View 2024 Agenda | Compliance Week Cyber Risk & Data Privacy Summit

/media/3310/cw-full-logo-with-background.png

Compliance Week Cyber Risk & Data Privacy Virtual Summit
February 1-2, 2024
Virtual

Past Agenda

Thursday - February 1, 2024

10:00 AM 10:10 AM

9:00 AM 9:10 AM

8:00 AM 8:10 AM

7:00 AM 7:10 AM

4:00 PM 4:10 PM

Welcome Remarks

Karen Moore, Adjunct Professor
Fordham Law School

10:10 AM 11:00 AM

9:10 AM 10:00 AM

8:10 AM 9:00 AM

7:10 AM 8:00 AM

4:10 PM 5:00 PM

Strategies for Elevating Your Data Privacy Framework

  • Discover the steps in developing an effective privacy program  
  • Highlight best practices for handling data breaches 
  • Outline strategies to gain management buy-in to help foster a culture of privacy awareness 

William Nelson, Associate General Counsel
Investment Advisor Association

11:00 AM 11:50 AM

10:00 AM 10:50 AM

9:00 AM 9:50 AM

8:00 AM 8:50 AM

5:00 PM 5:50 PM

Navigating the Regulatory Landscape of Data Privacy

  • Discuss the implications of the recently introduced state-specific data privacy laws
  • Highlight strategies for remaining compliant with the General Protection Data Regulation (GDPR)
  • Review how the California Consumer Privacy Act (CCPA) may affect your business operations

Josh Bryant, Senior Data Privacy Analyst
J.B. Hunt

Kari Loeser, Vice President, Chief Compliance Officer
Cytokinetics

Marian Agarwal, Partner
Morrison Foerster

11:50 AM 12:50 PM

10:50 AM 11:50 AM

9:50 AM 10:50 AM

8:50 AM 9:50 AM

5:50 PM 6:50 PM

Lunch Break

12:50 PM 1:40 PM

11:50 AM 12:40 PM

10:50 AM 11:40 AM

9:50 AM 10:40 AM

6:50 PM 7:40 PM

Bridging the Gap on Communications Between Compliance and Security Teams

  • Identify communication gaps between information security and compliance teams 
  • Analyze case studies of solutions that have helped facilitate better communications and reduce silos of information 
  • Discuss the need and opportunities for collaboration 

Jessica Sanderson, Founding Member
The Sanderson Law Firm

Shubha Lakshmanan, Senior Director of Compliance and Privacy
Waud Capital Partners

1:40 PM 1:55 PM

12:40 PM 12:55 PM

11:40 AM 11:55 AM

10:40 AM 10:55 AM

7:40 PM 7:55 PM

Break

1:55 PM 2:45 PM

12:55 PM 1:45 PM

11:55 AM 12:45 PM

10:55 AM 11:45 AM

7:55 PM 8:45 PM

Deep Dive: Ensuring Compliance and Security with Third Party Vendors

  • Outline the role of contract management in strengthening vendor relationships
  • Discuss effective approaches to managing third-party data
  • Review best practices for vetting and auditing high-risk partners

Paul Kurtz, Director of Third-Party Risk Management
Merchante

Gregory Rasner, CISSP, CIPM, CCNA, ITIL
Third Party Threat Hunting

Tiffany Bray, VP, Sr. Third Party Risk Manager
Seacoast Bank

 

2:45 PM 3:45 PM

1:45 PM 2:45 PM

12:45 PM 1:45 PM

11:45 AM 12:45 PM

8:45 PM 9:45 PM

Cybersecurity and Governance: A Board's Role in Risk Management and Oversight

  • Discuss how board members can effectively contribute to scenario planning and crisis management
  • Highlight the changing expectations of stakeholders and regulators regarding board involvement in cybersecurity strategies
  • Outline how to effectively communicate changes in cyber-risks to a board

James Goepel, General Counsel and Director of Education and Content
FutureFeed

David Sherman, Partner
Baker Law 

 

