BEGIN:VCALENDAR VERSION:2.0 PRODID:-//HasGeek//NONSGML Funnel//EN DESCRIPTION:On building privacy in engineering and product processes. NAME:Data Privacy Conference REFRESH-INTERVAL;VALUE=DURATION:PT12H SUMMARY:Data Privacy Conference TIMEZONE-ID:Asia/Kolkata X-PUBLISHED-TTL:PT12H X-WR-CALDESC:On building privacy in engineering and product processes. X-WR-CALNAME:Data Privacy Conference X-WR-TIMEZONE:Asia/Kolkata BEGIN:VEVENT SUMMARY:Introduction to the conference - Intent\, People\, Process and Tec hnology DTSTART;VALUE=DATE-TIME:20210423T063000Z DTEND;VALUE=DATE-TIME:20210423T064000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/Dg1acF9fj2V3Tt5k1T3K6X@hasgeek.com CREATED;VALUE=DATE-TIME:20210131T134555Z DESCRIPTION:\n LAST-MODIFIED;VALUE=DATE-TIME:20210406T091740Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Introduction to the conference - Intent\, People\, Process and Technology in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Keynote: Personal data in heavily regulated environments - Zerodha 's case study DTSTART;VALUE=DATE-TIME:20210423T064000Z DTEND;VALUE=DATE-TIME:20210423T072000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/Nv6ZfLEoRwLSXPrJekBqrq@hasgeek.com CATEGORIES:Process,30-min talk,Talk added to the schedule CREATED;VALUE=DATE-TIME:20210312T065707Z DESCRIPTION:The mainstream focus on personal and sensitive data generally tends to be on social media and communications platforms. The public under standing of how personal data flows through heavily regulated organisation s such as banks and stock brokers is limited. In fact\, such organisations are mandated by laws and regulations to share data with more parties than their unregulated counterparts. This talk highlights the lifecycle and fl ow of personal data in a regulated Indian stock broking firm\, and flow\, it does. LAST-MODIFIED;VALUE=DATE-TIME:20210415T071722Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/the-life -of-personal-data-in-heavily-regulated-environments-Nv6ZfLEoRwLSXPrJekBqrq BEGIN:VALARM ACTION:display DESCRIPTION:Keynote: Personal data in heavily regulated environments - Zer odha's case study in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Data Governance - Strategies from experience DTSTART;VALUE=DATE-TIME:20210423T072000Z DTEND;VALUE=DATE-TIME:20210423T080000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/X6ScDivmEW3qYWoVMUTd71@hasgeek.com CATEGORIES:30-min talk,Process,Talk added to the schedule CREATED;VALUE=DATE-TIME:20210416T063739Z DESCRIPTION:A lot of organizations have recently started taking Data Gover nance seriously given the different laws now coming up in countries regard ing the use of data and heavy penalties on leaks which is further exacerba ted by how much more data each of these orgs are now generating compared t o before.With these accelerated motives a lot of Data Governance strategie s are a make or break based on the tooling of choice and priorities/trade offs considered.\n\nIn this talk we look at the various paths organization s can take to accelerate data growth within the organization based on shap e\, size and need.\n LAST-MODIFIED;VALUE=DATE-TIME:20210416T063746Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/data-gov ernance-strategies-from-experience-X6ScDivmEW3qYWoVMUTd71 BEGIN:VALARM ACTION:display DESCRIPTION:Data Governance - Strategies from experience in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Lunch break DTSTART;VALUE=DATE-TIME:20210423T080000Z DTEND;VALUE=DATE-TIME:20210423T084500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/GgahHvfP6KeJaSsEZM1V2s@hasgeek.com CREATED;VALUE=DATE-TIME:20210312T064114Z LAST-MODIFIED;VALUE=DATE-TIME:20210406T093812Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Lunch break in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Birds of Feather (BOF) session: Building a Culture of Continuous S ecurity DTSTART;VALUE=DATE-TIME:20210423T084500Z DTEND;VALUE=DATE-TIME:20210423T094500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/Qxr5GsanGhVzVpWNmjFeXy@hasgeek.com CREATED;VALUE=DATE-TIME:20210312T065401Z DESCRIPTION:This BOF will have CISOs and Product Security officers as faci litators. \n\nThe following topics will be covered in this session:\n\n1. How much of the organization's culture can be influenced by top leadership 's awareness and intent of privacy and security? \n2. Budget allocation fo r data privacy and security\; and communication of budgets to developer te ams. \n3. Training and resources available to developer teams. \n4. Presen ce of formal and informal peer groups as a way to discuss issues concernin g security and data privacy. LAST-MODIFIED;VALUE=DATE-TIME:20210415T071017Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Birds of Feather (BOF) session: Building a Culture of Continuo us Security in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Tea/coffee break - water cooler conversations DTSTART;VALUE=DATE-TIME:20210423T094500Z DTEND;VALUE=DATE-TIME:20210423T100500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/QxXcD82XwcZzemVXEBJktC@hasgeek.com CREATED;VALUE=DATE-TIME:20210312T064535Z LAST-MODIFIED;VALUE=DATE-TIME:20210406T093910Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Tea/coffee break - water cooler conversations in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Fireside chat with Sandeep Srinivasa - on the Data Privacy Product and Engineering Journey at RedCarpetUp.com DTSTART;VALUE=DATE-TIME:20210423T100500Z DTEND;VALUE=DATE-TIME:20210423T105000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/6rzPpvJezM33d5pdcUVfe7@hasgeek.com CREATED;VALUE=DATE-TIME:20210406T095529Z LAST-MODIFIED;VALUE=DATE-TIME:20210415T071534Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Fireside chat with Sandeep Srinivasa - on the Data Privacy Pro duct and Engineering Journey at RedCarpetUp.com in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Summary of learnings from the day\; introduction to Day 2 DTSTART;VALUE=DATE-TIME:20210423T105000Z DTEND;VALUE=DATE-TIME:20210423T110500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/NaWmdEMRhEnnzgzhMjA46V@hasgeek.com CREATED;VALUE=DATE-TIME:20210406T174435Z LAST-MODIFIED;VALUE=DATE-TIME:20210416T113941Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Summary of learnings from the day\; introduction to Day 2 in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Closing keynote: Is NetworkOps Dead in the Age of Cloud? DTSTART;VALUE=DATE-TIME:20210423T133000Z DTEND;VALUE=DATE-TIME:20210423T144500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/CwgN376BHHt8ukNp7qAKr7@hasgeek.com CATEGORIES:Keynote talk,Technology,Talk scheduled for pre-recording CREATED;VALUE=DATE-TIME:20210416T062259Z DESCRIPTION:It’s been said that the number of clues remains constant eve n as some field of expertise expands. This may sometimes be the outgoing g eneration accusing the incoming generation of being soft or lazy\, and ind eed it has also been said that progress in most fields occurs one obituary at a time. What we know for certain is that skills for which demand is no t growing\, become less common. Maybe some managers and some investors lik e to avoid the cost of network operators and