Post Job Free

Resume

Sign in

Data Protection Information Security

Location:
North Brunswick, NJ
Posted:
March 13, 2024

Contact this candidate

Resume:

Doug Knehr

JD, MBA, BS, CISSP, FIP, CIPM, CIPP/US

* **** ***., ******* ****, NJ 08824

609-***-**** ad4a7h@r.postjobfree.com https://www.linkedin.com/in/doug-knehr/ Portfolio: https://dougknehr.wordpress.com/

Differentiators:

Information Security + Privacy + Governance

CISSP + (IAPP- FIP, CIPM, CIPP + AI Certs -Governance) + (Expertise gained at 8 Multinational orgs)

Of the 5 common CISO archetypes for this role, (Executive, Engineer, GRC Guru, Technician and Builder), I am a GRC / Builder and cross-functional governance driven CISO/DPO/CPO SME. I have a 9-time proven ability to scale cybersecurity, privacy, data protection and AI governance programs in harmony, at scale, across 100+ countries to 36,000+ employees. Whereas most individuals have not had the benefit of learning lessons from working in 9 global enterprises or whereas they have been restricted to interpretation to the detriment of operationalizing, or have had no cross-functional exposure as CISO, CPO, DPO, Sr. Cybersecurity SME, and have been limited by jurisdiction and a single technology footprint, I however have built and matured 8 privacy, information security GRC and AI governance programs without breach, and assisted 1 global enterprise, specifically for post-breach work. My unique cross functional expertise has been delivered for the entirety of the c-suite ( GCs, CPOS, DPOs, CIOs, CTOs, CDOs and CISOs).

Strengths: Operationalizing Cyber Risk, Information Security Governance, Privacy-Data Protection, Insider Threat, Incident Response, AI

prompt engineering and risk identification, Generative AI Model Considerations & Vulnerability reviews

Security & AI framework : NIST AI Risk Management Framework, NIST 800-53, ISO 270**-*****, 27701:2019, NY Shield, NYDFS 500, OWASP,

NERC, Breach and Attack Simulation MITRE ATT&CK framework

Privacy framework expertise: EU(GDPR + EU regs), USA (CCPA, CPRA, VCDPA, UCPA), PCI, CAN-SPAM, TCPA, CASL, Privacy Shield, HIPAA

Privacy Tooling expertise: GRC: Archer, Metric Stream, ZenGRC, Unified Compliance Framework, OneTrust, Nymity TrustArc, DPOrganizer, Integris, BigID

Security & Data Protection Tech:BIGID, Microsoft Cloud Access Security Broker (CASB), QRadar, Radarfirst, Alation, Microsoft O365 Safety & Compliance Center, Azure Rights Management, Microsoft Purview and MS data protection technologies, Splunk, Sumo Logic

EDUCATION

Degree-JD, School-Stetson (Doctoral Degree)

Degree MBA, School-Rutgers Graduate School of Management

Degree-BS, School-Rutgers University Cook College, NJ

Trainings-See Complete list of 260+ security, privacy & AI trainings attached

CERTIFICATIONS & LICENSES

Security Certifications:

Certified Information Security System Professional (CISSP) 2015

Privacy Certifications:

IAPP-Fellow of Information Privacy (FIP) 2017

IAPP-Certified Information Privacy Manager (CIPM) 2014

IAPP-Certified Information Privacy Professional (CIPP/US) 2014

Licensed :

New Jersey Bar (1999)

DC Bar (2019)

Certifications & Training In Progress

OneTrust: Assessment Automation Expert

OneTrust: Consent & Preference Management Expert

OneTrust: Data Mapping Expert

OneTrust: Data Discovery Expert

OneTrust: Assessment Automation Expert

OneTrust: Data Subject Requests Expert

OneTrust Incident Response Expert

Certified Cloud Security Professional (CCSP)

Certified Ethical Hacker (CEH)

SumoLogic Training

AI Certs

AI GOVERNANCE DATA PROTECTION TRAINING AREAS

001.01.00-GEN AI FOUNDATION MODEL CONSIDERATIONS

001.01.01-Generative AI Use Cases

001.01.02-Question About Foundational Model

001.01.03-Privacy or Intellectual Property.

001.01.04-Data Availability.

