SlideShare a Scribd company logo
The only comprehensive event of its kind
for the technology industry
This is your chance to
gain first-hand EU and
U.S. Government
updates on encryption,
intrusion software,
network surveillance,
cloud and
cybersecurity controls.
AmericanConference.com/Encryption
Widely regarded as the only comprehensive
event of its kind, benefit from a unique opportunity
to hear directly from U.S. and EU Government
decision-makers:
• Kevin Wolf, Assistant Secretary of Commerce for Export
Administration, Bureau of Industry and Security
• Joseph Whitehead, Special Agent in Charge, San Jose
Field Office, Bureau of Industry and Security
• Stéphane Chardon, DG Trade, European Commission
• Mathilde Latour, Domestic and Export Control Unit,
French Network and Information Security Agency
(ANSSI)
AmericanConference.com/Encryption
The fully updated agenda includes a
practical, in-depth panel on real-life
Wassenaar implementation challenges:
WASSENAAR – How New Proposals, 2015 Controls, and
Countries’ Adoption of Note 4 and OAM Affect Your
Global Encryption Compliance Strategy:
• Kathleen Gebeau, Senior Director, Export Compliance,
Qualcomm
• Michael Maney, Senior Manager, Trade Compliance,
Veritas Technologies
• Josephine Aiello Lebeau, Partner, Wilson Sonsini Goodrich
& Rosati
AmericanConference.com/Encryption
Hear from experts across
the globe on export
regulations, cybersecurity
and encryption controls
in the U.S., China, Hong
Kong, Singapore,
Malaysia, France, Russia
and other key
jurisdictions.
AmericanConference.com/Encryption
New topics for 2016 include:
• Industry Roundtable Discussion-Export
Compliance, Intrusion Software, Network
Surveillance and Cybersecurity in Practice
• TWO IN-DEPTH PANELS ON CHINA:
o New Security Regulations and Big
Encryption Controls Changes
o Satisfying “Secure and Controllable
Encryption” and Cybersecurity Requirements
AmericanConference.com/Encryption
Benchmark and network with your industry peers from
leading technology companies:
• Michael Angelo, Chief Security Architect, Micro Focus | NetIQ
Corporation
• Michael Maney, Senior Manager, Trade Compliance, Veritas
Technologies
• Neil Martin, Export Controls Programs Manager, Google
• Kathleen Gebeau, Senior Director, Export Compliance, Qualcomm
• Sooji Seo, Global Trade Counsel & Compliance Director, Dell
• Lillian Norwood, Manager, Technology Transfers, IBM
• Karmi Leiman, Senior Director, Trade Compliance, GlobalFoundries
• Anne Marie Griffin, Deputy Director, Global Trade Policy, Microsoft
• Steve Bird, Export Compliance Manager, Cisco Systems
• Ramakrishna Dasari, Export Compliance Manager, Apple
• Michael Lutz, Director of Trade Compliance, Google
AmericanConference.com/Encryption
Advance pricing expires on February
5th. Group rates are also available. For
further details and to register, please
call 888-224-2480 or visit
AmericanConference.com/Encryption
@ACILegal #ACIEncryption International Trade
Association Partner:

More Related Content

Viewers also liked

Mind the Byte
Mind the ByteMind the Byte
Mind the Byte
Mind the Byte
 
Bahasan 1 lingkup_alat_media_pendidikan
Bahasan 1 lingkup_alat_media_pendidikanBahasan 1 lingkup_alat_media_pendidikan
Bahasan 1 lingkup_alat_media_pendidikan
merysiswinda
 
Trends in Cybersecurity
Trends in CybersecurityTrends in Cybersecurity
Trends in Cybersecurity
Varunee Wongwichit
 
Cybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud ComputingCybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud Computing
Joseph Pindar
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Moshe Ferber
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
syrinxtech
 
Cloud security what to expect (introduction to cloud security)
Cloud security   what to expect (introduction to cloud security)Cloud security   what to expect (introduction to cloud security)
Cloud security what to expect (introduction to cloud security)
Moshe Ferber
 
Cybersecurity Skills Audit
Cybersecurity Skills AuditCybersecurity Skills Audit
Cybersecurity Skills Audit
Vilius Benetis
 
A Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons LearnedA Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons Learned
Mike Chapple
 
Company Product Sheet
Company Product SheetCompany Product Sheet
Company Product Sheet
Now Corporation
 
Network Infrastructure Validation Conference @UPRA (2003)
Network Infrastructure Validation Conference @UPRA (2003)Network Infrastructure Validation Conference @UPRA (2003)
Network Infrastructure Validation Conference @UPRA (2003)
Raul Soto
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
EnclaveSecurity
 
Ispe Article
Ispe ArticleIspe Article
Ispe Article
David Stephenson
 
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Mind the Byte
 
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB
 
Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud Cybersecurity
David Zaizar
 
Meet You GxP Compliance in the Cloud
Meet You GxP Compliance in the CloudMeet You GxP Compliance in the Cloud
Meet You GxP Compliance in the Cloud
Appian
 
Virtual infrastructure qualification
Virtual infrastructure qualificationVirtual infrastructure qualification
Virtual infrastructure qualification
US Data Management LLC
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
Kristian Alisasis Pura
 
Critical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachCritical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target Breach
Teri Radichel
 

Viewers also liked (20)

Mind the Byte
Mind the ByteMind the Byte
Mind the Byte
 
Bahasan 1 lingkup_alat_media_pendidikan
Bahasan 1 lingkup_alat_media_pendidikanBahasan 1 lingkup_alat_media_pendidikan
Bahasan 1 lingkup_alat_media_pendidikan
 
Trends in Cybersecurity
Trends in CybersecurityTrends in Cybersecurity
Trends in Cybersecurity
 
Cybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud ComputingCybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud Computing
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud security what to expect (introduction to cloud security)
Cloud security   what to expect (introduction to cloud security)Cloud security   what to expect (introduction to cloud security)
Cloud security what to expect (introduction to cloud security)
 
Cybersecurity Skills Audit
Cybersecurity Skills AuditCybersecurity Skills Audit
Cybersecurity Skills Audit
 
A Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons LearnedA Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons Learned
 
Company Product Sheet
Company Product SheetCompany Product Sheet
Company Product Sheet
 
Network Infrastructure Validation Conference @UPRA (2003)
Network Infrastructure Validation Conference @UPRA (2003)Network Infrastructure Validation Conference @UPRA (2003)
Network Infrastructure Validation Conference @UPRA (2003)
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
 
Ispe Article
Ispe ArticleIspe Article
Ispe Article
 
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
 
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
 
Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud Cybersecurity
 
Meet You GxP Compliance in the Cloud
Meet You GxP Compliance in the CloudMeet You GxP Compliance in the Cloud
Meet You GxP Compliance in the Cloud
 
Virtual infrastructure qualification
Virtual infrastructure qualificationVirtual infrastructure qualification
Virtual infrastructure qualification
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
 
Critical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachCritical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target Breach
 

Similar to ACI's Global Encryption, Cloud & Cybersecurity Controls

SMi Group's 9th annual Defence Exports conference & exhibition
SMi Group's 9th annual Defence Exports conference & exhibitionSMi Group's 9th annual Defence Exports conference & exhibition
SMi Group's 9th annual Defence Exports conference & exhibition
Dale Butler
 
590X15 European Export Controls S
590X15 European Export Controls S590X15 European Export Controls S
590X15 European Export Controls S
STEPHANIE C HART
 
SMi Group's 10th annual Defence Exports 2015 conference & exhibition
SMi Group's 10th annual Defence Exports 2015 conference & exhibitionSMi Group's 10th annual Defence Exports 2015 conference & exhibition
SMi Group's 10th annual Defence Exports 2015 conference & exhibition
Dale Butler
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
IT Governance Ltd
 
SMi Group's 13th annual Defence Exports 2018
SMi Group's 13th annual Defence Exports 2018SMi Group's 13th annual Defence Exports 2018
SMi Group's 13th annual Defence Exports 2018
Dale Butler
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
FERMA
 
SMi Group's Defence Exports 2018 conference
SMi Group's Defence Exports 2018 conferenceSMi Group's Defence Exports 2018 conference
SMi Group's Defence Exports 2018 conference
Dale Butler
 
SMi Group's Defence Exports 2019 conference
SMi Group's Defence Exports 2019 conferenceSMi Group's Defence Exports 2019 conference
SMi Group's Defence Exports 2019 conference
Dale Butler
 
The Open Source at the hearth of the Cyber Security innovation, OW2con'16, Pa...
The Open Source at the hearth of the Cyber Security innovation, OW2con'16, Pa...The Open Source at the hearth of the Cyber Security innovation, OW2con'16, Pa...
The Open Source at the hearth of the Cyber Security innovation, OW2con'16, Pa...
OW2
 
Automotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still ExistsAutomotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still Exists
OnBoard Security, Inc. - a Qualcomm Company
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
Cohesive Networks
 
SMi Group's Defence Exports 2017
SMi Group's Defence Exports 2017SMi Group's Defence Exports 2017
SMi Group's Defence Exports 2017
Dale Butler
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
Nicolas Beyer
 
Infosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.pptInfosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.ppt
Christophe Németh (CISSP / CISM)
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
Cyril Soeri
 
Secure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsSecure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech Applications
Lionel Briand
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
Scalar Decisions
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
PECB
 
USA Information Security Compliance Market Overview
USA Information Security Compliance Market OverviewUSA Information Security Compliance Market Overview
USA Information Security Compliance Market Overview
Niraj Singhvi
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
japijapi
 

Similar to ACI's Global Encryption, Cloud & Cybersecurity Controls (20)

SMi Group's 9th annual Defence Exports conference & exhibition
SMi Group's 9th annual Defence Exports conference & exhibitionSMi Group's 9th annual Defence Exports conference & exhibition
SMi Group's 9th annual Defence Exports conference & exhibition
 
590X15 European Export Controls S
590X15 European Export Controls S590X15 European Export Controls S
590X15 European Export Controls S
 
SMi Group's 10th annual Defence Exports 2015 conference & exhibition
SMi Group's 10th annual Defence Exports 2015 conference & exhibitionSMi Group's 10th annual Defence Exports 2015 conference & exhibition
SMi Group's 10th annual Defence Exports 2015 conference & exhibition
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
 
SMi Group's 13th annual Defence Exports 2018
SMi Group's 13th annual Defence Exports 2018SMi Group's 13th annual Defence Exports 2018
SMi Group's 13th annual Defence Exports 2018
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
SMi Group's Defence Exports 2018 conference
SMi Group's Defence Exports 2018 conferenceSMi Group's Defence Exports 2018 conference
SMi Group's Defence Exports 2018 conference
 
SMi Group's Defence Exports 2019 conference
SMi Group's Defence Exports 2019 conferenceSMi Group's Defence Exports 2019 conference
SMi Group's Defence Exports 2019 conference
 
The Open Source at the hearth of the Cyber Security innovation, OW2con'16, Pa...
The Open Source at the hearth of the Cyber Security innovation, OW2con'16, Pa...The Open Source at the hearth of the Cyber Security innovation, OW2con'16, Pa...
The Open Source at the hearth of the Cyber Security innovation, OW2con'16, Pa...
 
Automotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still ExistsAutomotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still Exists
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
SMi Group's Defence Exports 2017
SMi Group's Defence Exports 2017SMi Group's Defence Exports 2017
SMi Group's Defence Exports 2017
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
 
Infosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.pptInfosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.ppt
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
Secure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsSecure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech Applications
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
USA Information Security Compliance Market Overview
USA Information Security Compliance Market OverviewUSA Information Security Compliance Market Overview
USA Information Security Compliance Market Overview
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 

More from Dyan Cornacchio

Agenda and Complete Speakers List for Women in Life Sciences Law
Agenda and Complete Speakers List for Women in Life Sciences LawAgenda and Complete Speakers List for Women in Life Sciences Law
Agenda and Complete Speakers List for Women in Life Sciences Law
Dyan Cornacchio
 
Gain Concrete Tools for Success at ACI's Women Leaders in Life Sciences Law C...
Gain Concrete Tools for Success at ACI's Women Leaders in Life Sciences Law C...Gain Concrete Tools for Success at ACI's Women Leaders in Life Sciences Law C...
Gain Concrete Tools for Success at ACI's Women Leaders in Life Sciences Law C...
Dyan Cornacchio
 
