Awwwards

GDPR of Everything

Second annual Privacy and Data Protection Industry Talk  specially designed for CISO's, DPO's and Privacy Leads. 

By now any data driven organisation needs to have a clear adapt-or-die GDPR strategy, tested and verified. You’ve surely been pushing your GDPR related projects, but how far did you get? So we are offering a practical case-based approach to reviewing the GDPR market results. 

While everyone's still talking about what GDPR is, we are gathering the privacy and security peers of Scandinavia to see what has been done so far and what is left to be accomplished.

Points to be learned

  1. Security Based Business Planning
  2. Privacy and Security in the Age of Machine Learning
  3. Data Flows and Secured Data Exchange
  • 3

    topics

  • 6

    hours

  • 9

    discussions

  • 50

    key participants

Participants

Program

program icon
8:00 - 8:15

Registration and Coffee

program icon
8:15 - 8:30 Add to my calendar Add to appleCalendar

Opening Remarks by the Chairman

Researcher, consultant and government advisor focused on privacy and public policy, and the founder of the Internet of Things Privacy Forum. Gilad is focused on privacy by design, national policy, digital identity and the interplay between governments, commercial markets and standards.

Dr. Gilad L.	Rosner

Dr. Gilad L. Rosner

UK Cabinet Office, Privacy & Consumer Advocacy Group Member
program icon
8:30 - 9:00 Add to my calendar Add to appleCalendar

PRIORITIZING SECURITY IN BUSINESS STRATEGY

This up-to-date session will give a practical example of how the EU Data Protection alters the status quo and identifies practical steps banks are taking now for compliance success under the new EU status quo for privacy in financial sector of Sweden. 

Maria Holmström Mellberg

Maria Holmström Mellberg

Nordea Group Driver Privacy (EU GDPR Compliance risk)
Anders Sandell

Anders Sandell

Nordea Head of Group Information Security Policy Governance and Adoption
program icon
9:05 - 09:35 Add to my calendar Add to appleCalendar

NORDIC REGULATORY OVERVIEW

This regulatory session examines the current status of the “One Stop Shop” and analyzes the emerging structure of shared regulatory authority among the national data protection authorities and European Data Protection Board. 

It will present scenarios that international companies face in doing business in Sweden  raising and settling the disputes. 

Martin Brinnen

Martin Brinnen

The Swedish Data Protection Authority Legal Adviser
program icon
09:40 - 10:10 Add to my calendar Add to appleCalendar

PRIVACY BY DESIGN: WHERE STRATEGY MEETS SECURITY

"Privacy by Design” has become a buzzword yet many new technologies and business processes are still designed without our privacy in mind. This session will  showcase exactly why and how this can be done. 

Springworks and Telia Company will in this case demonstrate a legal, technological and DevOps collaboration within IoT/M2M to define, select and extract personal data. See what it takes to develop a consumer oriented privacy by design and by default based solution that ensures that security requirements are met and that users are in control of their data from a technical perspective.

Nicklas Fernström

Nicklas Fernström

SpringWorks Security Lead
program icon
10:15 - 10:45

Coffee Break and Networking Zones

program icon
10:45 - 11:15 Add to my calendar Add to appleCalendar

BLOCKCHAIN-BASED SECURITY AND PRIVACY ENHANCING TECHNOLOGY

Methods of privacy protection that were developed years or even decades ago no longer translate well in the age of big data. This is because these older methods either aren’t strong enough at scale or require a degradation of the quality of the data itself, making it less valuable.

Fortunately, new and complementary tools and methods of privacy protection make it possible to simultaneously protect data privacy and accuracy in order to leverage the value of big data in healthcare, banking and other privacy-sensitive data domains also comply with European and international laws

Mads Becker

Mads Becker

Ericsson Cyber Security & Blockchain Evangelist
program icon
11:20 - 11:50 Add to my calendar Add to appleCalendar

INDUSTRIAL SECURITY HACK

This ICS/SCADA system live demo hack will demonstrate how a skilled hacker on-stage retrieve easy to find information and then attacks the system.

During the presentation, you will learn some simple (but highly effective) ways to "ruin the hacker's day" and protect your company - even if your budget is tight.

Mikael 	Vingaard

Mikael Vingaard

IT at Energinet Preparedness coordinator
program icon
11:55 - 12:30 Add to my calendar Add to appleCalendar

THE BREACH: IGNORANCE NEVER LASTS FOREVER

This session defines what breach is as well as the strategies for foreseeing and preventing incidents: addressing public, customer, shareholder, regulatory and litigation risks when communicating during data breach and other incident responses. Together with Mikael we will look in the  top 10 breaches during the last 5 years, use of privilege, transparency, dispute prevention, defense strategy, and changes in remediation approaches.

Mikael Tanner

Mikael Tanner

Privasee Privacy Specialist
program icon
12:30- 13:30

Lunch and Networking

program icon
13:30 - 14:00 Add to my calendar Add to appleCalendar

CROSS BORDER DATA TRANSFERS: ADEQUACY AND BEYOND.

Storage and processing of a dataset, including metadata and temporary caches, may be distributed across different equipment in one or more data centers. Data and processing operations are often replicated to multiple locations within and across data centres. Thus, data movements are often frequent, multi-point and/or multi-stage.

Data are accessible remotely via Internet or private network without physical access to storage equipment; conversely, data may be physically moved to a third country without anyone in that country having access to intelligible data, if, for example, it’s been encrypted beforehand.

Eva Jarbekk

Eva Jarbekk

Føyen Torkildsen Head of ICT Media Team
program icon
14:05 - 14:35 Add to my calendar Add to appleCalendar

ENHANCING PRIVACY WITH SECURE DATA EXCHANGE AND DATA FLOWS

To achieve a better balance between data protection and international commercial/social data flows, we don’t need to restrict physical data location: we need better, more technologically-neutral rules regarding security, transparency and accountability that properly recognize the role that code, not just law, can play in protecting personal data. 

Alexander Hanff

Alexander Hanff

Privacy Advocate Evangelist
program icon
14:35 -15:00

SUMMARY OF THE DAY

Registration

Conference Pass

Price * Including
  • Full access to 6h/ 9 sessions conference program
  • Onsite networking
  • Refreshments & Lunch
  • Event Materials