SPEAKING ENGAGEMENTS

How Many Standards are Enough to Build a Privacy Program? | IAPP Global Privacy Summit 2025
Privacy impact assessments are a cornerstone of robust privacy compliance frameworks and an important part of a mature privacy program. PIAs proactively equip companies and institutions with an understanding of data processing and privacy impacts as well as possible remediation. Mandatory in California, Colorado, Connecticut, Texas, the EU and other regions, PIAs are non-negotiable in an increasing number of jurisdictions for high-risk processing activities (potentially harmful impacts to the individual).

Intersection of Data Protection Impact Assessments with AI and Everything Else | IAPP Global Privacy Summit 2025
Privacy impact assessments are a cornerstone of robust privacy compliance frameworks and an important part of a mature privacy program. PIAs proactively equip companies and institutions with an understanding of data processing and privacy impacts as well as possible remediation. Mandatory in California, Colorado, Connecticut, Texas, the EU and other regions, PIAs are non-negotiable in an increasing number of jurisdictions for high-risk processing activities (potentially harmful impacts to the individual).

Artificial Intelligence (AI) Governance | February PETed Sip & Chat
Despite all the advantages and benefits of AI, most of us are at the beginning of our AI governance journey. We need to learn how to handle and protect data during its use. Let’s talk about some of the key aspects of AI governance!

A CISO Guide to AI and Privacy
This presentation will discuss how to ensure your company has AI policies and plans in place based on industry best practices and applicable regulations. It will take into consideration the developing frameworks and other quickly evolving regulations.

Data Subject Requests (DSRs) | January PETed Sip & Chat
Our first monthly PETed Sip & Chat hosted by Janelle Hsia! Join us the 3rd Friday of every month at 11:00AM ET throughout 2025. Grab a beverage and come discuss Data Subject Requests (DSRs)!

Design Process Standard Deep Dive | Privacy Engineering & Technology Education Discussion (PETed)
IOPD President R Jason Cronk welcomes you to ask all your burning questions about the Design Process Standard published last year. The need for this standard is a culmination of several factors, and details the components necessary in a design process to incorporate privacy considerations and reduce privacy risks to individuals. The process could be the design of products, services or business processes and spans the lifecycle from ideation to deployment.

From Permission Usage to Compliance Analysis | Privacy Engineering & Technology Education Discussion (PETed)
What are the risks posed by the use of third-party code in the mobile ecosystem? How can you identify those risks before they become a regulatory headache?

Learn the Language of Privacy | 2024 PMI Mile Hi Symposium
Come Learn the Language of Privacy with Janelle Hsia at the 2024 PMI Mile Hi Symposium on April 5th in Denver! This is Colorado’s event for project management professionals, and over 1000+ of the brightest minds will be gathering at the Denver Convention Center!

ISSA Privacy SIG: 50 Shades of Data
It’s all about the data. Whether it's Data Subject Request or a Data Breach the amount of effort, cost and impact on a company's reputation depend on the quantity and the type of personal data involved. The more personal data, the larger the consequences…

ISSA Privacy SIG: Building a Responsible AI Culture
Artificial Intelligence (AI) is everywhere, even in places we don’t expect. We will explore a few areas like content generation, surveillance, and tracking with a deep dive into how companies utilize AI by extracting personal data and impact our everyday lives.

Vector Databases: AI Uses, Privacy Risks, and Mitigations | IOPD Privacy Engineering & Technology Education Discussion (PETed)
A short discussion of what a vector database is, how its popularity is soaring, why organizations are adopting it, and the many risks and misconceptions associated with the new types of data going into them.

Privacy by Design: More than just a catchy phrase! - ISSA Privacy SIG
“Privacy by design” has been part of the cybersecurity and privacy practitioners’ vernacular for well over a decade, but for many the phrase remains vague. In some of the new privacy laws, both in the US and globally, privacy by design is becoming something that companies must now implement. It can no longer be "vague."

Are you smart enough to use AI? | CSA Colorado Fall Summit 2023
Today Artificial Intelligence (AI) can be the dividing line between who gets help and who is left behind. An algorithm can not only be racist and decide who deserves what, but it can also lie faster and more convincingly. We will explore the following areas with a deep dive into how companies utilize AI by extracting personal data and impacting our everyday lives.

