Compliance Week's Cyber Risk & Data Privacy Summit | A Compliance Week Conference

C401 - Web - 1000 x 550 Logo.png

Save the Date for February 2025

Gain Insights, Share Experiences, and Hear Cutting-Edge Information on the Latest Trends in Cyber Risk & Data Privacy


In today’s ever-mobile, data-heavy, threat-evolving, and work-from-anywhere world, cybersecurity is top priority for organizations to ensure they are equipped with the knowledge and intelligence needed to protect corporate and personal information. Compliance Week’s Cyber Risk & Data Privacy Summit brings together legal, compliance, and risk professionals virtually to benchmark best practices on managing cyber risks and provide insights into the latest data privacy trends.

This premier cybersecurity summit features industry experts covering timely topics and the latest developments on regulatory issues and solutions to mitigate data breaches in today's fast-changing cybersecurity landscape.  

Stay tuned for details on next year's event.


Expect to network with professionals from the following company types:

  • Cyber/Data Privacy Software Providers

  • Corporations 

  • Consultants and Law Firms

  • Higher Education

  • Data Privacy Advocates/Watchdogs

The agenda is curated for mid- to senior-level compliance, risk, and legal personnel that have the following job titles:

  • Chief Compliance Officers

  • Chief Risk Officers

  • Information Security Specialists

  • Chief Information Security Officers

  • IT Professionals

  • Auditors

  • Specialists in Cybersecurity, Cyber Risk, and Data Privacy

  • Legal Counsel 

  • Consultants

  • Discuss the implications of the recently introduced state-specific data privacy laws

  • Explore the risks associated with the use of AI and intellectual property

  • Review cybersecurity metrics that are critical for compliance reporting

  • Outline the role of contract management in strengthening vendor relationships

  • Highlight the changing expectations of stakeholders and regulators regarding board involvement in cybersecurity strategies

  • Review the SEC's new requirements for public disclosure of data breaches

  • Examine best practices and steps to follow immediately after discovering a breach

  • Discuss common security vulnerabilities in cloud architecture

  • Review real-world examples where the Zero Trust Model has been implemented

  • Discover the cybersecurity aspects related to AML