SUMMARY:Artificial Intelligence Governance (AIGP)
DESCRIPTION:This training teaches critical artificial intelligence governance concepts that are also integral to the AIGP certification exam. While not purely a “test prep” course\, this training is appropriate for professionals who plan to certify\, as well as for those who want to deepen their AI governance knowledge. Both the training and the exam are based on the same body of knowledge. \n  \nWHAT YOU WILL LEARN: \nAIGP training teaches how to develop\, integrate and deploy trustworthy AI systems in line with emerging laws and policies. The curriculum provides an overview of AI technology\, survey of current law\, and strategies for risk management\, among many other relevant topics. \n  \nMODULES: \n\nModule 1: Foundations of artificial intelligence\nDefines AI and machine learning\, presents an overview of the different types of AI systems and their use cases\, and\npositions AI models in the broader socio-cultural context.\nModule 2: AI impacts on people and responsible AI principles\nOutlines the core risks and harms posed by AI systems\, the characteristics of trustworthy AI systems\, and the\nprinciples essential to responsible and ethical AI.\nModule 3: AI development life cycle\nDescribes the AI development life cycle and the broad context in which AI risks are managed.\nModule 4: Implementing responsible AI governance and risk management\nExplains how major AI stakeholders collaborate in a layered approach to manage AI risks while acknowledging AI\nsystems’ potential societal benefits.\nModule 5: Implementing AI projects and systems\nOutlines mapping\, planning and scoping AI projects\, testing and validating AI systems during development\, and\nmanaging and monitoring AI systems after deployment.\nModule 6: Current laws that apply to AI systems\nSurveys the existing laws that govern the use of AI\, outlines key GDPR intersections\, and provides awareness of\nliability reform\nModule 7: Existing and emerging AI laws and standards\nDescribes global AI-specific laws and the major frameworks and standards that exemplify how AI systems can be\nresponsibly governed.\nModule 8: Ongoing AI issues and concerns\nPresents current discussions and ideas about AI governance\, including awareness of legal issues\, user concerns\, and AI auditing and accountability issues.\n\n  \n\n  \n*Certification Study Group voucher must be used within three months of taking the course. \n**The IAPP exam must be taken within three months of the release of the exam (anticipated release in 1st quarter of 2024). Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref \n  \n*** Links to Privacy Ref Include Web Tracking***
URL:https://instituteofprivacydesign.org/event/artificial-intelligence-governance-aigp-2-utm_sourceiopdutm_mediumwebsiteutm_campaigniopdq1-2024/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#AIGP
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240314T130000
DTEND;TZID=America/New_York:20240314T150000
DTSTAMP:20260503T115402
CREATED:20240221T210956Z
LAST-MODIFIED:20240312T193321Z
UID:6225-1710421200-1710428400@instituteofprivacydesign.org
SUMMARY:Certification Study Group - U.S. Private-Sector Privacy (CIPP/US)
DESCRIPTION:There are many ways to prepare for taking a certification exam from the International Association of Privacy Professionals. No matter how you study\, there always seem to be some questions that remain. Privacy Ref can help. \nCome prepared to this 2-hour session with questions or areas related to the exam that you want to review. We will be making use of the exam blueprint and body of knowledge provided by the IAPP to focus our discussion.
URL:https://instituteofprivacydesign.org/event/certification-study-group-u-s-private-sector-privacy-cipp-us/
LOCATION:Online
CATEGORIES:#CIPP/US,#certificationstudygroup
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240314T130000
DTEND;TZID=America/New_York:20240314T140000
DTSTAMP:20260503T115402
CREATED:20240307T150457Z
LAST-MODIFIED:20240307T150457Z
UID:6330-1710421200-1710424800@instituteofprivacydesign.org
SUMMARY:Quarterly Data Breach Review - Free Webinar
DESCRIPTION:Once a quarter we review several recent breaches\, discussing what happened and how it could have been prevented. \n  \n\n  \nThe Quarterly Data Breach Review is led by Benjamin Siegel\, our Senior Privacy Consultant. Ben has a keen interest in the root causes of data breaches. He shares his breach insights by providing a quarterly roundup of recent events. He combines these learnings with his broad privacy knowledge to deliver concise\, actionable privacy assessments. \n  \nJoin us for all our monthly webinar conversations\, where we take a deep dive into current events happening globally\, and topics that have an impact on the decision making\, processing\, or transfer of personal data. \n  \nQuestions are welcome! Please submit them to info@privacyref.com. Contact us\, send us your comments and suggestions.
URL:https://instituteofprivacydesign.org/event/quarterly-data-breach-review-free-webinar/
LOCATION:Online
CATEGORIES:Speaking Engagements,Webinar
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240307T130000
DTEND;TZID=America/New_York:20240307T150000
DTSTAMP:20260503T115402
CREATED:20240221T210416Z
LAST-MODIFIED:20240304T171924Z
UID:6221-1709816400-1709823600@instituteofprivacydesign.org
SUMMARY:Certification Study Group - Privacy In Technology (CIPT)
DESCRIPTION:There are many ways to prepare for taking a certification exam from the International Association of Privacy Professionals. No matter how you study\, there always seem to be some questions that remain. Privacy Ref can help. \nCome prepared to this 2-hour session with questions or areas related to the exam that you want to review. We will be making use of the exam blueprint and body of knowledge provided by the IAPP to focus our discussion.
URL:https://instituteofprivacydesign.org/event/certification-study-group-privacy-in-technology-cipt/
LOCATION:Online
CATEGORIES:#CIPT,#certificationstudygroup
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240304T090000
DTEND;TZID=America/New_York:20240305T160000
DTSTAMP:20260503T115402
CREATED:20240212T233410Z
LAST-MODIFIED:20240216T221229Z
UID:6042-1709542800-1709654400@instituteofprivacydesign.org
SUMMARY:Privacy Program Management (CIPM)
DESCRIPTION:Privacy Program Management teaches you how to create and manage a privacy program. It gives you the tools to answer day-to-day questions about privacy operations. The CIPM is the world’s first and only certification in privacy program management. When you earn a CIPM\, it shows that you know how to make a privacy program work for your organization. \nThe content of the courses is integral to broadening your knowledge\, educating your privacy team\, and put you on the path to obtaining your privacy certifications. \n  \nCourse outline: \n\nModule 1: Introduction to privacy program management\nModule 2: Privacy  Governance\nModule 3: Applicable laws and regulations\nModule 4: Data assessments\nModule 5: Policies\nModule 6: Data subject rights\nModule 7: Training and awareness\nModule 8: Protecting personal information\nModule 9: Data breach incident plans\nModule 10: Monitoring and auditing program performance\n\n  \n\n  \n*Certification Study Group voucher must be used within three months of taking the course. \n**The IAPP exam must be taken within three months of the release of the exam. Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref \n  \n*** Links to Privacy Ref Include Web Tracking***
URL:https://instituteofprivacydesign.org/event/privacy-program-management-cipm-utm_sourceiopdutm_mediumwebsiteutm_campaigniopdq1-2024/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#CIPM
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240229
DTEND;VALUE=DATE:20240302
DTSTAMP:20260503T115402
CREATED:20240122T210050Z
LAST-MODIFIED:20240409T185519Z
UID:5774-1709164800-1709337599@instituteofprivacydesign.org
SUMMARY:Privacy SWAN Virtual Live CIPT Training
