next-generation data privacy and security

Upload: ark-group

Post on 02-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/27/2019 Next-Generation Data Privacy and Security

    1/4

  • 7/27/2019 Next-Generation Data Privacy and Security

    2/4

    COLLABORATIVE FORUM l Monday, 23 September 2013

    Combining EA and SOA with BPM strategies

    0 Registration and refreshments0 Chairpersons opening remarks

    Puneet Kukreja, Principal Consultant, Affirm Risk Pty Ltd.;Board Member, AISA National Advocacy Group

    5 The privacy amendment enhanced privacy protection

    What is the amendment and what does it mean for your organisation?

    What are the implications for Australian businesses in general?

    How does the amendment affect your current data protectionpractices?

    Nick Abrahams, Partner & Asia Pacific Technology Practice Leader,Norton Rose Fullbright Australia

    00 Preserving privacy while mining data

    Using data sets for data mining or selling data for mining

    Protecting your data so that confidential individual information is notdisclosed

    Ensuring that the privacy of your clients is not at risk

    Ljiljana Brankovic, Associate Professor, University of Newcastle

    45 Morning refreshments and networking

    00 Taking the IT out of Securitywhy removing technology as the mainfocus to a security program is the next step!

    Taking the IT out of Security what does that mean

    Why we targeted Secure the Human as the most important securityinitiatives of the next 2 years

    Maintaining a dynamic solution

    What our utopia would look likesecurity agnostic to technology

    Angela Coble, Global Manager, Enterprise Security & Risk Management, Johnson & Johnson

    45 The secure foundation for data use: identities and access control

    The paradox of modern information usage: universal access withabsolute confidentiality

    Why data owners struggle to understand the risks

    Protecting the person versus protecting the identity

    Monitoring of access: if you don't do it, someone else will

    John Greaves, Information Risk and Security Manager,QBE Insurance Australia

    30 Networking lunch ( Please let us know two weeks prior of any dietary requirements)

    0 Privacy by designUnderstanding the importance of implementing privacy early on

    Ensuring privacy is proactive and not reactive

    Embedding privacy in all parts of the information life cycle

    Alan Duncan, Director of Data Governance,University of New South Wales

    2:15 Spatial Data security and Privacy: Local government sector case studyPrivacy issues in public display

    Data distribution and data licensing

    Creating effective metadata tags

    Online mapping and the risks

    Jonathan Roach, Spatial Information Systems and Public Sector Professional

    3:00 Afternoon refreshments and networking

    3:15 Policy settings for security and privacyDigital Information Security Policy: Government perspective

    Protecting privacy and security in the context of cloud, big data, opendata

    Best practice in achieving optimal legal and policy settings

    Case studies and examples from the NSW experience

    Ivor King, Senior Policy Officer, Strategic Policy,Department of Finance & Services

    4:00 Maintaining information privacy and security in big data, cloud andsocial networks: Interactive session

    The security challenges with new technologies

    Ensuring governance to protect unstructured data

    Analysing how big data can be protected within the organisation

    Leveraging the value of Big data sets while maintaining privacy rights

    Protecting data sets and ensuring the customers privacy: Ensuringuser privacy and building anonymity

    Puneet Kukreja, Principal Consultant, Affirm Risk Pty Ltd.;Board Member, AISA National Advocacy Group

    4.45 Closing remarks by chair

    5.00 End of forum

    The advancement of big data, social media and new technologies create immense opportunities for businesses to innovate and developusiness advantages. However, grappling with such huge volumes of data puts enormous pressure on organisatons to manage contentensitively and protect data.

    Due to the nature of the information being generated and divulged, there is a superior need for data security and privacy from all stakeholders.With the push from national government towards increased information security compliance and the new privacy amendment coming into forcen March 2014, businesses need to understand what the implications are, and successfully achieve due compliance in a cost-effective way.

    This one day interactive forum provides an in-depth look at building and adapting your existing data foundations and ensuring privacy andecurity of your data warehouse.

