19th Annual Privacy and Security Conference Security & Privacy: A Global Evolution Feb. 7-9, 2018, Victoria, BC

General Information

Held in Victoria, British Columbia, Canada this conference is a must attend for those working on the transformation of the public and private sectors into the 4th generation digital economy. Presented by the Office of the CIO, Ministry of Citizens’ Services, Province of British Columbia, this three-day conference, is recognized as one of the top tier events in North America. Anyone working in the information privacy and security fields will benefit from the speakers, discussions and networking at the conference. Attendees are from every level both within government and private industry. The conference draws an international audience of some 1,000 delegates with an interest in cutting edge policy, programs, law, research and technologies aimed at the protection of privacy and security.

It is with great admiration that we dedicate the 19th Annual Privacy & Security Conference to Joseph Alhadeff’s memory.  Joseph Alhadeff, a wonderful man and brilliant privacy expert who worked for Oracle, passed away in May 2017 at the age of 57.  Many of you will remember Joe as he has graced the stages of the Privacy & Security Conference for almost all of its past 18 years.  We invite you to celebrate his life with us during the conference. Join subject matter experts and close friends of Joe’s at the panel session “What Would Joe Do?” as they reminisce about his career and discuss his outlooks on today’s pressing privacy and security issues.

Reasons to Attend

  • Timely, motivational presentations from leading industry experts
  • Learn about current trends, issues and actions
  • Valuable CPD credits to maintain a variety of qualifications essential for your career
  • Unparalled networking opportunities
  • Informative 3-hour pre-conference educational sessions and 1.5-hour technical panel sessions
  • Get immediate answers and solutions to issues current in your organization

Conference Rates*

Early Bird registration
by December 15, 2017
Regular registration
after December 15, 2017
Public Sector $675.00 CAD
(plus GST)
$795.00 CAD
(plus GST)
Private Sector $795.00 CAD
(plus GST)
$950.00 CAD
(plus GST)

*We are pleased to offer our Alumni program, providing a special rate to past attendees.  Delegates who have attended this conference before will receive the special price of $595 when they register on or before September 29th.  Please contact us for the promo code if you did not receive it by email.

Registration Fees Include

  • 2 plated lunches
  • All coffee breaks
  • All keynotes, plenaries, panel sessions and applied sessions
  • Pre-conference educational sessions
  • Access to networking lounges
  • Networking reception Thursday evening
  • Conference notebook
  • Conference materials
  • On-line access to presentations post-event

Keynote Speakers

Ray Boisvert

Provincial Security Advisor, Government of Ontario

Jeffery Butler

Author and Millennial Expert

Elizabeth Denham

Information Commissioner, UK Information Commissioner’s Office

Michelle Dennedy

Vice President and Chief Privacy Officer, Cisco Systems

Director Mario Harel

President of Canadian Association of Chiefs of Police (CACP)

Marc Rotenberg

President, Electronic Privacy Information Center (EPIC)

John Scott

CEO, 2Keys Corporation

Richard Thieme

Author and Futurist

Speakers

Martin Abrams

Executive Director and Chief Strategist, Information Accountability Foundation

Nik Badminton

Futurist

Ian Bailey

Assistant Deputy Minister and Acting Government Chief Information Officer, Ministry of Citizens’ Services, Province of BC

Dr. Colin J. Bennett

Professor, Department of Political Science, University of Victoria

Ray Boisvert

Provincial Security Advisor, Government of Ontario

Dan Caprio

Senior Strategic Advisor and Independent Consultant, McKenna Long & Aldridge LLP

Andrew Clement

Professor Emeritus; Co-Founder, Identity Privacy and Security Institute (IPSI), University of Toronto

Don Costello

Director, Security, Privacy & Compliance Management, Ministry of Social Development and Poverty Reduction, Province of BC

Elizabeth Denham

Information Commissioner, UK Information Commissioner’s Office

Dr. Khaled El Emam

CEO and Founder, Privacy Analytics

Geoff Fawkes

Chief Executive Officer, Vancosys Data Security Inc.

