TROPT Summit 2022 Working Agenda
Main Stage Agenda (In-Person & Virtual)
7:30 am PT Shaping the Emerging Privacy Tech Industry
TROPT Founder, Lourdes M. Turrecha, and other privacy tech industry leaders share their mission of shaping and fueling the emerging privacy tech industry.
- Lourdes M. Turrecha (TROPT Founder)
Tags: leadership, privacy tech
8:00 am PT Cross-Functional Privacy Tech Buyer-User Pain Points
Privacy domain experts share their top privacy tech buyer-user pain points. Covering both ends of the developer lifecycle and data lifecycle, they explore challenges and opportunities involving privacy as code, shift left privacy, end-to-end DSARs, confidential computing, the latest PETs and their use cases, and more. They benchmark practices in identifying, selecting, onboarding, using, and renewing privacy tech solutions.
Tags: experts, buyers, users, privacy tech
9:00 am PT Tech CPOs on Innovating in Privacy
Join leading tech CPOs discuss how their companies are innovating in privacy as they release new products and features. They cover specific privacy pain points that called for a privacy strategy beyond compliance; the specific brand, competitive advantage, and product privacy strategy they came up with; and the responsive products and features they rolled out to solve such privacy pain points.
- Harvey Jang (Cisco CPO), Emily Hancock (Cloudflare CPO), Damien Kieran (Twitter CPO), and Krystal Bowen (Block CPO)
Tags: leadership, privacy tech
10:00 am PT Privacy Engineering Developments Fueling Privacy Tech
Today’s top privacy engineers share privacy engineering developments that are fueling privacy tech, including advice for up-and-coming privacy tech vendors on how they could leverage the privacy engineering practice and domain in building their own companies.
Tags: experts, buyers, users, privacy engineering, privacy tech
11:00 am PT The Future of Privacy Tech & Innovation
Innovative privacy tech founders share their cutting edge privacy tech solutions and differentiated visions for the future of privacy tech & innovation.
Tags: founders, privacy tech
11:45 am PT Privacy Tech Lightning Talks, Part 1
Privacy tech founders preview their latest privacy tech solutions in a series of five-minute lightning talks.
Tags: founders, privacy tech
12 noon PT BREAK
1:30 pm PT The State of Privacy Tech Fundraising & Investing
Hear from the emerging privacy tech industry’s active Angel investors and VCs on privacy tech fundraising and investing trends and opportunities.
Tags: investors, privacy tech
2:30 pm PT Lessons From the World’s First CPOs on Privacy Executive & Board Leadership
Join the world’s first CPOs and gain insights from their combined 100+ years of privacy leadership on how they created their own roles; effectively advocated for privacy budget for headcount, resources, and tools; navigated board reporting on their privacy initiatives; and secured their own board opportunities, including privacy tech advisory roles.
- Ray Everett (PrivacyClue Principal)
- Michelle Finneran-Dennedy (PrivacyCode CEO & Co-Founder)
- Barbara Lawler (The IAF COO & Sr Strategist)
Tags: leadership, professional development, boards, experts
3:15 pm PT TROPT Privacy Tech Visionaries Circle
TROPT announces the inaugural TROPT Privacy Tech Visionaries Circle, an exclusive gathering of the privacy profession’s and the privacy tech industry’s innovative and forward-thinking leaders. TROPT Privacy Tech Visionaries are leading privacy domain experts and select privacy tech founders, investors, and advisors. They have deep expertise in the privacy, cybersecurity, data governance, and technology domains. Most notably, they are forward-thinkers, early tech adopters, and innovative leaders who have paved the way for others in the privacy and privacy tech space.
Tags: visionaries, leadership, professional development, experts, privacy tech
Interactive Sessions (Virtual)
Differential Privacy in the Real World
Explore potential use-cases of Differential Privacy in the real world and how one can achieve that.
- Chinmay Shah (OpenMined Differential Privacy Lead)
Tags: privacy tech
Differential Privacy: Lessons for Enterprises from US Government Agencies
The recent adoption of differential privacy at government agencies (such as the US Census Bureau and IRS) holds important lessons for how enterprises can use this emerging PET to expand data use and sharing. Using real case-studies we’ll review deployment challenges, policy-setting tactics, and assess outcomes and achieved benefits.
- Gerome Miklau (Tumult Labs Founder & CEO)
Tags: privacy tech
Engineering Privacy into Privacy Tech
Diving into Privacy Engineering? Just dipping in a toe? We’ll share 5 insider secrets that bridge the gap in Privacy Engineering.
- Kristy Edwards (Stealthy Privacy President and Co-founder)
Tags: privacy tech, privacy engineering
Job Hunting and Staffing in Privacy Tech
A discussion on the job market in the emerging privacy tech industry, including which specific areas are hiring vs. not-hiring, how to break in vs. how to get noticed, and more.
- Zachary Plotkin (Infinity Consulting Solutions Head of Compliance, Legal & Privacy/Fintech/Crypto/Cannabis Practice Area)
Tags: privacy tech, professional development
Privacy Tech for Marketing: Confronting Marketing’s Greatest Fears with Privacy
A frank discussion on how to enable marketing while ensuring privacy and the role of “Privacy Tech for Marketing” solutions.
- Mark LeVell (4Thought Marketing CEO, Privacy & Marketing SAAS Specialist)
Tags: privacy tech
Standards, Codes of Conduct, and Certifications as Privacy Tech Sales Tools
Using codes of conduct and certifications when selling services to enterprise clients can assuage them of security and privacy concerns, shorting the sales cycle.
- R. Jason Cronk (EnterPrivacy Privacy Engineer)
Tags: privacy tech
Vendor & Supply Chain Management Tech: The Future of Privacy Accountability
There is growing demand for privacy supply chain compliance and bona fides. How is data being shared and used by vendors and partners, are privacy promises being honored, and how to efficiently determine or demonstrate a compliant posture? Contract terms are not enough on their own, but what automated means are available and effective? New legal and self-regulatory requirements and efforts aim to address, but how close to the mark do they come (or not), and where is there opportunity for privacy tech to meaningfully address and support?
- Alysa Hutnik (Kelley Drye Chair/Partner, Privacy, Cyber, and Advertising)
Tags: privacy tech
Networking Agenda (In-Person)
7 am PT Breakfast Networking
12 noon PT Lunch Networking
3:30 pm PT Cocktail Reception Networking
Networking Agenda (Virtual)