    Next-Generation Data Privacy and Security

    P r i v a c y b y D e s i g n

  • 7/27/2019 Next-Generation Data Privacy and Security

    3/4

    POST- FORUM wORkShOPSTuesday, 24 September 2013

    About the workshop:Recent changes in legal frameworks and increased authority of the InformationCommissioner have put additional onus on organisations to implement robust DataManagement practices, although the process of compliance can seem costly andwithout benefit. Meanwhile, adopting a holistic approach to Data Governance canhelp you derive maximum business value from your organisations data assets, whilemaintaining data security and achieving regulatory compliance in a cost-effectivemanner.

    This interactive workshop will explore: The capabilities required for an Enterprise approach to Data Governance. The implications of regulatory requirements for privacy, security and

    openness. The relationship between Data Governance and Information Security. Achieving compliance in a cost effective manner as a by-product of

    improved business process.

    About the workshop leader: Alan D. Duncan is Director of Data Governance atUniversity of New South Wales, Australia and anevangelist for information and analytics as enablers ofbetter business outcomes.

    An executive-level leader in the field of Information andData Management Strategy, Governance and Business

    Analytics, he has over 20 years of international business experience,working with blue-chip companies in a range of industry sectors. Alanwas named by Information-Management.com in their 2012 list of Top 12

    Data Governance gurus you should be following on Twitter..

    Registration: 8.30 amWorkshop starts: 9.00 am

    Workshop ends: 12.00 pm

    Facilitated by: Alan Duncan, Director of Data Governance,University of New South Wales

    Registration: 12.30 pmWorkshop starts: 1.00 pmWorkshop ends: 4.00 pm

    Facilitated by:

    Joel Camissar, Practice Head, Data Protection & Privacy, McAfee & Kenneth

    Pang, Manager, Content Security Consulting, Content Security

    About the workshop:

    A

    B Guide Your Organisation to take Reasonable Steps to Protect PersonalInformation through a Practical Privacy Maturity Model

    Best Practice Data Governance and Privacy:Ensuring Data Governance for Effective Data Privacy and Security Measures

    About your workshop leaders: Joel Camissar manages McAfees dataprotection business the companys fastestgrowing practice across Asia Pacific. Heleads a cross-functional team and works withsome of the largest companies in the region totranslate business requirements into technical

    solutions that deliver rapid time to value.Camissar has more than 15 years experience in the IT sectorhaving held a range of senior roles with ArcSight, Websense,Trend Micro, MIMEsweeper and Gateway.

    Kenneth Pang manages Content Security's consulting team.He and his team provide security advisory services to assistcompanies in implementing industry best practices, and tomeet regulatory and industry compliance standards. Kenhas been working in IT Security since 1997, and has workedacross many different industries with consulting firms such asIBM, EDS, Dimension Data, and Trend Micro.

    Do you feel daunted with how to take the Privacy Amendments and turn them intopractical improvements by March 2014?

    To assist in this process, the Office of the Australian Information Commissioner (OAIC)has published a Guide to Information Security Reasonable steps to Protect PersonalInformation.

    Attending this workshop will give you practical insights on what reasonable stepslooks like. Participants will leave with a Model that can be used internally to assess howmature your organisation is in Privacy and Data Protection, along with practical stepsthat you can take to achieve compliance by March 2014.

    The content of the workshop will cover:

    A Privacy Optimisation Model How does your organisation rate: Reactive,Compliant, Pro-active or Optimised?

    How to create a compelling business case for privacy and engage withbusiness stakeholders

    Using the OAIC Guide to Information Security to review and improvetechnology controls

    How to create and run an education and awareness campaign to changeemployee behaviour

    Beyond March 2014 how to leverage a privacy program to reduce risks ofIntellectual Property leakage and aid with PCI Compliance.