Closer Inspection of AI - Find Out What is Under the Hood | 2023 Phoenix Security & Audit Conference
Artificial Intelligence (AI) is everywhere, even in places we don’t expect. We will explore generative artwork, digital assistants, automated license plate readers, and smart home devices with a deep dive into how companies utilize AI by extracting personal data and impact our everyday lives.

50 Shades of Data - ISSA Colorado Springs 13th Annual Peak Cyber Symposium
Its all about the data. Whether it's Data Subject Request or Data Breach the amount of effort, cost and impact on a company's reputation depend on the quantity and the type of personal data involved. The more data, the larger the consequences. This presentation is a practical approach to privacy and data protection that includes strategies to help you get to stay compliant with the evolving privacy regulations.

Using ChatGPT (or similar tools) with Privacy Compliance | Privacy Engineering & Technology Education Discussion (PETed)
Do your employees unknowingly put personal or sensitive information (like mobile number, email address, social security number, etc.) in emails or PDF documents and accidently expose that information to the wrong people? In a world when employees are using tools like ChatGPT for productivity, do they need help generating synthetic data or learning what data to redact before uploading?

50 Shades of Data - ISSA August Cyber Executive Forum 2023
Its all about the data. Whether it's Data Subject Request or Data Breach the amount of effort, cost and impact on a company's reputation depend on the quantity and the type of personal data involved.

Privacy Operations: What’s On the Horizon in the US
A discussion of Privacy Operations for new Privacy laws coming into enforcement in 2023. This will be a conversation around how to best ensure compliance with CPRA and VCDPA as well as the new laws enacted by Colorado, Connecticut, and Utah. We will also touch on the other states that are coming into enforcement within the next 2 years.

Colorado = Security: 248
Janelle Hsia interviews Chelsea Kelleher, Privacy & Security Attorney on news from Fluid Truck, Guild, Red Canary, Ping Identity, LogRhythm, Optiv and a lot more.

RMISC - DNT, GPC, and UOOM Walk Into a Bar…
The Colorado Privacy Act (CPA) goes into effect on July 1, 2023. We’ll discuss the CPA's new Universal Opt-Out Mechanism (UOOM) in light of current Global Privacy Control (GPC) guidelines. Plus, with the Sephora decision in 2022, the California Attorney General threw down the gauntlet with a $1.2 M fine and let companies know that ignoring clear consumer signals will not be tolerated. This session will discuss the history of consumer preference signals like Do Not Track/Do Not Target (DNT), the technology behind the new GPC, and the regulations driving adoption. As new state privacy laws are enacted in the US, understanding UOOM and GPC will become critical to your company's success.

In Person ISACA Phoenix Chapter Meeting (with Virtual Option)
Its All About Data at 1:10 PM with Janelle Hsia! Join us in person at the ISACA Phoenix Chapter Meeting (with Virtual Option).

Listen to Me!: Global Privacy Control (GPC) and Consumer Preference
While Do Not Track/Do Not Target (DNT) failed, the Global Privacy Control (GPC) will have the force of law. This session will discuss the history of consumer preference signals, the technology behind the new GPC, and the regulations driving adoption. As new state privacy laws are enacted in the US, understanding GPC will become critical to your company's success.

CSNP Webinar: The Dirty Little Secrets of Privacy
Learn the dirty little secrets to going from thinking and reading about creating a privacy program to implementing and running one. No legalese, no technical jargon, no buzz words, no assessment required - just a practical privacy approach that includes strategies and tactics that can be applied to help you get or stay compliant with the evolving privacy regulations.

Episode 4: A Conversation with Janelle Hsia, President, Privacy SWAN Consulting
In this episode of the IEEE Digital Privacy Podcast Series, Janelle RW Hsia shares her insights on integrating privacy and security with technology to advance the digital privacy space. Learn what it takes to integrate privacy and security with technology, what Janelle calls the trifecta of a sustainable data privacy program

CSA Colorado 2022 Fall Summit
Applied Privacy: The dirty little secrets of creating a privacy program

Rocky Mountain Information Security Conference (RMISC) 2022
F5: Designing Privacy Into Your Smart System

CSA Colorado 2022 Fall Summit
Applied Privacy: The dirty little secrets of creating a privacy program

CSA Colorado: They Know What You Did!
Companies are the ones collecting and analyzing our personal data and they are the only ones who actually know how and why they are using it. It’s not just Facebook, Amazon, Apple, Microsoft, and Google anymore, almost every company has joined the race to collect as much data about us as they possibly can.

