Systems will be breached by bad actors. Discover how systems can be designed to reduce the impact of a breach and defend against malicious acts.
- Moral crumple zones are not my branding or idea at all. … They are an idea and a paper that I will commend … to all of you by a wonderful woman who, … by the time we air this, will have her doctorate in hand, … Doctor Madeleine Elish. … And what Dr. Elish was working on just really rang true … with me and we had a long conversation about it. … When cars were first invented … and for a very long period of time, … safety meant making them harder, making them stronger, … making them one, solid unit. … Unfortunately, what happened is, the vehicle, … as the horsepower got even stronger, … the occupant was still governed by the laws of entropy. … And so if you ran into something … or the car just stopped too soon … or, you know, collided with a tree, … the occupants would fly forward … and then smash, bam off you go. … Not a good thing. … So instead, the designers of vehicles … have these empty pockets where physics and geometry is used … to direct all the energy for the known unknowns. …
- What is data privacy?
- Privacy vs. secrecy
- Trust and integrity
- What consumers expect
- Privacy solutions
Skill Level Intermediate
1. What Is Data Privacy?
2. The Importance of Data Privacy
3. What's at Stake?
4. Privacy Solutions
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.