3:45 PM 4:00 PM

2:45 PM 3:00 PM

1:45 PM 2:00 PM

12:45 PM 1:00 PM

9:45 PM 10:00 PM

Break

4:00 PM 4:50 PM

3:00 PM 3:50 PM

2:00 PM 2:50 PM

1:00 PM 1:50 PM

10:00 PM 10:50 PM

Best Practices on Data Breach Security and Required Disclosures

  • Review the SEC's new requirements for public disclosure of data breaches 
  • Examine best practices and steps to follow immediately after discovering a breach 
  • Discuss the implications of mandatory breach disclosures in terms of how they might impact an organization's response to the threat 

Pilar Caballero, VP Chief Compliance Officer & Chief Privacy Officer
Ryder

Julia Jacobson, Partner
Squire LLP

Mario Chilin, Chief Compliance Officer
EP Wealth Advisors

4:50 PM 5:00 PM

3:50 PM 4:00 PM

2:50 PM 3:00 PM

1:50 PM 2:00 PM

10:50 PM 11:00 PM

Closing Remarks

Karen Moore, Adjunct Professor
Fordham Law School

Friday - February 2, 2024

10:00 AM 10:10 AM

9:00 AM 9:10 AM

8:00 AM 8:10 AM

7:00 AM 7:10 AM

4:00 PM 4:10 PM

Welcome Remarks and Day One Takeaways

Karen Moore, Adjunct Professor
Fordham Law School

10:10 AM 11:00 AM

9:10 AM 10:00 AM

8:10 AM 9:00 AM

7:10 AM 8:00 AM

4:10 PM 5:00 PM

AI and Data Privacy: Balancing Innovation and Protection

  • Discuss the risks associated with the use of AI and intellectual property 
  • Outline best practices for companies using AI products in sensitive sectors 
  • Review AI risk assessments focused on bias and fairness 

Josh Bryant, Senior Data Privacy Analyst
J.B. Hunt

David Kessler, Vice President, IT & Cybersecurity
BAE Systems

 

11:00 AM 11:50 AM

10:00 AM 10:50 AM

9:00 AM 9:50 AM

8:00 AM 8:50 AM

5:00 PM 5:50 PM

The ABCs of Cloud Security

  • Explore enforcement trends in data privacy and cloud usage 
  • Understand the role of risk assessment in cloud security 
  • Discuss common security vulnerabilities in cloud architecture 

Karen Moore, Adjunct Professor
Fordham Law School

Heath Anderson, Director of Information Security
Stellar Health

Mike Egan, Partner
Cooley

11:50 PM 12:50 PM

10:50 PM 11:50 AM

9:50 PM 10:50 AM

8:50 PM 9:50 AM

5:50 AM 6:50 PM

Lunch Break

12:50 PM 1:40 PM

11:50 AM 12:40 PM

10:50 AM 11:40 AM

9:50 AM 10:40 AM

6:50 PM 7:40 PM

Embracing a Zero Trust Security Model

  • Define the fundamental principles that drive Zero Trust Security  
  • Review real-world examples where the Zero Trust Model has been implemented 
  • Discuss the impact of Zero Trust on enhancing your security protocols 

 

Gregory Rasner, CISSP, CIPM, CCNA, ITIL
Third Party Threat Hunting

1:40 PM 1:55 PM

12:40 PM 12:55 PM

11:40 AM 11:55 AM

10:40 AM 10:55 AM

7:40 PM 7:55 PM

Break

1:55 PM 2:45 PM

12:55 PM 1:45 PM

11:55 AM 12:45 PM

10:55 AM 11:45 AM

7:55 PM 8:45 PM

What You Need to Know about Cybersecurity in AML and other Financial Transactions

  • Discover the cybersecurity aspects related to AML  
  • Explore strategies for implementing security and monitoring in your AML protocols 
  • Understand the role of the cloud in protecting financial data 

William Nelson, Associate General Counsel
Investment Advisor Association

2:45 PM 2:55 PM

1:45 PM 1:55 PM

12:45 PM 12:55 PM

11:45 AM 11:55 AM

8:45 PM 8:55 PM

Closing Remarks

Karen Moore, Adjunct Professor
Fordham Law School