Tim Fitzgerald

Chief Information Security Officer, Arm

Joanna Fletcher

Blockchain Evangelist

Dr. Robert Fraser

President and CEO, Molecular You

Stephen Gordon

Executive Director and Cloud Strategy Lead, Ministry of Citizens’ Services, Province of BC

Robin Gould-Soil

Chief Privacy Officer, HSBC Canada

Fuad Iddrisu

Executive Director & CISO, Government of Saskatchewan

Sorana Ionescu

Director, Smart Metering, IESO

Ryan Jepson

Acting Inspector, Calgary Police Service

John Jordan

Executive Director, Services Strategy, Province of BC

Handol Kim

General Manager, Quadrant Business Unit, D-Wave Systems

Kevin Kim

Privacy Manager, First Nations Health Authority

Danielle Kingsbury

Founder and President, CyberSecPsych

Martin Kratz

Partner, Bennett Jones LLP

Dr. Victoria Lemieux

Associate Professor, University of British Columbia

Tom Levasseur

Owner and IT Security Specialist, HackingAway.org

Sarah Jamie Lewis

Anonymity & Privacy Researcher

Kevin Lo

Managing Director, Froese Forensic Partners

David Loukidelis

Associate Counsel, Young Anderson; former BC Information and Privacy Commissioner

Erwin Malzer

Vice Chair, BCCSS

Drew McArthur

Acting Information and Privacy Commissioner for British Columbia

Dr. Kimberlyn McGrail

Scientific Director, Population Data BC; Associate Professor, UBC School of Population and Public Health

Samson Mow

CEO, Pixelmatic; CSO, Blockstream

Richard Purcell

CEO, Corporate Privacy Group

Kurt Roemer

Chief Security Strategist, Citrix

Adrian Sakundiak

Senior Strategic Advisor & Management Consultant, 20/20 Management Consulting

John Scott

CEO, 2Keys Corporation

David Skillicorn

Professor, School of Computing, Queen’s University

Anna Slomovic

Former Chief Privacy Officer, Equifax; Lead Research Scientist, Cyber Security Policy & Research Institute, George Washington University

Sarah Speevak

Legal Counsel, Office of the Privacy Commissioner of Canada

Richard Thieme

Author and Futurist

Jeannette Van Den Bulk

Executive Director, Policy and Legislation, Ministry of Jobs, Trade and Technology, Province of BC

Dominic Vogel

Chief Security Strategist, Cyber.SC

Howard Waldner

Dean of the School of Health and Public Safety, SAIT; Former President & CEO, Island Health

Bradley Weldon

Acting Deputy Commissioner, Office of the Information and Privacy Commissioner for BC
Print Agenda

*Invited Speaker

Wednesday, February 7, 2018

9:00am-12:00pm Saanich Room

BC Ministry of Citizens’ Services – Privacy, Compliance and Training Branch and Information Security Branch presents: How to be a Privacy Officer

Designating a Privacy Officer is a key aspect of any privacy management program, and empowering that Privacy Officer with clear role definition ensures success. But what does it mean to be a Privacy Officer? This workshop will walk through the roles and responsibilities of this type of position and provide tips on how to establish a privacy culture within your organization.

This workshop is useful for those currently in the role who want to sharpen their skills or those who aspire to be future Privacy Officers and want to learn more about the role. We’ll offer some practical tips along with insight into how Privacy Officers fit into an organization’s overall privacy management program.

This session will address topics such as:
• What is a privacy management program
• PIAs, privacy breaches, training and contracts
• Program measurements
• Influencing a positive privacy environment

Join us for an informative discussion on this critical position.

8:30am-12:00pm Oak Bay Room

BC Ministry of Citizens’ Services – Information Security Branch presents: Breach the CyberWall and Win 1st Prize

Be part of the second CyberWall Competition at Victoria’s 2018 Privacy and Security Conference. Expect a fun, challenging, educational and team-building event, designed for people with minimal or entry-level hacking skills.

Teams of 4 will work together to break through cyber defenses, disrupt a virtual company and capture the secrets. Be part of the winning team and take home the coveted 1st prize. Tom Levasseur, veteran cyber breach event organizer and owner of Hackingaway.org, leads each team through the event ensuring an organized, productive and learning experience.

This morning session is less technical, so suitable for people with only basic IT skills. The session lasts 3.5 hours and does not require any previous hacking knowledge! The competition is not an event for people with advanced hacking skills.

Participants play the role of the cyber criminals trying to break into the target organization's IT infrastructure. The target is composed of firewalls, routers, servers and desktops in a complex and realistic but safe environment. By working in teams everyone contributes the skills they have - and learns from each other.

