August 21 - 23, 2019
Marriott Georgetown, Washington, DC
Dr. Nnake Nweke PhD,JD, Chief Risk Officer at United States Agency for Global Media
United States Agency for Global Media Logo

Dr. Nnake Nweke PhD,JD


Chief Risk Officer
United States Agency for Global Media

Day One: Wednesday, August 21, 2019

Wednesday, August 21st, 2019


1:30 PM Overcoming Security Challenges Created by the Internet of Things

The sheer number of connected devices continues to grow and with it so do the security challenges. Powered by the convenience and benefits the Internet of Things (IoT) can deliver; the devices continue to permeate all aspects of enterprise and personal existence without necessarily concerns over potential consequences and related security and privacy concerns. Hackers continue to deploy sophisticated attack methodologies to bypass existing security measures. Common attacks include: ransomware, which prevents the legitimate user from accessing a device or network and malware which infects known device vulnerabilities.

In this session explore:

  • Gaining visibility and classifying all connected devices
  • Detecting real-time alerts about cyber attacks
  • Instilling proactive prevention including micro-segmentation of the enterprise network

Day Two: Thursday, August 22, 2019

Thursday, August 22nd, 2019


9:40 AM Embracing the Privacy Imperative- Navigating Regulations and Requirements

Companies must navigate complex and rapidly evolving data privacy regulations and compliance requirements. Various state, national and global regulations along with high profile breaches have made consumers look deeper at which data they share and with whom. The panel will explore the evolving patchwork of privacy and security regulations and how they affect big data, Artificial Intelligence, advertising and litigation.  In this discussion, explore the emerging world of privacy with data as a currency. Look at who owns and controls the flow and use of data.  This session will discuss planning, preparedness and response to evolving compliance requirements including operational, strategic and proactive communications.
 
In this session:
 
·         Integrating privacy by design
·         Empowering privacy in enterprise risk management
Determining which state regulations to apply