so the fact that _the cloud_ does not ask its customers to operate physical routers or switches or serv ers seems like a good thing. We also know that **all magic comes at a cost **\, and in this case the low demand for network operations skills in one generation has led to a reduced understanding in the next generation of ho w distributed systems actually function. What does this do to the competit ive position of nations and companies and technologists\, and how shall we make ready now that it has become inevitable? LAST-MODIFIED;VALUE=DATE-TIME:20210416T114010Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/closing- keynote-is-networkops-dead-in-the-age-of-cloud-CwgN376BHHt8ukNp7qAKr7 BEGIN:VALARM ACTION:display DESCRIPTION:Closing keynote: Is NetworkOps Dead in the Age of Cloud? in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Theme introduction: Processes for Data Privacy and Data Governance in Product and Engineering DTSTART;VALUE=DATE-TIME:20210424T063000Z DTEND;VALUE=DATE-TIME:20210424T064000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/7SfmsNdYrAxou3kaH35PnR@hasgeek.com CREATED;VALUE=DATE-TIME:20210406T174655Z LAST-MODIFIED;VALUE=DATE-TIME:20210406T174659Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Theme introduction: Processes for Data Privacy and Data Govern ance in Product and Engineering in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Best practices in FOSS compliance can help improve security. DTSTART;VALUE=DATE-TIME:20210424T064000Z DTEND;VALUE=DATE-TIME:20210424T065500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/JgVKjUk1JDK8yRxKvYgshQ@hasgeek.com CATEGORIES:Talk scheduled for pre-recording,15-min talk,Process CREATED;VALUE=DATE-TIME:20210416T075321Z DESCRIPTION:Privacy and security are closely tied together in the form of legal requirements for “data protection” in laws across the world\, su ch as under Article 32 of EU’s General Data Protection Regulation\, and India’s Information Technology (Reasonable Security Practices and Proced ures and Sensitive Personal Data or Information) Rules\, 2011.\n\nThis tal k will focus on how the best practices in FOSS compliance\, such as compli ance with OpenChain Specification 2.1 (functionally identical to ISO/IEC 5 230:2020)\, can not only help with legal compliances for licensing require ments\, but can also help improve security in the entire supply chain. Imp lementing and maintaining a software bill of materials (SBOM) brings aware ness of all components that are in use in your products at all times. When a vulnerability is discovered in an existing open source component\, the SBOM can be used to quickly identify which of your products and components are affected.\n\nThis talk will also discuss the case study of Equifax da ta breach. LAST-MODIFIED;VALUE=DATE-TIME:20210416T114145Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/best-pra ctices-in-foss-compliance-can-help-improve-security-JgVKjUk1JDK8yRxKvYgshQ BEGIN:VALARM ACTION:display DESCRIPTION:Best practices in FOSS compliance can help improve security. i n 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Intuit's GDPR compliance case study DTSTART;VALUE=DATE-TIME:20210424T065500Z DTEND;VALUE=DATE-TIME:20210424T071500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/AX7UpHqyj3HpBgkBAgzxxy@hasgeek.com CATEGORIES:Talk added to the schedule,Process,30-min talk CREATED;VALUE=DATE-TIME:20210312T065615Z DESCRIPTION:There is an increased focus on data privacy and governance acr oss the world. Intuit\, offering products and services in the Financial In dustry\, operates worldwide in multiple countries. We needed to provide da ta privacy and compliance across multiple geographies. As part of enabling data privacy capabilities to our customers\, we navigated through a numbe r of challenges and built systems to support multiple regulations like GDP R\, CCPA\, AUCDR\, etc.\nWe enabled a comprehensive solution for both forg et me and data access requirements of data governance regulations.\n\nIn t his case study\, the audience would learn about the high level approach us ed for solving for data privacy and compliance. The case study would also cover the challenges faced during the implementation of the same and the s olutions employed so that engineers can use a similar pattern. \n LAST-MODIFIED;VALUE=DATE-TIME:20210416T110303Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/data-gov ernance-at-intuit-AX7UpHqyj3HpBgkBAgzxxy BEGIN:VALARM ACTION:display DESCRIPTION:Intuit's GDPR compliance case study in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Lunch break DTSTART;VALUE=DATE-TIME:20210424T071500Z DTEND;VALUE=DATE-TIME:20210424T075000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/5NmpMGUHKzmQxxvqG7J5Fs@hasgeek.com CREATED;VALUE=DATE-TIME:20210312T065827Z LAST-MODIFIED;VALUE=DATE-TIME:20210416T110330Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Lunch break in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Can my company be Data Privacy compliant and still stay Agile? DTSTART;VALUE=DATE-TIME:20210424T075000Z DTEND;VALUE=DATE-TIME:20210424T082000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/AAsyoKVAYJmekpoTxGY7He@hasgeek.com CATEGORIES:Talk scheduled for pre-recording,Process,30-min talk CREATED;VALUE=DATE-TIME:20210416T075727Z DESCRIPTION:Compliance is no longer a nice to have! An organization offeri ng a SaaS product needs to secure appropriate compliance reports (SOC2\, I SO27001\, GDPR\, FedRamp etc.) to ensure they put in place the organizatio n’s structure\, software\, people and data-handling procedures to handle and protect their customer’s data. Compliance serves as beacon of trans parency and conveys confidence to your customers that you have appropriate controls to safely handle their data and protect it.\n\nWait! Isn’t thi s so much of additional work? Will I need additional R&D and IT manpower n ow? Will I need to budget for additional infrastructure? Will this slow do wn my product deliverables that I cannot be agile anymore? Yes! But with t he right investments in processes and automation provided by cloud native products you can make all this seamless and execute repeatedly.\n\nI will give an overview of what are the key decisions VP’s have to take\, empow ered organization structures to put in place to make plans and decisions\, incident management & change management strategies and the type of produc ts/tools to use to stay compliant\, but still be agile. LAST-MODIFIED;VALUE=DATE-TIME:20210416T110332Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/can-my-c ompany-be-data-privacy-compliant-and-still-stay-agile-AAsyoKVAYJmekpoTxGY7 He BEGIN:VALARM ACTION:display DESCRIPTION:Can my company be Data Privacy compliant and still stay Agile? in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Leveraging existing Information Security practises to address data privacy requirements OR How Data Security and Data privacy can work tog ether DTSTART;VALUE=DATE-TIME:20210424T082000Z DTEND;VALUE=DATE-TIME:20210424T090000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/5dMUv8nccKRou41eAyLMsG@hasgeek.com CATEGORIES:Process,Talk scheduled for pre-recording,30-min talk CREATED;VALUE=DATE-TIME:20210416T074222Z DESCRIPTION:Data privacy and cybersecurity practices are becoming increasi ngly important in view of new legislation\, such as the General Data Prote ction Regulation (GDPR)\, Personal Data protection Act (PDPA) as well as i ncreasing sophisticated cyber attacks.Many organization spends most of the ir cybersecurity budgets on addressing technical\, financial and reputatio nal risks and It is often noted that an insufficient level of privacy pr otection or breaches of personal data may lead to loss of consumer trust a nd damage to businesses' reputation.