IAPP Global Privacy Summit 2022
What is "Privacy Risk?" Three Modern Methods for Risk Assessment

ISSA Privacy Special Interest Group: Birds of a Feather
The ISSA Privacy SIG would like to introduce a new series called Birds of a Feather (BoF). The BoF series will provide our ISSA Privacy SIG Members an opportunity to engage on topics relevant to their jobs.
-
April 2025
- Apr 24, 2025 How Many Standards are Enough to Build a Privacy Program? | IAPP Global Privacy Summit 2025 Apr 24, 2025
- Apr 22, 2025 Intersection of Data Protection Impact Assessments with AI and Everything Else | IAPP Global Privacy Summit 2025 Apr 22, 2025
-
February 2025
- Feb 21, 2025 Artificial Intelligence (AI) Governance | February PETed Sip & Chat Feb 21, 2025
-
January 2025
- Jan 21, 2025 A CISO Guide to AI and Privacy Jan 21, 2025
- Jan 17, 2025 Data Subject Requests (DSRs) | January PETed Sip & Chat Jan 17, 2025
-
June 2024
- Jun 27, 2024 Design Process Standard Deep Dive | Privacy Engineering & Technology Education Discussion (PETed) Jun 27, 2024
-
April 2024
- Apr 25, 2024 From Permission Usage to Compliance Analysis | Privacy Engineering & Technology Education Discussion (PETed) Apr 25, 2024
- Apr 5, 2024 Learn the Language of Privacy | 2024 PMI Mile Hi Symposium Apr 5, 2024
-
March 2024
- Mar 19, 2024 ISSA Privacy SIG: 50 Shades of Data Mar 19, 2024
-
December 2023
- Dec 19, 2023 ISSA Privacy SIG: Building a Responsible AI Culture Dec 19, 2023
- Dec 7, 2023 Vector Databases: AI Uses, Privacy Risks, and Mitigations | IOPD Privacy Engineering & Technology Education Discussion (PETed) Dec 7, 2023
-
November 2023
- Nov 21, 2023 Privacy by Design: More than just a catchy phrase! - ISSA Privacy SIG Nov 21, 2023
-
October 2023
- Oct 25, 2023 Are you smart enough to use AI? | CSA Colorado Fall Summit 2023 Oct 25, 2023
- Oct 12, 2023 Closer Inspection of AI - Find Out What is Under the Hood | 2023 Phoenix Security & Audit Conference Oct 12, 2023
-
September 2023
- Sep 12, 2023 – Sep 14, 2023 50 Shades of Data - ISSA Colorado Springs 13th Annual Peak Cyber Symposium Sep 12, 2023 – Sep 14, 2023
-
August 2023
- Aug 24, 2023 Using ChatGPT (or similar tools) with Privacy Compliance | Privacy Engineering & Technology Education Discussion (PETed) Aug 24, 2023
- Aug 6, 2023 50 Shades of Data - ISSA August Cyber Executive Forum 2023 Aug 6, 2023
-
June 2023
- Jun 20, 2023 Privacy Operations: What’s On the Horizon in the US Jun 20, 2023
- Jun 12, 2023 – Jun 30, 2023 Colorado = Security: 248 Jun 12, 2023 – Jun 30, 2023
- Jun 8, 2023 RMISC - DNT, GPC, and UOOM Walk Into a Bar… Jun 8, 2023
-
April 2023
- Apr 12, 2023 In Person ISACA Phoenix Chapter Meeting (with Virtual Option) Apr 12, 2023
-
February 2023
- Feb 21, 2023 Listen to Me!: Global Privacy Control (GPC) and Consumer Preference Feb 21, 2023
-
January 2023
- Jan 25, 2023 CSNP Webinar: The Dirty Little Secrets of Privacy Jan 25, 2023
- Jan 1, 2023 Episode 4: A Conversation with Janelle Hsia, President, Privacy SWAN Consulting Jan 1, 2023
-
October 2022
- Oct 18, 2022 CSA Colorado 2022 Fall Summit Oct 18, 2022
-
September 2022
- Sep 23, 2022 Rocky Mountain Information Security Conference (RMISC) 2022 Sep 23, 2022
-