Teams work together to be the first to break through to each stage, gather points, and win the challenge. Then wrap up with time to understand, and learning to defend.

First come first serve, plan to register quickly following registration opening on January 22nd (all registered conference delegates will receive an email on this date with registration instructions). A waiting list will be created in case of over registration.

Participants must bring their own laptop; laptops will not be provided. Participants will be using RDP (Remote Desktop Protocol) software for this event. RDP software is included in all recent versions of MS-Windows, and available for free download from Mac App Store. Participants will connect using a network wire. Your laptop must have a RJ45 connector or a USB-to-Ethernet 10/100 connector.

Upon attending this workshop, participants will be able to:
• Understand how hackers use tools and techniques to exploit vulnerabilities in computer systems;
• Where authorized, use specific tools and techniques to test system security in their organizations;
• Understand how to better protect systems from attack;
• Call on others from the event for advice and help.

9:00am-12:00pm Esquimalt Room

BC Ministry of Citizens’ Services – Information Security Branch presents: Encryption & Blockchain

9:00am-12:00pm Sidney Room

Ethics Session

1:00pm - 4:00pm TBD

Privacy Analytics presents:

1:00pm - 4:30pm Oak Bay Room

BC Ministry of Citizens’ Services – Information Security Branch presents: Breach the CyberWall and Win 1st Prize

Be part of the second CyberWall Competition at Victoria’s 2018 Privacy and Security Conference. Expect a fun, challenging, educational and team-building event, designed for people with minimal or entry-level hacking skills.

Teams of 4 will work together to break through cyber defenses, disrupt a virtual company and capture the secrets. Be part of the winning team and take home the coveted 1st prize. Tom Levasseur, veteran cyber breach event organizer and owner of Hackingaway.org, leads each team through the event ensuring an organized, productive and learning experience.

This afternoon session is for new and returning participants, and requires a few more advanced technical skills. However, the competition is not an event for people who already have advanced hacking skills.

Participants play the role of the cyber criminals trying to break into the target organization's IT infrastructure. The target is composed of firewalls, routers, servers and desktops in a complex and realistic but safe environment. By working in teams everyone contributes the skills they have - and learns from each other.

Teams work together to be the first to break through to each stage, gather points, and win the challenge. Then wrap up with time to understand, and learning to defend.

First come first serve, plan to register quickly following registration opening on January 22nd (all registered conference delegates will receive an email on this date with registration instructions). A waiting list will be created in case of over registration.

Participants must bring their own laptop; laptops will not be provided. Participants will be using RDP (Remote Desktop Protocol) software for this event. RDP software is included in all recent versions of MS-Windows, and available for free download from Mac App Store. Participants will connect using a network wire. Your laptop must have a RJ45 connector or a USB-to-Ethernet 10/100 connector.

Upon attending this workshop, participants will be able to:
• Understand how hackers use tools and techniques to exploit vulnerabilities in computer systems;
• Where authorized, use specific tools and techniques to test system security in their organizations;
• Understand how to better protect systems from attack;
• Call on others from the event for advice and help.

1:00pm - 4:00pm Saanich Room

BC Ministry of Citizens’ Services – Information Security Branch presents: Defensible Security: How the 80/20 can Improve Your Posture

Cybersecurity has never been as imperative as it is today. Most organizations have failed to invest at a rate that has sustained previously achieved capability levels. Others have never reached a level of security maturity adequate to mitigate risks to an acceptable level.

This non-technical workshop will assist attendees in understanding the Defensible Security framework as designed by the OCIO, and provide practical ways of achieving a hygiene level security posture in the most efficient way possible.

All attendees will be provided access to Defensible Security tools and templates. Printouts will be provided at the workshop, however exercises can be completed digitally if participants bring their own laptop with Microsoft Office and wireless capability; laptops will not be provided.

