4 hours 7 minutes
Hello. I'm Desiree Green. I will be your instructor for this course. I'm a compliance professionals specializing in the areas of cybersecurity and privacy and I'm also a licensed attorney. I hold a couple of certifications and privacy and cybersecurity, namely the GEAC information security fundamentals
as well as the certified information privacy professional through I a P P.
Feel free to reach out to me via linton or through email if you wish to connect or if you have any questions regarding the course.
By the end of this course, students should be able to understand why then this privacy framework was developed and created,
demonstrate knowledge of in this privacy framework core
demonstrate knowledge of this privacy framework profiles as well as the framework implementation tears, how to adopt in this privacy framework through the ready set go methodology
and lastly comparing with this privacy framework to other privacy frameworks so that you can make the right determination for what framework work best for your organization.
Prerequisite that you should take prior to enrolling in this course is the introduction to data privacy course and the reason for that is that if you're not familiar with data privacy,
some of the terminology that we may use during this course may sound foreign to you.
So it's good to have an introduction of data privacy where you've been introduced some of the laws and regulations, um the govern data privacy as well as what it is so that you'll have a better understanding of how the um miss privacy framework should be applied within your organization
really, this course is intended for individuals who have a privacy risk management, cybersecurity or other similar roles and responsibilities within their enterprise. Um that could be anyone maybe that sits in a data privacy officer role um assist so role or someone who reports to the sea. So um
as well as just others who may have a genuine interest in the subject matter.
So the syllabus for this course includes 10 modules and module one will go through an overview of the MS privacy framework.
Modules two through six, we'll look at the Miss privacy framework core, the functions of identity govern control, communicate and protect.
And Module seven will look at in this privacy framework profiles.
And then module Aid will move into the Miss privacy framework implementation tears
next in Module nine will look at how to adopt in this privacy framework. And finally in module tonight will go through privacy framework comparisons.
So for this course, I've compiled many resources to help you um learn throughout this course and the previous slide we went through the syllabus but in the resources tab, you'll also find a study guide to help you through this course.
There will be two case studies in module nine that will cover on how to adopt it, how to adopt in this privacy framework, there'll be multiple references that you can click on. The hyperlinks within the resources tab Throughout a lot of the modules too.
Get additional information on how you might implement,
especially within the core functions, really how to look at um implementing or adopting whether it's the function, the category subcategory
There will be quizzes in some of the lessons as well as in order to um get the certificate of completion for this course, you do have to complete a 20 question assessment.
So in this video we covered the course objectives, the prerequisites and the syllabus. I hope that you'll join me as we move into module one.
Welcome to module one of 10. Introduction to the mist privacy framework.
As we go through this course, I will be showing the course outline and where we currently are within the course. So, as you can see from the slide here, we've completed the introduction and we're now moving into module one overview of the mist privacy framework.
Welcome to less than 1.1 privacy risk management.
So the learning objectives that we will cover in this video are what is privacy risk management?
The difference between cybersecurity risk versus privacy risks and attributes of a privacy risk management program?
So what is privacy risk management?
Privacy risk management is cross organizational set of processes that helps organizations to understand how their systems, products and services may create problems for individuals and how develop effective solutions to manage such risks.
So I'm sure most of you and your organization's collect personal data of some kind, whether that's from employees or potential employees or customers. And so what privacy risk is focused on is really the risk to those individuals. Should something happen to that personal data, whether
um it becomes unavailable
or its integrity has been violated
or its access by individuals that have no authority to access that data.
Um And we're going to see on the next slide, sort of how that plays into impacting the organization as well.
So why is privacy risk management important?
The issue is that problems arise from data processing. So from collecting personal data, whether that's from a potential candidate was applying for a job within your company or customer who is responding to a marketing campaign
um or other information that you may be collecting um even from partners or vendors
or even other individuals. The personal day that you have on hand has the risk of basically being
um authorized by individuals who have no business to access it
and possibly ending up in the hands of people that intend to sell it to others. Um whether that's from an identity theft standpoint,
um or from some other in the various standpoint. So problems arise from the data processing that as you can see here, impact the individual. It's a direct impact of the individual because as I mentioned before, they could suffer identity theft and from identity theft comes an economic loss, possibly even embarrassment.
