August 21 - 23, 2019
Marriott Georgetown, Washington, DC
Marriott Georgetown, Washington, DC
Dr. Nnake Nweke PhD,JD
Chief Risk Officer
United States Agency for Global Media
Day One: Wednesday, August 21, 2019
Wednesday, August 21st, 2019
1:30 PM Overcoming Security Challenges Created by the Internet of Things
The sheer number of connected devices continues to grow and with it so do the security challenges. Powered by the convenience and benefits the Internet of Things (IoT) can deliver; the devices continue to permeate all aspects of enterprise and personal existence without necessarily concerns over potential consequences and related security and privacy concerns. Hackers continue to deploy sophisticated attack methodologies to bypass existing security measures. Common attacks include: ransomware, which prevents the legitimate user from accessing a device or network and malware which infects known device vulnerabilities.
In this session explore:
- Gaining visibility and classifying all connected devices
- Detecting real-time alerts about cyber attacks
- Instilling proactive prevention including micro-segmentation of the enterprise network
Day Two: Thursday, August 22, 2019
Thursday, August 22nd, 2019
9:40 AM Embracing the Privacy Imperative- Navigating Regulations and Requirements
Companies must navigate complex and rapidly evolving data privacy regulations and compliance requirements. Various state, national and global regulations along with high profile breaches have made consumers look deeper at which data they share and with whom. The panel will explore the evolving patchwork of privacy and security regulations and how they affect big data, Artificial Intelligence, advertising and litigation. In this discussion, explore the emerging world of privacy with data as a currency. Look at who owns and controls the flow and use of data. This session will discuss planning, preparedness and response to evolving compliance requirements including operational, strategic and proactive communications.
In this session:
· Integrating privacy by design
· Empowering privacy in enterprise risk management
Determining which state regulations to apply