001.01.05-Quality & Accuracy.

001.01.06-Effort to build

001.01.07-Security

001.01.08-Costs

001.01.09-Committees

001.03.10-Day-to-day usage

001.05.00-GENAI-SOFTWARE USING GENERATIVE AI

001.05.01-Use Case-Reputation Mgmnt

001.07.00- LIFECYCLE OF GENERATIVE AI PROJECTS

001.07.01-Stages

001.07.02.01-Improvement Processes Highly empirical (experimentative

001.07.02.02-(Improvement Processes)-RAG (Retrieval augmented generation)

001.07.02.03-(Improvement Processes)-Fine Tuning

001.09.00-ALGORITHMIC SYSTEM CONSIDERATIONS (005)

001.09.01-Design Considerations

001.09.03-Data Considerations

001.09.05-Development

001.09.07-Deployment

001.11.00-Task Analysis Of Jobs

001.11.01-Automation opportunity identification

001.11.03-Augmentation vs Automation

001.90.00-TEAMS TO BUILD GENERATIVE AI SYSTEMS

010.00.00-VULNERABILITIES, RISK & MITIGATION CONSIDERATIONS

010.01.00-GENERAL AI RISKS

010.01.01-Data Poisoning:

010.01.02-Model Theft:

010.01.03-Transparency, and Accountability

010.01.041-Bias and Discrimination:

010.01.042-Bias and Discrimination-Possible bias during RLHF (Reinforcement L...

010.01.05-Model Security:

010.01.06-False Results, aka AI “Hallucinations”

010.04.00--LEGAL RISKS

010.04.01-GDPR-Right To Erasure

010.04.02-Algorithmic Disgorgement & Destruction

010.05.00-CYBER SECURITY RISKS

010.05.01-(CyberSec Risks)-PROMPT MODEL VULNERABILITIES

010.05.01.01-Injection Risk

010.05.02-AI Attack Tactics & Techniques

010.07.01-Mitigation -Training Tactics- Reinforcement Learning From Human Fee...

010.90.01-CYBERSECURITY TOOLING

040.00.00-LLMs

040.01.00-LLMS - Generating Text using LLMS

040.02.00-LLM Potential Tasks (Not definitive)

040.03.00-LLM Limitations

040.04.00-How LLMs Follow Instructions

040.05.00-CHOOSING AN LLM MODEL

040.05.01-Model Size

040.05.02-Closed Source or Open Source

040.07.00-TOOL USE AND AGENTS VIA SOFTWARE

040.90.00--PROMPTING TIPS FOR LLMS

050.00.00-Image Generation (Diffusion Model)

060.00.00 Artificial General Intelligence

AWARDS

DPO Group Avanade 2019 Data Protection Officer Rockstar Award

CISO Group Avanade 2019 CISO Incident Response Superhero Award

EXPERIENCE

Position : Cybersecurity Post Incident SME (Contract)

Company: Infosys Ltd

Dates: January 2024 to March 1, 2024

Location: City-Remote, State-NJ

Advising during 3-month period focused on post-breach crisis management

Managing data subject notifications, CISO and enterprise communications, direct client notifications

Advising on cyber litigation and privacy data breach driven SLA and contract claims and notification strategies

Contributing to knowledge needed for attorney general, regulator and securities exchange interactions

Management of forensics reporting artifacts and related disclosure strategies

Position: Cyber Risk, Compliance, and Data Privacy SME To GC, Compliance, CISO (Contract)

Company: Yahoo

Dates: January 2023 to December 2023

Location: City-Remote, State-NJ

Lead 95+ teams over 1 year to mature/establish a data protection controls GRC program via an enterprise-wide impact assessment effort across Yahoo

Developed customized cyber risk reduction and data protection privacy engineering advisory across the Yahoo technical ecosystem with particular emphasis in data science, ML, AI systems

Continuous Improvement SME served as the subject matter expert (SME) collaborating with Legal, Compliance, CISO and AI/Analytics teams to mitigate privacy and data protection engineering control risk.

Position: Data Protection Officer-(Interim)

Company: Lucira Health (Medical Device Startup) Dates: May 2022 to August 2022

Location: City-Remote, State-NJ

Implemented a global information security and data protection privacy program from the foundation.

