Join Michelle Dennedy for an in-depth discussion in this video Next steps, part of Understanding and Prioritizing Data Privacy.
(gentle electronic music) … - If you'd like to learn more about data privacy, … there's an embarrassment of riches here. … Number one, I'm going to shamelessly tell you, … the 'Privacy Engineer's Manifesto' … going from policy to code to QA to value. … It's a personal favorite. … One that I wrote with Tom Finneran and my father, … Jonathon Fox, my business partner and myself, … and 32 other contributors from around the globe, … who are experts in this space. … You can get that free online in a digital version. … There are also organizations … like the IAPP that you can find at iapp.org, … that's the International Association … of Privacy Professionals. … There are numerous information and courses in the library … about ethical hacking and security. … You can also reach out in person to groups … like the Black Hat Conference … that happens in the depths of summer in Las Vegas, … to learn more about the exciting, … deep dark things going on in security. … And defcon is for the hardcore hackers …
Author
Updated
11/4/2019Released
10/2/2017- Relate the concept of data as intellectual property.
- Examine the ways in which moral, legal, and ethical concerns apply to data privacy.
- Explain how context applies to personal private information.
- Recognize the motivations of individuals accessing data they are not authorized to access.
- Define the implications of moral crumple zones.
Skill Level Intermediate
Duration
Views
Related Courses
-
Learning Data Governance
with Jonathan Reichental41m 4s Intermediate -
Data-Driven Network Security Essentials
with Jungwoo Ryoo1h 3m Intermediate -
Securing the IoT: Privacy
with Lisa Bock1h 59m Intermediate
-
Introduction
-
Welcome1m 1s
-
What you should know2m 4s
-
Privacy overview1m 55s
-
-
1. What Is Data Privacy?
-
Data tells a story2m 47s
-
Privacy vs. secrecy1m 27s
-
-
2. The Importance of Data Privacy
-
The individual's perspective1m 34s
-
Privacy is contextual1m 6s
-
Trust and integrity2m 55s
-
Consumer trust cliff2m 18s
-
Consumers want transparency2m 17s
-
-
3. What's at Stake?
-
Protecting the story4m 5s
-
Vulnerability to a system4m 42s
-
Data in the wrong hands2m 30s
-
React to privacy issues5m 24s
-
-
4. Privacy Solutions
-
Planning for data2m 5s
-
Privacy engineering2m 11s
-
Moral crumple zones4m 28s
-
Culture of privacy4m 10s
-
Innovation2m 40s
-
Conclusion
-
Emerging technologies3m 41s
-
Next steps1m 48s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Next steps