After a data breach, companies are on the clock to respond. Learn how to prepare for and respond to a breach.
- What should you do in the face of a breach or a theft, … or some other doubt that's thrown on your data sets? … There's a number of different things that you need to do. … One, you should practice before this even happens. … You should have tabletop exercises … and let your mind run wild. … Go watch some scary TV shows about dystopian futures, … and then play them out in your mind. … Be creative and imagine all the different ways … that data may be used or misused, … either to enrich another third party, harm your customers, … harm your employees, compromise your business, … and think through those scenarios. … What would it mean if your vendors went wild … and started sharing and oversharing information? … Or what would it mean if an attack on your information … came through one of your vendors? … So thinking through these scenarios, … testing and really playing with … who's the right person involved within your organization? … How do I get to better in the moment in the context? …
- What is data privacy?
- Privacy vs. secrecy
- Trust and integrity
- What consumers expect
- Privacy solutions
Skill Level Intermediate
1. What Is Data Privacy?
2. The Importance of Data Privacy
3. What's at Stake?
4. Privacy Solutions
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.