
GLOBAL LEGAL, PRIVACY & CYBER RISK CONFEX
DUBAI
OKTOBER 2022
Executing Defensible Decisions in Public-Market Enterprises
Legal, Privacy & Cyber Risk Decisions Under Real-World Pressure

Rechtsstreit. E-Discovery. Vertragsverwaltung. Dokumenten-Management. Datenprivatsphäre. Internet-Sicherheit. Risiko. Beachtung. Führung. Regulatorische Angelegenheiten. Schiedsverfahren. Streitbeilegung. Forensische Untersuchungen. Betrug & Korruption. Wirtschaftskriminalität. M&A. Juristische Übersetzung. Cloud Computing. Blockchain. KI. Rechtstechnologie.
Rechtsstreit. E-Discovery. Vertragsverwaltung. Dokumenten-Management. Datenprivatsphäre. Internet-Sicherheit. Risiko. Beachtung. Führung. Regulatorische Angelegenheiten. Schiedsverfahren. Streitbeilegung. Forensische Untersuchungen. Betrug & Korruption. Wirtschaftskriminalität. M&A. Juristische Übersetzung. Cloud Computing. Blockchain. KI. Rechtstechnologie.
Rechtsstreit. E-Discovery. Vertragsverwaltung. Dokumenten-Management. Datenprivatsphäre. Internet-Sicherheit. Risiko. Beachtung. Führung. Regulatorische Angelegenheiten. Schiedsverfahren. Streitbeilegung. Forensische Untersuchungen. Betrug & Korruption. Wirtschaftskriminalität. M&A. Juristische Übersetzung. Cloud Computing. Blockchain. KI. Rechtstechnologie.
Rechtsstreit. E-Discovery. Vertragsverwaltung. Dokumenten-Management. Datenprivatsphäre. Internet-Sicherheit. Risiko. Beachtung. Führung. Regulatorische Angelegenheiten. Schiedsverfahren. Streitbeilegung. Forensische Untersuchungen. Betrug & Korruption. Wirtschaftskriminalität. M&A. Juristische Übersetzung. Cloud Computing. Blockchain. KI. Rechtstechnologie.
Rechtsstreit. E-Discovery. Vertragsverwaltung. Dokumenten-Management. Datenprivatsphäre. Internet-Sicherheit. Risiko. Beachtung. Führung. Regulatorische Angelegenheiten. Schiedsverfahren. Streitbeilegung. Forensische Untersuchungen. Betrug & Korruption. Wirtschaftskriminalität. M&A. Juristische Übersetzung. Cloud Computing. Blockchain. KI. Rechtstechnologie.
Rechtsstreit. E-Discovery. Vertragsverwaltung. Dokumenten-Management. Datenprivatsphäre. Internet-Sicherheit. Risiko. Beachtung. Führung. Regulatorische Angelegenheiten. Schiedsverfahren. Streitbeilegung. Forensische Untersuchungen. Betrug & Korruption. Wirtschaftskriminalität. M&A. Juristische Übersetzung. Cloud Computing. Blockchain. KI. Rechtstechnologie.
Rechtsstreit. E-Discovery. Vertragsverwaltung. Dokumenten-Management. Datenprivatsphäre. Internet-Sicherheit. Risiko. Beachtung. Führung. Regulatorische Angelegenheiten. Schiedsverfahren. Streitbeilegung. Forensische Untersuchungen. Betrug & Korruption. Wirtschaftskriminalität. M&A. Juristische Übersetzung. Cloud Computing. Blockchain. KI. Rechtstechnologie.
Rechtsstreit. E-Discovery. Vertragsverwaltung. Dokumenten-Management. Datenprivatsphäre. Internet-Sicherheit. Risiko. Beachtung. Führung. Regulatorische Angelegenheiten. Schiedsverfahren. Streitbeilegung. Forensische Untersuchungen. Betrug & Korruption. Wirtschaftskriminalität. M&A. Juristische Übersetzung. Cloud Computing. Blockchain. KI. Rechtstechnologie.
Rechtsstreit. E-Discovery. Vertragsverwaltung. Dokumenten-Management. Datenprivatsphäre. Internet-Sicherheit. Risiko. Beachtung. Führung. Regulatorische Angelegenheiten. Schiedsverfahren. Streitbeilegung. Forensische Untersuchungen. Betrug & Korruption. Wirtschaftskriminalität. M&A. Juristische Übersetzung. Cloud Computing. Blockchain. KI. Rechtstechnologie.
Rechtsstreit. E-Discovery. Vertragsverwaltung. Dokumenten-Management. Datenprivatsphäre. Internet-Sicherheit. Risiko. Beachtung. Führung. Regulatorische Angelegenheiten. Schiedsverfahren. Streitbeilegung. Forensische Untersuchungen. Betrug & Korruption. Wirtschaftskriminalität. M&A. Juristische Übersetzung. Cloud Computing. Blockchain. KI. Rechtstechnologie.
Scale & Impact at a Glance
19 years of global impact. Trusted by senior decision-makers worldwide.