Maximize your Share of the Multi-Billion Dollar Biosimilars Market
Maximize your Share of the Multi-Billion Dollar Biosimilars MarketMaximize your Share of the Multi-Billion Dollar Biosimilars Market
Maximize your Share of the Multi-Billion Dollar Biosimilars Market
Dyan Cornacchio
 
The Future of Healthcare Reform Now and More Developments
The Future of Healthcare Reform Now and More Developments The Future of Healthcare Reform Now and More Developments
The Future of Healthcare Reform Now and More Developments
Dyan Cornacchio
 
How Does Your Company Handle Investigations?
How Does Your Company Handle Investigations?How Does Your Company Handle Investigations?
How Does Your Company Handle Investigations?
Dyan Cornacchio
 
American Conference Institute's 2nd Annual FCC Boot Camp
American Conference Institute's 2nd Annual FCC Boot Camp American Conference Institute's 2nd Annual FCC Boot Camp
American Conference Institute's 2nd Annual FCC Boot Camp
Dyan Cornacchio
 
ACI's 2nd Annual Women Leaders in Financial Services Law and Compliance
ACI's 2nd Annual Women Leaders in Financial Services Law and ComplianceACI's 2nd Annual Women Leaders in Financial Services Law and Compliance
ACI's 2nd Annual Women Leaders in Financial Services Law and Compliance
Dyan Cornacchio
 
ACI's FDA Boot Camp - Top Reasons to Attend
ACI's FDA Boot Camp - Top Reasons to Attend ACI's FDA Boot Camp - Top Reasons to Attend
ACI's FDA Boot Camp - Top Reasons to Attend
Dyan Cornacchio
 
6 Reasons to Attend DAS & Small Cells Congress Europe
6 Reasons to Attend DAS & Small Cells Congress Europe6 Reasons to Attend DAS & Small Cells Congress Europe
6 Reasons to Attend DAS & Small Cells Congress Europe
Dyan Cornacchio
 
Ten brand new sessions led by in-house and Judges at ACI’s Drug and Med Litig...
Ten brand new sessions led by in-house and Judges at ACI’s Drug and Med Litig...Ten brand new sessions led by in-house and Judges at ACI’s Drug and Med Litig...
Ten brand new sessions led by in-house and Judges at ACI’s Drug and Med Litig...
Dyan Cornacchio
 

More from Dyan Cornacchio (10)

Agenda and Complete Speakers List for Women in Life Sciences Law
Agenda and Complete Speakers List for Women in Life Sciences LawAgenda and Complete Speakers List for Women in Life Sciences Law
Agenda and Complete Speakers List for Women in Life Sciences Law
 
Gain Concrete Tools for Success at ACI's Women Leaders in Life Sciences Law C...
Gain Concrete Tools for Success at ACI's Women Leaders in Life Sciences Law C...Gain Concrete Tools for Success at ACI's Women Leaders in Life Sciences Law C...
Gain Concrete Tools for Success at ACI's Women Leaders in Life Sciences Law C...
 
Maximize your Share of the Multi-Billion Dollar Biosimilars Market
Maximize your Share of the Multi-Billion Dollar Biosimilars MarketMaximize your Share of the Multi-Billion Dollar Biosimilars Market
Maximize your Share of the Multi-Billion Dollar Biosimilars Market
 
The Future of Healthcare Reform Now and More Developments
The Future of Healthcare Reform Now and More Developments The Future of Healthcare Reform Now and More Developments
The Future of Healthcare Reform Now and More Developments
 
How Does Your Company Handle Investigations?
How Does Your Company Handle Investigations?How Does Your Company Handle Investigations?
How Does Your Company Handle Investigations?
 
