Privacy & DP
Birger Jarlsgatan 61 A, Stockholm, Birger Jarl Conference Hall
GDPR of Everything
Second annual Privacy and Data Protection Industry Talk specially designed for CISO's, DPO's and Privacy Leads.
By now any data driven organisation needs to have a clear adapt-or-die GDPR strategy, tested and verified. You’ve surely been pushing your GDPR related projects, but how far did you get? So we are offering a practical case-based approach to reviewing the GDPR market results.
While everyone's still talking about what GDPR is, we are gathering the privacy and security peers of Scandinavia to see what has been done so far and what is left to be accomplished.
Points to be learned
- Security Based Business Planning
- Privacy and Security in the Age of Machine Learning
- Data Flows and Secured Data Exchange
Registration and Coffee
Opening Remarks by the Chairman
Researcher, consultant and government advisor focused on privacy and public policy, and the founder of the Internet of Things Privacy Forum. Gilad is focused on privacy by design, national policy, digital identity and the interplay between governments, commercial markets and standards.
Dr. Gilad L. RosnerUK Cabinet Office, Privacy & Consumer Advocacy Group Member
PRIORITIZING SECURITY IN BUSINESS STRATEGY
This up-to-date session will give a practical example of how the EU Data Protection alters the status quo and identifies practical steps banks are taking now for compliance success under the new EU status quo for privacy in financial sector of Sweden.
Maria Holmström MellbergNordea Group Driver Privacy (EU GDPR Compliance risk)
Anders SandellNordea Head of Group Information Security Policy Governance and Adoption
NORDIC REGULATORY OVERVIEW
This regulatory session examines the current status of the “One Stop Shop” and analyzes the emerging structure of shared regulatory authority among the national data protection authorities and European Data Protection Board.
It will present scenarios that international companies face in doing business in Sweden raising and settling the disputes.
Martin BrinnenThe Swedish Data Protection Authority Legal Adviser
PRIVACY BY DESIGN: WHERE STRATEGY MEETS SECURITY
"Privacy by Design” has become a buzzword yet many new technologies and business processes are still designed without our privacy in mind. This session will showcase exactly why and how this can be done.
Springworks and Telia Company will in this case demonstrate a legal, technological and DevOps collaboration within IoT/M2M to define, select and extract personal data. See what it takes to develop a consumer oriented privacy by design and by default based solution that ensures that security requirements are met and that users are in control of their data from a technical perspective.
Nicklas FernströmSpringWorks Security Lead
Coffee Break and Networking Zones
BLOCKCHAIN-BASED SECURITY AND PRIVACY ENHANCING TECHNOLOGY
Methods of privacy protection that were developed years or even decades ago no longer translate well in the age of big data. This is because these older methods either aren’t strong enough at scale or require a degradation of the quality of the data itself, making it less valuable.
Fortunately, new and complementary tools and methods of privacy protection make it possible to simultaneously protect data privacy and accuracy in order to leverage the value of big data in healthcare, banking and other privacy-sensitive data domains also comply with European and international laws
Mads BeckerEricsson Cyber Security & Blockchain Evangelist
INDUSTRIAL SECURITY HACK
This ICS/SCADA system live demo hack will demonstrate how a skilled hacker on-stage retrieve easy to find information and then attacks the system.
During the presentation, you will learn some simple (but highly effective) ways to "ruin the hacker's day" and protect your company - even if your budget is tight.
Mikael VingaardIT at Energinet Preparedness coordinator
THE BREACH: IGNORANCE NEVER LASTS FOREVER
This session defines what breach is as well as the strategies for foreseeing and preventing incidents: addressing public, customer, shareholder, regulatory and litigation risks when communicating during data breach and other incident responses. Together with Mikael we will look in the top 10 breaches during the last 5 years, use of privilege, transparency, dispute prevention, defense strategy, and changes in remediation approaches.
Mikael TannerPrivasee Privacy Specialist
Lunch and Networking
CROSS BORDER DATA TRANSFERS: ADEQUACY AND BEYOND.
Storage and processing of a dataset, including metadata and temporary caches, may be distributed across different equipment in one or more data centers. Data and processing operations are often replicated to multiple locations within and across data centres. Thus, data movements are often frequent, multi-point and/or multi-stage.
Data are accessible remotely via Internet or private network without physical access to storage equipment; conversely, data may be physically moved to a third country without anyone in that country having access to intelligible data, if, for example, it’s been encrypted beforehand.
Eva JarbekkFøyen Torkildsen Head of ICT Media Team
ENHANCING PRIVACY WITH SECURE DATA EXCHANGE AND DATA FLOWS
To achieve a better balance between data protection and international commercial/social data flows, we don’t need to restrict physical data location: we need better, more technologically-neutral rules regarding security, transparency and accountability that properly recognize the role that code, not just law, can play in protecting personal data.
Alexander HanffPrivacy Advocate Evangelist
SUMMARY OF THE DAY
Conference PassPrice * Including
- Full access to 6h/ 9 sessions conference program
- Onsite networking
- Refreshments & Lunch
- Event Materials
Events only news: