BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//HasGeek//NONSGML Funnel//EN
DESCRIPTION:On building privacy in engineering and product processes.
X-WR-CALDESC:On building privacy in engineering and product processes.
NAME:Data Privacy Conference
X-WR-CALNAME:Data Privacy Conference
REFRESH-INTERVAL;VALUE=DURATION:PT12H
SUMMARY:Data Privacy Conference
TIMEZONE-ID:Asia/Kolkata
X-PUBLISHED-TTL:PT12H
X-WR-TIMEZONE:Asia/Kolkata
BEGIN:VEVENT
SUMMARY:Introduction to the conference - Intent\, People\, Process and Tec
 hnology framework for building privacy-enhancing technologies
DTSTART:20210423T063000Z
DTEND:20210423T064000Z
DTSTAMP:20260420T035002Z
UID:session/Dg1acF9fj2V3Tt5k1T3K6X@hasgeek.com
SEQUENCE:0
CREATED:20210131T134555Z
DESCRIPTION:\n
LAST-MODIFIED:20210420T123852Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Introduction to the conference - Intent\, People\, Process and
  Technology framework for building privacy-enhancing technologies in 5 min
 utes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Keynote: Personal data in heavily regulated environments - Zerodha
 's case study
DTSTART:20210423T064000Z
DTEND:20210423T072000Z
DTSTAMP:20260420T035002Z
UID:session/Nv6ZfLEoRwLSXPrJekBqrq@hasgeek.com
SEQUENCE:1
CATEGORIES:Talk added to the schedule,30-min talk,Process
CREATED:20210312T065707Z
DESCRIPTION:The mainstream focus on personal and sensitive data generally 
 tends to be on social media and communications platforms. The public under
 standing of how personal data flows through heavily regulated organisation
 s such as banks and stock brokers is limited. In fact\, such organisations
  are mandated by laws and regulations to share data with more parties than
  their unregulated counterparts. This talk highlights the lifecycle and fl
 ow of personal data in a regulated Indian stock broking firm\, and flow\, 
 it does.
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/the-life
 -of-personal-data-in-heavily-regulated-environments-Nv6ZfLEoRwLSXPrJekBqrq
BEGIN:VALARM
ACTION:display
DESCRIPTION:Keynote: Personal data in heavily regulated environments - Zer
 odha's case study in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Data Governance - Strategies from experience
DTSTART:20210423T072000Z
DTEND:20210423T080000Z
DTSTAMP:20260420T035002Z
UID:session/X6ScDivmEW3qYWoVMUTd71@hasgeek.com
SEQUENCE:1
CATEGORIES:Talk added to the schedule,30-min talk,Process
CREATED:20210416T063739Z
DESCRIPTION:A lot of organizations have recently started taking Data Gover
 nance seriously given the different laws now coming up in countries regard
 ing the use of data and heavy penalties on leaks which is further exacerba
 ted by how much more data each of these orgs are now generating compared t
 o before.With these accelerated motives a lot of Data Governance strategie
 s are a make or break based on the tooling of choice and priorities/trade 
 offs considered.\n\nIn this talk we look at the various paths organization
 s can take to accelerate data growth within the organization based on shap
 e\, size and need.\n
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/data-gov
 ernance-strategies-from-experience-X6ScDivmEW3qYWoVMUTd71
BEGIN:VALARM
ACTION:display
DESCRIPTION:Data Governance - Strategies from experience in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch break
DTSTART:20210423T080000Z
DTEND:20210423T084500Z
DTSTAMP:20260420T035002Z
UID:session/GgahHvfP6KeJaSsEZM1V2s@hasgeek.com
SEQUENCE:0
CREATED:20210312T064114Z
LAST-MODIFIED:20210406T093812Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Lunch break in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds of Feather (BOF) session: Building a Culture of Continuous S
 ecurity
DTSTART:20210423T084500Z
DTEND:20210423T094500Z
DTSTAMP:20260420T035002Z
UID:session/Qxr5GsanGhVzVpWNmjFeXy@hasgeek.com
SEQUENCE:1
CREATED:20210312T065401Z
DESCRIPTION:This BOF will have CISOs and Product Security officers as faci
 litators. \n\nThe following topics will be covered in this session:\n\n1. 
 Continuous security beyond compliance - how has each panelist strategized 
 this approach for their organization.\n2. Building capacity to do continuo
 us security - how do you upskill/train people internally and help develope
 rs internalize the culture of information security across different functi
 onal units?\n3. Tools to achieve this - as CISOs/leadership\, what factors
  influence the decision to build\, buy or rent technology for security? Wh
 at are the trade-offs of these decisions at different scales? 
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds of Feather (BOF) session: Building a Culture of Continuo
 us Security in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tea/coffee break - water cooler conversations
DTSTART:20210423T094500Z
DTEND:20210423T100500Z
DTSTAMP:20260420T035002Z
UID:session/QxXcD82XwcZzemVXEBJktC@hasgeek.com
SEQUENCE:0
CREATED:20210312T064535Z
LAST-MODIFIED:20210406T093910Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Tea/coffee break - water cooler conversations in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Fireside chat: Can small-sized startups build privacy in products?
  The journey of RedCarpetUp.com
DTSTART:20210423T100500Z
DTEND:20210423T105000Z
DTSTAMP:20260420T035002Z
UID:session/6rzPpvJezM33d5pdcUVfe7@hasgeek.com
SEQUENCE:0
CREATED:20210406T095529Z
LAST-MODIFIED:20210825T071201Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Fireside chat: Can small-sized startups build privacy in produ
 cts? The journey of RedCarpetUp.com in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Summary of learnings from the day\; introduction to Day 2
DTSTART:20210423T105000Z
DTEND:20210423T110500Z
DTSTAMP:20260420T035002Z
UID:session/NaWmdEMRhEnnzgzhMjA46V@hasgeek.com
SEQUENCE:0
CREATED:20210406T174435Z
LAST-MODIFIED:20210420T124040Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Summary of learnings from the day\; introduction to Day 2 in 5
  minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Break
DTSTART:20210423T110500Z
DTEND:20210423T140000Z
DTSTAMP:20260420T035002Z
UID:session/WQgq1UrSbJStjidSmZszBC@hasgeek.com
SEQUENCE:0
CREATED:20210420T124052Z
LAST-MODIFIED:20210422T105505Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Break in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Closing keynote: Is NetworkOps Dead in the Age of Cloud?
DTSTART:20210423T140000Z
DTEND:20210423T151500Z
DTSTAMP:20260420T035002Z
UID:session/CwgN376BHHt8ukNp7qAKr7@hasgeek.com
SEQUENCE:1
CATEGORIES:Talk scheduled for pre-recording,Technology,Keynote talk
CREATED:20210416T062259Z
DESCRIPTION:It’s been said that the number of clues remains constant eve
 n as some field of expertise expands. This may sometimes be the outgoing g
 eneration accusing the incoming generation of being soft or lazy\, and ind
 eed it has also been said that progress in most fields occurs one obituary
  at a time. What we know for certain is that skills for which demand is no
 t growing\, become less common. Maybe some managers and some investors lik
 e to avoid the cost of network operators and so the fact that _the cloud_ 
 does not ask its customers to operate physical routers or switches or serv
 ers seems like a good thing. We also know that **all magic comes at a cost
 **\, and in this case the low demand for network operations skills in one 
 generation has led to a reduced understanding in the next generation of ho
 w distributed systems actually function. What does this do to the competit
 ive position of nations and companies and technologists\, and how shall we
  make ready now that it has become inevitable?