\nLet’s discuss the opportunities to leverage existing Cybersecurity/Information security practices to address data privacy compliance requirements .\nKey takeaway\n1)How to implement Data privacy programme without reinventing wheel \n2)How information secur ity’s People \, process and technology can co-exists and work together e ffectively with data privacy framework\n LAST-MODIFIED;VALUE=DATE-TIME:20210416T114336Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/leveragi ng-existing-information-security-practises-to-address-data-privacy-require ments-or-how-data-security-and-data-privacy-can-work-together-5dMUv8nccKRo u41eAyLMsG BEGIN:VALARM ACTION:display DESCRIPTION:Leveraging existing Information Security practises to address data privacy requirements OR How Data Security and Data privacy can work together in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Tea/coffee break - water cooler conversations DTSTART;VALUE=DATE-TIME:20210424T090000Z DTEND;VALUE=DATE-TIME:20210424T091500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/AC7pJMvAS4WDxzhDeDMRHt@hasgeek.com CREATED;VALUE=DATE-TIME:20210312T070215Z LAST-MODIFIED;VALUE=DATE-TIME:20210416T114339Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Tea/coffee break - water cooler conversations in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Birds of Feather (BOF) session: Investors' views of privacy and se curity\; proactive measures and compliance for existing and future investe es. DTSTART;VALUE=DATE-TIME:20210424T091500Z DTEND;VALUE=DATE-TIME:20210424T101500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/Kj8CjriSohtCZXXvstTULU@hasgeek.com CREATED;VALUE=DATE-TIME:20210406T181247Z DESCRIPTION:This BOF will cover topics to understand evaluation risks. LAST-MODIFIED;VALUE=DATE-TIME:20210416T114347Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Birds of Feather (BOF) session: Investors' views of privacy an d security\; proactive measures and compliance for existing and future inv estees. in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Summary of learnings from the day\; introduction to Day 3 DTSTART;VALUE=DATE-TIME:20210424T101500Z DTEND;VALUE=DATE-TIME:20210424T103000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/TR23eYN2QpcGWPtXFFK5Rp@hasgeek.com CREATED;VALUE=DATE-TIME:20210312T070651Z LAST-MODIFIED;VALUE=DATE-TIME:20210416T114353Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Summary of learnings from the day\; introduction to Day 3 in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Lean Data Practices DTSTART;VALUE=DATE-TIME:20210424T133000Z DTEND;VALUE=DATE-TIME:20210424T141500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/BgVZcBUxcV1ZHq3MbeDQdY@hasgeek.com CREATED;VALUE=DATE-TIME:20210416T114537Z DESCRIPTION:Lean Data Practices (LDP) is a flexible framework that anyone handling personal data can use to build in privacy\, security\, and transp arency in ways that can build trust and reduce risk. This talk is a follow up to the November 2020 LDP presentation to dive deeper into the methodol ogy\, specifically how to apply it from the product management and develop ment lens. We will discuss how to implement the various LDP tips provided\ , including additional applications for the ones previously shared in the November 2020 session (available at https://hasgeek.com/PrivacyMode/lean-d ata-practices/).\n\nThe target audience for this programme includes Produc t Managers\, Privacy Architects or Engineers\, and anybody interested in l earning practical ways to incorporate privacy by design through use of the LDP methodology. Be sure to join the separate interactive Q&A to discuss your specific use cases.\n\nReferences: Resources about Lean Data Practice s is available on: www.leandatapractices.com\n\nAbout the speaker: Nneka S oyinka is the Privacy Program Manager at Mozilla. She is responsible for p rivacy program operations and privacy compliance\, including privacy educa tion\, vendor reviews\, data subject access requests\, and collaboration w ith various stakeholders to ensure privacy is incorporated in a meaningful way aligned with Mozilla's privacy principles. The Privacy Team supports all data collection touch points ranging from users\, to our community mem bers to our employees. LAST-MODIFIED;VALUE=DATE-TIME:20210416T114634Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/lean-dat a-practices-BgVZcBUxcV1ZHq3MbeDQdY BEGIN:VALARM ACTION:display DESCRIPTION:Lean Data Practices in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Jupiter's approach to PII/SPDI redaction DTSTART;VALUE=DATE-TIME:20210425T084000Z DTEND;VALUE=DATE-TIME:20210425T090000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/34jaf5zucsTtirzRCn3q2w@hasgeek.com CATEGORIES:Talk added to the schedule,Technology,30-min talk CREATED;VALUE=DATE-TIME:20210312T063958Z DESCRIPTION:**Abstract** By regulation and more so by a moral obligation\, Jupiter is required to safeguard the privacy of its customers. As provide rs of financial services\, we are often entrusted with information that co uld be extremely private to users\, of a sensitive nature and at the same time can be used to personally identify them by a single data element. Dea ling with an engineering stack that builds upon a number of microserves an d subsystems\, reliant on an equally large number of data storage systems - brings about its own challenges when it comes to governance of customer ’s private data. In this talk we would like to give a walkthrough of the solution that Jupiter implemented to solve this problem and to massively reduce the number of systems that would interact with actual\, raw PII/SPD I (Personally Identifying Information/Sensitive Personal Data or Informati on) so that monitoring of access and data control could be achieved with a higher degree of operational confidence.