Who Attends
Senior decision-makers accountable for legal, privacy & cyber risk execution
General Counsels & senior legal leaders
Chief Privacy, Security & Compliance leaders
Enterprise risk, investigations & incident response heads
Legal operations, contracts & vendor governance leaders
Privacy, cybersecurity, risk & governance solution providers
Select law firm and advisory partners (privacy, cyber & investigations)
Attendance is curated to ensure seniority, relevance, and execution-level dialogue.

Why Attend & What You’ll Gain
Built for execution — not awareness.
You will:
-
Work through real execution challenges across privacy, cybersecurity, incident response, investigations, vendor risk, and defensible decision-making
-
Hear how senior leaders make and defend decisions under enforcement, board scrutiny, discovery risk, and public-market pressure
-
Take back practical frameworks, checklists, and execution insights you can apply immediately
-
Build a high-trust peer network with senior leaders onsite in New York

Execution-Led Conference Agenda
08:00 AM – 05:00 PM (Approx., Local Time)
All sessions focus on real decisions, trade-offs, and accountability — not theory, trends, or promotion.
08:00 AM onwards
Registration & Welcome Tea / Coffee
Registration, refreshments, and informal networking with delegates, speakers, and sponsors in the main conference hall.
08:30 AM – 09:00 AM
GC360 Speed Connect: Interest-Based Introductions
A facilitated networking warm-up enabling delegates to connect quickly across privacy, cyber risk, investigations, incident response, vendor risk, and legal operations — setting the tone for focused, execution-led dialogue.
09:00 AM – 09:40 AM
Execution Panel 1
Executing Defensible Decisions in Public-Market Enterprises
What In-House Leaders Document, Escalate & Defend
How senior leaders establish defensibility: decision ownership, escalation thresholds, documentation standards, board reporting, and what gets tested under regulator and litigation scrutiny.
09:40 AM – 10:20 AM
Execution Panel 2
Privacy Enforcement & Litigation Readiness
What Breaks First — and How Leaders Prepare
How organisations prepare for privacy scrutiny: investigations, response playbooks, defensible consent and governance practices, and how decisions are assessed under enforcement and discovery.
10:20 AM – 10:40 AM
Executive Keynote (Exclusive | Sponsor-Led)
Defensibility Under Fire: Decisions That Survive Regulators, Courts & Boards
Explores what makes decisions defensible when enforcement, litigation, and disclosure obligations collide.
Focuses on documentation, escalation, and accountability tested in hindsight.
10:40 AM – 11:00 AM
Networking & Coffee Break
11:00 AM – 11:40 AM
GC360 Curated Executive Exchange (Opt-In | Pre-Scheduled)
1:1 & Small-Group Executive Conversations
A curated executive exchange conducted during official conference hours and within the main conference hall.
Participation is strictly opt-in and non-commercial, designed to enable focused, execution-led conversations around real challenges faced by senior in-house leaders.
Conversation formats include:
-
GC-to-GC peer exchanges
-
Pre-approved 1:1 or small-group conversations between in-house leaders and selected solution experts
All conversations are curated, pre-scheduled, and context-approved in advance to preserve relevance, trust, and execution value.
11:40 AM – 12:00 PM
Real-World Execution Case Study 1 (Sponsor-Led)
The First 72 Hours: Decisions That Defined the Outcome
Breaks down the most critical decisions made immediately after a cyber or data incident.
Examines how escalation, disclosure, and regulator engagement shaped final outcomes.
12:00 PM – 12:40 PM
Execution Panel 3
When an Incident Hits
How Legal, Cyber & Privacy Leaders Decide in the First 72 Hours
How organisations respond during the most critical early hours of a cyber or data incident: escalation calls, disclosure judgment, regulator engagement, privilege strategy, and accountability under pressure.