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/closing-
 keynote-is-networkops-dead-in-the-age-of-cloud-CwgN376BHHt8ukNp7qAKr7
BEGIN:VALARM
ACTION:display
DESCRIPTION:Closing keynote: Is NetworkOps Dead in the Age of Cloud? in 5 
 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Theme introduction: Building Data Privacy and Data Governance in P
 roducts and Engineering
DTSTART:20210424T063000Z
DTEND:20210424T064000Z
DTSTAMP:20260420T035002Z
UID:session/7SfmsNdYrAxou3kaH35PnR@hasgeek.com
SEQUENCE:0
CREATED:20210406T174655Z
LAST-MODIFIED:20210420T124321Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Theme introduction: Building Data Privacy and Data Governance 
 in Products and Engineering in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Best practices in FOSS compliance can help improve security.
DTSTART:20210424T064000Z
DTEND:20210424T065500Z
DTSTAMP:20260420T035002Z
UID:session/JgVKjUk1JDK8yRxKvYgshQ@hasgeek.com
SEQUENCE:1
CATEGORIES:Talk scheduled for pre-recording,15-min talk,Process
CREATED:20210416T075321Z
DESCRIPTION:Privacy and security are closely tied together in the form of 
 legal requirements for “data protection” in laws across the world\, su
 ch as under Article 32 of EU’s General Data Protection Regulation\, and 
 India’s Information Technology (Reasonable Security Practices and Proced
 ures and Sensitive Personal Data or Information) Rules\, 2011.\n\nThis tal
 k will focus on how the best practices in FOSS compliance\, such as compli
 ance with OpenChain Specification 2.1 (functionally identical to ISO/IEC 5
 230:2020)\, can not only help with legal compliances for licensing require
 ments\, but can also help improve security in the entire supply chain. Imp
 lementing and maintaining a software bill of materials (SBOM) brings aware
 ness of all components that are in use in your products at all times. When
  a vulnerability is discovered in an existing open source component\, the 
 SBOM can be used to quickly identify which of your products and components
  are affected.\n\nThis talk will also discuss the case study of Equifax da
 ta breach.
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/best-pra
 ctices-in-foss-compliance-can-help-improve-security-JgVKjUk1JDK8yRxKvYgshQ
BEGIN:VALARM
ACTION:display
DESCRIPTION:Best practices in FOSS compliance can help improve security. i
 n 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Intuit's GDPR compliance case study
DTSTART:20210424T065500Z
DTEND:20210424T071500Z
DTSTAMP:20260420T035002Z
UID:session/AX7UpHqyj3HpBgkBAgzxxy@hasgeek.com
SEQUENCE:1
CATEGORIES:Talk added to the schedule,30-min talk,Process
CREATED:20210312T065615Z
DESCRIPTION:There is an increased focus on data privacy and governance acr
 oss the world. Intuit\, offering products and services in the Financial In
 dustry\, operates worldwide in multiple countries. We needed to provide da
 ta privacy and compliance across multiple geographies. As part of enabling
  data privacy capabilities to our customers\, we navigated through a numbe
 r of challenges and built systems to support multiple regulations like GDP
 R\, CCPA\, AUCDR\, etc.\nWe enabled a comprehensive solution for both forg
 et me and data access requirements of data governance regulations.\n\nIn t
 his case study\, the audience would learn about the high level approach us
 ed for solving for data privacy and compliance. The case study would also 
 cover the challenges faced during the implementation of the same and the s
 olutions employed so that engineers can use a similar pattern. \n
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/data-gov
 ernance-at-intuit-AX7UpHqyj3HpBgkBAgzxxy
BEGIN:VALARM
ACTION:display
DESCRIPTION:Intuit's GDPR compliance case study in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch break
DTSTART:20210424T071500Z
DTEND:20210424T075000Z
DTSTAMP:20260420T035002Z
UID:session/5NmpMGUHKzmQxxvqG7J5Fs@hasgeek.com
SEQUENCE:0
CREATED:20210312T065827Z
LAST-MODIFIED:20210416T110330Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Lunch break in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Can my company be Data Privacy compliant and still stay Agile?
DTSTART:20210424T075000Z
DTEND:20210424T082000Z
DTSTAMP:20260420T035002Z
UID:session/AAsyoKVAYJmekpoTxGY7He@hasgeek.com
SEQUENCE:1
CATEGORIES:Talk scheduled for pre-recording,30-min talk,Process
CREATED:20210416T075727Z
DESCRIPTION:Compliance is no longer a nice to have! An organization offeri
 ng a SaaS product needs to secure appropriate compliance reports (SOC2\, I
 SO27001\, GDPR\, FedRamp etc.) to ensure they put in place the organizatio
 n’s structure\, software\, people and data-handling procedures to handle
  and protect their customer’s data. Compliance serves as beacon of trans
 parency and conveys confidence to your customers that you have appropriate
  controls to safely handle their data and protect it.\n\nWait! Isn’t thi
 s so much of additional work? Will I need additional R&D and IT manpower n
 ow? Will I need to budget for additional infrastructure? Will this slow do
 wn my product deliverables that I cannot be agile anymore? Yes! But with t
 he right investments in processes and automation provided by cloud native 
 products you can make all this seamless and execute repeatedly.\n\nI will 
 give an overview of what are the key decisions VP’s have to take\, empow
 ered organization structures to put in place to make plans and decisions\,
  incident management & change management strategies and the type of produc
 ts/tools to use to stay compliant\, but still be agile.
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/can-my-c
 ompany-be-data-privacy-compliant-and-still-stay-agile-AAsyoKVAYJmekpoTxGY7
 He
BEGIN:VALARM
ACTION:display
DESCRIPTION:Can my company be Data Privacy compliant and still stay Agile?
  in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:How Data Security and Data Privacy can work together - leveraging 
 existing Information Security practises to address data  privacy requireme
 nts
DTSTART:20210424T082000Z
DTEND:20210424T090000Z
DTSTAMP:20260420T035002Z
UID:session/5dMUv8nccKRou41eAyLMsG@hasgeek.com
SEQUENCE:1
CATEGORIES:Talk scheduled for pre-recording,30-min talk,Process
CREATED:20210416T074222Z
DESCRIPTION:Data privacy and cybersecurity practices are becoming increasi
 ngly important in view of new legislation\, such as the General Data Prote
 ction Regulation (GDPR)\, Personal Data protection Act (PDPA) as well as i
 ncreasing sophisticated cyber attacks.Many organization spends most of the
 ir cybersecurity budgets on addressing technical\, financial and reputatio
 nal  risks and  It is often noted that an insufficient level of privacy pr
 otection or breaches of personal data may lead to loss of consumer trust a
 nd damage to businesses' reputation.\nLet’s discuss the opportunities to
  leverage existing Cybersecurity/Information security practices to address
  data privacy compliance requirements .\nKey takeaway\n1)How to implement 
 Data privacy programme without reinventing wheel \n2)How information secur
 ity’s People \, process and technology can co-exists and work together e
 ffectively with data privacy framework\n
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/leveragi
 ng-existing-information-security-practises-to-address-data-privacy-require
 ments-or-how-data-security-and-data-privacy-can-work-together-5dMUv8nccKRo
 u41eAyLMsG
BEGIN:VALARM
ACTION:display
DESCRIPTION:How Data Security and Data Privacy can work together - leverag
 ing existing Information Security practises to address data  privacy requi
 rements in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tea/coffee break - water cooler conversations
DTSTART:20210424T090000Z
DTEND:20210424T091500Z
DTSTAMP:20260420T035002Z
UID:session/AC7pJMvAS4WDxzhDeDMRHt@hasgeek.com
SEQUENCE:0
CREATED:20210312T070215Z
LAST-MODIFIED:20210416T114339Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Tea/coffee break - water cooler conversations in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds of Feather (BOF) session: Investors' views of privacy and se
 curity\; proactive measures and compliance for existing and future investe
 es.
