Powered by the Consumer Technology Association (CTA)®

Skip to content
Conference Session

Data Collection, Privacy and Why You Should Care

Thursday, January 9
3:00 PM - 3:40 PM
As more personal data finds its way out through data leaks, learn what is really happening with your information and what individuals can do to protect themselves. 
Conference Track Cybersecurity
To attend this session, please complete your CES registration and purchase either the corresponding track or the full Deluxe Pass (to gain access to multiple tracks). If you have already registered, please login with your CES account and add on this track.
All CES conference sessions are seated on a first-come, first-served basis.

Speakers

  • Doreen Galli

    Doreen Galli

    Chief of Research, TBW Advisors LLC

    Moderator

  • Kate Barecchia

    Kate Barecchia

    VP, Deputy General Counsel & Global Data Privacy Officer, Imperva, Inc.

  • Olaf Groth PhD

    Olaf Groth PhD

    CEO & Prof of Practice, Cambrian Futures / UC Berkeley Haas School of Business

  • Shannon Murphy

    Shannon Murphy

    Senior Manager, Global Security and Risk Strategy, Trend Micro

Related Sessions

  • 9:00 AM-9:40 AM

    LVCC, North Level 2, N257

    Safe Money: Venture Leaders Leading the Way in Cybersecurity

    Investors and founders are hyper-focused on what’s happening in cybersecurity. Hear what they see regarding growth and the tech fueling innovation. 

    Conference Track

    Cybersecurity
  • 10:00 AM-10:40 AM

    LVCC, North Level 2, N257

    Securing the IoT: What is the Lay of the Land?

    The threat of cyber-attacks is growing exponentially and securing all three layers of the IoT stack – not just devices, but also networks and platforms – is paramount. 

    Conference Track

    Cybersecurity
  • 11:00 AM-11:50 AM

    LVCC, North Level 2, N257

    U.S. Cyber Trust Mark: Getting Ready for Certification

    The U.S. Cyber Trust Mark cybersecurity certification for consumer connected devices is rolling out now. Hear experts discuss the expected requirements and processes. 

    Conference Track

    Cybersecurity