Recommended attendees: Information Officers, Information Security Officers, Risk Officers, Security Analysts, Security Architects, Security Consultants, Security Engineers, Security Administrators

Upon attending this workshop, participants will be able to:
• Understand how to leverage defensible security within their organization
• Gain a clear understanding of the Defensible Security framework
• Understand the control objectives for the control elements
• Understand how to utilize the tools and templates

1:00pm - 4:00pm Esquimalt Room

BC Ministry of Citizens’ Services – Privacy, Compliance and Training Branch presents: Unpacking PIAs

The Privacy Impact Assessment (PIA) is a helpful tool in any organization – when wielded properly. The PIA can make the difference between a privacy-invasive and a privacy-enhancing initiative – without compromising business objectives or adding significant costs. It can be an educational tool or serve business and project planning needs.

This workshop is for those who have never written a PIA and for the more seasoned PIA writers. You will walk away from this workshop equipped with a deeper understanding of the intent behind each section of the BC Government’s PIA template. In particular, you will be able to:
• Identify privacy risks within a project;
• Identify personal information, including the potential for the mosaic effect;
• Document the entire data flow of a project;
• Figure out if a project is a data-linking initiative or a common or integrated program;
• Write a compliant collection notice; and
• Identify personal information banks.

Join us for a lively discussion on PIAs so that the next PIA you draft will go smoothly.

Thursday, February 8, 2018

7:30am

Registration & Networking Lounge Open

8:15am - 8:20am Carson Hall (Salon ABC)

Call to Conference - Master of Ceremonies

8:20am - 8:30am Carson Hall (Salon ABC)

Welcome Remarks

8:30am - 9:05am Carson Hall (Salon ABC)

Keynote Presentation

9:05am - 9:45am Carson Hall (Salon ABC)

Keynote Presentation

9:45am - 10:00am Upper & Lower Foyers

Morning Break - Sponsored by Nymity

10:00am - 10:30am Salon A

Concurrent Keynote Presentation by F5 Networks

10:00am - 10:30am Salon B

Concurrent Keynote Presentation by Deloitte

10:00am - 10:30am Theatre

Concurrent Keynote Presentation by Cisco

10:35am - 11:50am Salon A

Concurrent Panel Session - Panel A: Blockchain: The Ingenious Protocol that has the Capacity to Revolutionize Virtually Every Industry

Blockchain is defined as "a digital ledger in which transactions made in bitcoin or another cryptocurrency are recorded chronologically and publicly". However, blockchain's uses are not limited to just the financial sector. Blockchain can also be used as an incorruptible, yet transparent database of information, a decentralizer and accelerator of technology, and as the ultimate form of personal identification.

Government and private sector organizations across the globe are exploring the use of blockchain technology to improve operations. The ability to record transactions on distributed ledgers offers new approaches for governments and businesses to improve transparency, prevent fraud and establish trust.

This exciting panel will examine how organizations around the world are taking the first steps in adopting distributed ledger technology with various blockchain initiatives and pilot projects.

10:35am - 11:50am Salon B

Concurrent Panel Session - Panel B: Shedding Light on the Dark Web

The dark web is the world-wide web content that exists on dark nets, overlay networks which use the internet but require specific software, configurations or authorization to access. The dark web is used for illegal activities such as illegal trade, forums and media exchanges for pedophiles and terrorists. Botnets are often structured with their command and control services based on a censorship-resistant hidden service. Hackers sell their services for financial institutions, banks, governments and private organizations. Although much of the dark web is innocuous, prosecutors and government agencies among others are convinced that it is a haven for criminal activities and social injustices.

10:35am - 11:50am Theatre

Concurrent Panel Session - Panel C: Data Breaches - Another Day Another Breach: Why Do They Occur and What Should Be Done to Prevent Them?

Can the average citizen really protect themselves from identity fraud? Using secure Internet lines and updating passwords are things we can control, but consumers actually have very little ability to protect themselves from fraud. What can we do when organisations such as banks, hospitals, stores and Internet companies are breached? With the recent Equifax breach, Credit Reporting Agencies, the very organisations that are designed to verify our identity and information, have been exposed as having inadequate security procedures in place. This panel will examine recent data breaches, the causes and the effects they have had, and what we need to do to prevent future ones.

10:35am - 11:50am Salon C

Concurrent Panel Session - Security Technical Panel: Mobile Security and Privacy: Promoting Consumer Privacy and Security in the Mobile Ecosystem

The growth of the mobile Internet, led by the success of smartphones and mobile broadband technology continues to bring widespread benefits and opportunities to people around the world. It also creates new challenges regarding the security and privacy of mobile users' personal information.

