50 Shades of Data – ISSA Colorado Springs 13th Annual Peak Cyber Symposium

Its all about the data. Whether it's Data Subject Request or Data Breach the amount of effort, cost and impact on a company's reputation depend on the quantity and the type of personal data involved. The more data, the larger the consequences. This presentation is a practical approach to privacy and data protection that includes strategies to help you get to stay compliant with the evolving privacy regulations.

Building Digital Trust Amongst the Digital Chaos | Dublin SASIG: Meeting Today’s Cybersecurity Challenges

Join us at the Dublin SASIG: Meeting Today's Cybersecurity Challenges in association with BSI Thursday, September 28 from 9:30am – 3pm BST (10am – 2pm live stream via Zoom). Conor Hogan from our Standards Committee will present "Building digital trust amongst the digital chaos." In this session, Conor will outline his perspective on digital trust (“trust in the digital interactions and relationships between business, people and things”) and how it builds on known concepts and multi-layered assurance and by-design approaches.

Navigating the CRM Data Landscape: Security, Compliance, and Innovation | Privacy Engineering & Technology Education Discussion (PETed)

Join our new IOPD PETed series! The format of the webinar will be a one-hour informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data, zero-knowledge proofs, homomorphic encryption, and translucent databases. Come back the fourth Thursday of every month for a new discussion, new speaker, and new insights on the most cutting-edge privacy challenges! 

What Can Go Wrong With Your AI? | Privacy Engineering & Technology Education Discussion (PETed)

Join our NEW IOPD PETed series! The format of the webinar will be a one-hour informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data, zero-knowledge proofs, homomorphic encryption, and translucent databases. Come back the fourth Thursday of every month for a new discussion, new speaker, and new insights on the most cutting-edge privacy challenges! 

Vector Databases: AI Uses, Privacy Risks, and Mitigations | Privacy Engineering & Technology Education Discussion (PETed)

Join our NEW IOPD PETed series! The format of the webinar will be a one-hour informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data, zero-knowledge proofs, homomorphic encryption, and translucent databases. Come back the fourth Thursday of every month for a new discussion, new speaker, and new insights on the most cutting-edge privacy challenges! 

Symptai Live Online CIPP/E Training

Virtual

This training is an opportunity to learn about critical privacy concepts that are also integral to the CIPP/E exam. While not purely a ‘test prep’ course, this training is appropriate for professionals who plan to certify, as well for those who want to deepen their data protection knowledge. Both the training and the exam are based on the same body of knowledge.

These instructor-led training sessions are beneficial for persons who plan to certify or just want to deepen your privacy knowledge.

Assurance Cases | Privacy Engineering & Technology Education Discussion (PETed)

Join our NEW IOPD PETed series! The format of this session will be a one-hour informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data, zero-knowledge proofs, homomorphic encryption, and translucent databases. Come back the fourth Thursday of every month for a new discussion, new speaker, and new insights on the most cutting-edge privacy challenges! 

Purpose and Means CIPT Live Training – Feb 5, 6, 12 & 13

Virtual

Data privacy regulations worldwide require privacy protections be built into products and services. IAPP Privacy in Technology training, aligned with the ANSI/ISO-accredited CIPT certification program, will provide you with the knowledge to recognize privacy threats and skills to apply technical strategies to mitigate privacy risk throughout the software and systems development lifecycles.

€1195