\n\nWe would be talking about the basic requirements around PII/SPDI protection as an industry requirement: \n1. What does the law/regulation say about PII/SPDI\n2. What did our part ners need from us when it came to protecting customer data\n\nIn terms of engineering:\n1. How can we implement a solution that induces little to no developer friction - the aim here was not just making it easy for develop ers to integrate PII/SPDI redaction\; having an intrusive process with mul tiple touchpoints would make a human error that much more likely\, which c ould end up being a potential point of breach\n2. The same code should wor k with PII/SPDI redaction switched off as it does with redaction switched on\n3. How are we ensuring that we are still able to maintain semantics of lookup\, uniqueness of certain data elements\, specifically the ability t o use certain data elements as primary keys for user centric data\n4. How we are handling multiple partners wanting their customers data to be store d isolated from other partners\, with encryption using keys that are provi sioned specifically for them\n5. Why we chose to work at the serialization layer to implement PII/SPDI redaction\n\nAnd in terms of where we see thi s going:\n1. What are the limitations and caveats of the current system\n2 . Ideas to explore - Is it possible to do this at a service mesh level? Pr oxy level? At a gateway\, maybe - our thoughts and musings on this topic LAST-MODIFIED;VALUE=DATE-TIME:20210415T091944Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/our-appr oach-to-pii-spdi-redaction-34jaf5zucsTtirzRCn3q2w BEGIN:VALARM ACTION:display DESCRIPTION:Jupiter's approach to PII/SPDI redaction in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Masking Sensitive Data in Logs with LogStash DTSTART;VALUE=DATE-TIME:20210425T090000Z DTEND;VALUE=DATE-TIME:20210425T092000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/H3Vv6A6Gzi7psMj9psk9GM@hasgeek.com CATEGORIES:Talk added to the schedule,15-min talk,Technology CREATED;VALUE=DATE-TIME:20210312T063823Z DESCRIPTION:ElasticSearch\, LogStash and Kibana together create one of the most popular log ingestion and indexing solution. However\, the logs bein g indexed and made available can potentially contain sensitive information such as PII. The talk will explain how to setup masking for such sensitiv e information(s) present in the logs in LogStash. This would enable any pr incipal who wants to look at the logs to be able to do so while protecting leakage and misuse of sensitive information. \n\nAs an example case study \, the participants will be shown how to setup filters in LogStash to mask data in the log conditionally based on whether the sensitive field is pre sent in the particluar log entry or not. LAST-MODIFIED;VALUE=DATE-TIME:20210415T092015Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/masking- sensitive-data-in-logs-with-logstash-H3Vv6A6Gzi7psMj9psk9GM BEGIN:VALARM ACTION:display DESCRIPTION:Masking Sensitive Data in Logs with LogStash in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Lessons learned from the biggest data breach - Yahoo! DTSTART;VALUE=DATE-TIME:20210425T092000Z DTEND;VALUE=DATE-TIME:20210425T094000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/7DnvfppNDV2yVaqzJpo4MS@hasgeek.com CATEGORIES:Talk scheduled for pre-recording,15-min talk,Process CREATED;VALUE=DATE-TIME:20210413T070447Z DESCRIPTION:[15 minute talk]\n\nFirst in 2013\, then in 2014 & Again in 20 16 - Yahoo! suffered the biggest data breach after losing the data of bill ion people.\n\nIn the case study that I'll present - I'll demystify:\n- Wh y Yahoo! was the target?\n- How often Yahoo! was attacked which led to a d ata breach?\n- Who were the Yahoo! hackers?\n- How was the data stolen?\n- How did Yahoo respond?\n- Lessons learned from the Yahoo! attack?\n\nThes e shall remain the sub-headings of my talk. When explaining\, I shall cove r how companies in 2021 see similar vulnerabilities (in general\, without naming)\, and therefore\, what are the recommended developer and security precautions that businesses should adopt. LAST-MODIFIED;VALUE=DATE-TIME:20210415T092024Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/lessons- learned-from-the-biggest-data-breach-yahoo-7DnvfppNDV2yVaqzJpo4MS BEGIN:VALARM ACTION:display DESCRIPTION:Lessons learned from the biggest data breach - Yahoo! in 5 min utes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Tea/coffee break - water cooler conversations DTSTART;VALUE=DATE-TIME:20210425T094000Z DTEND;VALUE=DATE-TIME:20210425T095500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/JNDJxMnPVKRCKLDgir7aUB@hasgeek.com CREATED;VALUE=DATE-TIME:20210312T071416Z LAST-MODIFIED;VALUE=DATE-TIME:20210413T070501Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Tea/coffee break - water cooler conversations in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Protect the pie (PII) DTSTART;VALUE=DATE-TIME:20210425T095500Z DTEND;VALUE=DATE-TIME:20210425T102500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/U3dDYSwPhuKJ9KrvErRuTi@hasgeek.com CREATED;VALUE=DATE-TIME:20210416T114910Z DESCRIPTION:Core to data-security is the user's personally identifiable in formation. As Disney + Hotstar grows internationally\, with increasing com pliance restrictions\, we’ve re-architected our entire data-platform to support differing compliance & security requirements. We make the user’s personally identifiable information impossible to access unless absolutel y necessary. In this talk we discuss how we use masking & filtering while ingesting\, storing and processing data\, and how systems that access data for analytics\, personalization\, targeting\, reporting were accommodated to fit this new world. We discuss the paradigm shift in approaching the d ata from a user’s point of view instead of a use-case point of view LAST-MODIFIED;VALUE=DATE-TIME:20210416T115013Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/protect- the-pie-pii-U3dDYSwPhuKJ9KrvErRuTi BEGIN:VALARM ACTION:display DESCRIPTION:Protect the pie (PII) in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Birds of Feather (BOF) session: Compliance\, audits and data secur ity in Fintech - role of DevOps and SRE DTSTART;VALUE=DATE-TIME:20210425T102500Z DTEND;VALUE=DATE-TIME:20210425T111500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/45vkH5ugmCqJTi8xgvRnEh@hasgeek.com CREATED;VALUE=DATE-TIME:20210407T040907Z LAST-MODIFIED;VALUE=DATE-TIME:20210416T115015Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Birds of Feather (BOF) session: Compliance\, audits and data s ecurity in Fintech - role of DevOps and SRE in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Summary of learnings from the day\; introduction to Day 4 DTSTART;VALUE=DATE-TIME:20210425T111500Z DTEND;VALUE=DATE-TIME:20210425T113000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/HtXFhS9RioDLxPPHrZdLfW@hasgeek.com CREATED;VALUE=DATE-TIME:20210407T040947Z LAST-MODIFIED;VALUE=DATE-TIME:20210416T115019Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Summary of learnings from the day\; introduction to Day 4 in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Encryption\, Data Protection and Privacy Engineering DTSTART;VALUE=DATE-TIME:20210426T092000Z DTEND;VALUE=DATE-TIME:20210426T093000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/9vAhCb1NJvcwGfiDATJY6f@hasgeek.com CREATED;VALUE=DATE-TIME:20210131T134841Z DESCRIPTION:\n LAST-MODIFIED;VALUE=DATE-TIME:20210416T115307Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Encryption\, Data Protection and Privacy Engineering in 5 minu tes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Master class: TLS in 2021 DTSTART;VALUE=DATE-TIME:20210426T093000Z DTEND;VALUE=DATE-TIME:20210426T103000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/MBmYeVdFfrBenb2AVQbpto@hasgeek.com CATEGORIES:1-hour master class,Technology,Talk scheduled for pre-recording CREATED;VALUE=DATE-TIME:20210406T182526Z DESCRIPTION:Transport Layer Security: everybody needs it\, but few of us u nderstand it. TLS is not just about getting the lock icon in the browser a ddress bar. It's perhaps the most frequently misconfigured protocol on the Internet.\n\nThis talk takes you through:\n• How TLS works\n• What TL S provides\, and what it doesn’t\n• How applications wrap unencrypted connections inside TLS\n• Assessing TLS configurations\n• The Automate d Certificate Management Environment (ACME) protocol\n• Using Let’s En crypt to automatically maintain TLS certificates\n• Online Certificate S tatus Protocol\n• The Realities of Certificate Revocation\n• CAA\, HST S\, and Certificate Transparency\n• Why you shouldn’t run your own CA\ , and hints on how to do it anyway\n LAST-MODIFIED;VALUE=DATE-TIME:20210416T115254Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/tls-in-2 021-MBmYeVdFfrBenb2AVQbpto BEGIN:VALARM ACTION:display DESCRIPTION:Master class: TLS in 2021 in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Interactive Q&A with Michael W. Lucas on TLS master class DTSTART;VALUE=DATE-TIME:20210426T103000Z DTEND;VALUE=DATE-TIME:20210426T105500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/KN3f4jC99arcsYGuy9DRbZ@hasgeek.com CREATED;VALUE=DATE-TIME:20210408T083158Z LAST-MODIFIED;VALUE=DATE-TIME:20210416T115346Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Interactive Q&A with Michael W. Lucas on TLS master class in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Tea/coffee break - water cooler conversations DTSTART;VALUE=DATE-TIME:20210426T105500Z DTEND;VALUE=DATE-TIME:20210426T115000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/5N86cVyGuos1UeQzsn2bFc@hasgeek.com CREATED;VALUE=DATE-TIME:20210312T072045Z LAST-MODIFIED;VALUE=DATE-TIME:20210416T120410Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Tea/coffee break - water cooler conversations in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Birds of Feather (BOF) session: India's Personal Data Protection B ill - what it means for changes in engineering and business. DTSTART;VALUE=DATE-TIME:20210426T115000Z DTEND;VALUE=DATE-TIME:20210426T125000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/3DB92b8orFiqo6t5TjY6SW@hasgeek.com CREATED;VALUE=DATE-TIME:20210416T115531Z LAST-MODIFIED;VALUE=DATE-TIME:20210416T115552Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Birds of Feather (BOF) session: India's Personal Data Protecti on Bill - what it means for changes in engineering and business. in 5 minu tes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Cryptographic Protocols for a Secure and Private IoT DTSTART;VALUE=DATE-TIME:20210426T125000Z DTEND;VALUE=DATE-TIME:20210426T132000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/GxMHqRgK5YT8dkiFx2pRDs@hasgeek.com CATEGORIES:Speaker to submit outline in 3 slides,TBD - to be decided,Submi ssion for another conference/vertical CREATED;VALUE=DATE-TIME:20210416T120333Z DESCRIPTION:The Internet of Things (IoT) suffers from critical\, systemic\ , security and privacy flaws. Problems of Spoofable Identities\, Weak Auth entication and Ambient Authority are common in most deployments.\n\nBusine sses see IoT solutions as an opportunity to reduce costs\, increase employ ee safety and create new revenue streams. Consumers often love the conveni ence offered by home and wearable IoT products. Adoption is growing rapidl y and simultaneously there has been a steady escalation in the severity of attacks against IoT that compromise private information and critical syst ems.\n\nThis talk will discuss how several cryptographic protocol building -blocks\, that have been proven in other domains\, can be adapted to addre ss _foundational problems in IoT_. For example\, we'll discuss how protoco ls from open encrypted messaging projects like Signal can be adapted for e nd-to-end encrypted communication in IoT. How pairing based cryptography\, short group signatures and zero knowledge proofs can be used for efficien t privacy preserving authorization credentials in resource constrained mac hines. And many other such examples of applying proven primitives to secur e communication and robust access management in real world IoT systems.\n\ nWe'll explore how these building blocks can be combined to create an Inte rnet of Things that is dependable and preserves our privacy.\n\nMany of th e ideas presented in this talk are being researched\, discussed and implem ented as Rust and Elixir libraries in our open source project - [Ockam](ht tps://github.com/ockam-network/ockam)\n\n## Earlier Talks\n\n- A talk I pr esented last year that explores [why IoT needs secure messaging](https://w ww.youtube.com/watch?v=wEeLSbkU_jI).\n- A recent talk by Ockam contributor Mike Lodder on the [cryptography behind the anonymous\, privacy preservin g credentials in Ockam](https://youtu.be/l1NDpH5vo8I?t=585). LAST-MODIFIED;VALUE=DATE-TIME:20210416T120434Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/cryptogr aphic-protocols-for-a-secure-and-private-iot-GxMHqRgK5YT8dkiFx2pRDs BEGIN:VALARM ACTION:display DESCRIPTION:Cryptographic Protocols for a Secure and Private IoT in 5 minu tes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Break DTSTART;VALUE=DATE-TIME:20210426T132000Z DTEND;VALUE=DATE-TIME:20210426T133500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/38rKTLZnZtsf5wxtKKXvhw@hasgeek.com CREATED;VALUE=DATE-TIME:20210416T120441Z LAST-MODIFIED;VALUE=DATE-TIME:20210416T120448Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Break in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:End-to-end encryption: State of the Technical and Policy Debate DTSTART;VALUE=DATE-TIME:20210426T133500Z DTEND;VALUE=DATE-TIME:20210426T144500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/R7V65dTuMkA669f8ByFpHb@hasgeek.com CATEGORIES:Talk scheduled for pre-recording,Keynote talk,Technology CREATED;VALUE=DATE-TIME:20210416T102706Z DESCRIPTION:Over the past decade\, end-to-end encryption (E2EE) has been w idely deployed in electronic messaging applications\, including WhatsApp\, Signal\, Apple iMessage and others. This form of messaging ensures that i nformation is encrypted from an end-user device (such as a phone) and rema ins encrypted until it reaches the destination. A key benefit of E2EE is t hat it protects messages from server-side hacking and mass surveillance. A t the same time E2EE has created a vigorous pushback from the national sec urity and law enforcement communities worldwide\, as it significantly impe des investigative efforts. In this talk I will discuss the state of the E2 EE messaging debate\; the technical developments in this field\; and the p olicy questions that remain. LAST-MODIFIED;VALUE=DATE-TIME:20210416T115459Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/end-to-e nd-encryption-state-of-the-technical-and-policy-debate-R7V65dTuMkA669f8ByF pHb BEGIN:VALARM ACTION:display DESCRIPTION:End-to-end encryption: State of the Technical and Policy Debat e in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Product design and usability for privacy DTSTART;VALUE=DATE-TIME:20210426T144500Z DTEND;VALUE=DATE-TIME:20210426T153000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/H5yUSM9ZuZuhFJuiaY3a8u@hasgeek.com CATEGORIES:Speaker to prepare slides for pre-recording,30-min talk,Technol ogy CREATED;VALUE=DATE-TIME:20210416T102950Z DESCRIPTION:As more of our conversations move online\, privacy by design i s becoming crucial in product development. In this session\, Uzma Barlaska r\, product manager at WhatsApp\, will discuss "Product design and usabili ty for privacy\," focusing on how WA features like ephemerality & live loc ation as examples of how building e2ee into the system can be used for oth er things too.