One of the major challenges faced by the growth of the mobile Internet is that the security and privacy of consumers’ personal information is regulated by a patchwork of geographically bound privacy regulations, while the mobile Internet is international.

Governments should ensure legislation is technology neutral and that its rules are applied consistently to all players in the Internet ecosystem, while the mobile industry needs to ensure privacy risks are considered when designing new apps and services.

How do stakeholders from across the mobile industry work to develop a consistent approach to privacy protection while promoting trust in mobile services?

11:50am - 1:05pm Carson Hall (Salon ABC)

Luncheon Keynote Presentation

11:50am - 1:05pm Crystal Ballroom

Networking Luncheon

1:05pm - 1:40pm Carson Hall (Salon ABC)

Keynote Presentation by IBM

1:50pm - 2:20pm Salon A

Applied Session - A Protocol for Information Sharing Agreements

1:50pm - 2:20pm Salon B

Applied Session by F5 Networks

1:50pm - 2:20pm Salon C

Applied Session by Cisco

1:50pm - 2:20pm Theatre

Applied Session - New Age Enterprise Security Playbook: First 100 Days

Cyber security is not rocket science. In this applied session, learn about developing an effective and efficient enterprise security program that starts with strong culture and risk communication. If you recently became a CISO or security director you will learn how to build your playbook for your first 100 days on the job. Ditch the dated old school security ways and embrace a more modern approach. The pillars of building the new age enterprise security are: developing a positive security culture, making secure business processes easy, reducing alert overload, fostering enduring business relationships, constant communication with executives, and getting the biggest bang for your limited bucks with risk prioritization.

1:50pm - 2:20pm Saanich Room

Applied Session

1:50pm - 2:20pm Oak Bay I Room

Applied Session

1:50pm - 2:20pm Oak Bay II Room

Applied Session - Ransomware LIVE Demo

Ransomware has become widespread in the past few years. As defenders we need to understand it. In this fast-paced and practical session you'll see exactly how the most widespread ransomware attack of 2017 was built, and then witness a LIVE demonstration (not a video or a simulation) of the attack in action. You will fully understand the ramifications of such a campaign. A brief discussion will follow to highlight what we've learned, and why this attack was so successful. You're gonna' wanna' cry.

1:50pm - 2:20pm Sidney

Applied Session

2:20pm - 2:40pm Upper & Lower Foyers

Afternoon Break

2:40pm - 3:55pm Salon A

Concurrent Panel Session - Panel A: Smart Machines, Deep Learning & Big Data

Deep Learning is a form of machine learning that uses a computing model inspired by the structure of the brain which requires less human supervision, a technology that makes many applications smarter and more natural through experience. With massive amounts of computational power, machines can now recognize objects and translate speech in real time. Smart machines are currently used for understanding speech, personal assistance, controlling robots, aiding vision for self-driving cars, image recognition, identifying patterns, fraud detection, predicting behaviours and advertising. This is just the beginning as smart machines and deep learning open up a new era in technology.

2:40pm - 3:55pm Salon B

Concurrent Panel Session - Panel B: Internet of Things: Shedding Light on Smart City Privacy & Surveillance

Cities and communities generate data through a vast and growing network of connected technologies that power new and innovative services ranging from apps that can help drivers find parking spots to sensors that can improve water quality. Such services improve individual lives and make cities more efficient. While smart city technologies can raise privacy issues, sophisticated data privacy programs can mitigate these concerns while preserving the benefits of cities that are cleaner, faster, safer, more efficient, and more sustainable.

2:40pm - 3:55pm Theatre

Concurrent Panel Session - Panel C: GDPR - Canadian Privacy Law No Longer Adequate for Europeans: What Is At Stake?

International experts will discuss the EU's General Data Protection Regulation, as the private and public sector transform into the new world of the digital economy.
• What is GDPR and how will it affect my organization and my clients?
• How does the GDPR apply to Canadian companies and organizations?
• How do I ensure I am prepared when the new laws come into effect?
• What are the consequences if I am not compliant with GDPR regulations?

2:40pm - 3:55pm Salon C

Concurrent Panel Session - Privacy Technical Panel: Data Classification: What Is It and Why Is It Important for Your Organization?

