Grace Hopper Annual Conference Schedule

SESSIONS LIST

Identity and Privacy: Presentations

October 15 10:30 am-11:30 am
361 A Level Three GRBCC
TRACK: Security/Privacy
Presentation / Lightning Talk
Identity & Access Management: Who is Touching What?
10:30 AM - 10:45 AM
LEVEL: Beginner

Identity & Access Management (IAM) is the “diamond in the rough” of information security; everyone thinks it’s simple, technologist love to hate it, and everyone passes it over when it’s full of potential. Between multiple systems and politics, IAM is a complex problem every organization faces. Come learn what it takes to move the dial to tackle IAM and how you could make it a stepping stone in your career.

Identity Toolkit
10:45 AM - 11:00 AM
LEVEL: Beginner

So you would like to build a website, but how can you share it with a limited group of people? or anyone? is the best way to build your own sign in mechanism? How secure is it? In this talk we will present an Identity toolkit that will help you incorporate a sign up/in mechanism into your website.

Ethical Market Models in the Personal Data Ecosystem
11:00 AM - 11:15 AM
LEVEL: Beginner

I present alternatives to the current split between “do not track” and “business as usual” where all companies get to track all data about us generated via our data. I outline three ethical market models within the personal data ecosystem. These are presented within the context of an overall landscape that includes accountability frameworks, and systems of governance including peer-to-peer, legal frameworks, code via standards and Identifier systems.

Life of PII - Protecting Your Personally Identifiable Information
11:15 AM - 11:30 AM
LEVEL: Intermediate

It’s important to understand what companies, governments, and other entities are doing with your private data. What happens after you click “Submit”? How well-protected is your data? What can you do to keep it safe from malicious thieves and attackers ? This talk will cover the lifecycle of an average consumer’s PII (personally identifiable information), from its entry into a website to its deletion from the site’s servers.