\n\nUzma will talk through the Product principles at WhatsAp p and how privacy is embedded in WhatsApp's DNA. The interaction will foc us on how people can build product and features with privacy and security at its core. LAST-MODIFIED;VALUE=DATE-TIME:20210416T115503Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/product- design-and-usability-for-privacy-H5yUSM9ZuZuhFJuiaY3a8u BEGIN:VALARM ACTION:display DESCRIPTION:Product design and usability for privacy in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Theme introduction: Technology and Data Privacy DTSTART;VALUE=DATE-TIME:20210427T083000Z DTEND;VALUE=DATE-TIME:20210427T084000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/XcMLRyoNmxhKEY8Su8PouT@hasgeek.com CREATED;VALUE=DATE-TIME:20210131T134912Z DESCRIPTION:\n LAST-MODIFIED;VALUE=DATE-TIME:20210408T083316Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Theme introduction: Technology and Data Privacy in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Case study of CalyxOS DTSTART;VALUE=DATE-TIME:20210427T084000Z DTEND;VALUE=DATE-TIME:20210427T092500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/NyXiemcfUMUXtLtV8FVxLX@hasgeek.com CATEGORIES:30-min talk,Technology,Talk added to the schedule CREATED;VALUE=DATE-TIME:20210416T101730Z DESCRIPTION:CalyxOS is an open source Android-based Operating System\, spo nsored by the Calyx Institute\, a 501(c) non-profit dedicated to making pr ivacy and security available for all.\n\nWe take the code Google releases as open source to the Android Open Source Project\, and try to make it usa ble for everyone while preserving their privacy\, and also keeping the sec urity model Google intended intact.\nThis creates some interesting scenari os\, where being in the control of the Operating System lets you make pret ty much any modification you'd like\, but lots of implications have to be considered.\n\nSome of the features / decisions I'll be talking about:\n* microG Integration and configuration\, as a replacement of Google Play Ser vices\n* Signal and WhatsApp calling integration into the Dialer\n* Some d efault services used by the device for various tasks such as time keeping\ , checking if the internet is working\n* Ad / Tracker blocking\, and addit ional firewall features LAST-MODIFIED;VALUE=DATE-TIME:20210416T101730Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/case-stu dy-of-calyxos-NyXiemcfUMUXtLtV8FVxLX BEGIN:VALARM ACTION:display DESCRIPTION:Case study of CalyxOS in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Synthetic data generation DTSTART;VALUE=DATE-TIME:20210427T092500Z DTEND;VALUE=DATE-TIME:20210427T100000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/PvruqSWS8XN8myPBjhYCLH@hasgeek.com CATEGORIES:Technology,30-min talk,Talk scheduled for pre-recording CREATED;VALUE=DATE-TIME:20210416T101914Z DESCRIPTION:At Needl\, our mission is to organize and stitch your informat ion to make it universally accessible and useful. Knowledge workers today are inundated with massive amounts of data via multiple communication apps and devices resulting in huge efforts to save\, organise\, retrieve\, and make sense of data leading to productivity loss. Needl aims to unbundle your data across apps & devices into a single repository for both structur e and unstructured data across private and public sources. A seamless expe rience of all your data in one place\, securely backed up with a host of c loud computing processes on tap and user defined interfaces built to analy se and share – transforming the way you and your team work and collabora te!\n\nAs our engineers continue to develop new features (especially ML-re lated)\, we needed a way to test those features against user data. But si nce the privacy of every user's data is non-negotiable\, we cannot directl y use Production data. We wanted a way to generate synthetic data from a snapshot of the Production data and then test our features reliably agains t this synthetic data.\n\nhttps://www.needl.ai/\n\nSlides outline (UPDATED 13 Apr) https://docs.google.com/presentation/d/13ObjJyCl2a38yUud-pxVx34pl o5t50zZb7l0K3sNB8Y/edit?usp=sharing LAST-MODIFIED;VALUE=DATE-TIME:20210416T101922Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/syntheti c-data-generation-PvruqSWS8XN8myPBjhYCLH BEGIN:VALARM ACTION:display DESCRIPTION:Synthetic data generation in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Tea/coffee break - water cooler conversations DTSTART;VALUE=DATE-TIME:20210427T100000Z DTEND;VALUE=DATE-TIME:20210427T102000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/AfTDE5Sy2Kf2SapaS2QjMp@hasgeek.com CREATED;VALUE=DATE-TIME:20210406T183347Z LAST-MODIFIED;VALUE=DATE-TIME:20210408T083512Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Tea/coffee break - water cooler conversations in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:May I have my data please? DTSTART;VALUE=DATE-TIME:20210427T102000Z DTEND;VALUE=DATE-TIME:20210427T105000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/VmBjZvmF7KkGA3KDe1tWFD@hasgeek.com CREATED;VALUE=DATE-TIME:20210416T115817Z DESCRIPTION:In a world where we collect as much user data to make their jo urney as personalized as possible\, it’s also important to adhere to com pliance requirements where a user can request both deletion (forget) or a dump (access) of their data. As a centralized data-platform team\, this wa s a huge challenge for us at Disney + Hotstar. Owning the platform\, while various teams owned the data meant that we had to provide a distributed w ay for every team to support data-subject requests while coordinating & or chestrating it altogether at the same time. In this talk\, we discuss the various approaches we considered & discuss the architecture of handling da ta-subject requests that allows us to scale as more systems (as well as th e data they use) grow within the ecosystem. LAST-MODIFIED;VALUE=DATE-TIME:20210416T115904Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/may-i-ha ve-my-data-please-VmBjZvmF7KkGA3KDe1tWFD BEGIN:VALARM ACTION:display DESCRIPTION:May I have my data please? in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Enabling customers' security and privacy journey in the AWS/Cloud DTSTART;VALUE=DATE-TIME:20210427T105000Z DTEND;VALUE=DATE-TIME:20210427T115000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/UXJd3jmH7nTVvZPUoWPrRN@hasgeek.com CREATED;VALUE=DATE-TIME:20210416T121555Z DESCRIPTION:AWS delivers its wide bouquet of services to millions of activ e customers in over 240 countries and territories. Our customers include f inancial services providers\, healthcare providers\, telecom and governmen tal agencies\, who trust us with some of their most sensitive information. Over the years and through operating across data jurisdictions\, we have developed a security assurance program that uses best practices for global privacy and data protection to help our customers operate securely within AWS\, and to make the best use of our security control environment. These security protections and control processes are independently validated by multiple third-party independent assessments e.g. SOC 2\, ISO 27018. We w ould like to conduct a meta-case study session wherein we use multiple cus tomer case studies to highlight:\n1. Our shared responsibility model and s ecurity assurance program.