Relive Bridge Summit 2025
There is a lack of avenues for privacy professionals to discuss technical solutions and openly share their experiences in solving complex privacy challenges. Bridge exists to fill this gap. We are grateful to everyone who joined Bridge this year.
Sessions
Bridge 2025 will include presentations, panels, and workshops focusing on these five themes.
In today’s hyper-connected, software-driven world, privacy risks multiply as organizations scale. Relying solely on trust means counting on each team’s best intentions and manual processes to maintain compliance—a strategy that simply can’t keep up. The future of privacy technology is a new approach focused on the primary source of privacy risk: product. Only evidence-based privacy can address growing the risk, and the evidence lies in software products. We call this approach product privacy management. Implementing product privacy management means privacy is integrated across the product/software development lifecycle: design, development, and launch. Hear from privacy leaders at HP and Grindr how their organizations are already benefitting from this approach. Privado.ai’s co-founders will finish the keynote by sharing how Privado.ai's product roadmap is building towards the product privacy management vision.




Privado.ai’s 2025 State of Mobile App Privacy Report highlights the significant challenges privacy teams face with mobile apps. With most top mobile apps found to not honor consent according to current privacy regulations, new privacy solutions are clearly needed to monitor consent compliance. Relying solely on a consent management platform isn’t enough. Join Vaibhav Antil, CEO and Co-Founder of Privado.ai, as he shares insights from the report, examines why so many organizations struggle with these challenges, and discusses available solutions.

Most privacy fines in the US are due to non-compliant data sharing with marketing partners, and the trend is only getting worse. Marketing teams, partners, and tools have traditionally depended on personal data sharing to measure and optimize campaigns, and they have all still yet to adapt to current privacy regulations. Join this panel of privacy legal experts and practitioners to learn about privacy enforcement trends, technical compliance challenges, and best practices for risk mitigation.





Fines for non-compliant data sharing are increasing at a rapid pace, and privado.ai’s research has found that most websites and mobile apps risk non-compliance with regulations in the US and Europe. While many companies have implemented consent management platforms across their websites and mobile apps, few monitor the actual data flows to third parties to ensure they align with user consent and applicable regulations. In this workshop, Ben Werner, product marketing manager, and Patrick Murthey, customer success manager, from Privado.ai will walk through the most common consent compliance risk on websites and mobile apps and share the best practices for implementing technologies to minimize those risks.


LLMs and AI have gone from being a topic of discussion to becoming deeply integrated into every product. Privacy leaders must act quickly to develop and implement governance frameworks that help them deal with the complex privacy, security, and ethical considerations of this new reality. Join this panel of AI and privacy leaders as they discuss how they solved AI governance challenges in their organizations and what best practices they learned in the process.




Explore how prioritizing trustworthiness in AI can create advantages for your business. In this panel, privacy leaders will discuss strategies for building AI systems that are ethical, transparent, and secure—and how these qualities can create competitive advantages. Learn how aligning AI trustworthiness with organizational values and customer expectations can foster innovation and market leadership.




Privacy compliance must become more automated or privacy risks will only get worse. Privacy teams today are challenged with solving complex privacy problems with minimal resources and tools. Join this panel of leading privacy researchers and practitioners to hear how innovative privacy teams are using LLMs to automate privacy reviews.



.jpeg)
It's time to make privacy a business-enabler instead of a blocker. When privacy teams get involved early, communicate effectively, and become integrated with other teams' workflows, they can remove obstacles instead of creating them. Join this panel of experienced privacy leaders to learn what techniques and technologies they used to help the business move faster while reducing risk.




Privacy assessments like PIAs and DPIAs must be conducted to evaluate the privacy risk and document compliance for new and existing products and activities, but they often expend valuable resources and delay timelines. Join this discussion to learn best practices for developing scalable privacy assessment processes that leverage technology, minimize manual effort, and accurately assess risk.




In today’s tech-driven world, privacy roles have quickly become more technical. It’s not enough to know how to create policies and contracts that adhere to privacy regulations. To ensure privacy policies are followed, privacy teams learn more about the source of most privacy risk: software. Software controls personal data flows: how data is collected, shared, used, and stored. As software is now constantly being updated, personal data flows are constantly changing, creating more and more privacy risks. In this presentation, leading technical privacy expert, Nishant Bhajaria, and Privado.ai chief scientist, Suchakra Sharma, will provide a quick primer for how software is developed and the implications for privacy teams. You will learn about each stage of the software development lifecycle (SDLC), key terminology, and how privacy can be integrated into the process.