DTSTART:20210424T091500Z
DTEND:20210424T101500Z
DTSTAMP:20260420T035002Z
UID:session/Kj8CjriSohtCZXXvstTULU@hasgeek.com
SEQUENCE:1
CREATED:20210406T181247Z
DESCRIPTION:This BOF will cover:\n\n1. How are investors doing risk assess
 ment given privacy regulations and laws around policies in India\, and glo
 bally?\n2. How should investees\, especially early startups\, gear up for 
 investment in this climate? Practical suggestions and advice.\n3. In the l
 ight of recent data breaches\, and the consumer sentiment on privacy given
  the COVID-19 situation\, what metrics and criteria will investors apply t
 o evaluate potential investees in Fintech and health tech sectors? \n4. Wh
 at are the panel's recommendations for the government with respect to Priv
 acy and data protection policies and regulations for startups?
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds of Feather (BOF) session: Investors' views of privacy an
 d security\; proactive measures and compliance for existing and future inv
 estees. in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Summary of learnings from the day\; introduction to Day 3
DTSTART:20210424T101500Z
DTEND:20210424T103000Z
DTSTAMP:20260420T035002Z
UID:session/TR23eYN2QpcGWPtXFFK5Rp@hasgeek.com
SEQUENCE:0
CREATED:20210312T070651Z
LAST-MODIFIED:20210420T124624Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Summary of learnings from the day\; introduction to Day 3 in 5
  minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Break
DTSTART:20210424T103000Z
DTEND:20210424T140000Z
DTSTAMP:20260420T035002Z
UID:session/4TwwSCVDtc3eCMTkaCAUqb@hasgeek.com
SEQUENCE:0
CREATED:20210420T124632Z
LAST-MODIFIED:20210420T124702Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Break in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lean Data Practices
DTSTART:20210424T140000Z
DTEND:20210424T144500Z
DTSTAMP:20260420T035002Z
UID:session/BgVZcBUxcV1ZHq3MbeDQdY@hasgeek.com
SEQUENCE:1
CREATED:20210416T114537Z
DESCRIPTION:Lean Data Practices (LDP) is a flexible framework that anyone 
 handling personal data can use to build in privacy\, security\, and transp
 arency in ways that can build trust and reduce risk. This talk is a follow
  up to the November 2020 LDP presentation to dive deeper into the methodol
 ogy\, specifically how to apply it from the product management and develop
 ment lens. We will discuss how to implement the various LDP tips provided\
 , including additional applications for the ones previously shared in the 
 November 2020 session (available at https://hasgeek.com/PrivacyMode/lean-d
 ata-practices/).\n\nThe target audience for this programme includes Produc
 t Managers\, Privacy Architects or Engineers\, and anybody interested in l
 earning practical ways to incorporate privacy by design through use of the
  LDP methodology. Be sure to join the separate interactive Q&A to discuss 
 your specific use cases.\n\nReferences: Resources about Lean Data Practice
 s is available on: www.leandatapractices.com\n\nAbout the speaker: Nneka S
 oyinka is the Privacy Program Manager at Mozilla. She is responsible for p
 rivacy program operations and privacy compliance\, including privacy educa
 tion\, vendor reviews\, data subject access requests\, and collaboration w
 ith various stakeholders to ensure privacy is incorporated in a meaningful
  way aligned with Mozilla's privacy principles. The Privacy Team supports 
 all data collection touch points ranging from users\, to our community mem
 bers to our employees.
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/lean-dat
 a-practices-BgVZcBUxcV1ZHq3MbeDQdY
BEGIN:VALARM
ACTION:display
DESCRIPTION:Lean Data Practices in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Theme introduction: Technology and Privacy - approaches on how to 
 manage customer data
DTSTART:20210425T083000Z
DTEND:20210425T084000Z
DTSTAMP:20260420T035002Z
UID:session/8Qt5LZLRrhTd9rVBQVfBit@hasgeek.com
SEQUENCE:0
CREATED:20210420T125048Z
LAST-MODIFIED:20210424T132533Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Theme introduction: Technology and Privacy - approaches on how
  to manage customer data in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Jupiter's approach to PII/SPDI redaction
DTSTART:20210425T084000Z
DTEND:20210425T090000Z
DTSTAMP:20260420T035002Z
UID:session/34jaf5zucsTtirzRCn3q2w@hasgeek.com
SEQUENCE:1
CATEGORIES:Talk added to the schedule,30-min talk,Technology
CREATED:20210312T063958Z
DESCRIPTION:**Abstract** By regulation and more so by a moral obligation\,
  Jupiter is required to safeguard the privacy of its customers. As provide
 rs of financial services\, we are often entrusted with information that co
 uld be extremely private to users\, of a sensitive nature and at the same 
 time can be used to personally identify them by a single data element. Dea
 ling with an engineering stack that builds upon a number of microserves an
 d subsystems\, reliant on an equally large number of data storage systems 
 - brings about its own challenges when it comes to governance of customer
 ’s private data. In this talk we would like to give a walkthrough of the
  solution that Jupiter implemented to solve this problem and to massively 
 reduce the number of systems that would interact with actual\, raw PII/SPD
 I (Personally Identifying Information/Sensitive Personal Data or Informati
 on) so that monitoring of access and data control could be achieved with a
  higher degree of operational confidence.\n\nWe would be talking about the
  basic requirements around PII/SPDI protection as an industry requirement:
 \n1. What does the law/regulation say about PII/SPDI\n2. What did our part
 ners need from us when it came to protecting customer data\n\nIn terms of 
 engineering:\n1. How can we implement a solution that induces little to no
  developer friction - the aim here was not just making it easy for develop
 ers to integrate PII/SPDI redaction\; having an intrusive process with mul
 tiple touchpoints would make a human error that much more likely\, which c
 ould end up being a potential point of breach\n2. The same code should wor
 k with PII/SPDI redaction switched off as it does with redaction switched 
 on\n3. How are we ensuring that we are still able to maintain semantics of
  lookup\, uniqueness of certain data elements\, specifically the ability t
 o use certain data elements as primary keys for user centric data\n4. How 
 we are handling multiple partners wanting their customers data to be store
 d isolated from other partners\, with encryption using keys that are provi
 sioned specifically for them\n5. Why we chose to work at the serialization
  layer to implement PII/SPDI redaction\n\nAnd in terms of where we see thi
 s going:\n1. What are the limitations and caveats of the current system\n2
 . Ideas to explore - Is it possible to do this at a service mesh level? Pr
 oxy level? At a gateway\, maybe - our thoughts and musings on this topic
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/our-appr
 oach-to-pii-spdi-redaction-34jaf5zucsTtirzRCn3q2w
BEGIN:VALARM
ACTION:display
DESCRIPTION:Jupiter's approach to PII/SPDI redaction in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Masking Sensitive Data in Logs with LogStash
DTSTART:20210425T090000Z
DTEND:20210425T092000Z
DTSTAMP:20260420T035002Z
UID:session/H3Vv6A6Gzi7psMj9psk9GM@hasgeek.com
SEQUENCE:1
CATEGORIES:Talk added to the schedule,15-min talk,Technology
CREATED:20210312T063823Z
DESCRIPTION:ElasticSearch\, LogStash and Kibana together create one of the
  most popular log ingestion and indexing solution. However\, the logs bein
 g indexed and made available can potentially contain sensitive information
  such as PII. The talk will explain how to setup masking for such sensitiv
 e information(s) present in the logs in LogStash. This would enable any pr
 incipal who wants to look at the logs to be able to do so while protecting
  leakage and misuse of sensitive information. \n\nAs an example case study
 \, the participants will be shown how to setup filters in LogStash to mask
  data in the log conditionally based on whether the sensitive field is pre
 sent in the particluar log entry or not.