American Conference Institute's 2nd Annual FCC Boot Camp
American Conference Institute's 2nd Annual FCC Boot Camp American Conference Institute's 2nd Annual FCC Boot Camp
American Conference Institute's 2nd Annual FCC Boot Camp
 
ACI's 2nd Annual Women Leaders in Financial Services Law and Compliance
ACI's 2nd Annual Women Leaders in Financial Services Law and ComplianceACI's 2nd Annual Women Leaders in Financial Services Law and Compliance
ACI's 2nd Annual Women Leaders in Financial Services Law and Compliance
 
ACI's FDA Boot Camp - Top Reasons to Attend
ACI's FDA Boot Camp - Top Reasons to Attend ACI's FDA Boot Camp - Top Reasons to Attend
ACI's FDA Boot Camp - Top Reasons to Attend
 
6 Reasons to Attend DAS & Small Cells Congress Europe
6 Reasons to Attend DAS & Small Cells Congress Europe6 Reasons to Attend DAS & Small Cells Congress Europe
6 Reasons to Attend DAS & Small Cells Congress Europe
 
Ten brand new sessions led by in-house and Judges at ACI’s Drug and Med Litig...
Ten brand new sessions led by in-house and Judges at ACI’s Drug and Med Litig...Ten brand new sessions led by in-house and Judges at ACI’s Drug and Med Litig...
Ten brand new sessions led by in-house and Judges at ACI’s Drug and Med Litig...
 

Recently uploaded

Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

ACI's Global Encryption, Cloud & Cybersecurity Controls

  • 1. The only comprehensive event of its kind for the technology industry
  • 2. This is your chance to gain first-hand EU and U.S. Government updates on encryption, intrusion software, network surveillance, cloud and cybersecurity controls. AmericanConference.com/Encryption
  • 3. Widely regarded as the only comprehensive event of its kind, benefit from a unique opportunity to hear directly from U.S. and EU Government decision-makers: • Kevin Wolf, Assistant Secretary of Commerce for Export Administration, Bureau of Industry and Security • Joseph Whitehead, Special Agent in Charge, San Jose Field Office, Bureau of Industry and Security • Stéphane Chardon, DG Trade, European Commission • Mathilde Latour, Domestic and Export Control Unit, French Network and Information Security Agency (ANSSI) AmericanConference.com/Encryption
  • 4. The fully updated agenda includes a practical, in-depth panel on real-life Wassenaar implementation challenges: WASSENAAR – How New Proposals, 2015 Controls, and Countries’ Adoption of Note 4 and OAM Affect Your Global Encryption Compliance Strategy: • Kathleen Gebeau, Senior Director, Export Compliance, Qualcomm • Michael Maney, Senior Manager, Trade Compliance, Veritas Technologies • Josephine Aiello Lebeau, Partner, Wilson Sonsini Goodrich & Rosati AmericanConference.com/Encryption
  • 5. Hear from experts across the globe on export regulations, cybersecurity and encryption controls in the U.S., China, Hong Kong, Singapore, Malaysia, France, Russia and other key jurisdictions. AmericanConference.com/Encryption
  • 6. New topics for 2016 include: • Industry Roundtable Discussion-Export Compliance, Intrusion Software, Network Surveillance and Cybersecurity in Practice • TWO IN-DEPTH PANELS ON CHINA: o New Security Regulations and Big Encryption Controls Changes o Satisfying “Secure and Controllable Encryption” and Cybersecurity Requirements AmericanConference.com/Encryption
  • 7. Benchmark and network with your industry peers from leading technology companies: • Michael Angelo, Chief Security Architect, Micro Focus | NetIQ Corporation • Michael Maney, Senior Manager, Trade Compliance, Veritas Technologies • Neil Martin, Export Controls Programs Manager, Google • Kathleen Gebeau, Senior Director, Export Compliance, Qualcomm • Sooji Seo, Global Trade Counsel & Compliance Director, Dell • Lillian Norwood, Manager, Technology Transfers, IBM • Karmi Leiman, Senior Director, Trade Compliance, GlobalFoundries • Anne Marie Griffin, Deputy Director, Global Trade Policy, Microsoft • Steve Bird, Export Compliance Manager, Cisco Systems • Ramakrishna Dasari, Export Compliance Manager, Apple • Michael Lutz, Director of Trade Compliance, Google AmericanConference.com/Encryption
  • 8. Advance pricing expires on February 5th. Group rates are also available. For further details and to register, please call 888-224-2480 or visit AmericanConference.com/Encryption @ACILegal #ACIEncryption International Trade Association Partner: