-
8:30am
Welcome Speech
-
8:30 am – 9:00am
2 Years-Latest Regulatory Developments & Guidelines of China Cyber Security Law: Implications for Businesses
Keynote Speaker:International Leading Law Firm
-
9:00am - 9:30am
Keynote Speaker:Leading Service Provider
-
9:30am - 10:10am
Panel Discussion: Complying with the Regulations of Cross-Border Data Transfer and Data Localization
-
10:10am – 10:30am
Panelists
-
10:30am – 11:10am
Due Diligence to third party in compliance of data protection and managing the 3rd party (relying solely on items of contract won’t guarantee 100% liability-free)
Keynote Speaker:International Leading Law Firm
-
11:10am – 11:50am
Data Localization and Cross-border Data Transfer – Latest Development, Questions and Practical Approach
Keynote Speaker:Xiao Dong
-
11:50am – 12:10am
Prevention and Investigation of Data Leakage & White Collar Crime
Keynote Speaker:FBI/International Expert for White Collar
-
12:10pm – 01:30pm
Networking Luncheon
-
01:30pm – 02:10pm
Panel Discussion: Under the China Cyber Security Law and GDPR, How to Legally Collect, Store & Transfer “Personal Information” & “Important Data”
The identifying of “Personal Information” vs “Important Data
-
02:10pm – 02:40pm
Clearing the Next Compliance Hurdle: California’s Consumer Privacy Act (CCPA)
Speaker: Robert E. (Bob) Cattanach
-
02:40pm – 03:00pm
Anti-Data Leakage Investigation
Keynote Speaker:Discovery scientist
-
03:00pm – 03:10pm
Tea Break &Networking
-
03:10pm – 03:40pm
Human Genetic Resources Management Regulations
Keynote Speaker:Leading Law firm
-
03:40pm – 04:10pm
Cloud Computing Services Security Assessment Measures
Keynote Speaker:Leading Law firm
-
04:10pm – 04:40pm
How is GDPR's Impacting on Internal Investigations
Keynote Speaker:Investigation Expert
-
04:40pm – 05:10pm
Complying with Cybersecurity Multi-Level Protection Scheme (MLPS) Requirements
Keynote Speaker:International Leading Consulting Firm
-
05:10pm-05:40pm
Panel Discussion: Are we left with no choice but to choose which law to break? The Tricky Game of “Copies of Data Demanding vs Prohibition of Data Export”