Managed the drafting of global Data Transfer Addendums, Standard Contractual Clauses, Privacy Statements, and Cookie Notices.

Managed multi-country outside counsel and provided product counseling for the multi-country launch, ensuring compliance with NIST, ISO and local data protection security frameworks and alignment with HIPAA, GDPR, CCPA, PIPEDA.

Counseled product security and privacy for multi country launch

Served as the sole data protection security expert, creating budgets, and operationalizing various heavy lift initiatives, including:

DLP (Data Loss Prevention) implementation.

Acting as a Microsoft Data Protection Subject Matter Expert (SME) and utilizing data protection technologies.

Implementing MCAS (Microsoft Cloud App Security) privacy measures.

Conducting data discovery and managing SIEM detection for insider threat data protection.

Establishing GRC (Governance, Risk, and Compliance) foundational programs and a WISP (Written Information Security Program).

Addressing security obligations under Standard Contractual Clauses and distributor agreements.

Conducting HIPAA Security Risk Assessments and utilizing MS and AWS Safety and Compliance technologies.

Providing expert guidance to a 300-person company on NIST, ISO 27001, GDPR, CCPA, CPRA, PIPEDA, HIPAA, and local privacy and data protection laws.

Developing and operationalized privacy program, and budget including:

Incident response program.

ROPA (Records of Processing and Inventory) program.

Cookie technology program.

Consent and preference management program.

Individual Rights Response program, including DSAR (Data Subject Access Request) lookup methodology.

Privacy and data protection research program.

PIA/DPIA (Privacy Impact Assessment/Data Protection Impact Assessment) assessment automation and mitigation efforts.

Data mapping and data flows.

Privacy program product launches.

Established both CPO (Chief Privacy Officer) and DPO (Data Protection Officer) offices.

Ensured accuracy of security representations in global data transfer addendums.

Drafted legal documents for lawful transfer mechanisms, including SCCS (Standard Contractual Clauses), DTA (Data Transfer Agreements), and DPPs (Data Protection Provisions).

Implemented a retention program (technology and methods).

Utilized Trust Arc and OneTrust

Generated Alation data catalog.

Provided guidance to various business groups on privacy concerns.

Utilized Big ID for data discovery and policy generation.

Position: Data Protection Privacy Subject Matter Expert (SME) to CIO & GC (Contract Advisory)

Company: The Clorox Company

Dates: April 2021 to March 2022

Location: City-Remote, State-NJ

Data Protection Privacy

Advised the complete rebuilding of the data protection and privacy program in Target Process Online.

Served as the sole data protection and privacy SME, focusing on maturing the technical implementation and engineering underpinning of privacy and data protection within Target Process models.

Implemented data protection privacy processes as an SME and (effectively as Chief Privacy Officer (CPO) in absence of a CPO), including the Privacy Operating Model.

Drafted policies, standards, and controls that integrate privacy with information security and data protection controls for the CTO, GC, and CISO teams

Position: Cyber Risk Privacy Subject Matter Expert-(SME To CISO (Contract Advisory))

Company: Mondelez International

Dates: July 2020 to February 2021

Location: City-Remote, State-NJ

Cyber Risk

Developed cyber risk governance maturity modeling (COSO) and risk quantification for the CISO and Board of Director committees

Drafted policies, standards, and controls for the security program.

Privacy

Control SME -Advised and participating in the complete rebuilding of the data protection privacy program at the domain and control level.

Matured an international security and privacy program for the CISO by developing innovative standards, controls, procedures, and metrics that implemented a global privacy framework tied to data security frameworks, resulting in a comprehensive program tailored to the organization.

Created innovative Schrems II solutions by leveraging unique security and privacy framework GRC (Governance, Risk, and Compliance) methodologies.

Advised on the launch of a consent and preference management platform and maturing the Incident Response program.

Drafted policies, standards, and controls for the privacy program.

Position: Chief Privacy Officer And Data Protection SME ((Interim)Contract Advisory)

Company: Acoustic (Ad Tech MarTech)

Dates: December 2019 to January 2020

Location: City: New York City, State-NY

Strategized for the post-acquisition design of a global privacy program at a start-up Adtech (purchased by a private equity firm) focusing on drafting and implementing controls aligned with ISO 27001, CCPA (California Consumer Privacy Act) and GDPR (General Data Protection Regulation) requirements.

Position: Information Security Privacy SME to CISO, DPO, GC

Company: Avanade Inc.

Dates: February 2018 to December 2019

Location: City-Remote, State- NJ

Key Achievements: SME to 24 country privacy data protection program for CISO & GC-1 of 3 privacy and data protection counsel to 36,000 employees

Awards: 2019 Data Protection Officer Rockstar Award

2019 CISO Incident Response Superhero Award

Information Security, Cyber Risk & Incident Response

Advised CISO and GC on security frameworks, risk assurance as a SME and counsel for 24 subsidiary entities

Approved crisis management escalation handling for CISO

Guiding the CISO, GC and DPO to integrate GDPR data protection, privacy and cyber security regulatory operational and risk framework requirements into operations.

Led cyber wargaming tabletop exercise planning

Resolved privacy and organizational cyber risk incidents internationally for incident response / breach response

Provided expert advice across all major departments international data protection events (incidents) across 24 countries

Risk Assurance and GRC

Expert development of 24 country GRC information security program -1 of 3 SMEs (Small Team Greenfield Launch expertise)

Expert in information security GRC and Privacy GRC (ZenGRC, Archer, Metric Stream, UCF)

Policy, standard, control drafting for security program

Leveraged ISO27701-2019 and Microsoft expertise to design jurisdictionally relevant governance rules including the use of Azure rights

management and O365 Safety & Compliance center

Designed privacy and information security by design control sets including within cloud environments

Purple Team type cross functional expert between CISO, DPO, GC (Advised on penetration testing standards and red team / blue team efforts)

Resolved application security control issues and cloud OWASP resolution, especially within incident response handling

Compliance Center controls to effect international data protection governance across 23 countries

Built WISP (written Information Security Program) and data protection plans globally

Threat modeling guidance involving the Mitre Attack framework

Provided guidance on insider threat and detection/deterrents

Recommending technology and technology revisions based on operational, legal and contractual requirements to meet international cyber security and data privacy GRC needs

Implemented technologies as SME (Data Protection, Consent, Encryption, Privacy Tracking)

Privacy Operations & Advisory

Directly advised CISO, GC, DPO and all business units on privacy and data security frameworks – Significant Operational Expertise

Expert development of 24 country Governance Risk Compliance (GRC) privacy program -1 of 3 SMEs (Small Team Greenfield Launch expertise)

Directly advised DPO, GC and CISO on operational privacy initiatives

Expert in GDPR, CCPA, ISO 27701:2019, NIST 800-53, NYDFS and a variety of global privacy and data protection frameworks

Privacy and data protection expert across EU and Americas negotiating and drafting commercial contracts including terms and conditions governing consumer data

Worked daily with product and security engineering teams proactively managing privacy and data protection legal risk

Guiding Data Protection and GDPR (General Data Protection Regulation) strategy implementation teams

ZenGRC, Onetrust, Nymity, TrustArc, SME. Significant expertise across a variety of data protection technologies.

Application of privacy-by-design principles, conducting and documenting privacy assessments, including data privacy impact assessments (DPIAs), legitimate interest assessments (LIAs), international data transfer adequacy assessments, and inbound and outbound privacy and security due diligence.

Created a 24 country jurisdictionally relevant trigger set against GDPR, CCPA, NIST, ISO to effect PIA, DPIA, DPbD

accounting for local country regulation, and the latest jurisdictionally relevant regulatory guidance

Due diligence reviews of regular flow-down assessments within privacy and information security domains to hold processors and sub-processors in compliance against negotiated terms,and served as data privacy expert to ensure flow-downs are current against global regulatory requirements.

Filtered the present state of data protection capabilities with the development of data protection protocols to baseline capabilities and rationalize the same against operating jurisdictions to enhance the speed of the contracting process and reduce compliance risk.

Utilized security monitoring tools, data discovery tooling, data classification tooling to meet privacy regulations and cyber regulatory regulations

Preparation to present security tooling to works councils

Privacy Data Protection & Drafting

Drafted consents, privacy notices, data transfer agreements and other documents for lawful transmission of data.

Drafted Legitimate Interest Tests, PIAs(Privacy Impact), DPIAs (Data Protection Impact Assessments)(including multi country implementing law compliance)

Policy, standard, control drafting for privacy program

Advised on BCR (Binding Corporate Rules), SCC (Std Contractual Clauses)

Modifying legal agreements (DTAs, Model Clauses, Contract Addendums, Notices, Policy)

Contract drafting of data protection protocols, MSA clauses with focus on privacy and security

Creating technologies internally to effect compliance and data protection regulation globally within the organization

Position: Chief Information Security Officer(CISO) and Director Information Security Governance (Dual Interim)

Company: Santander Holdings USA & Santander Securities LLC

Dates: August 2017 to January 2018

Location: City-Holmdel, State-NJ

DUAL INTERIM ROLES

Designed an information security governance, risk, and compliance program embedded into the 1st Line of Defense for six entities across the USA.

Presented information security governance findings to the Board of Directors at the holding company.

Operationalized data protection efforts within the 1st Line of Defense.

Embedded NYDFS (New York Department of Financial Services) regulations, Privacy by Design principles, and data protection regulations such as GDPR (General Data Protection Regulation), GLBA (Gramm-Leach-Bliley Act), DPbD (Data Protection by Design), state data protection laws, breach notification requirements, data destruction regulations, financial health industry security, and privacy regulations into the 1st Line of Defense.

Served as the Interim CISO for Santander Securities LLC.

Position: Information Security Privacy SME to CISO, DPO, GC

Company: Avanade Inc.

Dates: May 2016 to August 2017

Location: City-Remote, State-NJ

Key Achievements:

Implemented and matured incident response platform to integrate privacy and information security.

Implemented and matured a GRC platform

Implemented and matured a Written Information Security Program

Designed a privacy program based on GDPR capable of meeting international data privacy regulatory changes across 23 countries.

Implemented from green fields a GDPR and International Data Protection privacy program advising across 23 countries

Matured SDLC and security assurance efforts (emphasis on pen testing standards)

Led CISO audits across ISO 270**-*****, NIST 800-53 and various NIST control docs, Sans CSC, HIPAA security and privacy controls

Served in both a privacy counsel and senior information security officer capacity for the CISO and GC depts across 23 countries

Advised on technology, privacy and information security aspects for contract matters including Master Services Agreements, Vendor Agreements, Professional Services Agreements, Work Orders / SOW's, Software Licensing Agreements, Non-Disclosure Agreements

Reviewed and reduced cyber risk internationally across WISP (written Information Security Program) including but not limited to SOC, breach management, pen testing procedure review, Disaster Recovery, NIST/ISO framework audit and cyber risk review of broad CISO activities

Designed 23 country GDPR program

Advised on Penetration testing standards

Assessed privacy and information security controls, including BCR (Binding Corporate Rules), SCC (Standard Contractual Clauses), security monitoring tools, security tools legal requirements, privacy regulations, and cyber regulatory regulations, and rationalized them against works council requirements, international and domestic laws, and operational requirements.

Implemented international privacy and cyber regulatory requirements for international incident and breach response

Recommended based on operational, legal and contractual requirements the technology to meet international cyber security data privacy

Guided the CISO and GC suite to integrate GDPR privacy and cyber security regulatory operational and frameworks into operations.

Provided expert advice across all major departments regarding cyber regulatory risk

Position: Information Security Privacy SME (Contract )

Company: DTCC

Dates: July 2015 to December 2015

Location: City-Jersey City, State-NJ

Consultant and counsel providing advice on information security, data privacy, and cyber risk across more than 18 foreign jurisdictions, including the European Economic Area (EEA) and the USA.

Generated technical cyber risk and information security metrics, Key Performance Indicator (KPI) reports, risk data, and enterprise-wide cyber risk reduction strategies.

Provided consultation and counsel on cyber IT controls and data privacy controls.

Supported the development of a data privacy strategy, data transformation roadmap, and long-term strategic priorities for cyber risk reduction through information security and data privacy data transfer initiatives.

Consulted on the revamp of a multi-organization, multi-country information protection and data privacy department, including areas such as vendor management, privacy policy, charter, and daily privacy counseling.