DESCRIPTION:PrivacySWAN is an Official Training Partner of the International Association of Privacy Professionals (IAPP) which is the largest association of privacy professionals in the world. The CIPT is the first and original certification in Privacy Technology Management. Along with the training program\, the IAPP also provides an ANSI/ISO-accredited certification. Come learn how to develop and manage a global privacy and data protection program today. \nThis instructor-led training is conducted over two days. Privacy in Technology training is the how-to course on privacy and data protection practices in the development\, engineering\, deployment\, and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. It prepares you for the tough challenges you will encounter as you talk to your technical teams about incorporating privacy into their design. You will be provided with real-life examples and templates that help deal with the ever-changing privacy landscape. These news skills will advance your career. In addition to the highly sought-after training\, the following benefits are provided by Privacy SWAN: \n\nIAPP Strategic Privacy by Design Textbook (only for the first four students who register)\nIAPP Introduction to Privacy for Technology Professionals Textbook (Digital only – $75 value)\nParticipant training materials (only available with training)\nExam Voucher – if purchased ($550 value)\nOne year of IAPP Membership or renewal of existing Membership ($295 value)\nPrivacy SWAN custom training materials\n\n  \nWho should attend\nTechnology\, InfoSec\, and Engineering professionals with a primary focus on securing the integrity\, confidentiality\, and availability of corporate data. Anyone who can understand highly complex interconnected technologies and who needs to incorporate a robust privacy program to ensure compliance with global data protection regulations. \n\nChief Information Security Officers\nSecurity Managers\nInformation Managers\nProduct Managers\nAuditors\nContract Managers\nCompliance Officers\nPrivacy Managers\nChief Privacy Officers\nData Protection Officers\n\n  \nWhat you will learn\nHow to protect personal data by applying critical privacy concepts and practices that impact technology and use technology to design data privacy into products and services and establish privacy practices for data security and control\, such as data minimization\, perturbing the data\, and de-identification techniques. Factor privacy into data classification and emerging technology\, such as cloud computing\, facial recognition\, and surveillance. Communicate and collaborate on privacy issues with management\, development\, marketing\, and legal departments. Understand consumer privacy expectations and best practices\, while proactively addressing privacy issues with the Internet of Things. \n\nFoundational Principles in Technology Summarizes the foundational elements for embedding privacy in technology through privacy by design and value-sensitive design; reviews the data life cycle and common privacy risk models and frameworks\nThe Tech Pro’s role in privacy Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security\nNeutralizing Threats and Enhancing Privacy Identify inherent risks throughout the stages of the data life cycle and explore how software security helps mitigate privacy threats; examine the impacts that behavioral advertising\, cyberbullying\, and social engineering have on privacy within the technological environment\nPrivacy Engineering Explores the role of privacy engineering within an organization\, including the objectives of privacy engineering\, privacy design patterns\, and software privacy risks\nTechnological Challenges for Privacy Examine the unique challenges that come from online privacy issues\, including automated decision making\, tracking and surveillance technologies\, anthropomorphism\, ubiquitous computing\, and mobile social computing\nOfficial IAPP CIPT Get Certified Documents\n\n 
URL:https://instituteofprivacydesign.org/event/privacy-swan-virtual-live-cipt-training/
LOCATION:Virtual
CATEGORIES:#privacytraining,#CIPT
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/SWANlogo2023-transp-3.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240228T090000
DTEND;TZID=America/New_York:20240229T160000
DTSTAMP:20260503T115402
CREATED:20240212T233127Z
LAST-MODIFIED:20240216T221215Z
UID:6039-1709110800-1709222400@instituteofprivacydesign.org
SUMMARY:European Data Protection (CIPP/E)
DESCRIPTION:The European Data Protection (CIPP/E) encompasses pan-European and national data protection laws\, key data protection terminology and practical concepts concerning the protection of personal data and trans-border data flows. The global gold standard in European data protection certification. \nThe content of the courses is integral to broadening your knowledge\, educating your privacy team\, and put you on the path to obtaining your privacy certifications. \n  \nCourse outline: \n\nModule 1: Data protection laws\nModule 2: Personal data\nModule 3: Controllers and processors\nModule 4: Processing personal data\nModule 5: Data subject rights\nModule 6: Information provision obligations\nModule 7: International data transfers\nModule 8: Compliance considerations\nModule 9: Security of processing\nModule 10: Accountability\nModule 11: Supervision and enforcement\n\n  \n\n  \n*Certification Study Group voucher must be used within three months of taking the course. \n**The IAPP exam must be taken within three months of the release of the exam. Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref \n  \n*** Links to Privacy Ref Include Web Tracking***
URL:https://instituteofprivacydesign.org/event/european-data-protection-cipp-e-utm_sourceiopdutm_mediumwebsiteutm_campaigniopdq1-2024/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#CIPP/E
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240222T120000
DTEND;TZID=America/New_York:20240222T130000
DTSTAMP:20260503T115402
CREATED:20240103T231725Z
LAST-MODIFIED:20240207T204551Z
UID:5405-1708603200-1708606800@instituteofprivacydesign.org
SUMMARY:Deploying Decentralized Privacy-Preserving Contact Tracing | Privacy Engineering & Technology Education Discussion (PETed)
DESCRIPTION:Join our IOPD Privacy Engineering & Technology Education Discussion (PETed) Series! The format of the webinar will be a recorded 10-minute introduction followed by a 40-minute informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data\, zero-knowledge proofs\, homomorphic encryption\, and translucent databases. \nThe participants will be asked to bring questions related to the topic. Come back the fourth Thursday of every month for a new discussion\, new speaker\, and new insights on the most cutting-edge privacy challenges! \n  \nDate & Time:\nFebruary 22\, 2024 @ 12:00 PM ET / 6:00 PM CET \n  \nTopic:\nDeploying decentralized privacy-preserving contact tracing \n  \nProblem Statement:\nDigital contact tracing systems promised to help combat the COVID-19 pandemic; but in doing so introduce privacy risks. Privacy-friendly contact tracing systems enable notification of exposed people without privacy harms. \n  \nSynopsis:\nIn this webinar Wouter will talk about his experience designing a large-scale privacy-friendly digital contact tracing system that later led to the system adopted by Google and Apple\, and experiences deploying such a privacy-friendly system in the wild. \n  \nPre-Webinar Resources:\n\nDeploying Decentralized\, Privacy-Preserving Proximity Tracing https://dl.acm.org/doi/pdf/10.1145/3524107\nDecentralized Privacy-Preserving Proximity Tracing (original DP3T whitepaper) https://arxiv.org/pdf/2005.12273.pdf\n\n  \nSpeaker:\nWouter Lueks\nWouter Lueks is a tenure-track faculty member at the CISPA Helmholtz Center for Information Security in Saarbrücken\, German. Before that he was a postdoctoral researcher at EPFL in Lausanne\, Switzerland where he worked with Carmela Troncoso. He is interested in solving real-world problems by designing end-to-end privacy-friendly systems. To do so he combines privacy\, applied cryptography\, and systems research. His work has real-world impact. For instance\, his designs for privacy-friendly contact tracing have been deployed in millions of phones around the world\, and his secure document search system is being deployed by a large organisation for investigative journalists. \n  \nModerator:\nAndrei Dumitru \nAfter working more than ten years in the IT department of an International Organization\, I focused in the last years on privacy and data protection. I think privacy is a fundamental right that cannot exist today without computer security so I am always searching to find a balance between both and see how privacy can be embedded into technology. I am particularly interested in privacy by design and dark patterns\, and always curious to see how privacy is integrated (or not) in current products and services. \n  \nThe IOPD Privacy Engineering & Technology Education Discussion (PETed) Series is a members-only event. Join as an Ambassador before the 1st of each month to get invited to the recurring monthly event. If you are already a member\, but need an invitation please contact admin22. 