The data classification process goes far beyond making information easy to find. Data classification is necessary to enable modern enterprises to make sense of the vast amounts of data available at any given moment. Data classification provides a clear picture of the data within the organization’s control and an understanding of where data is stored, how it’s most easily accessed, and how data is best protected from potential security risks. Data classification, once implemented, provides an organized information framework that facilitates more adequate data protection measures and promotes employee compliance with security policies.

4:05pm - 5:05pm Carson Hall (Salon ABC)

Dedication to the Life and Work of Joe Alhadeff - Panel: What Would Joe Do?

Joseph Alhadeff, a wonderful man and brilliant privacy expert, passed away in May 2017 at the age of 57. Many of you will remember Joe as he has graced the stages of the Privacy & Security Conference for almost all of its past 18 years. Most recently VP for Global Public Policy and Chief Privacy Officer for Oracle, Joe was a sought after speaker around the world and we were privileged to have him return to our conference year after year and, most importantly, to call him a good friend.

It is with great admiration that we dedicate the 19th Annual Privacy & Security Conference to Joe's memory. We invite you to celebrate his life with us during the conference. Join subject matter experts and close friends of Joe's during this panel session as they reminisce about his career and discuss his outlooks on today's pressing privacy and security issues.

5:05pm - 5:15pm Carson Hall (Salon ABC)

Day 1 Closing Remarks

5:15pm - 6:00pm Upper Foyer

Networking Reception

Friday, February 9, 2018

7:30am

Registration & Networking Lounge Open

8:30am - 8:35am Carson Hall (Salon ABC)

Administrative Announcements

8:35am - 8:55am Carson Hall (Salon ABC)

Opening Introductions

8:55am - 9:30am Carson Hall (Salon ABC)

Keynote Presentation by Microsoft

9:30am - 10:05am Carson Hall (Salon ABC)

Keynote Presentation

10:05am - 10:25am Upper & Lower Foyers

Morning Break

10:25am - 10:55am Salon A

Concurrent Keynote Presentation by 2Keys - Balancing Cyber Security and Digital Rights and Privacy

Effective cyber security depends on the ability to detect and resolve behaviours in advance of their impact. At the same time, legal trends such as information fiduciaries, informed consent requirements, the tort of seclusion, and digital privacy as a constitutional and property right will impact the design of systems that require digital identity and downstream data to deliver their value. If systems limit information inputs and practices to meet digital rights, is the ability to detect and protect in advance compromised?

10:25am - 10:55am Salon B

Concurrent Keynote Presentation by TBD

10:25am - 10:55am Theatre

Concurrent Keynote Presentation by TBD

11:00am - 12:15pm Salon A

Concurrent Panel Session - Panel A: Personalized Medicine: Is the Healthcare System Ready for It?

Personalized medicine is being driven in part by our growing capacity to generate and handle large amounts of genomic and other “omic” data. It holds the promise of a health care system that delivers the “right treatment to the right patient at the right time”. The paradigm for health is changing, whether we want it to or not, and systems built based on the “one treatment for most people at the same time” model with data from randomized controlled trials will need to change. What do we need to be doing to adapt?

11:00am - 12:15pm Salon B

Concurrent Panel Session - Panel B: Lessons Learned from Top CISOs Across Canada

A Chief Information Security Officer can be defined as a senior-level executive responsible for developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems and assets from both internal and external threats. However, the position is much more than responding in the face of a data breach or security incident. The CISO is tasked with anticipating new threats and actively working to prevent them from occurring. The CISO must work with other executives across different departments to ensure that security systems are working smoothly to reduce the organization's operational risks in the face of a security attack. Join this panel as they discuss the life of a CISO and learn about the disasters they must avert on a daily basis.

11:00am - 12:15pm Theatre

Concurrent Panel Session - Panel C: Artificial Intelligence: Applications, Implications and Ethics

Artificial Intelligence (AI), defined as intelligence exhibited by machines, is poised to transform everyday life through its use in a wide range of activities, including medical diagnosis, electronic trading, robot control and remote sensing. AI is drastically changing various industries, such as finance, healthcare, education, transportation and more. However, these changes come with a host of new questions and responsibilities.

• How do we make people accountable for the decisions made by machines?
• Does artificial intelligence weight the scale to the advantage of those with power?
• Does machine learning make consent irrelevant?
• As machines continue to replace humans, will we find ourselves alienated, devalued and frustrated?
• What are the unintended consequences of developing self-improving AI that could become vastly more powerful than humans?

