Companies Home Search Profile

Implementing the NIST Privacy Framework

Focused View

Ronald Woerner

1:45:26

0 View
  • 01.01-privacy framework welcome.mp4
    00:59
  • 01.02-what you should know.mp4
    01:11
  • 02.01-privacy framework introduction.mp4
    03:58
  • 02.02-what is privacy.mp4
    04:39
  • 02.03-why care about privacy.mp4
    04:57
  • 02.04-nist privacy framework structure.mp4
    05:10
  • 02.05-establishing and improving a privacy program.mp4
    04:08
  • 02.06-privacy vs. security vs. compliance vs. risk.mp4
    03:21
  • 02.07-leveraging the nist privacy framework for a privacy risk program.mp4
    03:02
  • 03.01-identify-p function.mp4
    01:33
  • 03.02-data inventory and mapping.mp4
    04:59
  • 03.03-business environment.mp4
    04:09
  • 03.04-data processing risk identification.mp4
    04:14
  • 04.01-privacy governance policies and procedures.mp4
    05:01
  • 04.02-privacy risk management strategy.mp4
    02:53
  • 04.03-monitoring review awareness and training.mp4
    04:20
  • 05.01-data processing policies processes and procedures.mp4
    02:57
  • 05.02-data processing management.mp4
    02:57
  • 05.03-disassociated processing.mp4
    02:53
  • 05.04-communicate data processing policies and practices.mp4
    04:45
  • 05.05-challenge nist pram worksheets.mp4
    04:34
  • 06.01-data protection and maintenance practices and procedures.mp4
    03:19
  • 06.02-identity management authentication and access control.mp4
    03:31
  • 06.03-data security.mp4
    03:41
  • 06.04-protective technology.mp4
    03:52
  • 07.01-detecting privacy issues.mp4
    03:48
  • 07.02-response and recovery.mp4
    04:07
  • 08.01-privacy impact assessments (pias).mp4
    02:10
  • 08.02-privacy management plans.mp4
    02:48
  • 09.01-privacy next steps and resources.mp4
    01:30
  • Description


    These days, a large-scale security breach seems to be an almost-daily occurrence. Standing in the balance is the personal information of millions of people, alongside the private records of your entire organization. Losses incurred by a security breach can spell disaster, but you can always do more to mitigate the risk. In this course, security expert Ronald Woerner shows you how to implement the NIST Privacy Framework to better protect critical customer information.

    Explore the fundamentals of the NIST Privacy Framework and how your organization can use it to categorize and effectively oversee its in-house privacy protocols. Discover the benefits of implementing the NIST Framework as a safeguard in your security management lifecycle. Learn strategies of identifying, managing, and mitigating privacy risks, as Ronald teaches you how to assess your own specific needs and outcomes, highlighting real-world examples and best practices along the way.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Ronald Woerner
    Ronald Woerner
    Instructor's Courses
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 30
    • duration 1:45:26
    • Release Date 2024/10/14