URL:https://instituteofprivacydesign.org/event/dark-patterns-february-2024-privacy-engineering-technology-education-discussion-peted/
CATEGORIES:PETed
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/1-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240220T090000
DTEND;TZID=America/New_York:20240223T170000
DTSTAMP:20260503T115402
CREATED:20240119T102000Z
LAST-MODIFIED:20240123T213104Z
UID:5524-1708419600-1708707600@instituteofprivacydesign.org
SUMMARY:Symptai Live Online CIPM Training
DESCRIPTION:The CIPM program was developed by the International Association of Privacy Professionals (IAPP)\, which is the world’s largest comprehensive global information privacy community and resource. The CIPM certification also holds accreditation under ISO 17024: 2012. \nThese instructor-led training sessions are beneficial for persons who plan to certify or just want to deepen your privacy knowledge. And\, in the ever-changing privacy environment\, as new legislation such as the GDPR and the CCPA comes along\, you will be fully prepared. \n  \n\nWhat will you learn\n\nModule 1: Introduction to privacy program management\nModule 2: Privacy governance\nModule 3: Applicable laws and regulations\nModule 4: Data assessments\nModule 5: Policies\nModule 6: Data subject rights\nModule 7: Training and awareness\nModule 8: Protecting personal information\nModule 9: Data breach incident plans\nModule 10: Measuring\, monitoring and auditing program performance\n\n  \n\n\nWho should attend?\n\nData Protection Officers\nData Protection Managers\nAuditors\nLegal Compliance Officers\nSecurity Manager\nInformation Managers\nAnyone involved with data protection processes and programs\n\n  \n\n\nWhat comes with registration?\nOnce registered for this course\, participants will also be registered as an official member of the IAPP and receive official members access to the training/course material for the CIPM exam and an exam voucher in order to register for the exam. This course will prepare persons to sit the CIPM exam and have a comprehensive understanding of privacy in an organization and how to manage it. \n  \n\nWhy organizations should implement training?\n\nComply with GDPR requirements\nAvoid penalties up to 20 million euros (25 million USD) or 4% of global revenues\nImprove the way your entire organization handles data\nReduce risk of a data breach\nBuild privacy policies to make your organization more cost-effective\nDemonstrate accountability and due diligence\nFoster customer confidence
URL:https://instituteofprivacydesign.org/event/iapp-cipm-virtual-feb-20-23/
LOCATION:Virtual
CATEGORIES:#privacytraining,#CIPM
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/logo.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240219T090000
DTEND;TZID=America/New_York:20240220T160000
DTSTAMP:20260503T115402
CREATED:20240212T231939Z
LAST-MODIFIED:20240219T133617Z
UID:6026-1708333200-1708444800@instituteofprivacydesign.org
SUMMARY:Artificial Intelligence Governance (AIGP)
DESCRIPTION:This training teaches critical artificial intelligence governance concepts that are also integral to the AIGP certification exam. While not purely a “test prep” course\, this training is appropriate for professionals who plan to certify\, as well as for those who want to deepen their AI governance knowledge. Both the training and the exam are based on the same body of knowledge. \n  \nWHAT YOU WILL LEARN: \nAIGP training teaches how to develop\, integrate and deploy trustworthy AI systems in line with emerging laws and policies. The curriculum provides an overview of AI technology\, survey of current law\, and strategies for risk management\, among many other relevant topics. \n  \nMODULES: \n\nModule 1: Foundations of artificial intelligence\nDefines AI and machine learning\, presents an overview of the different types of AI systems and their use cases\, and\npositions AI models in the broader socio-cultural context.\nModule 2: AI impacts on people and responsible AI principles\nOutlines the core risks and harms posed by AI systems\, the characteristics of trustworthy AI systems\, and the\nprinciples essential to responsible and ethical AI.\nModule 3: AI development life cycle\nDescribes the AI development life cycle and the broad context in which AI risks are managed.\nModule 4: Implementing responsible AI governance and risk management\nExplains how major AI stakeholders collaborate in a layered approach to manage AI risks while acknowledging AI\nsystems’ potential societal benefits.\nModule 5: Implementing AI projects and systems\nOutlines mapping\, planning and scoping AI projects\, testing and validating AI systems during development\, and\nmanaging and monitoring AI systems after deployment.\nModule 6: Current laws that apply to AI systems\nSurveys the existing laws that govern the use of AI\, outlines key GDPR intersections\, and provides awareness of\nliability reform\nModule 7: Existing and emerging AI laws and standards\nDescribes global AI-specific laws and the major frameworks and standards that exemplify how AI systems can be\nresponsibly governed.\nModule 8: Ongoing AI issues and concerns\nPresents current discussions and ideas about AI governance\, including awareness of legal issues\, user concerns\, and AI auditing and accountability issues.\n\n  \n\n  \n*Certification Study Group voucher must be used within three months of taking the course. \n**The IAPP exam must be taken within three months of the release of the exam (anticipated release in 1st quarter of 2024). Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref \n  \n*** Links to Privacy Ref Include Web Tracking***
URL:https://instituteofprivacydesign.org/event/artificial-intelligence-governance-aigp-utm_sourceiopdutm_mediumwebsiteutm_campaigniopdq1-2024/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#AIGP
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240214T150000
DTEND;TZID=America/New_York:20240214T160000
DTSTAMP:20260503T115402
CREATED:20240117T190010Z
LAST-MODIFIED:20240117T190010Z
UID:5497-1707922800-1707926400@instituteofprivacydesign.org
SUMMARY:Q1 2024 All Hands Meeting
DESCRIPTION:Ambassadors\, Advisors\, Volunteers\, and Committee Members are all invited to join us Wednesday\, February 14th from 3:00 – 4:00 PM. We will meet to welcome our new members\, discuss community growth\, and report on the Privacy Design Seal in development! Agenda will be announced ASAP.  \nPlease reach out to admin22@instituteofprivacydesign.org if you are a member and have yet to receive invitation details. Guest invites limited. Ask a current member to nominate you to receive an invitation. If you are not a member\, apply to join as an Ambassador to get invited and see what’s up! 
URL:https://instituteofprivacydesign.org/event/q1-2024-all-hands-meeting/
CATEGORIES:All Hands Meeting
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/IOPD-AHM-Q12024.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240206
DTEND;VALUE=DATE:20240208
DTSTAMP:20260503T115402
CREATED:20240119T101607Z
LAST-MODIFIED:20240123T212859Z
UID:5520-1707177600-1707350399@instituteofprivacydesign.org
SUMMARY:Symptai In Person CIPT Training (Kingston\, Jamaica)
DESCRIPTION:The CIPT program was developed by the International Association of Privacy Professionals (IAPP)\, which is the world’s largest comprehensive global information privacy community and resource. The CIPT certification also holds accreditation under ISO 17024: 2012. \nThese instructor-led training sessions are beneficial for persons who plan to certify or just want to deepen your privacy knowledge. And\, in the ever-changing privacy environment\, as new legislation such as the GDPR and the CCPA comes along\, you will be fully prepared. \n  \n\nWhat will you learn\n\nModule 1: Foundational principles of privacy in technology\nModule 2: The role of the technology professional in privacy\nModule 3: Privacy threats and violations\nModule 4: Technical measures and privacy-enhancing technologies\nModule 5: Privacy engineering\nModule 6: Privacy-by-design methodology\nModule 7: Technology challenges for privacy\n\n  \n\n\nWho should attend?\n\nData Protection Officers\nData Protection Managers\nAuditors\nLegal Compliance Officers\nSecurity Manager\nInformation Managers\nAnyone involved with data protection processes and programs\n\n  \n\n\nWhat comes with registration?\nOnce registered for this course\, participants will also be registered as an official member of the IAPP and receive official members access to the training/course material for the CIPM exam and an exam voucher in order to register for the exam. This course will prepare persons to sit the CIPM exam and have a comprehensive understanding of privacy in an organization and how to manage it. \n  \n\nWhy organizations should implement training?\n\nComply with GDPR requirements\nAvoid penalties up to 20 million euros (25 million USD) or 4% of global revenues\nImprove the way your entire organization handles data\nReduce risk of a data breach\nBuild privacy policies to make your organization more cost-effective\nDemonstrate accountability and due diligence\nFoster customer confidence
URL:https://instituteofprivacydesign.org/event/iapp-cipt-kingston-jamaica-feb-6-7/
LOCATION:Symptai Consulting Limited\, 58 Half Way Tree Road\, Kingston\, Jamaica
CATEGORIES:#privacytraining,#CIPT
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/logo.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240125T120000
DTEND;TZID=America/New_York:20240125T130000
DTSTAMP:20260503T115402
CREATED:20240103T231752Z
LAST-MODIFIED:20240125T165323Z
UID:5403-1706184000-1706187600@instituteofprivacydesign.org
SUMMARY:Assurance Cases | Privacy Engineering & Technology Education Discussion (PETed)