Advanced global cyber security governance by conducting security risk assessments, identifying threats, establishing global reporting systems and procedures for risk, creating training and awareness plans, and integrating risk reporting matrices.

Contributed to cyber investigations, forensics, risk trend analysis, vulnerability exercises, and addressing security operations center (SOC) issues that filtered into the General Counsel's office.

Addressed security awareness, encryption concerns, network security, vendor protection, data protection, and privacy matters.

Engaged in significant international cyber security and data privacy work for numerous business units, from framework development to risk assessment, and provided board-level recommendations.

MEMBERSHIPS / ASSOCIATIONS: ISC, IAPP, RUTGERS MBA, STETSON

Douglas S. Knehr,JD, MBA, BS, CISSP,FIP, CIPM, CIPP

ad4a7h@r.postjobfree.com M: 609-***-****

CISSP -2015 CERTIFIED INFORMATION SECURITY SYSTEM PROFESSIONAL

FIP -2017 FELLOW OF INFORMATION PRIVACY

CIPM -2014 – CERTIFIED INFORMATION PRIVACY MANAGER

CIPP – 2014 – CERTIFIED INFORMATION PRIVACY PROFESSIONAL

JD – 1999 - STETSON LAW ALUMNI

MBA – 1994 - RUTGERS GRADUATE SCHOOL OF MANAGEMENT ALUMNI

BS- 1992 RUTGERS

https://www.linkedin.com/in/doug-knehr/ https://www.DougKnehr.Wordpress.com

Training Outside of work

2014-2024

1

CIPM Certified thru IAPP

2014

2

CIPP Certified thru IAPP

2014

3

Certified Information System Security Professional

15-Jul-15

4

Internet of things – Data Privacy Considerations

5

Everything you need to know about HIPAA

10/1/2014

6

Online Practice Management – Online Marketing Bootcamp

6/3/2015

7

Extensive online privacy and related information security training as found at my portfolio site at:

5/1/2015

8

MCBA: Online Marketing Boot Camp

6/3/2015

9

MCBA: Special Education Rights

6/16/2015

10

The Internet of Things: Data Privacy Considerations

6/30/2015

11

A Practical Guide to Meeting Cyber Security Requirements

7/1/2015

12

Security Lessons Learned from Target, Niemen Marcus, Sony and Other Breaches (Ultimate Windows Security.com and LogRhythm 7-28-201*-*** min Seminar)

7/28/2015

13

Cutting Edge Etch for Sole Practitioners

2/6/2016

14

Top Security Trends for 2014-2015

9/21/2015

15

Lessons Learned from 2015 Verizon Data Breach

9/24/2015

16

US-EU Safe Harbor What Now

10/9/2015

17

Cyber Security Future Threats To Financial Industry

10/15/2015

18

Top 5 Things The CISO needs to know about data privacy

10/15/2015

19

Cyber Threats - Focusing on Home User Security

10/21/2015

20

Managing Innovation Risk

10/28/2015

21

Aligning your hr practices w evolving privacy rules in Latin America

10/29/2015

22

Vendor Risk Data Breach and its business

11/4/2015

23

Penetration testing - Keeping It Real

12/1/2015

24

Phish Me

12/2/2015

25

Beyond Buzzwords - defense in depth

12/2/2015

26

Nymity: Demonstrating compliance

12/16/2015

27

Safe Harbor Data Transfer

12/19/2015

28

Kapersky GoToWebinar - Cybersecurity Forecast: What’s on the Horizon?

1/28/2016

29

NJAJ New Brunswick Cutting Edge Technology for sole practitioners

2/6/2016

30

Cyber Security For Financial Services Industry

3/2/2016

31

Dude Where's My data - Inside the internal security Data exfiltration study

3/17/2016

32

ACC: Negotiating the Cloud: An Overview of Key Issues in the Cloud

3/24/2016

33

The only constant is change - GDPR and Data Privacy

4/14/2016

34

Flipping the Economics of Cyber Attacks

4/19/2016

35

Global Mobility Issues and Challenges for Employers

4/20/2016

36

Cloud Security Threats and resolutions: A Meeting of The Minds

4/27/2016

37

ACC Webcast CLE/CPD Fees: Relationship Between Cyber Breaches and IG

4/28/2016

38

Pre and post-trial motions

5/9/2016

39

GoToWebinar - Don't be Afraid of the Dark III: Solving Data Security with File Analysis -ZL Technologies' Dark Data Webinar series will focus on the security portion of file analysis