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/masking-
 sensitive-data-in-logs-with-logstash-H3Vv6A6Gzi7psMj9psk9GM
BEGIN:VALARM
ACTION:display
DESCRIPTION:Masking Sensitive Data in Logs with LogStash in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lessons learned from the biggest data breach - Yahoo!
DTSTART:20210425T092000Z
DTEND:20210425T094000Z
DTSTAMP:20260420T035002Z
UID:session/7DnvfppNDV2yVaqzJpo4MS@hasgeek.com
SEQUENCE:1
CATEGORIES:Talk scheduled for pre-recording,15-min talk,Process
CREATED:20210413T070447Z
DESCRIPTION:[15 minute talk]\n\nFirst in 2013\, then in 2014 & Again in 20
 16 - Yahoo! suffered the biggest data breach after losing the data of bill
 ion people.\n\nIn the case study that I'll present - I'll demystify:\n- Wh
 y Yahoo! was the target?\n- How often Yahoo! was attacked which led to a d
 ata breach?\n- Who were the Yahoo! hackers?\n- How was the data stolen?\n-
  How did Yahoo respond?\n- Lessons learned from the Yahoo! attack?\n\nThes
 e shall remain the sub-headings of my talk. When explaining\, I shall cove
 r how companies in 2021 see similar vulnerabilities (in general\, without 
 naming)\, and therefore\, what are the recommended developer and security 
 precautions that businesses should adopt.  
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/lessons-
 learned-from-the-biggest-data-breach-yahoo-7DnvfppNDV2yVaqzJpo4MS
BEGIN:VALARM
ACTION:display
DESCRIPTION:Lessons learned from the biggest data breach - Yahoo! in 5 min
 utes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tea/coffee break - water cooler conversations
DTSTART:20210425T094000Z
DTEND:20210425T095500Z
DTSTAMP:20260420T035002Z
UID:session/JNDJxMnPVKRCKLDgir7aUB@hasgeek.com
SEQUENCE:0
CREATED:20210312T071416Z
LAST-MODIFIED:20210413T070501Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Tea/coffee break - water cooler conversations in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Data Anonymization @ Offline Data Lake
DTSTART:20210425T095500Z
DTEND:20210425T103500Z
DTSTAMP:20260420T035002Z
UID:session/XGh3DdAmjX9bUC1Dyvhu1q@hasgeek.com
SEQUENCE:1
CATEGORIES:Talk scheduled for pre-recording,30-min talk,Technology
CREATED:20210420T124849Z
DESCRIPTION:LinkedIn works at exabyte data scale and respecting the privac
 y of its Members is the top most priority as part of LinkedIn culture and 
 the core value “Members first”.  In this talk we will walk through the
  tools & technologies used in creating a PII-free anonymized data warehous
 e for allowing GDPR compliant access to data. \nWe will look at the challe
 nges involved in various approaches and design for creating a Anonymized D
 ataLake
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/data-ano
 nymization-offline-data-lake-XGh3DdAmjX9bUC1Dyvhu1q
BEGIN:VALARM
ACTION:display
DESCRIPTION:Data Anonymization @ Offline Data Lake in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds of Feather (BOF) session: Compliance\, audits and data secur
 ity in Fintech - the role of DevOps and SRE
DTSTART:20210425T103500Z
DTEND:20210425T112500Z
DTSTAMP:20260420T035002Z
UID:session/45vkH5ugmCqJTi8xgvRnEh@hasgeek.com
SEQUENCE:1
CREATED:20210407T040907Z
DESCRIPTION:The aim of the BOF is to discuss practical experiences and sug
 gestions on the following questions: \n\n1. What are the processes and wor
 kflows in your organizations around compliance and audit - involving DevOp
 s?\n2. How do DevOps teams communicate with other teams as part of these p
 rocesses and workflows? What are the hand-off points?\n3. What are some of
  the red flags in your organization's setup? For e.g.\, lack of incident r
 eporting processes\, lack of training\, etc. \n
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds of Feather (BOF) session: Compliance\, audits and data s
 ecurity in Fintech - the role of DevOps and SRE in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Summary of learnings from the day\; introduction to Day 4
DTSTART:20210425T112500Z
DTEND:20210425T114000Z
DTSTAMP:20260420T035002Z
UID:session/HtXFhS9RioDLxPPHrZdLfW@hasgeek.com
SEQUENCE:0
CREATED:20210407T040947Z
LAST-MODIFIED:20210420T125132Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Summary of learnings from the day\; introduction to Day 4 in 5
  minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Master class: TLS in 2021
DTSTART:20210426T114500Z
DTEND:20210426T124500Z
DTSTAMP:20260420T035002Z
UID:session/MBmYeVdFfrBenb2AVQbpto@hasgeek.com
SEQUENCE:2
CATEGORIES:Talk scheduled for pre-recording,1-hour master class,Technology
CREATED:20210406T182526Z
DESCRIPTION:Transport Layer Security: everybody needs it\, but few of us u
 nderstand it. TLS is not just about getting the lock icon in the browser a
 ddress bar. It's perhaps the most frequently misconfigured protocol on the
  Internet.\n\nThis talk takes you through:\n•	How TLS works\n•	What TL
 S provides\, and what it doesn’t\n•	How applications wrap unencrypted 
 connections inside TLS\n•	Assessing TLS configurations\n•	The Automate
 d Certificate Management Environment (ACME) protocol\n•	Using Let’s En
 crypt to automatically maintain TLS certificates\n•	Online Certificate S
 tatus Protocol\n•	The Realities of Certificate Revocation\n•	CAA\, HST
 S\, and Certificate Transparency\n•	Why you shouldn’t run your own CA\
 , and hints on how to do it anyway\n
LAST-MODIFIED:20230810T072606Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/tls-in-2
 021-MBmYeVdFfrBenb2AVQbpto
BEGIN:VALARM
ACTION:display
DESCRIPTION:Master class: TLS in 2021 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Theme introduction: Encryption and Privacy
DTSTART:20210426T124500Z
DTEND:20210426T125500Z
DTSTAMP:20260420T035002Z
UID:session/RyY6ZSMRTL3EBL8y9edmzj@hasgeek.com
SEQUENCE:0
CREATED:20210420T125409Z
LAST-MODIFIED:20210425T142012Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Theme introduction: Encryption and Privacy in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Cryptographic Protocols for a Secure and Private IoT
DTSTART:20210426T125500Z
DTEND:20210426T133000Z
DTSTAMP:20260420T035002Z
UID:session/GxMHqRgK5YT8dkiFx2pRDs@hasgeek.com
SEQUENCE:2
CATEGORIES:Speaker to submit outline in 3 slides,Submission for another co
 nference/vertical,TBD - to be decided
CREATED:20210416T120333Z
DESCRIPTION:The Internet of Things (IoT) suffers from critical\, systemic\
 , security and privacy flaws. Problems of Spoofable Identities\, Weak Auth
 entication and Ambient Authority are common in most deployments.\n\nBusine
 sses see IoT solutions as an opportunity to reduce costs\, increase employ
 ee safety and create new revenue streams. Consumers often love the conveni
 ence offered by home and wearable IoT products. Adoption is growing rapidl
 y and simultaneously there has been a steady escalation in the severity of
  attacks against IoT that compromise private information and critical syst
 ems.\n\nThis talk will discuss how several cryptographic protocol building
 -blocks\, that have been proven in other domains\, can be adapted to addre
 ss _foundational problems in IoT_. For example\, we'll discuss how protoco
 ls from open encrypted messaging projects like Signal can be adapted for e
 nd-to-end encrypted communication in IoT. How pairing based cryptography\,
  short group signatures and zero knowledge proofs can be used for efficien
 t privacy preserving authorization credentials in resource constrained mac
 hines. And many other such examples of applying proven primitives to secur
 e communication and robust access management in real world IoT systems.\n\
 nWe'll explore how these building blocks can be combined to create an Inte
 rnet of Things that is dependable and preserves our privacy.\n\nMany of th
 e ideas presented in this talk are being researched\, discussed and implem
 ented as Rust and Elixir libraries in our open source project - [Ockam](ht
 tps://github.com/ockam-network/ockam)\n\n## Earlier Talks\n\n- A talk I pr
 esented last year that explores [why IoT needs secure messaging](https://w
 ww.youtube.com/watch?v=wEeLSbkU_jI).\n- A recent talk by Ockam contributor
  Mike Lodder on the [cryptography behind the anonymous\, privacy preservin
 g credentials in Ockam](https://youtu.be/l1NDpH5vo8I?t=585).