DESCRIPTION:Join our IOPD Privacy Engineering & Technology Education Discussion (PETed) Series! The format of the webinar will be a one-hour informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data\, zero-knowledge proofs\, homomorphic encryption\, and translucent databases.\nThe participants will be asked to bring questions related to the topic. Come back the fourth Thursday of every month for a new discussion\, new speaker\, and new insights on the most cutting-edge privacy challenges! \n  \nDate & Time:\nJanuary 25th\, 2024 @ 12:00 PM ET \n  \nTopic:\nAssurance Cases \n  \nSynopsis:\nAssurance cases are gaining traction as a means of certification in Aerospace and other safety and security critical industries. However\, these assurance cases can become overwhelming and complicated\, even for moderately complex systems. Therefore\, there is a compelling requirement to develop new automation that can aid in creating and assessing assurance cases. In this introductory presentation for the webinar to facilitate subsequent discussion\, I introduce a rigorous framework that eliminates adhoc construction of assurance cases with emphasis on the validity and soundness of the argumentation process\, confidence of the claims/arguments/evidences and the systematic exploration of defeaters. I briefly discuss the tools and automation support for Assurance 2.0 that was developed in the Clarissa project for a DARPA ARCOS program and finally highlight the key capabilities through examples. \n  \nPre-Webinar Resources:\n\nCLARISSA: Foundations\, Tools & Automation for Assurance Cases\, Presented at 42nd Digital Avionics Systems Conference (DASC)\, Barcelona\, Spain\, October 2023\, https://www.csl.sri.com/~rushby/papers/clarissa-dasc23.pdf\nAdelard ASCE tool https://www.adelard.com/asce/\nAdvoCATE NASA Tool: https://ntrs.nasa.gov/citations/20220009664\nAssurance 2.0 Methodology for Assurance cases: https://arxiv.org/abs/2205.04522\nAssurance 2.0: A Manifesto 2004.10474v3.pdf (arxiv.org) \n\n  \nSpeaker:\nVatsan Varadarajan\nDr. Srivatsan Varadarajan is a Technical Engineering Fellow within Advanced Technology for Honeywell Aerospace. Research areas include AI/ML technologies for autonomy\, certifiable software\, formal methods (e.g.\, model checkers\, theorem provers) for automated verification. Extensive expertise in the development of distributed\, fault-tolerant networks\, wireless communications and dependable\, embedded hardware and software platforms. In his current role\, he oversees specific research and technology development projects in the core areas of certifiable platforms and assurance technologies for autonomous avionics systems. He has over 30 publications in conferences and journals and has 25 Patents awarded to date. He has a PhD in Computer Science and MS degrees in Mathematics and Computer sciences and Engineering. \n  \nModerator:\nSteve Hickman\nSteve is the Founder of Epistimis\, a company dedicated to providing tools that support true Privacy by Design. Prior to founding Epistimis\, Steve worked in the privacy organization at Meta/Facebook where he saw first-hand how current approaches won’t scale. Prior to working at Meta\, Steve worked at Honeywell Aerospace Advanced Technology\, where he worked on design tooling for the US Army. (Epistimis Modeling Tool uses the same conceptual foundation developed for the US Military). Prior to that\, he managed the Honeywell Aerospace Invention / Patent review process for 4 years\, which processed ~1000 invention disclosures each year. There he improved and automated processes\, created training\, and managed 12+ invention review teams consisting of 75+ technical experts from across Honeywell Aerospace. Prior to that Steve was one of architects of HiLiTE\, a tool for test and code generation for data flow and state designs used in Honeywell Aerospace’s flight and engine control software. Steve holds a BSEE from Rice University\, a MS Comp Sci from Southern Methodist University\, and a JD (Intellectual Property) from Mitchell Hamline School of Law. \n  \nThe IOPD Privacy Engineering & Technology Education Discussion (PETed) Series is a members-only event. Join as an Ambassador before the 1st of each month to get invited to the recurring monthly event. If you are already a member\, but need an invitation please contact admin22. 
URL:https://instituteofprivacydesign.org/event/assurance-cases-january-2024-privacy-engineering-technology-education-discussion-peted/
CATEGORIES:PETed
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240120
DTEND;VALUE=DATE:20240124
DTSTAMP:20260503T115402
CREATED:20240119T115717Z
LAST-MODIFIED:20240123T215237Z
UID:5633-1705708800-1706054399@instituteofprivacydesign.org
SUMMARY:Symptai Live Online CIPP/E Training
DESCRIPTION:This training is an opportunity to learn about critical privacy concepts that are also integral to the CIPP/E exam. While not purely a ‘test prep’ course\, this training is appropriate for professionals who plan to certify\, as well for those who want to deepen their data protection knowledge. Both the training and the exam are based on the same body of knowledge. \nThese instructor-led training sessions are beneficial for persons who plan to certify or just want to deepen your privacy knowledge. \n Preview this course \n\n\n\n\nWhat will you learn\n\nModule 1: Data Protection Laws\nModule 2: Personal Data\nModule 3: Controllers and Processors\nModule 4: Processing Personal Data\nModule 5: Data Subjects’ Rights\nModule 6: Information Provision Obligations\nModule 7: International Data Transfers\nModule 8: Compliance Considerations\nModule 9: Security of Processing\nModule 10: Accountability\nModule 11: Supervisions and Enforcement\n\n  \n\n\nWho should attend?\n\nLegal\nAuditors\nLegal Compliance Officers\nInformation Management\nHuman Resources\nSecurity Manager\nRecords Managers\n\n  \n\n\nWhat comes with registration?\nOnce registered for this course\, participants will also be registered as an official member of the IAPP and receive official members access to the training/course material for the CIPP exam and an exam voucher in order to register for the exam. This course will prepare persons to sit the CIPP exam and have a comprehensive understanding of jurisdictional laws\, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. \n  \n\nWhy organizations should implement training?\n\nComply with GDPR requirements\nAvoid penalties up to 20 million euros (25 million USD) or 4% of global revenues\nImprove the way your entire organization handles data\nReduce risk of a data breach\nBuild privacy policies to make your organization more cost-effective\nDemonstrate accountability and due diligence\nFoster customer confidence
URL:https://instituteofprivacydesign.org/event/iapp-cipp-e-virtual-jan-20-23/
LOCATION:Virtual
CATEGORIES:#privacytraining,#CIPP/E
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/logo.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231207T120000
DTEND;TZID=America/New_York:20231207T130000
DTSTAMP:20260503T115402
CREATED:20231025T221918Z
LAST-MODIFIED:20231025T223802Z
UID:4978-1701950400-1701954000@instituteofprivacydesign.org
SUMMARY:Vector Databases: AI Uses\, Privacy Risks\, and Mitigations | Privacy Engineering & Technology Education Discussion (PETed)
DESCRIPTION:Join our new IOPD Privacy Engineering & Technology Education Discussion (PETed) Series! The format of the webinar will be a one-hour informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data\, zero-knowledge proofs\, homomorphic encryption\, and translucent databases. The participants will be asked to bring questions related to the topic. Come back the fourth Thursday of every month for a new discussion\, new speaker\, and new insights on the most cutting-edge privacy challenges! \nDate & Time:\nDecember 7th\, 2023 @ 12:00 PM ET \nTopic:\nVector Databases: AI Uses\, Privacy Risks\, and Mitigations \nProblem Statement:\nDevelopers are rushing to adopt new AI tools and techniques\, and private data for AI systems is shifting out of models and into vector databases. These new databases are immature from a security and privacy perspective\, and the attacks against them are numerous and growing by the day. Understanding\, controlling\, monitoring\, and protecting the data in these databases should be a top priority of security and privacy teams. \nSynopsis:\nA short discussion of what a vector database is\, how its popularity is soaring\, why organizations are adopting it\, and the many risks and misconceptions associated with the new types of data going into them. \nRelated PETs:\n\nHomomorphic Encryption\nData-in-Use Encryption\nCustomer-held Encryption Keys\n\nPre-Webinar Resources:\n\nGoogle: Meet AI’s multitool: Vector embeddings \nOpenAI: Introducing text and code embeddings \nIBM: What is retrieval-augmented generation? \nRetrieval Augmented Generation using Azure Machine Learning prompt flow \n“Embeddings Aren’t Human Readable” And Other Nonsense \nText Embeddings Reveal (Almost) As Much As Text \n“Inverting facial recognition models (Can we teach a neural net to convert face embedding vectors back to images?) \n\nSpeaker:\nPatrick Walsh \nPatrick Walsh has more than 20 years of experience building security products and enterprise software solutions. Most recently\, he ran an Engineering division at Oracle\, bringing productivity and insights to the world’s largest companies. Patrick now leads IronCore Labs\, a data protection platform that helps businesses get back control of their data so they can meet increasingly stringent data protection and privacy requirements. \nModerator:\nJanelle Hsia \nJanelle Hsia is the President and Founder of Privacy SWAN Consulting working as a trainer\, consultant\, and trusted advisor for strategic and tactical decision-making. While she is focused on the field of privacy and data protection\, Janelle Hsia is not a lawyer and brings a diverse background with strong leadership\, technical\, and business skills spanning 20 years in the areas of project management\, IT\, privacy\, security\, data governance\, and process improvement. Janelle Hsia is also Co-Founder and Vice-President of the Institute of Operational Privacy Design. \nThe IOPD Privacy Engineering & Technology Education Discussion (PETed) Series is a members-only webinar. Join as an Ambassador to get invited to the recurring monthly event. If you are already a member\, but need an invitation please contact admin22@instituteofprivacydesign.org. 
URL:https://instituteofprivacydesign.org/event/vector-databases-ai-uses-privacy-risks-and-mitigations-privacy-engineering-technology-education-discussion-peted/
CATEGORIES:PETed
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2023/10/1-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231102T120000
DTEND;TZID=America/New_York:20231102T130000
DTSTAMP:20260503T115402
CREATED:20231009T194457Z
LAST-MODIFIED:20231026T153729Z
UID:4893-1698926400-1698930000@instituteofprivacydesign.org
SUMMARY:What Can Go Wrong With Your AI? | Privacy Engineering & Technology Education Discussion (PETed)
DESCRIPTION:Join our new IOPD Privacy Engineering & Technology Education Discussion (PETed) Series! The format of the webinar will be a one-hour informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data\, zero-knowledge proofs\, homomorphic encryption\, and translucent databases. The participants will be asked to bring questions related to the topic. Come back the fourth Thursday of every month for a new discussion\, new speaker\, and new insights on the most cutting-edge privacy challenges! \n \nDate & Time:\nNovember 2nd\, 2023 @ 12:00 PM ET \n \nTopic:\nWhat Can Go Wrong With Your AI? \n \nProblem Statement:\nDo AI systems require a holistic risk-based approach? How can you identify and assess all the different risks? \n \nSynopsis:\nDuring this session we are going to discuss the problem of risk identification and assessment in AI systems. We will look into the ideas in Europe of introducing a Fundamental Rights Impact Assessment and we will explore some of the available tools. \n \nRelated PETs:\n\nPLOT4ai\nATLAS\n\n  \nPre-Webinar Resources:\n\nhttps://plot4.ai/\nhttps://datasociety.net/wp-content/uploads/2021/11/HUDIERA-Full-Paper_FINAL.pdf\nhttps://rm.coe.int/huderaf-coe-final-1-2752-6741-5300-v-1/1680a3f688\nhttps://www.ippapublicpolicy.org/file/paper/6476ec2fe5c7f.pdf\nhttps://www.government.nl/documents/reports/2022/03/31/impact-assessment-fundamental-rights-and-algorithms\n\n  \nSpeaker:\nIsabel Barberá \nIsabel Barberá is the co-founder of Rhite\, a consultancy specialised in Privacy Engineering and Responsible AI based in The Netherlands. She advises local and international organisations in the public and private sector on aspects related to Privacy Engineering\, Privacy and Security by Design and Responsible AI. Isabel is one of the members of the European agency for Cybersecurity (ENISA) Working Group on Data Protection Engineering and a member of the European Data Protection Board (EDPB) Pool of Experts. She is also the author of the AI privacy threat modeling library PLOT4ai\, an open source AI risk assessment tool created to help organisations build Responsible AI systems. Find her on LinkedIn at https://www.linkedin.com/in/isabelbarbera/ \n \n \nModerator:\nNicole Nguyen \nNicole Nguyen is an enthusiastic privacy professional\, deftly bridging technology\, business\, and law. Beginning in intellectual property and patent prosecution\, she gained practical legal insights and technical acumen\, which she later applied to data privacy across various regulated industries. She honed her skills across operations\, regulatory analysis\, and engineering\, to streamline data handling\, shape privacy policies\, and drive privacy-by-design principles. Recognized for her leadership and technical prowess\, Nicole guides strategic decisions\, resolves complex issues\, and bolsters business resilience. Her passion lies in crafting comprehensive data governance programs\, weaving security\, privacy\, and risk disciplines into robust frameworks that safeguard business value and promote a future-ready\, privacy-conscious culture. B.S. Chemical and Electrical Engineering and M.S. Information Systems\, Cybersecurity and Business Intelligence. \n \n \nThe IOPD Privacy Engineering & Technology Education Discussion (PETed) Series is a members-only webinar. Join as an Ambassador to get invited to the recurring monthly event. If you are already a member\, but need an invitation please contact admin22@instituteofprivacydesign.org. 
URL:https://instituteofprivacydesign.org/event/what-can-go-wrong-with-your-ai-privacy-engineering-technology-education-discussion-peted/
CATEGORIES:PETed
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2023/10/IOPD-LinkedIn.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20231101
DTEND;VALUE=DATE:20231104
DTSTAMP:20260503T115402
CREATED:20230223T210740Z
LAST-MODIFIED:20230602T005515Z
UID:2888-1698796800-1699055999@instituteofprivacydesign.org
SUMMARY:Privacy + Security Forum (Fall Academy)
DESCRIPTION:
URL:https://instituteofprivacydesign.org/event/privacy-security-forum-fall-academy/
CATEGORIES:Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20231024
DTEND;VALUE=DATE:20231025
DTSTAMP:20260503T115402
CREATED:20231016T204014Z
LAST-MODIFIED:20231016T204133Z
UID:4940-1698105600-1698191999@instituteofprivacydesign.org
SUMMARY:Responsible AI by Design (One-Day) Pre-Conference Workshop | ISC2 Security Congress 2023
DESCRIPTION:Tuesday\, October 24\n8:00 a.m. – 5:00 p.m. CT\nRegular Pricing through October 11\nMember: $650 | Non-Member: $750 \nCPE Credits: 8 \n  \nSince the introduction of ChatGPT late in 2022\, generative artificial intelligence (GAI) has seen truly unprecedented use and adoption around the world.  With it has come a whole host of questions for InfoSec professionals:  How do we determine which GAI tools are safe?  What are the considerations for selling GAI tools to the public or offering them “as a service”?  What are the ethical and legal considerations for building GAI tools? \nIn this one-day workshop\, two veteran practitioners\, including a leading cybersecurity attorney\, will offer practical information on multiple aspects of designing\, incorporating\, and employing GAI for internal or customer use. Takeaways include: \n\nA deep dive into dangers and limitations of GAI\, as well as a survey of the GAI InfoSec threat landscape\nThe current state of AI laws\, a preview of the EU AI Act\, and how they apply to InfoSec\nHow to conduct impact assessments using the U.S. Dept. of Energy’s AI Risk Management Playbook as well as the NIST AI RMFs Playbook\n\n  \nWorkshop Instructors:\nR. Jason Cronk\, CIPT\, CIPM\, CIPP/US\, FIP\, JD\, PbD Ambassador\, President\, Enterpivacy Consulting Group\nScott M. Giordano\, Esq.\, CISSP\, CCSP\, Attorney at Law\, Giordano Law Offices \n  \nRegister at https://web.cvent.com/event/c5c86a46-bb65-46c7-a27c-b55e080e372b/websitePage:322284a9-ca0d-4674-b9a0-291acfc91d60
URL:https://instituteofprivacydesign.org/event/responsible-ai-by-design-one-day-pre-conference-workshop-isc2-security-congress-2023/
CATEGORIES:#privacytraining,Workshop
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20231023
DTEND;VALUE=DATE:20231024
DTSTAMP:20260503T115402
CREATED:20231016T203233Z
LAST-MODIFIED:20231016T203506Z
UID:4934-1698019200-1698105599@instituteofprivacydesign.org
SUMMARY:Privacy by Design (One-Day) Pre-Conference Workshop | ISC2 Security Congress 2023