This exciting panel will examine the rapidly advancing world of artificial intelligence and the drastic changes, both good and bad, that it promises to deliver.

11:00am - 12:15pm Salon C

Concurrent Panel Session - Privacy Technical Panel: De-Identification – Protecting Data Privacy and Preserving Data Utility

This panel will provide data privacy/security professionals and legal counsel with an introduction to the principles and methods of statistical disclosure limitation that can be used to de-identify healthcare data to meet the HIPAA privacy regulations while assuring that both data privacy and statistical/analytic accuracy are appropriately protected and balanced. Participants will learn the basics of statistical disclosure risk analysis (primarily for healthcare microdata): data intrusion scenarios, the importance of both sample and population uniqueness, record linkage methods, formulations of re-identification risks, k-anonymity, differential privacy and other de-identification approaches, the definition of quasi-identifiers and the significance of their classification, and the appropriate use of HIPAA limited data sets. Participants will also learn about the types of disclosure analyses, including equivalence class analyses; geography analyses; and family key analyses. After this session, participants will be able to work more successfully with statistical disclosure experts to understand and manage statistical de-identification for data sets under the HIPAA requirements while preserving analytic utility.

12:15pm - 1:30pm Carson Hall (Salon ABC)

Luncheon Keynote Presentation

12:15pm - 1:30pm Crystal Ballroom

Networking Luncheon

1:40pm - 2:10pm Salon A

Applied Session

1:40pm - 2:10pm Salon B

Applied Session by Palo Alto

1:40pm - 2:10pm Theatre

Applied Session

1:40pm - 2:10pm Saanich Room

Applied Session

1:40pm - 2:10pm Oak Bay I Room

Applied Session

1:40pm - 2:10pm Oak Bay II Room

Applied Session

2:10pm - 2:25pm Upper & Lower Foyers

Afternoon Break

2:25pm - 3:40pm Salon A

Concurrent Panel Session - Panel A: Privacy & Security Issues in Healthcare

There are many recent examples of major hacking and denial of service attacks of a global nature that have impacted the largest of Healthcare networks and hospital facilities ie. NHS, and many of the largest US based organizations. Further, the targets are likely to increase exponentially with the drive to further digitization & integration of hospital and primary care based networks and connections to individual patient portals, mobile apps and hand-held devices. The challenge is to mitigate these risks while promoting further digitization to improve the efficient delivery of quality healthcare in a sustainable way.

2:25pm - 3:40pm Salon B

Concurrent Panel Session - Panel B: Biometrics: The Solution to Digital Identity Management is Literally at our Finger Tips!

Biometrics uses unique physiological characteristics, such as fingerprints, face or iris recognition, to identify people and bridges the gap between our physical and digital identities. As our world becomes more and more digital, protecting our identity becomes increasingly important. Tools that are fool proof and easy to use are essential in this age and the use of biometrics to protect our identities combines both trust and convenience. The future, where biometrics will be your trusted passport in your journey through a mobile, digital life, has begun.

2:25pm - 3:40pm Theatre

Concurrent Panel Session - Panel C: Achieving Meaningful Consent in the Digital Age

Some say that privacy is about controlling one’s own personal information. Consent is a key element of that control. But what is consent and when should consent be required? What is meaningful consent and when can implied or express consent be relied on? What should governance of consent—specifically, the corporate accountability and enforcement mechanisms—look like? This panel will delve into these complex questions from different perspectives: privacy protection authority, private-sector organizations and academia. Attendees will learn how discussions around consent are evolving in Canada and beyond and also gain an understanding of the panelists’ unique perspectives on consent.

2:25pm - 3:40pm Salon C

Concurrent Panel Session - Security Technical Panel: Which Cloud is the Right Cloud and How do People and Organizations Ensure Their Data is Safe?

Cloud computing and storage provides users with capabilities to store and process their data in third-party data centres. Organizations use the cloud in a variety of different service models and deployment models. Security concerns associated with cloud computing fall into two broad categories: security issues faced by cloud providers and security issues faced by their customers. However, responsibility for cloud security must be shared. The provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected, while the user must take measures to fortify their application and use strong passwords and authentication measures. Join this panel and learn more about remaining secure in the cloud, both at work and at home.