Privacy regulation and enforcement continues to be in a constant state of flux. We saw many new laws and precedent-setting lawsuits in 2024, and we expect this trend to only accelerate in 2025. Join legal privacy experts Keir Lamont from leading US privacy think tank, Future Privacy Forum and Matthew Nuding from UK lawfirm Wilson Sonsini Goodrich & Rosati as they discuss the latest US and European privacy regulatory developments and enforcement trends to prepare for in 2025.



Technical privacy reviews are a critical tool for achieving Privacy by Design. Before starting on projects or products with privacy risks, privacy experts should evaluate how the project/product can be designed to minimize privacy risk. In this workshop, privacy consultant, Tariq Yusuf, will walk through how they conduct technical privacy reviews and share best practices they have learned in the process.

Chief Privacy Officers (CPOs) are often put in an impossible position: prevent privacy risk and support growth goals from the board. As privacy regulations and consumer expectations have increased, more pressure is being put on CPOs to integrate privacy across the business without slowing things down. This means CPOs must work across more stakeholders and stay ahead of technology changes that increase risk. Join this panel of leading CPOs to learn how they have successfully managed this balancing act.




Data Protection Officers (DPOs) are put in the difficult position of enforcing privacy compliance, particularly at large tech-driven organizations that control massive amounts of data. As enforcement has become stricter and data flows have become more complex, DPOs have to continually improve compliance processes and solutions to keep up. Join this panel of proven DPOs to learn how they have addressed these challenges and how you can apply their learnings in your organization.


Privacy engineering is an emerging and complicated field. Privacy engineering requires a unique combination of regulatory knowledge and technical expertise. Privacy engineers must work across privacy and engineering teams that often speak different languages. Learn from a panel of experienced privacy engineers who will discuss how they have built their expertise, navigated organizational challenges, and added value to privacy and engineering teams.




Speakers








































.jpeg)


Partners
Be the first to know about upcoming events
More information
Bridge Summit 2025 is a virtual two-day conference organized by privado.ai and held on February 5-6, 2025 for privacy leaders and privacy engineers to openly discuss technical privacy challenges and solutions.
The IAPP (International Association of Privacy Professionals) has approved for Bridge Summit attendees to receive CPE credits that count towards a number of IAPP certifications.
Bridge Summit attendees can receive up to 7.5 CPE credits for the following certifications: CIPP/A, CIPP/C, CIPP/CN, CIPP/E, CIPP/US, CIPM, and CIPT. Additionally, attendees can receive 1.5 CPE credits for the AIGP certification by attending these three sessions: (1) From the Trenches: Solving AI Governance Challenges and (2) Making Trustworthy AI a Business Advantage (3) Automating Privacy in your Organization: Challenges & Opportunities
To receive CPE credits, attendees must self-report attendance at iapp.org/certify/cpe-submit/
In 2024, over 1,200 privacy professionals joined the first edition of Bridge Summit. The event’s 19 speakers included a wide range of privacy leaders and technical privacy experts from companies like Uber, DoorDash, eBay, Cisco, and AppsFlyer. See the full recap of the 2024 Bridge sessions here.
Yes, Bridge Summit is free for all to join. Register for Free to get access links for event.
Registered participants will receive an email with a unique link to join the event a few days prior to the event.
Yes. The IAPP (International Association of Privacy Professionals) has approved for Bridge Summit attendees to receive CPE credits that count towards a number of IAPP certifications.
Bridge Summit attendees can receive up to 7.5 CPE credits for the following certifications: CIPP/A, CIPP/C, CIPP/CN, CIPP/E, CIPP/US, CIPM, and CIPT.
Additionally, attendees can receive 1.5 CPE credits for the AIGP certification by attending these three sessions:
- From the Trenches: Solving AI Governance Challenges
- Making Trustworthy AI a Business Advantage
- Automating Privacy in your Organization: Challenges & Opportunities
To receive CPE credits, attendees must self-report attendance by doing the following:
- Access your IAPP account and navigate to the CPE Submission Form
- Select “NonIAPP Conference or Event” or “CPE” on the Professional education activity drop-down menu
- Choose the applicable certification(s) you would like to submit the CPE credits for
- Enter the date of the event and the number of CPE credits earned. In the Notes section, add the title of the event
- Hit submit! The credits are immediately added to your account
Yes, register now to get the recordings in your inbox after the event.
Data Privacy Day is “an international effort to create awareness about the importance of respecting privacy, safeguarding data and enabling trust.” Initiated in 2007 by the Council of Europe and adopted in 2009 by the United States, Data Privacy Day is now observed by over 50 countries around the world.
At Privado, we take pride in celebrating this day every year in a big way and Bridge Summit is our way of doing just that for 2024.