LAST-MODIFIED:20230810T072606Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/cryptogr
 aphic-protocols-for-a-secure-and-private-iot-GxMHqRgK5YT8dkiFx2pRDs
BEGIN:VALARM
ACTION:display
DESCRIPTION:Cryptographic Protocols for a Secure and Private IoT in 5 minu
 tes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Interactive Q&A with Michael W. Lucas on TLS master class
DTSTART:20210426T133000Z
DTEND:20210426T140000Z
DTSTAMP:20260420T035002Z
UID:session/KN3f4jC99arcsYGuy9DRbZ@hasgeek.com
SEQUENCE:0
CREATED:20210408T083158Z
LAST-MODIFIED:20210422T110021Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Interactive Q&A with Michael W. Lucas on TLS master class in 5
  minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Keynote: End-to-end encryption: state of technical and policy deba
 tes
DTSTART:20210426T140000Z
DTEND:20210426T151000Z
DTSTAMP:20260420T035002Z
UID:session/R7V65dTuMkA669f8ByFpHb@hasgeek.com
SEQUENCE:1
CATEGORIES:Talk scheduled for pre-recording,Technology,Keynote talk
CREATED:20210416T102706Z
DESCRIPTION:Over the past decade\, end-to-end encryption (E2EE) has been w
 idely deployed in electronic messaging applications\, including WhatsApp\,
  Signal\, Apple iMessage and others. This form of messaging ensures that i
 nformation is encrypted from an end-user device (such as a phone) and rema
 ins encrypted until it reaches the destination. A key benefit of E2EE is t
 hat it protects messages from server-side hacking and mass surveillance. A
 t the same time E2EE has created a vigorous pushback from the national sec
 urity and law enforcement communities worldwide\, as it significantly impe
 des investigative efforts. In this talk I will discuss the state of the E2
 EE messaging debate\; the technical developments in this field\; and the p
 olicy questions that remain.
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/end-to-e
 nd-encryption-state-of-the-technical-and-policy-debate-R7V65dTuMkA669f8ByF
 pHb
BEGIN:VALARM
ACTION:display
DESCRIPTION:Keynote: End-to-end encryption: state of technical and policy 
 debates in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds of Feather - Product design and usability for privacy
DTSTART:20210426T151000Z
DTEND:20210426T155500Z
DTSTAMP:20260420T035002Z
UID:session/H5yUSM9ZuZuhFJuiaY3a8u@hasgeek.com
SEQUENCE:1
CATEGORIES:Speaker to prepare slides for pre-recording,30-min talk,Technol
 ogy
CREATED:20210416T102950Z
DESCRIPTION:As more of our conversations move online\, privacy by design i
 s becoming crucial in product development. In this session\, Uzma Barlaska
 r\, product manager at WhatsApp\, will discuss "Product design and usabili
 ty for privacy\," focusing on how WA features like ephemerality & live loc
 ation as examples of how building e2ee into the system can be used for oth
 er things too.\n\nUzma will talk through the Product principles at WhatsAp
 p and how privacy is embedded in WhatsApp's DNA. The interaction  will foc
 us on how people can build product and features with privacy and security 
 at its core.
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/product-
 design-and-usability-for-privacy-H5yUSM9ZuZuhFJuiaY3a8u
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds of Feather - Product design and usability for privacy in
  5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Summary of learnings from the day\; introduction to Day 5
DTSTART:20210426T155500Z
DTEND:20210426T160000Z
DTSTAMP:20260420T035002Z
UID:session/Ww8LxY7YgE4UdEF7w4Rdj6@hasgeek.com
SEQUENCE:0
CREATED:20210420T125906Z
LAST-MODIFIED:20210422T110029Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Summary of learnings from the day\; introduction to Day 5 in 5
  minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Theme introduction: Technology and Data Privacy
DTSTART:20210427T083000Z
DTEND:20210427T084000Z
DTSTAMP:20260420T035002Z
UID:session/XcMLRyoNmxhKEY8Su8PouT@hasgeek.com
SEQUENCE:0
CREATED:20210131T134912Z
DESCRIPTION:\n
LAST-MODIFIED:20210420T125345Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Theme introduction: Technology and Data Privacy in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Case study of CalyxOS
DTSTART:20210427T084000Z
DTEND:20210427T091500Z
DTSTAMP:20260420T035002Z
UID:session/NyXiemcfUMUXtLtV8FVxLX@hasgeek.com
SEQUENCE:1
CATEGORIES:Talk added to the schedule,30-min talk,Technology
CREATED:20210416T101730Z
DESCRIPTION:CalyxOS is an open source Android-based Operating System\, spo
 nsored by the Calyx Institute\, a 501(c) non-profit dedicated to making pr
 ivacy and security available for all.\n\nWe take the code Google releases 
 as open source to the Android Open Source Project\, and try to make it usa
 ble for everyone while preserving their privacy\, and also keeping the sec
 urity model Google intended intact.\nThis creates some interesting scenari
 os\, where being in the control of the Operating System lets you make pret
 ty much any modification you'd like\, but lots of implications have to be 
 considered.\n\nSome of the features / decisions I'll be talking about:\n* 
 microG Integration and configuration\, as a replacement of Google Play Ser
 vices\n* Signal and WhatsApp calling integration into the Dialer\n* Some d
 efault services used by the device for various tasks such as time keeping\
 , checking if the internet is working\n* Ad / Tracker blocking\, and addit
 ional firewall features
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/case-stu
 dy-of-calyxos-NyXiemcfUMUXtLtV8FVxLX
BEGIN:VALARM
ACTION:display
DESCRIPTION:Case study of CalyxOS in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Synthetic data generation
DTSTART:20210427T091500Z
DTEND:20210427T095000Z
DTSTAMP:20260420T035002Z
UID:session/PvruqSWS8XN8myPBjhYCLH@hasgeek.com
SEQUENCE:1
CATEGORIES:Talk scheduled for pre-recording,30-min talk,Technology
CREATED:20210416T101914Z
DESCRIPTION:At Needl\, our mission is to organize and stitch your informat
 ion to make it universally accessible and useful. Knowledge workers today 
 are inundated with massive amounts of data via multiple communication apps
  and devices resulting in huge efforts to save\, organise\, retrieve\, and
  make sense of data leading to productivity loss.  Needl aims to unbundle 
 your data across apps & devices into a single repository for both structur
 e and unstructured data across private and public sources. A seamless expe