    WARNING: The workshop will be highly interactive with participants workingin small teams to contribute to the modules above

  • 7/27/2019 Next-Generation Data Privacy and Security

    4/4

    Prici g circle c oice

    w ole Eve t Forum a d O e wor s opA or B

    Forum o ly wor s opsA or B

    Sta dard Prici g q save $200$2185 + GST =$2403.50

    q save $100$1590 + GST = $1749

    q $995 + GST = $1094.50 q $695 + GST = $764.50

    Ea d (exp: 30/08/2013)Not valid with any other offer

    q save $300$2085 + GST = $2293.50

    q save $200$1490 + GST = $1639

    q save $50$945 + GST = $1039.50

    q save $60$635 + GST = $698.50

    Mem e o e(exp:30/08/2013)I am a member of an organisationsupporting this forum Not valid withany other offer

    q save $400$1985 + GST = $2183.50

    q save $300$1390 + GST = $1529

    q save $150$845 + GST = $929.50

    q save $100$595 + GST = $654.50

    Even ven e and a ommoda on

    Preferential rates are available at the Sebel Surry Hills, Sydney.

    Please contact the hotel directly to make your reservation,

    quoting Ark Group Australia as your reference.

    The Sebel Surry Hills, Sydney

    28 Albion Street

    Surry Hills NSW 2010

    (02) 9289 0000

    http://www.sebelsurryhills.com.au/

    Sponso sh p o E h on Oppo n es

    If you are interested in sponsoring or exhibiting at this event

    please contact Ark Group Australia on:

    Phone: 1300 550 662

    Email:[email protected]

    Next-Generation Data Privacy and Security23-24 September 2013 Sebel Surry Hills, Sydney Australia

    Delegate Name Job title Email address

    1st

    2nd

    3rd

    4th

    Bookings can be submitted at any stage prior to the1.event, subject to availability. A limited allocation is beingheld and booking early is therefore recommended. Inthe event of the booking not being accepted by ArkGroup Australia the total amount will be refunded.Payment must be received in full prior to the course.2.

    All speakers are correct at the time of printing, but are3.

    subject to variation without notice.If the delegate cancels after the booking has been4.accepted, the delegate will be liable to the followingcancellation charges:

    Cancellations notified over 45 days prior to the eventwill not incur a cancellation fee.In the event of a cancellation being between 45 and30 days prior to the event, a 20% cancellation feewill be charged.

    For cancellations received less than 30 days prior tothe event, the full delegate rate must be paid and norefunds will be available.

    All bookings submitted by e-mail, fax, or over the5.telephone are subject to these booking conditions.

    All cancellations must be received in writing.6. Ark Group Australia will not be held liable for7.

    circumstances beyond their control which lead to thecancellation or variation of the programme. All bookings, whether Australian or overseas will be8.charged Australian GST at the prevailing rate at thetime of booking.Delegates are responsible for their own travel,9.accommodation and visa requirements.

    We occasionally allow reputable companies to mail details of products we feel may be of interest.If you do not wish to receive this service, please tick this box q

    Please note: Payment must be received in full prior to the event to guarantee your place

    o Payment enclosed (Cheques should be made payable to Ark Group Australia Pty Ltd)o Please invoice me

    I have read and accepted the booking conditions

    Signature

    E072

    Expiry date

    Cardholders name

    Cardholders signature

    Boo i g co ditio s

    o Mastercard o Visa o American Express

    OrGANiSAtiON NAME

    POStAl ADDrESS

    StAtE POStcODE

    fAx PHONE

    Put yOur DEtAilS HErE (PlEASE PriNt):

    Card number

    wAYS TO BOOk YOUR PL ACE AT ThIS EVE nT HONE: +61 1300 550 662 fAx: +61 1300 550 663 EMAil: [email protected]

    OSt: Send the completed registration form to Ark Group Australia Pty Ltd, Main level, 83 Walker Street, North Sydney, NSW 2060

    +61 (02) 8913 4000 +61 (02) 8913 4099 WEb: www.arkgroupaustralia.com.au

    SO-WEB