3:50pm - 4:30pm Carson Hall (Salon ABC)

Closing Keynote Presentation

4:30pm - 4:40pm Carson Hall (Salon ABC)

Closing Remarks

4:40pm - 4:45pm Carson Hall (Salon ABC)

Closing Announcements

Platinum Sponsor

Gold Sponsors

Conference Sponsors & Exhibitors

Academic Partner

Fairmont Empress Hotel Room Block

If you need to make accommodation arrangements, the Fairmont Empress is offering a special conference rate of $169/night for Corporate reservations and $149/night for Government reservations. Please note that this room block ends January 12, 2018.

Please contact the hotel directly at (250) 384-8111 to book a room or book online using the following links:

Government Reservations – https://aws.passkey.com/go/privacyandsecurity2018
Corporate Reservations – https://aws.passkey.com/go/privacysecurityconfcorp2018

Fairmont Empress
721 Government Street
Victoria, BC
V8W 1W5

https://www.fairmont.com/empress-victoria/

YYJ Airport Shuttle Discount

If you are needing transportation from the Victoria International Airport to Downtown Victoria/Empress Hotel why not consider using the YYJ Airport Shuttle.

When booking the shuttle online or over the phone please use the promo code REBOOT20.  This will give you 20% off tickets.

For more information please visit their website at www.yyjairportshuttle.com or call them at 1-855-351-4995.

Harbour Air Seaplanes Discount

Flying in from Vancouver or Seattle for the conference? Arrive in style in Victoria’s Inner Harbour with Harbour Air.  Subject to availability, attendees will receive a 20% discount on their regular fares for confirmed travel to/from Victoria between February 5 and 11, 2018. Please note that all rates are subject to tax and fees. This offer cannot be combined with any other offers or promotions or be paid by Airbucks or TurboBucks and cannot be applied to private charters. In order to receive this special discounted rate, attendees can contact the Reservation Department directly by phone at 1.800.665.0212, by e-mail at reservation@harbourair.com or online at www.harbourair.com and quote the promotional code ‘P&SC02-18’. Also be advised that you will need to provide a copy of  your registration to the conference upon check-in.

All schedules and location information can be accessed through their website at www.harbourair.com.

Call for Speakers

  • Please note that the call for speakers closed September 29, 2017.
  • The Advisory Board for the 2018 Privacy and Security Conference is pleased to announce that the Call for Speakers is now closed.
  • Subject matter experts working within the privacy and information security communities are invited to submit papers on their area of expertise. Of particular interest are briefs on cutting-edge subjects and themes suitable for presentation in either a panel session, technical panel session or keynote address. Hosted by the Office of the Chief Information Officer, Ministry of Citizens’ Services, Government of British Columbia, this three-day conference draws an international audience focused on policy, programs, law, research and technologies aimed at the protection of privacy and security.
  • Date: February 7-9th, 2018
    Location: The Victoria Conference Centre, Victoria, British Columbia
  • 2018 Conference Suggested Topics (not exhaustive):
    • Advanced Robotics
    • Artificial Intelligence
    • Augmented & Virtual Reality
    • Autonomous Driving
    • Big Data Analytics
    • Biometrics/Geometrics
    • Blockchain
    • Cloud Computing
    • Crypto Currency
    • Cyber Security
    • Dark Web
    • Data Classification
    • Digital Privacy Rights
    • Drones
    • Ethics
    • Healthcare Privacy & Security
    • Internet of Things
    • Mobile Privacy & Security
    • Open Data
    • Ransomware
    • Smart Cities

    Deadline:

    All entries must be received by midnight of September 29th, 2017. Invited speakers will be notified by October 31st, 2017.

    Submissions:

    Submissions will be accepted electronically using the form below.

    Presentation Types:

    • Issue papers: An executive or management briefing on a prominent issue or aspect of information privacy or security.
    • Case studies: Descriptions of a specific information privacy or security situation or incident, or research results. Names of organizations can be kept anonymous to maintain confidentiality if necessary.
    • Research: Results or developments in cutting edge research on new information privacy and security technologies.
    • Sociological/ Philosophical perspective: A candid and/or introspective look at the impacts of new technological developments on privacy, security, social consciousness, or social functioning.

    Have Questions or Need More Information?