Companies Home Search Profile

Data Priacy, Video Edition

Focused View

12:19:26

76 View
  • Chapter 1. How data flows into and within your company.mp4
    03:46
  • Chapter 1. How priacy affects your business at a macro leel.mp4
    09:05
  • Chapter 1. How the role of engineers has changed, and how that has affected priacy.mp4
    05:37
  • Chapter 1. Priacy A mental model.mp4
    04:23
  • Chapter 1. Priacy engineering Why it s needed, how to scale it.mp4
    11:04
  • Chapter 1. Priacy tech and tooling Your options and your choices.mp4
    16:36
  • Chapter 1. Summary.mp4
    01:02
  • Chapter 1. What this book will not do.mp4
    00:31
  • Chapter 1. Why priacy matters.mp4
    29:00
  • Chapter 2. After building the tools comes the hard part Building a program.mp4
    07:05
  • Chapter 2. As you build a program, build a priacy-first culture.mp4
    04:46
  • Chapter 2. Data, your business growth strategy, and priacy.mp4
    04:18
  • Chapter 2. Examples When priacy is iolated.mp4
    10:56
  • Chapter 2. Priacy and the regulatory landscape.mp4
    05:55
  • Chapter 2. Priacy and the user.mp4
    04:54
  • Chapter 2. Summary.mp4
    01:01
  • Chapter 2. This could be your company.mp4
    06:49
  • Chapter 2. Understanding data and priacy.mp4
    13:35
  • Chapter 3. Data classification.mp4
    05:50
  • Chapter 3. Data classification An example.mp4
    05:43
  • Chapter 3. How to classify data with a focus on priacy laws.mp4
    05:50
  • Chapter 3. How you can implement data classification to improe priacy.mp4
    11:43
  • Chapter 3. Summary.mp4
    01:06
  • Chapter 3. The data classification process.mp4
    11:23
  • Chapter 3. Why data classification is necessary.mp4
    28:04
  • Chapter 4. A data inentory is not a binary process.mp4
    08:15
  • Chapter 4. Creating a baseline.mp4
    03:34
  • Chapter 4. Data inentory.mp4
    09:04
  • Chapter 4. Machine-readable tags.mp4
    09:14
  • Chapter 4. Summary.mp4
    00:51
  • Chapter 4. The technical architecture.mp4
    17:51
  • Chapter 4. Understanding the data.mp4
    05:31
  • Chapter 4. What does a successful data inentory process look like.mp4
    05:07
  • Chapter 4. When should you start the data inentory process.mp4
    09:22
  • Chapter 5. Data sharing.mp4
    18:00
  • Chapter 5. How to share data safely Security as an ally of priacy.mp4
    15:40
  • Chapter 5. Measuring priacy impact.mp4
    10:43
  • Chapter 5. Obfuscation techniques for priacy-safe data sharing.mp4
    18:30
  • Chapter 5. Priacy harms This is not a drill.mp4
    04:42
  • Chapter 5. Sharing internal IDs with third parties.mp4
    10:24
  • Chapter 5. Summary.mp4
    01:15
  • Chapter 6. Implementing the legal priacy reiew process.mp4
    03:31
  • Chapter 6. Integrating technical priacy reiews into the innoation pipeline.mp4
    10:24
  • Chapter 6. Making the case for a technical priacy reiew.mp4
    09:18
  • Chapter 6. Sample technical priacy reiews.mp4
    09:50
  • Chapter 6. Scaling the technical priacy reiew process.mp4
    07:33
  • Chapter 6. Summary.mp4
    01:08
  • Chapter 6. The technical priacy reiew.mp4
    21:14
  • Chapter 7. Data deletion.mp4
    05:57
  • Chapter 7. Deleting account-leel data Automation and scaling for distributed serices.mp4
    12:11
  • Chapter 7. Deleting account-leel data A starting point.mp4
    07:28
  • Chapter 7. How the data collection architecture works.mp4
    03:08
  • Chapter 7. Sensitie data deletion.mp4
    07:36
  • Chapter 7. Summary.mp4
    00:51
  • Chapter 7. What does a modern data collection architecture look like.mp4
    13:12
  • Chapter 7. Who should own data deletion.mp4
    02:07
  • Chapter 8. DSAR automation, data structures, and data flows.mp4
    17:16
  • Chapter 8. Exporting user data Data Subject Access Requests.mp4
    17:51
  • Chapter 8. Internal-facing screens and dashboards.mp4
    06:35
  • Chapter 8. Setting up the DSAR process.mp4
    08:21
  • Chapter 8. Summary.mp4
    00:58
  • Chapter 9. A consent management platform.mp4
    03:47
  • Chapter 9. A data schema model for consent management.mp4
    15:52
  • Chapter 9. Building a consent management platform.mp4
    16:53
  • Chapter 9. Consent code Objects.mp4
    18:27
  • Chapter 9. Integrating consent management into product workflow.mp4
    08:04
  • Chapter 9. Other useful capabilities in a CMP.mp4
    05:01
  • Chapter 9. Summary.mp4
    00:46
  • Chapter 10. Closing security ulnerabilities.mp4
    33:53
  • Chapter 10. Protecting priacy by closing access-control gaps.mp4
    08:52
  • Chapter 10. Protecting priacy by managing perimeter access.mp4
    55:50
  • Chapter 10. Summary.mp4
    00:56
  • Chapter 11. Priacy and the regulatory climate.mp4
    09:47
  • Chapter 11. Scaling, hiring, and considering regulations.mp4
    24:12
  • Chapter 11. Summary.mp4
    00:36
  • Chapter 11. The priacy engineering domain and skills.mp4
    07:20
  • Part 1. Priacy, data, and your business.mp4
    01:19
  • Part 2. A proactie priacy program Data goernance.mp4
    01:14
  • Part 3. Building tools and processes.mp4
    01:06
  • Part 4. Security, scaling, and staffing.mp4
    00:57
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    O'Reilly Media is an American learning company established by Tim O'Reilly that publishes books, produces tech conferences, and provides an online learning platform. Its distinctive brand features a woodcut of an animal on many of its book covers.
    • language english
    • Training sessions 80
    • duration 12:19:26
    • Release Date 2024/07/26

    Courses related to Cyber Security

    Subtitle
    Secure Coding with OWASP in Go
    Pluralsight Paul Mooney
    Paul Mooney
    Secure Coding with OWASP in Go
    4:18:01
    English subtitles
    08/20/2023
    Subtitle
    Automate Security By 30+ Ansible Examples

    Courses related to Cyber Security Awareness