Course Summary
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Difficulty
Intermediate
Video Transcription
00:00
Module 4.2 Course Summary.
00:05
In this module, we're going to explore topics covered from the course
00:10
module one. Module four have to do with the intro in the summary. So I want to focus on reviewing module to in module three, or module to is the privacy strategy and program
00:20
In Module three gets into the operation elements of the privacy program
00:24
and module to. We started out by talking about the role of the privacy manager reviewed privacy manager. Job descriptions.
00:30
We talked about developing a strategy and vision for the program. Established a program, data governance model, but just how information flows in and out of our organization.
00:39
Specifically our program we define a program scope and charter,
00:43
we identified how pIA is used and applicable loss.
00:47
We also had some additional program considerations that may not have been covered in the previous modules.
00:53
Also included an introduction to ISO slash i e c 27701 And this privacy framework version one point which are
01:00
two Very new. Less than a year old
01:03
uh privacy standards and frameworks that we can use to help influence and build or reinforce our programs.
01:11
Module three again got into the operational elements where we talked about how to develop policy standards and guidelines,
01:19
talked about some supporting policies to support. Our privacy program, talked about metrics, audits and assessments.
01:25
We had a guest speaker. Our 1st 1 Bob Johnson where you talked about information disposition.
01:30
We had a discussion about security and then we had another visitor talked to us about data protection was dr lisa Dolby.
01:38
We had some vendor privacy examples. We talked about record retention, if you remember one of my favorites.
01:42
We had a retention discussion with john Montagna
01:48
and we went into education awareness, privacy by design. We talked about data subjects and we explore data subjects in the US and the EU. As a couple of examples,
01:57
we had another visitor, our last visitor information request with Monica,
02:01
right shirt
02:04
and
02:06
incident management. Incident management roles. And instant examples were discussed.
02:14
So at some point you're going to be asked about this course and I really encourage you to give feedback on what you loved about this course.
02:22
Instructors like me love feedback
02:23
whether it's good or bad, we want to know what you love.
02:28
Also, privacy is such a broad area.
02:30
We want to know if there was something that was missing from this course.
02:34
Sai Buri has a lot of really good resources out there on the topic and this one had to do with privacy program management, which is pretty specific.
02:42
However, if you felt something needed to be included,
02:45
please let us know
02:49
in this module. We discussed why the topics in the course were chosen
02:52
and we ask for feedback about of course
Instructed By
Similar Content