Companies Home Search Profile

Data Privacy, Governance, and Compliance: How to Share Your Data with Privacy Controls

Focused View

Nishant Bhajaria

57:20

269 View
  • 01 - Welcome.mp4
    02:31
  • 02 - Who this course is for.mp4
    01:33
  • 03 - Data classification as part of data governance.mp4
    02:05
  • 01 - How data sharing works The ads use case.mp4
    02:50
  • 02 - How data sharing can go wrong.mp4
    03:19
  • 03 - Data sharing risks A case study.mp4
    07:25
  • 04 - When data sharing should raise red flags.mp4
    02:09
  • 05 - Valid reasons for data sharing.mp4
    01:16
  • 01 - Techniques to minimize privacy risk.mp4
    07:26
  • 02 - Anonymization concepts.mp4
    02:48
  • 03 - Anonymization techniques.mp4
    03:55
  • 04 - Encryption.mp4
    05:19
  • 01 - What is k-anonymity.mp4
    01:15
  • 02 - k-Anonymity A use case.mp4
    00:37
  • 03 - k-Anonymity With very coarse data.mp4
    01:29
  • 04 - k-Anonymity With very granular data.mp4
    01:39
  • 05 - k-Anonymity Industry best practice.mp4
    02:16
  • 01 - How l-diversity helps privacy.mp4
    00:45
  • 02 - k-Anonymity vs. l-diversity.mp4
    01:40
  • 01 - Your physical fingerprint.mp4
    00:50
  • 02 - Your digital fingerprint.mp4
    00:44
  • 03 - The power of joining outside data.mp4
    02:13
  • 01 - Next steps.mp4
    01:16
  • Description


    Companies that drive revenue and growth based on user engagement also face challenges sharing data. From re-identification to exfiltration to unmanaged access, data sharing presents several privacy risks. In this course, privacy and security executive Nishant Bhajaria helps data-driven innovators understand key technologies and players that are involved in the data sharing space. As part of a "shift left" governance strategy, find out how to perform a cost-benefit analysis around data sharing and its use cases. Learn to apply data-driven tests to measure privacy risks around data sharing. Explore ways to solve the privacy risks around data sharing at all levels: data, access, identity, transport, and storage. Contextualize data sharing in terms of user footprint digitally versus in real life. After this course, you will be able to enforce data protection policies throughout the data sharing process.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Nishant Bhajaria
    Nishant Bhajaria
    Instructor's Courses
    I am a cybersecurity and privacy executive, and have built teams and programs to help achieve these goals. I typically serve as a vital link between legal, engineering and C-level leadership to ensure that the company's products help protect user data and secure customer trust. This means that the impact of my teams ranges from building (or deprecating) product functionality, processes, artifacts and policy; and then, optimizing the program so that data protection does not impede innovation. I have been in this space long enough to remember when a C-level executive asked me at a presentation "why do we need to invest so much in security and privacy?"
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 23
    • duration 57:20
    • Release Date 2023/04/27