\n2. How our tools and services have helped cust omers with ensuring compliance and security with no/low impact on innovati on.\n3. AWS experience in enabling customers in some of the most stringent Privacy and Data control requirements including GDPR\, HIPAA and PCI DSS\ n4. India and Data Protection Landscape \n4. AWS Security and Compliance b est Practices/Architecture\n5. AWS Data Protection and Privacy Resources\n This session would also speak to our own experiences with distributed data systems and geographical compliances\, privacy-centric developer practice s and the impact to those that we foresee once the PDP Bill is implemented .\n\n LAST-MODIFIED;VALUE=DATE-TIME:20210416T121602Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/enabling -customers-security-and-privacy-journey-in-the-aws-cloud-UXJd3jmH7nTVvZPUo WPrRN BEGIN:VALARM ACTION:display DESCRIPTION:Enabling customers' security and privacy journey in the AWS/Cl oud in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Summary of learnings from the day\; introduction to Day 6 DTSTART;VALUE=DATE-TIME:20210427T115000Z DTEND;VALUE=DATE-TIME:20210427T120000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/FqhvAYqpg3u5rzdDSgtgTS@hasgeek.com CREATED;VALUE=DATE-TIME:20210408T083543Z LAST-MODIFIED;VALUE=DATE-TIME:20210416T115911Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Summary of learnings from the day\; introduction to Day 6 in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Theme introduction: Technology and Data Privacy DTSTART;VALUE=DATE-TIME:20210428T063000Z DTEND;VALUE=DATE-TIME:20210428T064000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/7pBTVtjk1E8CN9AqP6gqbx@hasgeek.com CREATED;VALUE=DATE-TIME:20210406T183635Z LAST-MODIFIED;VALUE=DATE-TIME:20210408T083926Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Theme introduction: Technology and Data Privacy in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Identity and biometrics DTSTART;VALUE=DATE-TIME:20210428T064000Z DTEND;VALUE=DATE-TIME:20210428T080000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/8tMLen4WT3ZZaLgY6K4Xki@hasgeek.com CATEGORIES:Speaker to prepare slides for pre-recording,1-hour master class ,Technology CREATED;VALUE=DATE-TIME:20210416T063414Z DESCRIPTION:India has deployed the world’s largest national digital iden tity system based on biometrics. In this session we will review the suitab ility of biometrics based identity definition for delivery of essential se rvices.\n\nIn the first part of the session we will briefly review the cor e algorithmic ideas behind biometric matching and discuss their strengths and weaknesses\, with special references to fingerprints\, iris scan and f acial images. In the second part of the session we will outline the requir ements of an identity instrument and discuss the suitability of biometrics for defining identity.\n\nBackground requirement: No particular backgroun d requirement. LAST-MODIFIED;VALUE=DATE-TIME:20210416T120031Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/identity -and-biometrics-8tMLen4WT3ZZaLgY6K4Xki BEGIN:VALARM ACTION:display DESCRIPTION:Identity and biometrics in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Lunch break DTSTART;VALUE=DATE-TIME:20210428T080000Z DTEND;VALUE=DATE-TIME:20210428T084500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/BptkBVuRp7LimNdxuAeP5d@hasgeek.com CREATED;VALUE=DATE-TIME:20210408T083945Z LAST-MODIFIED;VALUE=DATE-TIME:20210408T083952Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Lunch break in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Why netbanking fails DTSTART;VALUE=DATE-TIME:20210428T084500Z DTEND;VALUE=DATE-TIME:20210428T090500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/Q3PM8Jqnyycsj4dsNMx5P6@hasgeek.com CATEGORIES:Talk added to the schedule,15-min talk,Process CREATED;VALUE=DATE-TIME:20210406T183929Z DESCRIPTION:Security is hard. Designing user experience (UX) around securi ty is harder. Yet almost everyday\, we are forced to make security related decisions across multiple connected devices we own. Sometimes we make the se choices for ourselves\, and sometime we impose our choices subtly on ot hers with whom we share these devices. Proliferation of personal IoT devic es exacerbates this problem\, and in some cases\, even forces sub-optimal security choices.\n\n\nWhy is UX around security so hard? What are we thin king when we make these choices around security in our daily lives? How sh ould one go about designing UX to — as Mozilla puts it — "enlighten an d empower" informed choice?\n\n\nIn this session we will dive into behavio ral psychology\, and human-computer interaction studies\, and formulate a set of key principles to use when designing UX around security choices. We will apply these principles to evaluate a popular and high-security workf low we use daily — netbanking services. \n\nPreview available here: http s://1drv.ms/p/s!Au4kkP8CklsegbYeJeUlN4h1TxyD_A?e=Isr3Yl LAST-MODIFIED;VALUE=DATE-TIME:20210408T084001Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/netbanki ng-fails-Q3PM8Jqnyycsj4dsNMx5P6 BEGIN:VALARM ACTION:display DESCRIPTION:Why netbanking fails in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Birds of Feather (BOF) session on Fixing banking UI and UX for pri vacy DTSTART;VALUE=DATE-TIME:20210428T090500Z DTEND;VALUE=DATE-TIME:20210428T100500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/N8cmKe8Z6LWvKppMDpqPoi@hasgeek.com CREATED;VALUE=DATE-TIME:20210406T184144Z LAST-MODIFIED;VALUE=DATE-TIME:20210408T084006Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Birds of Feather (BOF) session on Fixing banking UI and UX for privacy in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Tea/coffee break - water cooler conversations DTSTART;VALUE=DATE-TIME:20210428T100500Z DTEND;VALUE=DATE-TIME:20210428T102500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/Nc2AqncmhVZXM8jqutt7tP@hasgeek.com CREATED;VALUE=DATE-TIME:20210406T183906Z LAST-MODIFIED;VALUE=DATE-TIME:20210408T084013Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Tea/coffee break - water cooler conversations in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Integrating privacy-preserving analytics into your application DTSTART;VALUE=DATE-TIME:20210428T102500Z DTEND;VALUE=DATE-TIME:20210428T105000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/YXJN6frLxWCTmfrucNYJdf@hasgeek.com CATEGORIES:Technology,Talk scheduled for pre-recording,30-min talk CREATED;VALUE=DATE-TIME:20210416T063119Z DESCRIPTION:Analytics is an important part of application development\, an d adding them in a privacy preserving manner is challenging.