Join Michelle Dennedy for an in-depth discussion in this video React to privacy issues, part of Understanding & Prioritizing Data Privacy.
- What should you do in the face of a breach…or a theft or some other doubt…that's thrown on your data sets?…There's a number of different things that you need to do.…One, you should practice before this even happens.…You should have tabletop exercises…and let you mind run wild.…Go watch some scary TV shows about dystopian futures…and then play them out in your mind.…Be creative and imagine all the different ways…that data may be used or misused,…either to enrich another third party,…harm your customers, harm your employees,…compromise your business,…and think through those scenarios.…
What would it mean if your vendors went wild…and started sharing and oversharing information?…Or what would it mean if an attack…on your information came through one of your vendors?…Whether they're a traditional infosec-type vendor,…or whether they're someone who…deals with your air conditioning vents…and they're able to get in and tap into your networks.…It's happened before.…So thinking through the scenario testing…and really playing with who's the right person…
- What is data privacy?
- Privacy vs. secrecy
- Trust and integrity
- What consumers expect
- Privacy solutions
Skill Level Intermediate
1. What Is Data Privacy?
2. The Importance of Data Privacy
3. What's at Stake?
4. Privacy Solutions
Next steps1m 48s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.