Three days of world-class sessions, workshops, and keynotes — curated to inspire, educate, and connect the global tech community.
This session dives deep into the regulatory landscape of DPDPA, focusing on the practical hurdles faced by organizations during the implementation phase. We will cover data localization, consent management, and the role of the Data Protection Officer.
• Understanding compliance checklists for DPDPA.
• Strategies for automated consent management.
•
Managing cross-border data transfer risks.
Privacy is often viewed as a cost center. This session reevaluates that perspective, looking at the ROI of privacy, the operational costs of data breaches, and how privacy-by-design can actually reduce long-term expenses.
• Budgeting for enterprise-wide privacy programs.
• Quantitative metrics for privacy ROI.
•
Reducing overhead through automated compliance.
The decline of third-party cookies is reshaping digital advertising. This session explores behavioral targeting alternatives and how to maintain marketing effectiveness while respecting user privacy.
• Implementing first-party data strategies.
• Understanding Clean Rooms and Privacy Sandboxes.
•
Future-proofing ad-supported business models.
As digital platforms target younger audiences, age verification and child safety become central concerns. This session examines the regulatory landscape and best practices for protecting minors.
• Designing age-appropriate interfaces.
• Implementing robust parental consent flows.
• Global
trends in children's privacy regulations.
As AI agents begin acting independently, privacy risks evolve beyond traditional data processing. This discussion explores the unique challenges of long-term memory and agentic behavior.
• Governing AI agent permissions.
• Managing data in LLM memory systems.
• Accountability
frameworks for autonomous decisions.
Privacy is shifting from legal documentation to engineering architecture. This session focuses on technical implementation of privacy controls and developer-centric compliance tools.
• Integrating privacy into the CI/CD pipeline.
• Automated data discovery and classification.
•
Implementing robust telemetry controls.
Healthcare data is among the most sensitive categories of personal information. This session explores the intersection of health innovation and strict privacy compliance.
• Handling sensitive medical information in the cloud.
• Compliance for AI-driven diagnostic
tools.
• Patient data ownership and access rights.
Security incidents increasingly become privacy incidents. This panel examines how CISOs and privacy leaders must collaborate to manage modern risks and ransomware threats.
• Building a privacy-aware security operations center.
• Integrated incident response
frameworks.
• Managing insider risks to sensitive data.
Consumers increasingly expect meaningful control over their data. This session explores how organizations can go beyond legal minimums to build true trust through better UX.
• Avoiding dark patterns in consent flows.
• Implementing granular preference centers.
•
Measuring the impact of privacy UX on trust.
Managing privacy at scale requires coordination between legal, engineering, and operations. This session focuses on the "how" of enterprise privacy governance.
• Building cross-functional privacy councils.
• Automating Data Subject Access Requests
(DSARs).
• Scalable privacy impact assessments.
Static privacy notices are evolving toward structured systems. This session explores how machine-readable policies can enable automated compliance and better user control.
• Adopting emerging policy metadata standards.
• Automated negotiation between users and
services.
• Building AI-ready governance structures.
Connected infrastructure generates massive amounts of behavioral data. This session explores how cities can leverage IoT while protecting the privacy of residents.
• Implementing privacy-by-design in urban tech.
• Managing transparency for public
surveillance.
• Data sharing models for public-private partnerships.
Privacy is no longer just a compliance issue — it is a strategic business concern. This session explores how privacy leaders can effectively communicate risk to the board.
• Framing privacy as a competitive advantage.
• Reporting metrics that matter to the C-suite.
•
Managing regulatory risk in emerging markets.
Privacy experiences are often confusing and legalistic. Designers and product leaders discuss how to make transparency layers intuitive and engaging for users.
• Building "just-in-time" notice patterns.
• Simplifying complex privacy settings.
• Visual
language for data transparency.
CMPs are evolving from compliance tools into trust infrastructure. Experts discuss the next generation of preference orchestration and interoperability standards.
• Implementing GPC (Global Privacy Control).
• Standardizing consent receipts across platforms.
•
Choosing the right CMP for global scale.
The DPDPA introduces a fiduciary-style approach to handling personal data. This session examines the legal and operational implications for "Significant Data Fiduciaries."
• Navigating Data Protection Impact Assessments.
• Appointing a Data Protection Officer (DPO).
•
Audit requirements for major fiduciaries.
Technologies like differential privacy and secure enclaves are redefining data protection. Experts explore practical deployment and trade-offs of these advanced PETs.
• Practical federated learning for mobile apps.
• Homomorphic encryption in financial services.
•
Scaling PETs for high-performance applications.
India’s DPI ecosystem is becoming a global model. Experts discuss embedding privacy into public digital infrastructure at population scale.
• Building trust in population-scale systems.
• Technical standards for public data protocols.
•
Lessons from India's DPI journey.
Privacy enforcement is becoming more aggressive worldwide. Legal experts discuss how organizations should prepare for regulatory investigations and penalties.
• Preparing for regulatory audits and visits.
• Lessons from global enforcement actions.
•
Mitigating litigation risk through transparency.