12:40 PM – 01:00 PM
Real-World Execution Case Study 2 (Sponsor-Led)
Vendor Failure, Shared Accountability
Analyses real cases where third-party failures exposed enterprises to regulatory or litigation risk.
Highlights contractual blind spots, shared responsibility breakdowns, and board response expectations.
01:00 PM – 02:00 PM
Networking Lunch
02:00 PM – 02:40 PM
Execution Panel 4
Third-Party, Vendor & Supply Chain Risk
Defensible Controls When Accountability Is Shared
How leaders structure governance, contracts, oversight, and escalation when risk flows through vendors and shared responsibility models — and how these decisions are defended after incidents.
02:40 PM – 03:20 PM
Execution Panel 5
Protecting IP & Trade Secrets Under Disclosure & Discovery Risk
How organisations protect IP, trade secrets, and sensitive data when incidents, investigations, and litigation increase exposure — including vendor leakage and internal control breakdowns.
03:20 PM – 03:30 PM
Networking & Coffee Break
03:30 PM – 04:10 PM
Execution Panel 6 (Closing Panel)
What We Would Execute Differently Today
Defensibility Lessons from the Last 24 Months
Reflections from senior leaders on what they would redesign if starting again — what truly works, what fails under scrutiny, and how to build a defensible operating model.
04:10 PM – 04:40 PM
Peer Action Lab
Your Challenge. Your Table. Your 30-Day Action Plan
A facilitated working session where delegates collaborate in small groups around shared challenges — privacy governance, investigations, cyber readiness, vendor risk, legal operations — and identify one realistic action to implement within 30 days.
04:40 PM – 04:50 PM
GC360 Think Tank & Event Close
A facilitated closing session consolidating key execution insights from the day, with reflections on practical next steps and formal close of the conference.
This agenda is designed for senior in-house leaders responsible for execution and accountability — not awareness-level discussion.
Program and timings are subject to change.

Execution Leaders & Contributors
Senior leaders sharing real-world execution experience across legal, privacy, AI, cybersecurity, and governance.

Delegate Pass
USD 699
(All-Inclusive)
Registration is processed in USD via Eventbrite.
Delegate Pass Includes
-
Full-day access to all execution-led panels, keynote, and case studies
-
Informal networking opportunities
-
Networking lunch and refreshment breaks
-
CPD credits (where applicable)
-
Digital certificate of participation
Note: The Delegate Pass does not include participation in the GC360 Curated Executive Exchange (opt-in, by invitation).

Proven Conference Performance — New York 2025
-
Access to 100+ senior in-house leaders onsite
-
Engagement with GCs, AGCs, CLOs, CPOs, CISOs, and senior leaders across legal, privacy, compliance, and cybersecurity
-
Participation from global enterprises including U.S. Bank, HSBC, UBS, IBM, Fitch Group and more
-
Executive engagement through curated discussions and speaking roles

What Leaders Say
Short, credible reflections from senior participants on the value of GC360 execution-led conferences.
“I had a great experience speaking at the conference, with engaging discussions and meaningful peer exchange around real-world challenges.”

Anastasia Vener
Senior Litigation Counsel |
MetTel
“A powerful gathering of senior legal and privacy leaders. The discussions delivered practical execution insights I could immediately take back to my team.”

Sarah Van Sicklen
Global Privacy & Technology Counsel | Thermo Fisher Scientific
“A valuable forum for discussing real execution challenges in privacy and compliance under evolving regulatory pressure.”

Paula Heckrich
Attorney | U.S. Dep’t of Homeland Security
Regular Participants
Participation does not imply organisational endorsement.
Event Partners
Knowledge Partners

Past Event Partners













































