 rience of all your data in one place\, securely backed up with a host of c
 loud computing processes on tap and user defined interfaces built to analy
 se and share – transforming the way you and your team work and collabora
 te!\n\nAs our engineers continue to develop new features (especially ML-re
 lated)\, we needed a way to test those features against user data.  But si
 nce the privacy of every user's data is non-negotiable\, we cannot directl
 y use Production data.  We wanted a way to generate synthetic data from a 
 snapshot of the Production data and then test our features reliably agains
 t this synthetic data.\n\nhttps://www.needl.ai/\n\nSlides outline (UPDATED
  13 Apr) https://docs.google.com/presentation/d/13ObjJyCl2a38yUud-pxVx34pl
 o5t50zZb7l0K3sNB8Y/edit?usp=sharing
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/syntheti
 c-data-generation-PvruqSWS8XN8myPBjhYCLH
BEGIN:VALARM
ACTION:display
DESCRIPTION:Synthetic data generation in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tea/coffee break - water cooler conversations
DTSTART:20210427T095000Z
DTEND:20210427T101000Z
DTSTAMP:20260420T035002Z
UID:session/AfTDE5Sy2Kf2SapaS2QjMp@hasgeek.com
SEQUENCE:0
CREATED:20210406T183347Z
LAST-MODIFIED:20210422T110041Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Tea/coffee break - water cooler conversations in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Data deletion practices @ Offline Data lake
DTSTART:20210427T101000Z
DTEND:20210427T104500Z
DTSTAMP:20260420T035002Z
UID:session/9mvjjum3ZDYTq4BHndxmjt@hasgeek.com
SEQUENCE:1
CATEGORIES:Talk scheduled for pre-recording,30-min talk,Technology
CREATED:20210420T130116Z
DESCRIPTION:LinkedIn works at exabyte data scale and respecting the privac
 y of its Members is the top most priority as part of LinkedIn culture and 
 the core value “Members first”.  This talk will briefly touch upon som
 e of the practices\, tools & technologies used in offline data lake for ad
 herence to GDPR “Right to erasure”. Talk will also cover the lessons l
 earned and challenges faced while talking in detail about the offline GDPR
  data deletion architecture.
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/data-del
 etion-practices-offline-data-lake-9mvjjum3ZDYTq4BHndxmjt
BEGIN:VALARM
ACTION:display
DESCRIPTION:Data deletion practices @ Offline Data lake in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Enabling customers' security and privacy journey in the AWS/Cloud
DTSTART:20210427T104500Z
DTEND:20210427T114500Z
DTSTAMP:20260420T035002Z
UID:session/UXJd3jmH7nTVvZPUoWPrRN@hasgeek.com
SEQUENCE:1
CREATED:20210416T121555Z
DESCRIPTION:AWS delivers its wide bouquet of services to millions of activ
 e customers in over 240 countries and territories. Our customers include f
 inancial services providers\, healthcare providers\, telecom and governmen
 tal agencies\, who trust us with some of their most sensitive information.
  Over the years and through operating across data jurisdictions\, we have 
 developed a security assurance program that uses best practices for global
  privacy and data protection to help our customers operate securely within
  AWS\, and to make the best use of our security control environment. These
  security protections and control processes are independently validated by
  multiple third-party independent assessments e.g. SOC 2\, ISO 27018. We w
 ould like to conduct a meta-case study session wherein we use multiple cus
 tomer case studies to highlight:\n1. Our shared responsibility model and s
 ecurity assurance program.\n2. How our tools and services have helped cust
 omers with ensuring compliance and security with no/low impact on innovati
 on.\n3. AWS experience in enabling customers in some of the most stringent
  Privacy and Data control requirements including GDPR\, HIPAA and PCI DSS\
 n4. India and Data Protection Landscape \n4. AWS Security and Compliance b
 est Practices/Architecture\n5. AWS Data Protection and Privacy Resources\n
 This session would also speak to our own experiences with distributed data
  systems and geographical compliances\, privacy-centric developer practice
 s and the impact to those that we foresee once the PDP Bill is implemented
 .\n\n
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/enabling
 -customers-security-and-privacy-journey-in-the-aws-cloud-UXJd3jmH7nTVvZPUo
 WPrRN
BEGIN:VALARM
ACTION:display
DESCRIPTION:Enabling customers' security and privacy journey in the AWS/Cl
 oud in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Summary of learnings from the day\; introduction to Day 6
DTSTART:20210427T114500Z
DTEND:20210427T115500Z
DTSTAMP:20260420T035002Z
UID:session/FqhvAYqpg3u5rzdDSgtgTS@hasgeek.com
SEQUENCE:0
CREATED:20210408T083543Z
LAST-MODIFIED:20210422T110054Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Summary of learnings from the day\; introduction to Day 6 in 5
  minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Theme introduction: Data Privacy for consumer-facing products
DTSTART:20210428T063000Z
DTEND:20210428T064000Z
DTSTAMP:20260420T035002Z
UID:session/7pBTVtjk1E8CN9AqP6gqbx@hasgeek.com
SEQUENCE:0
CREATED:20210406T183635Z
LAST-MODIFIED:20210427T122156Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Theme introduction: Data Privacy for consumer-facing products 
 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Master class on identity and biometrics
DTSTART:20210428T064000Z
DTEND:20210428T080000Z
DTSTAMP:20260420T035002Z
UID:session/8tMLen4WT3ZZaLgY6K4Xki@hasgeek.com
SEQUENCE:1
CATEGORIES:Speaker to prepare slides for pre-recording,1-hour master class
 ,Technology
CREATED:20210416T063414Z
DESCRIPTION:India has deployed the world’s largest national digital iden
 tity system based on biometrics. In this session we will review the suitab
 ility of biometrics based identity definition for delivery of essential se
 rvices.\n\nIn the first part of the session we will briefly review the cor
 e algorithmic ideas behind biometric matching and discuss their strengths 
 and weaknesses\, with special references to fingerprints\, iris scan and f
 acial images. In the second part of the session we will outline the requir
 ements of an identity instrument and discuss the suitability of biometrics
  for defining identity.\n\nBackground requirement: No particular backgroun
 d requirement.