And this in turn um is a resulting impact to the organization because when individuals personal data is affected, they can no longer really trust the company um is going to protect the information that's been collected from them. So you may see customer abandonment from that,
you could end up basically paying costs derived from a data breach, um whether that's from having to set up a call center to deal with uh notifying individuals and them being allowed being allowed to call in
From reputation to your um internal culture as well. So it becomes sort of a uh 360 sort of view here. So the problems arise and that it has a direct impact of the individual and the resulting impact of the organization and its why privacy risk management is important.
So when we start talking about privacy risk, we really want to differentiate that from a cybersecurity risk
and those of you that may be taking this course that may work um within the cyber security field may feel that these are synonymous with each other, but there really is a difference between a cyber security risks and privacy risk, but it doesn't mean that there isn't an overlap.
So in this instance, um a cybersecurity risk is a risk that is associated with the cybersecurity incident arising from loss of confidentiality integrity or availability.
Um And you'll notice here that a privacy risk is a risk that's defined as being associated with a privacy event arising from data processing. So what this means, it's a risk to basically how that data is handled, possibly, and how it's being stored, how it's being shared with another individual.
So that's what we mean by a privacy risk. And as you can see where the overlap here is that you could have a cybersecurity related privacy event,
so it could be that access to um to personal information basically is compromised, which means that it now becomes a cybersecurity related privacy event.
But we do want to show here that there is a clear difference between
really a security risk is what a cybersecurity risk is versus a privacy risk um where it's a risk basically to
um the stem from events from processing that personal data,
so attributes of a privacy risk management program. As we go through this course, you're going to get additional information on how you should be looking to possibly build your privacy management program.
But really what this is going to show you is really how you should be looking to assess um how to build that. So your privacy capabilities, this is really looking at um what you have, the bandwidth that you have within your company, the resources funding you want to know sort of where you stand because this is really gonna help determine how you can really build out your program. Um Next is really privacy requirements you really want to look to see. Uh and this is where sometimes scoping becomes a concern because depending on your type of organization, there may or may not be certain
laws and regulations that are applicable to you. For instance, if you're in healthcare, you have the hipAA privacy rule to be concerned about. Um If you're in finance, you possibly have G. L. B. A. That can um to be concerned with. So if you're not in either of those um arenas, those aren't necessarily regulations that you have to be
um compliant with. However,
if you do business in the EU um or marketing to individuals within the EU and transferring that data outside of the EU to another country,
then you could possibly uh G. D. P. R. Would be applicable to you.
So that's what we're looking at from privacy requirements standpoint. Um Once you kind of know what laws and regulations or other um privacy requirements you may have to adhere to and knowing your capabilities, um you that's when you really get into conducting privacy risk assessments and determining what are the privacy risks to an individual
and then how does that impact the company, looking at the likelihood of those events occurring? And really trying to lay out the framework for where there are privacy risks within your organization.
Um from there, that's when you get into requirements testing, is that you're looking to see um
can you be compliant basically with your privacy requirements based on the controls that you're putting in place to mitigate risks? Um and then you want to continue to monitor changing risks. So there may be new laws or regulations that come on the horizon. You want to be able to
add those possibly to your risk register
and continue to monitor um even the risks that you already have on that register, because sometimes you may be able to reduce the risk level or accept a risk. So just realize that the attributes you're putting in place for your privacy risk management program require continuous monitoring.
So before we move into the next lesson, let's take a quick quiz.
So privacy risks are associated with privacy events arising from one loss of confidentiality
To loss of integrity or three data processing.
So the correct answer here is data processing. You want to remember that? I said that there is a difference between cyber security risks and privacy risks and loss of confidentiality. Loss of integrity have more to do with security.
Data processing is what we're concerned with with data privacy. Um, so it's how you're processing the data that you want to be mindful of.
So in this video we covered the importance of privacy risk management,
how privacy risks differ from cyber risks and how privacy risk management practices and looking at the privacy risk management practice areas.
So I hope you'll join me as we move into less than 1.2
NIST 800-53: Introduction to Security and Privacy Controls
This course will provide Executives, Assessors, Analysts, System Administrators and students with the foundational knowledge ...
2 CEU/CPE Hours Available
Certificate of Completion Offered
CIS Top 20 Critical Security Controls
This course will provide students with an overview of the CIS Top 20 Critical Security ...
4 CEU/CPE Hours Available
Certificate of Completion Offered