\n\nThis talk will give an overview of the process we went through to integrate analytic s into the System Updater\, a very critical component of our Android-based operating system\, CalyxOS.\n\nThe Updater is a critical component becaus e if you can successfully update a system\, you can eventually fix any bug s\, but if the update system itself is broken\, there's no coming back. An alytics here are important to let us know if installs failed or succedded\ , and to get a user count based on the number of updates installed. LAST-MODIFIED;VALUE=DATE-TIME:20210416T063205Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/integrat ing-privacy-preserving-analytics-into-your-application-YXJN6frLxWCTmfrucNY Jdf BEGIN:VALARM ACTION:display DESCRIPTION:Integrating privacy-preserving analytics into your application in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Birds of Feather (BOF) session: Architecting mobile apps for data security DTSTART;VALUE=DATE-TIME:20210428T105000Z DTEND;VALUE=DATE-TIME:20210428T115000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/S7tRAgwZKWt2gkcc5h2oQ5@hasgeek.com CREATED;VALUE=DATE-TIME:20210408T083901Z LAST-MODIFIED;VALUE=DATE-TIME:20210416T063209Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Birds of Feather (BOF) session: Architecting mobile apps for d ata security in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Tea/coffee break - water cooler conversations DTSTART;VALUE=DATE-TIME:20210428T115000Z DTEND;VALUE=DATE-TIME:20210428T120500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/EvmXSsyz3fbY7xRW1cZPkQ@hasgeek.com CREATED;VALUE=DATE-TIME:20210406T184108Z LAST-MODIFIED;VALUE=DATE-TIME:20210416T063213Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Tea/coffee break - water cooler conversations in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Birds of Feather (BOF) session: On Browsers\, Data Collection and Data Privacy Issues DTSTART;VALUE=DATE-TIME:20210428T120500Z DTEND;VALUE=DATE-TIME:20210428T130500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/H6x7YgW5tdZvmKAss4a3cb@hasgeek.com CREATED;VALUE=DATE-TIME:20210406T184227Z LAST-MODIFIED;VALUE=DATE-TIME:20210416T063215Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Birds of Feather (BOF) session: On Browsers\, Data Collection and Data Privacy Issues in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Summary of learnings from the day\; introduction to Day 7 DTSTART;VALUE=DATE-TIME:20210428T130500Z DTEND;VALUE=DATE-TIME:20210428T131500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/LdT2Qeq2UNDut7bN2HwS3K@hasgeek.com CREATED;VALUE=DATE-TIME:20210407T041133Z LAST-MODIFIED;VALUE=DATE-TIME:20210416T063217Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Summary of learnings from the day\; introduction to Day 7 in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Theme introduction: Data Protection in India and operational chall enges in implementation DTSTART;VALUE=DATE-TIME:20210429T083000Z DTEND;VALUE=DATE-TIME:20210429T084000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/Esy89yL7S2CMDXrYoWSi8s@hasgeek.com CREATED;VALUE=DATE-TIME:20210407T041232Z LAST-MODIFIED;VALUE=DATE-TIME:20210408T084103Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Theme introduction: Data Protection in India and operational c hallenges in implementation in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Tea/coffee break - water cooler conversations DTSTART;VALUE=DATE-TIME:20210429T094500Z DTEND;VALUE=DATE-TIME:20210429T100500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/HYPnc5oW73yLfiLKu1kycg@hasgeek.com CREATED;VALUE=DATE-TIME:20210407T041418Z LAST-MODIFIED;VALUE=DATE-TIME:20210407T041424Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Tea/coffee break - water cooler conversations in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Birds of Feather (BOF) session: How Fintech and Consumer Internet companies have implemented compliance from first principles DTSTART;VALUE=DATE-TIME:20210429T100500Z DTEND;VALUE=DATE-TIME:20210429T105500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/MGPHwtd7mpexoR6JqwvRjy@hasgeek.com CREATED;VALUE=DATE-TIME:20210407T041810Z LAST-MODIFIED;VALUE=DATE-TIME:20210407T041933Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Birds of Feather (BOF) session: How Fintech and Consumer Inter net companies have implemented compliance from first principles in 5 minut es TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Tea/coffee break - water cooler conversations DTSTART;VALUE=DATE-TIME:20210429T105500Z DTEND;VALUE=DATE-TIME:20210429T111000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/Pp4H3cgPViBsJ6N8zMnctB@hasgeek.com CREATED;VALUE=DATE-TIME:20210407T041541Z LAST-MODIFIED;VALUE=DATE-TIME:20210407T041935Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Tea/coffee break - water cooler conversations in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Birds of Feather (BOF) session: Personal Data Protection (PDP) bil l - are Indian tech companies ready for compliance? DTSTART;VALUE=DATE-TIME:20210429T111000Z DTEND;VALUE=DATE-TIME:20210429T121000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/ASCz7bhx9yRoiHWurUQ2Nk@hasgeek.com CREATED;VALUE=DATE-TIME:20210408T084158Z LAST-MODIFIED;VALUE=DATE-TIME:20210408T084208Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Birds of Feather (BOF) session: Personal Data Protection (PDP) bill - are Indian tech companies ready for compliance? in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Tea/coffee break - water cooler conversations DTSTART;VALUE=DATE-TIME:20210429T121000Z DTEND;VALUE=DATE-TIME:20210429T122500Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/A8rrLzHh8rsXg32pDzRMhK@hasgeek.com CREATED;VALUE=DATE-TIME:20210407T041916Z LAST-MODIFIED;VALUE=DATE-TIME:20210408T084211Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Tea/coffee break - water cooler conversations in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Birds of Feather (BOF) session: Cross-border and data localization compliance experience case studies DTSTART;VALUE=DATE-TIME:20210429T122500Z DTEND;VALUE=DATE-TIME:20210429T131000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/g3NFBan1U9j6bRp4nk8Jr@hasgeek.com CREATED;VALUE=DATE-TIME:20210407T041850Z LAST-MODIFIED;VALUE=DATE-TIME:20210408T084232Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Birds of Feather (BOF) session: Cross-border and data localiza tion compliance experience case studies in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT BEGIN:VEVENT SUMMARY:Conclusion - and way forward\; Best Practice Guide (BPG) contribut ions DTSTART;VALUE=DATE-TIME:20210429T131000Z DTEND;VALUE=DATE-TIME:20210429T132000Z DTSTAMP;VALUE=DATE-TIME:20210418T180912Z UID:session/5cbW3YY5ogWioeubk85Xin@hasgeek.com CREATED;VALUE=DATE-TIME:20210407T042108Z LAST-MODIFIED;VALUE=DATE-TIME:20210408T084215Z ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com BEGIN:VALARM ACTION:display DESCRIPTION:Conclusion - and way forward\; Best Practice Guide (BPG) contr ibutions in 5 minutes TRIGGER:-PT5M END:VALARM END:VEVENT END:VCALENDAR