Online Content 2016

We recorded nearly 70 sessions that were held at the main Privacy+Security Forum event on October 25-26, 2016. If you missed sessions you wanted to attend you can now access them via our recordings. If you did not attend the event, you can see as much of it online as you want. You will receive online access to all the archived content, about 70 sessions at the event, for a period of 6 months.

Purchase Online Content 2016

Speaker or Attendee

Non-Speaker or




Includes faculty, students, and administrators in educational institutions




3 or more licenses – 25% discount
6 or more licenses – 35% discount

Recorded Sessions 2016

A Deep Dive into Hot Topics in Healthcare Privacy
Addressing the Threat to Large Organizations from Data Protection in Small and Medium Enterprises (SMEs)
Agreements Involving PHI
Are Good Security Measures Always Good for Privacy? A Discussion of NIST Frameworks
Assessing Cyberinsurance Policies: The Good, the Bad and the Ugly
Beyond FERPA: What California and New York Require of EdTech Providers
Big Data and Discrimination
Breaking Glass Ceilings: Executive Women in Privacy and Security
Class Action Litigation: Privacy, Data Breach, and the TCPA
Comparative Global Privacy and Security Enforcement
Compliance and the Cloud
Computer Crime: New Developments
Connected Healthcare Devices
Current and Future HHS Initiatives in Health Privacy
Cyber Insurance: How It Works, How to Select a Policy, and Emerging Trends and Practices
Data Monetization
Data Privacy, De-Identification and PII: Using De-Identification Best Practices to Preserve Data Quality While Preventing Re-Ide
Data Protection and Privacy in Latin America
Dealing with Risk
Digital Advertising Self-Regulation: A Comparison of Approaches
Dramatizing Privacy and Security
Ethics in an Automated and Trackable World
Eyes in the Skies – Drone Privacy
Future Trends in Privacy and Security
Global Data Security: A Comparison of Laws
Government Access to Personal Data
HIPAA Business Associates: Advanced Challenges and Compliance Strategies
Image Recognition Technology: Privacy and Security Issues
Japanese Privacy and Data Protection Law
Managing Personal Data in a Changing EU Privacy Regime
Managing Security Vulnerabilities: The Communications Imperative
Native Advertising
Non-HIPAA Health Data
Notice, Choice, and Design
Obtaining Consent and Complying with Age Requirements in the GDPR and COPPA
Operationalizing Genetic Privacy: Industry Perspectives
PIA Assessment Scenario Exercise
Preparing for Critical Infrastructure Cyber Attacks
Preparing for the GDPR: Attaining and Demonstrating Compliance
Privacy and Data Security Harms and Standing
Privacy and Security in the Employment Relationship
Privacy and Security Risk: Theory vs. Practice
Privacy Impact Assessments: An Agile Methodology
Privacy Implications of Retail Tracking
Privacy’s Blueprint: How Should the Law Regulate Privacy by Design?
Protecting Knowledge Assets
Regulating the Internet of Things and Big Data: The Role of the FTC
Responding to Healthcare Data Breaches: The Need for Special Response Measures
Scoping Privacy Engineering Requirement: A Workshop on Turning Policy into Design
Securing IoT: Think Outside the Wall
Security Standards Across Sectors
Security vs. Security: Encryption and Law Enforcement
Surveillance Law in the US and EU
The Arc of a Data Breach
The Effect of Privacy and Security on Business Valuation
The Fair Credit Reporting Act; 45 Years of Lessons from the World’s First Fair Information Practice Statute
The FCC’s Privacy and Data Security NPRM and the Internet Ecosystem
The FTC CID Demystified
The GDPR and Technology
The GDPR’s Data Protection Officer (DPO)
The Law of Connected Devices: Privacy and Litigation Risks
The Privacy Shield: a Bright or Dismal Future?
The Relationship Between Privacy and Security
The Science of Measuring Risk: Using Insights from Cyber Insurance Underwriting to Improve Risk Management
The Use of Privacy Enhancing Technologies (PETs)
Vendor Management: Three Sides of the Coin
Will Member State DPA’s Still Matter? National Law after the GDPR