5/9/2016

40

GDPR Comprehensive: New York

5/17/2016

41

Studying For Certified Ethical Hacker

4/12/2016

42

Metric Stream 63 minutes -Role of Audit in CISO dept

6/10/2016

43

Privacy Shield Is Here - What You Need TO Know

7/21/2016

44

New Technology that revolutionizes vendor risk management

7/21/2016

45

Avanade - Information Security Brown Bag

7/26/2016

46

Tenable - 13 essential steps to address the security req of the new general data protection regulation

7/27/2016

47

Sans Data Breach Summit: assessment, Compliance & Communication

8/18/2016

48

Device Fingerprinting

9/9/2016

49

PLI: Privacy Shield Boot Camp 2016

9/12/2016

50

Cybersecurity 2016: Managing Cybersecurity Incidents

9/20/2016

51

Changing The role of the cpo in today’s privacy eco system

9/22/2016

52

Tracking Targeting Customers Online, on mobile and social media

10/20/2016

53

Encryption: A Gathering Global Storm

11/1/2016

54

cybersecurity regulation in US governing frameworks

11/10/2016

55

EU Privacy Dawn Raids

11/29/2016

56

Splunk ransomware endpoint

12/13/2016

57

Client data protection community of practice

12/14/2016

58

FARS DFARS req for fed govt contractors - coal fire

12/5/2016

59

Splunk Ransomware

12/19/2017

60

Ethics of electronic info 2016

12/30/2016

61

Privacy Data Security Litigation-PLI

12/31/2016

62

California Privacy Law

12/31/2016

63

Evolving legal ethics

12/31/2016

64

Cyber Security Best practices for legal serv providers

1/18/2017

65

Adv Data Privacy, Cyber Security Breach and TCPA class action litigation

1/20/2017

66

Best Practices to create data inventory to meet GDPR compliance

1/24/2017

67

Best Practices for GDPR compliant privacy notices

1/30/2017

68

NY Cyber security reg

1/31/2017

69

Data Visualization

2/8/2017

70

High Performing Compliance & Ethics Programs

2/21/2017

71

Govt Investigations 2017 - inv arising from data breach

2/24/2017

72

The New Cybersecurity Landscape - What the NYDFS Regs really mean for your business

3/9/2017

73

Successful Audits

3/6/2017

74

China's Cyber Security Law

3/7/2017

75

Privacy Issues on Mobile

3/14/2017

76

Operationalizing legitimate interests

3/16/2017

77

Data Mapping

3/23/2017

78

Data Protection Masterclass: Cyber security trends to watch

3/29/2017

79

Iso compliant risk - mind manager

4/5/2017

80

Managing Privacy & Data Security Risks in M&A

4/5/2017

81

Managing Privacy Risk

4/20/2017

82

Cracking Chinas cyber security law - how an audit can help your business prepare for compliance

4/27/2017

83

Financial Services Tech 2017 Avoidance of Risk

5/5/2017

84

Integrated business continuity management, pathway to resilience

5/10/2017

85

Ransomware

5/18/2017

86

Cloud Computing 2017 - key issues and practical guidance

5/22/2017

87

Traditional PIA to DPIA

5/23/2017

88

Using safety act to demonstrate reasonable cybersecurity plans

5/24/2017

89

Resilient on GDPR

5/24/2017

90

Microsoft on Data Protection tools to implement

5/24/2017

91

UCF Mapping

5/25/2017

92

Consent events

5/25/2017

93

18th annual institute on privacy and data security law

5-30-5-31-201*

94

GDPR Is Less Than A Year Away: Are You On Track

6/6/2017

95

SANS - Practical threat Modeling for Financial Orgs

6/6/2017

96

Consent Issues

6/20/2017

97

Is a personal data inventory required

6/22/2017

98

Is a PI Necessary

6/29/2017

99

The human Side of GDPR

7/11/2017

100

3 steps to stop data protection sprawl

11/7/2017

101

The Future is Here,



Contact this candidate