August 2022
- Aug 22, 2022 CSA Colorado 2022 Fall Summit Aug 22, 2022
-
May 2022
- May 19, 2022 CSA Colorado: They Know What You Did! May 19, 2022
-
April 2022
- Apr 10, 2022 IAPP Global Privacy Summit 2022 Apr 10, 2022
-
March 2022
- Mar 8, 2022 ISSA Privacy Special Interest Group: Birds of a Feather Mar 8, 2022
-
January 2022
- Jan 25, 2022 ISSA Privacy Special Interest Group: Privacy and the “Law of Everything” Jan 25, 2022
- Jan 1, 2022 – Jan 1, 2023 Protecting Personal Data: Product Development in a Changing Regulatory Land Jan 1, 2022 – Jan 1, 2023
-
September 2021
- Sep 28, 2021 PrivacyConnect Denver: How To Get Started In The Privacy Field Sep 28, 2021
- Sep 21, 2021 ISSA Privacy SIG: When Security and Privacy Want Opposite Things Sep 21, 2021
- Sep 13, 2021 CU Boulder: Technology, Cybersecurity & Policy Seminar Series Sep 13, 2021
- Sep 10, 2021 – Jun 1, 2022 Computer Science at UC Boulder Sep 10, 2021 – Jun 1, 2022
-
August 2021
- Aug 17, 2021 ISSA Privacy Special Interest Group: How Nascent Privacy-tech Supports Operations While Preserving Confidentiality Aug 17, 2021
- Aug 2, 2021 Colorado = Security: 219 Aug 2, 2021
-
June 2021
- Jun 15, 2021 ISSA Privacy Special Interest Group: Why Privacy (Usually) Needs Anonymity Jun 15, 2021
-
April 2021
- Apr 20, 2021 ISSA Privacy Special Interest Group: Taking Responsibility for Someone Else’s Code Apr 20, 2021
- Apr 19, 2021 Colorado = Security: 207 Apr 19, 2021
- Apr 5, 2021 Colorado = Security: 205 Apr 5, 2021
-
March 2021
- Mar 16, 2021 CSA Colorado March 2021 Virtual Meeting Mar 16, 2021
- Mar 3, 2021 Security and Privacy: Can We Still Be Friends? Mar 3, 2021
-
February 2021
- Feb 15, 2021 Colorado = Security: 198 Feb 15, 2021
-
January 2021
- Jan 19, 2021 ISSA Privacy Special Interest Group: Pseudonymization vs. Encryption: Jan 19, 2021
- December 2020
-
October 2020
- Oct 20, 2020 ISSA Boise: Annual Information Security Conference Oct 20, 2020
- Oct 5, 2020 Colorado = Security: 183 Oct 5, 2020
-
August 2020
- Aug 19, 2020 ISSA Privacy Special Interest Group: The Osano Data Privacy and Data Breach Link Aug 19, 2020
-
June 2020
- Jun 25, 2020 ISSA Privacy Special Interest Group: Privacy and Security Considerations Post-Public Health Emergency Jun 25, 2020
-
April 2020
- Apr 26, 2020 Colorado = Security: 185 Apr 26, 2020
-
February 2020
- Feb 18, 2020 CSA Denver: Time to Adopt PETs Feb 18, 2020
-
November 2019
- Nov 10, 2019 CSA Denver: Shared Responsibility Model in the Age of Cloud Nov 10, 2019
-
October 2019
- Oct 29, 2019 SecureWorld Denver: How Privacy and Security Work Together Oct 29, 2019
-
June 2019
- Jun 10, 2019 Westnet Salt Lake City: How Security and Privacy Work Together Jun 10, 2019
- Jun 4, 2019 Rocky Mountain Information Security Conference (RMISC) Community Day Jun 4, 2019
-
January 2019
- Jan 10, 2019 CSA Denver: GDPR Meetup Jan 10, 2019
-
June 2018
- Jun 10, 2018 Westnet Phoenix: From Privacy to GDPR Jun 10, 2018
-
April 2018
- Apr 10, 2018 CSA Denver: Data Privacy and the Cloud Apr 10, 2018
-
January 2018
- Jan 11, 2018 How to Measure Compliance Program Effectiveness Jan 11, 2018
-
May 2017
- May 10, 2017 CSA Denver: SaaS Risk Management Using STAR May 10, 2017