DESCRIPTION:Monday\, October 23\n8:00 a.m. – 5:00 p.m. CT\nRegular Pricing through October 11\nMember: $650 | Non-Member: $750 \nCPE Credits: 8 \n  \nSince the EU General Data Protection Regulation (GDPR) came into force in 2018\, the need to bake privacy in [aka Privacy by Design (PbD)] has become an obligatory aspect of software and services development in a way that protects individual privacy while leveraging the power of modern technology.  For InfoSec professionals\, PbD offers a powerful toolbox for building data protection programs that meet organizational and legal requirements while honoring privacy norms that individuals have come to expect.  PdD also offers similar benefits for developing products and services\, including those incorporating generative artificial intelligence (GAI). \nIn this one-day workshop\, two veteran practitioners\, including one of the world’s leading PbD experts\, will offer help participants explore and understand privacy and privacy design in profoundly new ways. Takeaways include: \n\nCritical distinctions between privacy and security\nAn exploration of privacy threat modeling and privacy risk using a variant of FAIR (Factors Analysis of Information Risk)\nStrategies and tactics for reducing privacy risks in products and services\n\n  \nWorkshop Instructors:\nR. Jason Cronk\, CIPT\, CIPM\, CIPP/US\, FIP\, JD\, PbD Ambassador\, President\, Enterpivacy Consulting Group\nScott M. Giordano\, Esq.\, CISSP\, CCSP\, Attorney at Law\, Giordano Law Offices \n  \nRegister at https://web.cvent.com/event/c5c86a46-bb65-46c7-a27c-b55e080e372b/websitePage:322284a9-ca0d-4674-b9a0-291acfc91d60
URL:https://instituteofprivacydesign.org/event/privacy-by-design-one-day-pre-conference-workshop-isc2-security-congress-2023/
CATEGORIES:#privacytraining,Workshop
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20231012T094500
DTEND;TZID=America/Denver:20231012T104500
DTSTAMP:20260503T115402
CREATED:20230914T015023Z
LAST-MODIFIED:20230914T020021Z
UID:4804-1697103900-1697107500@instituteofprivacydesign.org
SUMMARY:Closer Inspection of AI - Find Out What is Under the Hood | 2023 Phoenix Security & Audit Conference
DESCRIPTION:Join our Vice President\, Janelle Hsia\, and Committee Member\, Nicole Nguyen\, at the 2023 Phoenix Security & Audit Conference October 12th on the Emerging Issues track in the Primrose Room from 9:45 – 10:45 am! This combined event from the local chapters of the ISSA\, ISACA\, and the IIA provides great networking and educational opportunities. The conference provides multiple sessions of content along five tracks as well as morning and lunch keynote speakers. Continental breakfast\, lunch\, and snacks provided. 7 CPE. \n  \nArtificial Intelligence (AI) is everywhere\, even in places we don’t expect. We will explore generative artwork\, digital assistants\, automated license plate readers\, and smart home devices with a deep dive into how companies utilize AI by extracting personal data and impact our everyday lives. We will analyze these technologies and review some unintended consequences and privacy harms like economic loss\, social stigmatization\, loss of autonomy\, and discrimination that can be caused without careful implementation. We will discuss the integration of AI into your tech stack and engagement with 3rd party service to perform tasks for you (contracts\, cookies\, data retention\, data subject rights\, and more.) \n\nJanelle Hsia \nJanelle Hsia is the Founder and President of Privacy SWAN Consulting. She is focused on privacy and data protection and brings a diverse background with strong leadership\, technical\, and business skills spanning over 20 years. Because she is not a lawyer\, she brings a unique perspective to integrating privacy with security and technology\, which helps companies operationalize their privacy requirements. \nNicole Nguyen \nNicole Nguyen is an enthusiastic privacy professional\, deftly bridging technology\, business\, and law. Beginning in intellectual property and patent prosecution\, she gained practical legal insights and technical acumen\, which she later applied to data privacy across various regulated industries. She honed her skills across operations\, regulatory analysis\, and engineering\, to streamline data handling\, shape privacy policies\, and drive privacy-by-design principles. Recognized for her leadership and technical prowess\, Nicole guides strategic decisions\, resolves complex issues\, and bolsters business resilience. Her passion lies in crafting comprehensive data governance programs\, weaving security\, privacy\, and risk disciplines into robust frameworks that safeguard business value and promote a future-ready\, privacy-conscious culture. B.S. Chemical and Electrical Engineering and M.S. Information Systems\, Cybersecurity and Business Intelligence. \n 
URL:https://instituteofprivacydesign.org/event/closer-inspection-of-ai-find-out-what-is-under-the-hood-2023-phoenix-security-audit-conference/
LOCATION:Desert Willow Conference Center\, 4340 East Cotton Center Boulevard\, Phoenix\, AZ\, 85040\, United States
CATEGORIES:Speaking Engagements,Conference,In-Person
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2023/09/f16251345c9a48e9bbc6cdd0975a3067___637fabf2293d39d908694e089e35ef89.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Halifax:20230928T120000
DTEND;TZID=America/Halifax:20230928T130000
DTSTAMP:20260503T115402
CREATED:20230828T142102Z
LAST-MODIFIED:20230912T204835Z
UID:4645-1695902400-1695906000@instituteofprivacydesign.org
SUMMARY:Navigating the CRM Data Landscape: Security\, Compliance\, and Innovation | Privacy Engineering & Technology Education Discussion (PETed)
DESCRIPTION:Join our second webinar in the new IOPD Privacy Engineering & Technology Education Discussion (PETed) Series! The format of the webinar will be a one-hour informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data\, zero-knowledge proofs\, homomorphic encryption\, and translucent databases. \nThe participants will be asked to bring questions related to the topic. Come back the fourth Thursday of every month for a new discussion\, new speaker\, and new insights on the most cutting-edge privacy challenges! \n  \nDate & Time:\nSeptember 28th\, 2023 @ 12:00 PM ET \n  \nTopic:\nNavigating the CRM Data Landscape: Security\, Compliance\, and Innovation \n  \nSynopsis:\nJoin us for an engaging and informative interactive session featuring Mike Smith\, Distinguished Security Architect at Salesforce. Mike is a Fellow of Information Privacy with the International Association of Privacy Professionals (IAPP)\, and is a seasoned expert in data security\, privacy\, and compliance\, particularly in the world of SaaS applications. In this session\, we will explore three critical aspects of managing data and protecting privacy in today’s digital world: \n\nProtecting Data in CRM: Discover practical strategies and best practices to safeguard your valuable customer data within your Customer Relationship Management (CRM) system. Learn how to mitigate risks\, prevent data breaches\, and build trust with your customers.\nComplying with Data Privacy Laws: Understand the tools that are available within Salesforce for privacy program management\, including data anonymization\, retention\, and managing Data Subjects Access Requests (DSARs). Learn how to ensure compliance while maintaining operational efficiency.\nUsing Generative AI with Enterprise Data\, in a Trusted and Secure Manner: Explore the possibilities of harnessing generative AI technologies for innovation within your enterprise\, while protecting personal data and other sensitive information that powers your business. Discover how to leverage AI in a secure\, responsible\, and ethical way to generate insights\, streamline tasks\, and drive business growth.\n\nOur host\, Nicole\, will moderate a dynamic Q&A session following the introduction\, where you’ll have the opportunity to ask questions and engage with Mike on these vital topics. Whether you’re a business leader\, IT professional\, or data enthusiast\, this interactive session is your gateway to navigating the complex world of data security\, compliance\, and innovation within Salesforce. Don’t miss out on this opportunity to stay informed and empowered in the data-driven era! \n  \nSpeaker:\nMike Smith \n  \nModerator:\nNicole Nguyen \n  \nThe IOPD Privacy Engineering & Technology Education Discussion (PETed) Series is a members-only event. Join as an Ambassador before the 1st of each month to get invited to the recurring monthly event. If you are already a member\, but need an invitation please contact admin22. 
URL:https://instituteofprivacydesign.org/event/september-privacy-engineering-technology-education-discussion-peted/
CATEGORIES:PETed
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2023/08/1-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20230928
DTEND;VALUE=DATE:20230929
DTSTAMP:20260503T115402
CREATED:20230919T205647Z
LAST-MODIFIED:20230919T205647Z
UID:4827-1695859200-1695945599@instituteofprivacydesign.org
SUMMARY:Building Digital Trust Amongst the Digital Chaos | Dublin SASIG: Meeting Today's Cybersecurity Challenges
DESCRIPTION:Organisations build trust in their brands over a long time. Sustaining that trust then becomes a critical measure of brand resilience\, especially when facing the digital chaos of the modern world. This includes the proliferation of data\, new technologies like LLMs\, AI\, and the continuous threat of cyber-attacks and supply chain disruptions. Even the potential of an incident can erode trust. Reputations\nare built-in “drops” over time but are lost in seconds\, becoming harder to regain.\n\nJoin us at the Dublin SASIG: Meeting Today’s Cybersecurity Challenges in association with BSI Thursday\, September 28 from 9:30am – 3pm BST (10am – 2pm live stream via Zoom).\n\nConor Hogan from our Standards Committee will present “Building digital trust amongst the digital chaos.” In this session\, Conor will outline his perspective on digital trust (“trust in the digital interactions and relationships between business\, people and things”) and how it builds on known concepts and multi-layered assurance and by-design approaches. He will highlight the opportunity for all organisations to adopt digital trust and power business operations; drive performance; foster innovation and benefit all stakeholders and wider society.
URL:https://instituteofprivacydesign.org/event/building-digital-trust-amongst-the-digital-chaos-dublin-sasig-meeting-todays-cybersecurity-challenges/
CATEGORIES:Speaking Engagements,Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230914T024500
DTEND;TZID=America/New_York:20230914T151500
DTSTAMP:20260503T115402
CREATED:20230828T222905Z
LAST-MODIFIED:20230828T223424Z
UID:4752-1694659500-1694704500@instituteofprivacydesign.org
SUMMARY:50 Shades of Data - ISSA Colorado Springs 13th Annual Peak Cyber Symposium
DESCRIPTION:50 Shades of Data – New US Privacy Laws\nAbout the ISSA Colorado Springs 13th Annual Peak Cyber Symposium \nThe Information Systems Security Association (ISSA) – Colorado Springs Chapter is delighted to announce the return of the highly anticipated 13th Annual Peak Cyber Symposium in beautiful Colorado Springs\, CO. Mark your calendars for the event days\, which will be held from Tuesday\, September 12 to Thursday\, September 14\, 2023. CPE/CEU Credit will be awarded. \nThe Peak Cyber Symposium is an exceptional opportunity for Cybersecurity\, Information Management\, Information Technology\, and Communications Professionals to enhance their knowledge and expertise. This symposium aims to provide a comprehensive platform to delve into the most critical cybersecurity threats of today\, explore effective remediation strategies\, and share best practices. \nJoin us as we gather industry experts\, thought leaders\, and professionals from various cyber sectors to foster an engaging environment for learning\, networking\, and collaboration. Gain valuable insights into the latest trends\, emerging technologies\, and innovative approaches in the ever-evolving field of cybersecurity. \n\nTopic:\n50 Shades of Data – New US Privacy Laws \n\nDate:\nSeptember 14\, 2023 \n\nTime:\n2:45 pm – 3:15 pm \n\nLocation:\nUniversity of Colorado Colorado Springs (UCCS)\, Ent Center for the Arts\, Shockley Theater \n5225 N Nevada Ave\, Colorado Springs\, CO 80918 \n\nSummary:\nIts all about the data. Whether it’s Data Subject Request or Data Breach the amount of effort\, cost and impact on a company’s reputation depend on the quantity and the type of personal data involved. The more data\, the larger the consequences. This presentation is a practical approach to privacy and data protection that includes strategies to help you get to stay compliant with the evolving privacy regulations. \n\nSpeaker:\nJanelle Hsia \nJanelle is the President of Privacy SWAN Consulting and a speaker\, trainer\, consultant\, and trusted advisor for strategic and tactical decision-making within global organizations of all sizes. She is focused on the field of privacy and data protection and brings a diverse background with strong leadership\, technical\, and business skills spanning over 20 years. Because of this\, she brings a unique perspective regarding how to integrate data protection with security and technology while helping companies operationalize their privacy requirements. Her passion is creating comprehensive and tailored data governance programs for SMBs with an international presence. She holds the CIPM\, CIPT\, CIPP/US/E\, CISA\, CDPSE\, PMP\, and GSLC certifications
URL:https://instituteofprivacydesign.org/event/issa-colorado-springs-13th-annual-peak-cyber-symposium/
CATEGORIES:Speaking Engagements,Conference
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2023/08/ISSA-COS-Logo-.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20230911
DTEND;VALUE=DATE:20230913
DTSTAMP:20260503T115402
CREATED:20230802T190848Z
LAST-MODIFIED:20230802T190914Z
UID:4527-1694390400-1694563199@instituteofprivacydesign.org
SUMMARY:Confirmation Bias in the Privacy Profession: Common Misreading of the NIST Privacy Framework - PEPR'23
DESCRIPTION:Join R Jason Cronk and Nandita Narla from our Standards Committee for Confirmation Bias in the Privacy Profession: Common Misreading of the NIST Privacy Framework from 4:30 – 4:45 pm Tuesday\, September 12th at the 2023 USENIX Conference on Privacy Engineering Practice and Respect (PEPR’23)! \nConfirmation bias is a cognitive bias whereby people consume information in a way that reinforces their previously held beliefs. Many users and implementers of the NIST Privacy Framework do just that\, diverting their attention away from many of the important and central concepts in the framework. Similar to the Cybersecurity Framework\, the Privacy Framework embodies a risk based approach\, but many privacy professionals are more familiar with principle based privacy with a primary goal of legal and regulatory compliance. Focusing on these mental models can lead to challenges and conflicting interpretations of NIST Privacy Framework concepts and terminology\, much of which is unique to the framework and not found elsewhere in the professional literature. This presentation will highlight some of the common misconceptions and antipatterns related to the usage of NIST privacy framework drawn from real life case studies and implementation experience across industries. \nRegister at https://www.usenix.org/conference/pepr23 \n 
URL:https://instituteofprivacydesign.org/event/confirmation-bias-in-the-privacy-profession-common-misreading-of-the-nist-privacy-framework/
CATEGORIES:Speaking Engagements,Conference
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2023/08/pepr23_banner_social_1200x630_v2.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Halifax:20230824T120000
DTEND;TZID=America/Halifax:20230824T130000
DTSTAMP:20260503T115402
CREATED:20230817T222937Z
LAST-MODIFIED:20230818T181903Z
UID:4592-1692878400-1692882000@instituteofprivacydesign.org
SUMMARY:Using ChatGPT (or similar tools) with Privacy Compliance | Privacy Engineering & Technology Education Discussion (PETed)
DESCRIPTION:Join our first webinar in the new IOPD Privacy Engineering & Technology Education Discussion (PETed) Series! The format of the webinar will be a one-hour informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data\, zero-knowledge proofs\, homomorphic encryption\, and translucent databases. The participants will be asked to bring questions related to the topic. Come back the fourth Thursday of every month for a new discussion\, new speaker\, and new insights on the most cutting-edge privacy challenges! \n  \nDate & Time:\nAugust 24th\, 2023 @ 12:00 PM ET \n  \nTopic:\nUsing ChatGPT (or similar tools) with Privacy Compliance: Enabling companies to identify and use unstructured data for analysis and sharing. \n  \nSynopsis:\nDo your employees unknowingly put personal or sensitive information (like mobile number\, email address\, social security number\, etc.) in emails or PDF documents and accidently expose that information to the wrong people? In a world when employees are using tools like ChatGPT for productivity\, do they need help generating synthetic data or learning what data to redact before uploading? Do you need help identifying and correcting privacy policy violations related to data sharing in real-time AND being able to provide leadership metrics? Are you looking for ways to show accountability with your privacy program? If you need answers to questions like these\, please join us as we explore a new privacy tool\, with a live demonstration\, that has been called the Grammarly of data privacy. \n  \nRelated PETs:\n\nSynthetic data\nRedaction\nEncryption\nIdentify privacy policy violation\nReal-time personal data awareness/training\nMetrics and accountability\n\n  \nPre-Webinar Resources:\n\nhttps://www.entrepreneur.com/en-in/technology/this-platform-is-grammarly-for-data-privacy/441441\nhttps://www.unifi.ai/download-priviliy\nhttps://chrome.google.com/webstore/detail/privily/ckgpondnkhpodegigclccglbdflgmmld?hl=en&authuser=3 \n\n  \nSpeaker:\nPramod Misra \nPramod Misra is passionate about using data for automation\, analytics and decision-making. He is a co-founder of Unifi.ai based in Atlanta. Unifi.ai is on a mission enabling corporate employees using AI tools with privacy compliance . His work has been quoted in Forbes\, Inc. Entrepreneur\,ceoworld and other leading publications.  He has over 20 years of full-time work experience and worked with companies like Vodafone\, Novartis\, P&G. Pramod is also an Advisor of the IOPD. \n  \nModerator:\nJanelle RW Hsia \nJanelle Hsia is the President and Founder of Privacy SWAN Consulting working as a trainer\, consultant\, and trusted advisor for strategic and tactical decision-making. While she is focused on the field of privacy and data protection\, Janelle Hsia is not a lawyer and brings a diverse background with strong leadership\, technical\, and business skills spanning 20 years in the areas of project management\, IT\, privacy\, security\, data governance\, and process improvement. Janelle Hsia is also Co-Founder and Vice-President of the Institute of Operational Privacy Design. \n  \nThe IOPD Privacy Engineering & Technology Education Discussion (PETed) Series is a members-only webinar. Join as an Ambassador to get invited to the recurring monthly event. If you are already a member\, but need an invitation please contact admin22. 
URL:https://instituteofprivacydesign.org/event/peted-aug23-using-chatgpt-or-similar-tools-with-privacy-compliance/
CATEGORIES:PETed
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2023/08/1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20230806T143000
DTEND;TZID=America/Denver:20230806T180000
DTSTAMP:20260503T115402
CREATED:20230802T185712Z
LAST-MODIFIED:20230802T185712Z
UID:4524-1691332200-1691344800@instituteofprivacydesign.org
SUMMARY:2nd Workshop on Privacy Threat Modeling (WPTM)
DESCRIPTION:Sunday\, August 6th\, 2023 | 2:30-6PM | In-person attendance\n\nThe Workshop on Privacy Threat Modeling brings together researchers\, practitioners\, government representatives\, and industry specialists to collaborate on the topic of privacy threats. While aspects of privacy risk modeling are relatively well-developed\, such as constructions of privacy harms (Solove’s Taxonomy of Privacy and Calo’s subjective/objective privacy harms for instance)\, there has been insufficient discussion around approaches to modeling privacy threats\, broadly construed. \nThe workshop will include an informative session and a collaborative session. The informative session will consist of a keynote\, brief updates on two privacy threat models (MITRE PANOPTIC™ and LINDDUN)\, and presentations selected from participant submissions. In the collaborative session we will discuss threat model generalization and operationalization in break-out groups\, then come together to share discussion outcomes. \n\nLearn More at https://ptmworkshop.gitlab.io/
URL:https://instituteofprivacydesign.org/event/2nd-workshop-on-privacy-threat-modeling-wptm/
CATEGORIES:Speaking Engagements,Workshop
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20230806T100000
DTEND;TZID=America/Denver:20230806T133000
DTSTAMP:20260503T115402
CREATED:20230706T185732Z
LAST-MODIFIED:20230706T190432Z
UID:3812-1691316000-1691328600@instituteofprivacydesign.org
SUMMARY:Workshop on Privacy Engineering in Practice (PEP '23): Beyond Checkbox Compliance
DESCRIPTION:Workshop on Privacy Engineering in Practice (PEP ’23): Beyond Checkbox Compliance\nIf you are attending #SOUPS23\, stop by for this workshop! \nSee R Jason Cronk’s Invited Keynote from 10:10 am – 11:00 am! The IOPD is represented by Nandita Rao Narla and Daniel Smullen\, Ph.D. as part of the Program Committee. \nAbout\nFrequent data breaches\, increased privacy non-compliance fines and rising user expectations of privacy have led organizations to focus on privacy as a core function and demonstrate compliance with existing (while preparing for upcoming) privacy laws. \nHowever\, privacy programs driven by regulatory pressures result in a minimal\, fast as possible\, ‘just enough to comply’ approach\, without holistically addressing privacy. \nTo embed privacy into the software development and data life cycle\, we turn to the emerging field of privacy engineering. We explore privacy engineering research to attempt answering questions such as – How are legal and policy privacy requirements translated to technical requirements? How can we address user’s privacy requirements and expectations? Which privacy engineering tools\, models\, standards and use cases are sufficient? What technical privacy assurances are available? \nThe Workshop on Privacy Engineering in Practice brings together researchers\, lawyers\, developers\, practitioners\, and industry experts to collaborate on building a stronger case for privacy engineering and moving away from the current industry practice of treating privacy as a compliance checkbox. We aim to find common ground between legal\, technical\, and design concepts for privacy. \nFor more information\, see the call for papers. \nWorkshop Goals 🎯\n\nUnderstand methods\, tools\, and approaches to design for privacy\nBroaden the lens through which privacy compliance is viewed by industry and research community\nInitiate discussions and collaboration among an interdisciplinary community of stakeholders to solve for current privacy engineering challenges\n\nPEP ’23 will take place at the Anaheim Marriott in Anaheim\, CA\, USA\, on Sunday\, August 6th\, 2023\, from 10:00 am to 1:30 pm PT. Co-located with the Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023) \n  \nLearn more at https://pep23.com/
URL:https://instituteofprivacydesign.org/event/privacy-engineering-in-practice-pep23/
CATEGORIES:Speaking Engagements,Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20230806T093000
DTEND;TZID=America/Denver:20230806T101500
DTSTAMP:20260503T115402
CREATED:20230705T204136Z
LAST-MODIFIED:20230705T204136Z
UID:3745-1691314200-1691316900@instituteofprivacydesign.org
SUMMARY:50 Shades of Data - ISSA August Cyber Executive Forum 2023
DESCRIPTION:50 Shades of Data\nJoin Vice President\, Janelle RW Hsia\, at the ISSA August Cyber Executive Forum 2023 for “50 Shades of Data” August 6th from 9:30 AM to 10:15 AM! \n  \nPresented at the August Cyber Executive Forum 2023. \nSession date: August 6\, 2023 \nSession time: 9:30 AM – 10:15 AM \nIts all about the data. Whether it’s Data Subject Request or Data Breach the amount of effort\, cost and impact on a company’s reputation depend on the quantiy and the type of personal data involved. The more data\, the larger the consequences. This presentation is a practical approach to privacy and data protection that includes strategies to help you get to stay compliant wih the evolving privacy regulations. \nAnother great event that’s part of the ongoing Cyber Executive Forum series. \n  \nLearn More at August Cyber Executive Forum 2023 – ISSA International
URL:https://instituteofprivacydesign.org/event/50-shades-of-data-issa-august-cyber-executive-forum-2023/
CATEGORIES:Speaking Engagements,Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Halifax:20230725T120000
DTEND;TZID=America/Halifax:20230725T130000
DTSTAMP:20260503T115402
CREATED:20230703T221448Z
LAST-MODIFIED:20230710T200056Z
UID:3706-1690286400-1690290000@instituteofprivacydesign.org
SUMMARY:Design Process Standard Launch Webinar
DESCRIPTION:In January\, the IOPD published our Design Process Standard\, the industry’s first standard for a repeatable and comprehensive process by which a company can reduce privacy risk. \nIn our very first event ever\, speakers from our Standards Committee will introduce our standard\, unravel the intricacies\, and address common concerns around implementing #privacy! \nWe are on the hunt for organizations that would like to adhere to the standard and apply as an early adopter for certification. Come learn about what the IOPD DPS has to offer! \nJoin us July 25th @ 12:00 – 1:00 PM (EDT). This webinar will be followed by a 30-minute unrecorded Q&A session. \nThis is a FREE webinar open to the public which does not require registration to attend. Join the conversation July 25\, 2023 from 12:00PM – 1:00PM (EDT) at https://whereby.com/iopd-webinar! However\, when you register\, you will receive a direct calendar invitation\, a post-event survey\, and one invitation to join the IOPD. \nRegister at https://instituteofprivacydesign.org/launch-webinar/
URL:https://instituteofprivacydesign.org/event/design-process-standard-launch-webinar/
CATEGORIES:Speaking Engagements,Webinar
END:VEVENT
END:VCALENDAR