Curriculum For This Course
Video tutorials list
-
Understanding the need for privacy in IT environment
Video Name Time 1. Evolving compliance requirements 04:24 2. Major Risks to a Company's IT Framework 11:28 3. Stakeholder expectations for privacy 04:49 4. Privacy vs Security 03:52 5. IT Governance vs Data Governance 01:56 -
Core Privacy Concepts
Video Name Time 1. Foundational elements for embedding privacy in IT (1) 11:16 2. Foundational elements for embedding privacy in IT (2) 04:28 3. Common Privacy Principles 03:22 -
Privacy Considerations & Techniques
Video Name Time 1. Collection 08:03 2. Use 07:18 3. Disclosure 04:47 4. Retention 07:00 5. Destruction 04:44 6. Authentication techniques 09:07 7. Identifiability 09:42 -
Privacy in Systems and Applications
Video Name Time 1. Identity and Access Management (IAM) 09:28 2. Credit card information & processing 06:48 3. Remote access, telecommuting and bridging devices to work 05:45 4. Data Encryption 08:24 5. Other Privacy enhancing technologies 04:33 -
GDPR Implementation - short intro guide!
Video Name Time 1. GDPR short overview 02:49 2. Format and Definitions 03:06 3. Principles 01:13 -
Lawful Processing of HR Data, Contracts & Recruiting
Video Name Time 1. Where do privacy and HR meet? 04:30 2. More difficult to rely on Consent 03:59 3. Data Protection Principles from HR perspective 06:26 4. Consent_no_longer_an_option_for_HR 04:10 5. Legitimate interests 04:49 6. Pseudonymisation 02:56 7. Cross Border HR Data Transfers under GDPR 02:42 8. Changes to employee data management under GDPR 04:28 9. DPOs and DPIAs from HR perspective 03:28 10. Data Breaches & what to take away from that 05:10 11. Action Steps from HR perspective 04:35 12. HR related policies and procedures 03:59 13. Contracts of employment - what to look for 03:47 14. Data Protection Policy 08:36 15. GDPR terms and how they relate to recruiting? 04:51 16. Map your recruiting data 02:25 17. Create a privacy policy for recruiting 02:54 18. Source candidates online with care 02:44 19. Ensure you job application process complies with GDPR 05:43 20. Ensure your software vendors are compliant 04:24 -
GDPR for Cloud Service Providers (CSPs)
Video Name Time 1. Cloud and GDPR Concerns 05:41 2. Looking at GDPR the right way 04:41 3. Controllers and Processors 08:44 4. CSP as a processor and GDPR 03:33 5. Technical and Organisational measures 5:00 6. Subcontracting 05:48 7. Detailed impact on cloud contracts 04:26 8. Clauses between a processor and a sub-processor 06:05 9. Codes of conduct, certifications and compliance 03:20 10. Important steps to compliance 00:49 11. Choosing a hosting provider 02:20 12. What businesses need to do 01:41 13. Software and CSPs to consider - part 1 07:27 14. Software and CSPs to consider - part 2 10:04 15. Software and CSPs to consider - part 3 10:40 16. Software and CSPs to consider - part 4 06:49 17. Advices for CSPs and Software providers 03:41 18. GDPR and IoT approach 04:50 19. There is far more in this space 02:39 20. GDPR requirements in an IoT context 06:17 21. Robots, AI, IoT and BigData 5:00 -
GDPR and Payment Services Directive (PSD2)
Video Name Time 1. What is PSD 2 and main objectives 04:18 2. Benefits for consumers 07:08 3. Scope of PSD2 directive 02:55 4. New rules on authorisation and supervision 05:26 5. New types of service providers - TPPs 06:41 6. Impact of PSD2 to financial services industry 04:29 7. New risks associated with the TPPs 06:48 8. Banks are caught between GDPR and PSD2 06:03 9. Other challenges - GDPR and PSD2 06:07 10. What is Open Banking Consent Model 04:17 11. Consent Step 02:38 12. Authentication Step 01:05 13. Authorisation Step 02:14 14. Redirection 01:29 15. Data Minimisation & Permissions 01:55 -
How Technology can help in achieving GDPR compliance
Video Name Time 1. What you will going to see in this section 03:31 2. Identity Protection demo (AAD IP) 12:37 3. Privileged Identity Management demo (PIM) 07:00 4. Mobile Productivity policies demo (Intune) 17:32 5. Classification, Labelling and Protection of Information demo (AIP) 09:28 6. Cloud application visibility and security demo (Cloud App Sec) 12:31 7. Security in cloud infrastructure environment demo 11:28 8. Defending and remediating endpoints from cloud demo 09:15
Add Comment