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/identity
 -and-biometrics-8tMLen4WT3ZZaLgY6K4Xki
BEGIN:VALARM
ACTION:display
DESCRIPTION:Master class on identity and biometrics in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch break
DTSTART:20210428T080000Z
DTEND:20210428T084500Z
DTSTAMP:20260420T035002Z
UID:session/BptkBVuRp7LimNdxuAeP5d@hasgeek.com
SEQUENCE:0
CREATED:20210408T083945Z
LAST-MODIFIED:20210408T083952Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Lunch break in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Why netbanking fails
DTSTART:20210428T084500Z
DTEND:20210428T090500Z
DTSTAMP:20260420T035002Z
UID:session/Q3PM8Jqnyycsj4dsNMx5P6@hasgeek.com
SEQUENCE:1
CATEGORIES:Talk added to the schedule,15-min talk,Process
CREATED:20210406T183929Z
DESCRIPTION:Security is hard. Designing user experience (UX) around securi
 ty is harder. Yet almost everyday\, we are forced to make security related
  decisions across multiple connected devices we own. Sometimes we make the
 se choices for ourselves\, and sometime we impose our choices subtly on ot
 hers with whom we share these devices. Proliferation of personal IoT devic
 es exacerbates this problem\, and in some cases\, even forces sub-optimal 
 security choices.\n\n\nWhy is UX around security so hard? What are we thin
 king when we make these choices around security in our daily lives? How sh
 ould one go about designing UX to — as Mozilla puts it — "enlighten an
 d empower" informed choice?\n\n\nIn this session we will dive into behavio
 ral psychology\, and human-computer interaction studies\, and formulate a 
 set of key principles to use when designing UX around security choices. We
  will apply these principles to evaluate a popular and high-security workf
 low we use daily — netbanking services. \n\nPreview available here: http
 s://1drv.ms/p/s!Au4kkP8CklsegbYeJeUlN4h1TxyD_A?e=Isr3Yl
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/netbanki
 ng-fails-Q3PM8Jqnyycsj4dsNMx5P6
BEGIN:VALARM
ACTION:display
DESCRIPTION:Why netbanking fails in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds of Feather (BOF) session on Fixing banking UI and UX for pri
 vacy
DTSTART:20210428T090500Z
DTEND:20210428T100500Z
DTSTAMP:20260420T035002Z
UID:session/N8cmKe8Z6LWvKppMDpqPoi@hasgeek.com
SEQUENCE:0
CREATED:20210406T184144Z
LAST-MODIFIED:20210825T071338Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds of Feather (BOF) session on Fixing banking UI and UX for
  privacy in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tea/coffee break - water cooler conversations
DTSTART:20210428T100500Z
DTEND:20210428T102500Z
DTSTAMP:20260420T035002Z
UID:session/Nc2AqncmhVZXM8jqutt7tP@hasgeek.com
SEQUENCE:0
CREATED:20210406T183906Z
LAST-MODIFIED:20210408T084013Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Tea/coffee break - water cooler conversations in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Integrating privacy-preserving analytics into your application
DTSTART:20210428T102500Z
DTEND:20210428T110000Z
DTSTAMP:20260420T035002Z
UID:session/YXJN6frLxWCTmfrucNYJdf@hasgeek.com
SEQUENCE:1
CATEGORIES:Talk scheduled for pre-recording,30-min talk,Technology
CREATED:20210416T063119Z
DESCRIPTION:Analytics is an important part of application development\, an
 d adding them in a privacy preserving manner is challenging.\n\nThis talk 
 will give an overview of the process we went through to integrate analytic
 s into the System Updater\, a very critical component of our Android-based
  operating system\, CalyxOS.\n\nThe Updater is a critical component becaus
 e if you can successfully update a system\, you can eventually fix any bug
 s\, but if the update system itself is broken\, there's no coming back. An
 alytics here are important to let us know if installs failed or succedded\
 , and to get a user count based on the number of updates installed.
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/integrat
 ing-privacy-preserving-analytics-into-your-application-YXJN6frLxWCTmfrucNY
 Jdf
BEGIN:VALARM
ACTION:display
DESCRIPTION:Integrating privacy-preserving analytics into your application
  in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds of Feather (BOF) session: Architecting mobile apps for data 
 security
DTSTART:20210428T110000Z
DTEND:20210428T120000Z
DTSTAMP:20260420T035002Z
UID:session/S7tRAgwZKWt2gkcc5h2oQ5@hasgeek.com
SEQUENCE:1
CREATED:20210408T083901Z
DESCRIPTION:The questions that will be discussed in this session are:\n\n1
 . What are the 2-3 major data security challenges that organizations face 
 with respect to mobile engineering and app development? \n2. Are there fra
 mework and OS limitations with respect to data security security issues an
 d mobile apps/engineering?\n3. How organizations safeguard against vulnera
 bilities? Via tools\, processes and training + building culture? Share pra
 ctical experiences and examples.\n\nThe summary of the session is publishe
 d at https://hasgeek.com/rootconf/data-privacy-conference/sub/security-pra
 ctices-for-mobile-app-development-UM3jcSWkCqAAwtFTGHznBU 
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds of Feather (BOF) session: Architecting mobile apps for d
 ata security in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tea/coffee break - water cooler conversations
DTSTART:20210428T120000Z
DTEND:20210428T121500Z
DTSTAMP:20260420T035002Z
UID:session/EvmXSsyz3fbY7xRW1cZPkQ@hasgeek.com
SEQUENCE:0
CREATED:20210406T184108Z
LAST-MODIFIED:20210422T110116Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Tea/coffee break - water cooler conversations in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds of Feather (BOF) session: Handling data deletion practices i
 n engineering and product
DTSTART:20210428T121500Z
DTEND:20210428T131000Z
DTSTAMP:20260420T035002Z
UID:session/PGHe2gdXMkagU6S3emG3Fa@hasgeek.com
SEQUENCE:1
CREATED:20210420T132139Z
DESCRIPTION:This session will discuss:\n\n(a) flows of information (legit/
 ignorant/malicious\, tracked/untracked)\n(b) guarantees required (soft\, h
 ard)\n(c) controls (and audit of controls)\n(d) architectural principles t
 o simplify this\n(e) process issues (integration with one-trust\, complian
 ce platform providers\; audit trails\; legal reviews)
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds of Feather (BOF) session: Handling data deletion practic
 es in engineering and product in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Summary of learnings from the day\; introduction to Day 7
DTSTART:20210428T131000Z
DTEND:20210428T132000Z
DTSTAMP:20260420T035002Z
UID:session/LdT2Qeq2UNDut7bN2HwS3K@hasgeek.com
SEQUENCE:0
CREATED:20210407T041133Z
LAST-MODIFIED:20210427T122207Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Summary of learnings from the day\; introduction to Day 7 in 5
  minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Theme introduction: Intent\, Process\, People - a framework for pr
 ivacy
DTSTART:20210429T100000Z
DTEND:20210429T101000Z
DTSTAMP:20260420T035002Z
UID:session/Esy89yL7S2CMDXrYoWSi8s@hasgeek.com
SEQUENCE:0
CREATED:20210407T041232Z
LAST-MODIFIED:20210422T110723Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Theme introduction: Intent\, Process\, People - a framework fo
 r privacy in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Round table: Security Incident analysis and reporting
DTSTART:20210429T101000Z
DTEND:20210429T110500Z
DTSTAMP:20260420T035002Z
UID:session/PT88AXKyeby5CUjZeEyDrV@hasgeek.com
SEQUENCE:1
CATEGORIES:Speaker to prepare slides for pre-recording,Round table,TBD - t
 o be decided
CREATED:20210422T110646Z
DESCRIPTION:Hard Questions: Security Incident Analysis\, Reporting and Man
 agement\n\n1. Security incidents are coming to light through dark webs. Ho
 w effective are organizations’ systems in detecting incidents? Where do 
 you think we are having debts?\n\n2. How are companies handling the immedi
 ate need to rotate access keys and credentials that have been compromised?
 \n\n3. How practical is RBI’s rule on reporting security incidents withi
 n 1 hour?\n\n4. What is your take on Controller’s contractual requiremen
 t for Processors (under GDPR) to report security incidents within 24 hours
 ?\n\n5. How effective are organizations in having a list of all customers
 ’ security incidents reporting coordinates?\n\n6. Are companies having a
 dvance contracts (with right NDA and terms and conditions) with regional /
  global Legal and PR advisors for handling security and privacy incidents?
 \n\n
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/round-ta
 ble-security-incident-analysis-and-reporting-PT88AXKyeby5CUjZeEyDrV
BEGIN:VALARM
ACTION:display
DESCRIPTION:Round table: Security Incident analysis and reporting in 5 min
 utes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tea/coffee break - water cooler conversations
DTSTART:20210429T110500Z
DTEND:20210429T112000Z
DTSTAMP:20260420T035002Z
UID:session/Pp4H3cgPViBsJ6N8zMnctB@hasgeek.com
SEQUENCE:0
CREATED:20210407T041541Z
LAST-MODIFIED:20210422T110737Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Tea/coffee break - water cooler conversations in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:AWS Security Best Practice
DTSTART:20210429T112000Z
DTEND:20210429T121500Z
DTSTAMP:20260420T035002Z
UID:session/UyZKknCWpMMt8tJYKSH44s@hasgeek.com
SEQUENCE:1
CREATED:20210422T110746Z
DESCRIPTION:AWS has developed mechanisms & controls to achieve desired sec
 urity posture to meet security objectives\, compliance & regulations. \n\n
 @AWS \, as Security specialists\, we help customer to:\n-	Run their worklo
 ads with desired security posture\n-	Design & operate secure systems\n-	Id
 entify patterns from the field\, understand various controls\, their execu
 tion mechanism\, common pitfalls & various attack scenarios\n-	Providing c
 onsultation with prescriptive guidance\n\nOne of our key work is to help c
 ustomers to understand different threat vectors & their proactive mitigati
 on\n\nWe work to help the security ecosystem grow with infusing different 
 open source & prevalent technologies in security solutions & build securit
 y implementation partners\n\nWe would like to share the field signals & pa
 tterns\, while discussing how to navigate and manage AWS tools and capabil
 ities to prevent security incidents\, design and architect systems leverag
 ing the AWS platform using cloud native & open-source tools
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/aws-secu
 rity-best-practice-UyZKknCWpMMt8tJYKSH44s
BEGIN:VALARM
ACTION:display
DESCRIPTION:AWS Security Best Practice in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tea/coffee break - water cooler conversations
DTSTART:20210429T121500Z
DTEND:20210429T123000Z
DTSTAMP:20260420T035002Z
UID:session/A8rrLzHh8rsXg32pDzRMhK@hasgeek.com
SEQUENCE:0
CREATED:20210407T041916Z
LAST-MODIFIED:20210420T132342Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Tea/coffee break - water cooler conversations in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds of Feather (BOF) session: Personal Data Protection (PDP) bil
 l - are Indian tech companies ready for compliance?
DTSTART:20210429T123000Z
DTEND:20210429T133000Z
DTSTAMP:20260420T035002Z
UID:session/ASCz7bhx9yRoiHWurUQ2Nk@hasgeek.com
SEQUENCE:1
CREATED:20210408T084158Z
DESCRIPTION:The aim of the BOF is to discuss: \n\n1. How much of the exist
 ence compliance infrastructure in your organizations is ready for adaptati
 on to PDP?\n2. Challenges you foresee with respect to operational issues i
 n implementing and complying with PDP? What operational issues have you se
 en from your experiences with doing other compliances - GDPR\, CCPA\, etc.
    \n3. What resources do you think your organizations will need for doing
  PDP compliance - knowledge\, skilling\, budgets\, peer groups?\n
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds of Feather (BOF) session: Personal Data Protection (PDP)
  bill - are Indian tech companies ready for compliance? in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Conclusion: The Way Forward - Privacy Mode Best Practice Guide (BP
 G) contributions
DTSTART:20210429T133000Z
DTEND:20210429T134000Z
DTSTAMP:20260420T035002Z
UID:session/5cbW3YY5ogWioeubk85Xin@hasgeek.com
SEQUENCE:0
CREATED:20210407T042108Z
LAST-MODIFIED:20210422T110520Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Conclusion: The Way Forward - Privacy Mode Best Practice Guide
  (BPG) contributions in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Short break
DTSTART:20210429T134000Z
DTEND:20210429T135500Z
DTSTAMP:20260420T035002Z
UID:session/Tb7nf3DHkK9ctXS9U7kGSr@hasgeek.com
SEQUENCE:0
CREATED:20210422T110529Z
LAST-MODIFIED:20210422T110537Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Short break in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Privacy-tech survey launch
DTSTART:20210429T135500Z
DTEND:20210429T144500Z
DTSTAMP:20260420T035002Z
UID:session/F61bAMK12BMUJDTfQpRT71@hasgeek.com
SEQUENCE:0
CREATED:20210422T110604Z
LAST-MODIFIED:20210825T071413Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Privacy-tech survey launch in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Handling data deletion requests at Hotstar
DTSTART:20210820T083000Z
DTEND:20210820T091500Z
DTSTAMP:20260420T035002Z
UID:session/VmBjZvmF7KkGA3KDe1tWFD@hasgeek.com
SEQUENCE:1
CREATED:20210416T115817Z
DESCRIPTION:In a world where we collect as much user data to make their jo
 urney as personalized as possible\, it’s also important to adhere to com
 pliance requirements where a user can request both deletion (forget) or a 
 dump (access) of their data. As a centralized data-platform team\, this wa
 s a huge challenge for us at Disney + Hotstar. Owning the platform\, while
  various teams owned the data meant that we had to provide a distributed w
 ay for every team to support data-subject requests while coordinating & or
 chestrating it altogether at the same time. In this talk\, we discuss the 
 various approaches we considered & discuss the architecture of handling da
 ta-subject requests that allows us to scale as more systems (as well as th
 e data they use) grow within the ecosystem.
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/may-i-ha
 ve-my-data-please-VmBjZvmF7KkGA3KDe1tWFD
BEGIN:VALARM
ACTION:display
DESCRIPTION:Handling data deletion requests at Hotstar in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:How Personally Identifiable Information (PII) is accessed inside D
 isney-Hotstar
DTSTART:20210820T083000Z
DTEND:20210820T091500Z
DTSTAMP:20260420T035002Z
UID:session/U3dDYSwPhuKJ9KrvErRuTi@hasgeek.com
SEQUENCE:1
CREATED:20210416T114910Z
DESCRIPTION:Core to data-security is the user's personally identifiable in
 formation. As Disney + Hotstar grows internationally\, with increasing com
 pliance restrictions\, we’ve re-architected our entire data-platform to 
 support differing compliance & security requirements. We make the user’s
  personally identifiable information impossible to access unless absolutel
 y necessary. In this talk we discuss how we use masking & filtering while 
 ingesting\, storing and processing data\, and how systems that access data
  for analytics\, personalization\, targeting\, reporting were accommodated
  to fit this new world. We discuss the paradigm shift in approaching the d
 ata from a user’s point of view instead of a use-case point of view
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/data-privacy-conference/schedule/protect-
 the-pie-pii-U3dDYSwPhuKJ9KrvErRuTi
BEGIN:VALARM
ACTION:display
DESCRIPTION:How Personally Identifiable Information (PII) is accessed insi
 de Disney-Hotstar in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
END:VCALENDAR
