Companies Home Search Profile

Ultimate Privacy by Design Data Protection Course(GDPR,LGPD)

Focused View

Roland Costea

5:44:49

4 View
  • 1 - Introduction Why Privacy by Design is extremely important.mp4
    05:19
  • 2 - What you will learn in this course.mp4
    06:43
  • 3 - 1udemymay2022dataprivacygdprccpalearningplanbyrolandcosteav2021xlsx.zip
  • 3 - IAPP certification learning plan CIPT CIPM CIPPE.mp4
    03:02
  • 4 - Powerpointpresentations.zip
  • 4 - Powerpoint Presentations for download.html
  • 5 - How was privacy by design adopted during time.mp4
    03:30
  • 6 - Privacy by Design Principle 1.mp4
    02:18
  • 7 - Privacy by Design Principle 2.mp4
    03:15
  • 8 - Privacy by Design Principle 3.mp4
    02:51
  • 9 - Privacy by Design Principle 4.mp4
    03:47
  • 10 - Privacy by Design Principles 5 6 and 7.mp4
    04:14
  • 11 - Are there any challenges.mp4
    02:11
  • 12 - It is extremely important to include privacy from early stages.mp4
    09:54
  • 13 - What is this section about.mp4
    01:32
  • 14 - Individuals.mp4
    05:26
  • 15 - Important Actors.mp4
    06:50
  • 16 - Links and Relationships.mp4
    03:10
  • 17 - Privacy by Design Example 1.mp4
    02:11
  • 18 - Privacy by Design Example 2.mp4
    01:05
  • 19 - Privacy by Design Example 3.mp4
    02:47
  • 20 - Violations Overview.mp4
    04:44
  • 21 - Information collection.mp4
    06:56
  • 22 - Information processing part 1.mp4
    10:35
  • 23 - Information processing part 2.mp4
    10:33
  • 24 - Information dissemination part 1.mp4
    12:42
  • 25 - Information dissemination part 2.mp4
    09:15
  • 26 - Invasions.mp4
    08:23
  • 27 - Centralization.mp4
    03:56
  • 28 - Identifiability.mp4
    07:27
  • 29 - Privacy DataOriented Strategies SEPARATE.mp4
    05:46
  • 30 - Privacy DataOriented Strategies MINIMIZE part 1.mp4
    05:40
  • 31 - Privacy DataOriented Strategies MINIMIZE part 2.mp4
    05:35
  • 32 - Privacy DataOriented Strategies HIDE.mp4
    06:44
  • 33 - Privacy DataOriented Strategies ABSTRACT.mp4
    04:15
  • 34 - Privacy ProcessOriented Strategies ENFORCE.mp4
    07:44
  • 35 - Privacy ProcessOriented Strategies DEMONSTRATE.mp4
    05:44
  • 36 - Privacy ProcessOriented Strategies INFORM.mp4
    06:35
  • 37 - Privacy ProcessOriented Strategies CONTROL.mp4
    01:43
  • 38 - Architecture Redux.mp4
    06:04
  • 39 - Information Flow.mp4
    10:30
  • 40 - Domains and Subdomains.mp4
    03:28
  • 41 - App example.mp4
    03:03
  • 42 - Exercises.html
  • 42 - exercisesdocx.zip
  • 43 - Risk Analysis from Privacy perspective.mp4
    04:16
  • 44 - A FAIR method for privacy risk.mp4
    07:08
  • 45 - What is Frequency.mp4
    08:46
  • 46 - Vulnerability.mp4
    03:39
  • 47 - Magnitude.mp4
    10:15
  • 48 - How to apply controls part 1.mp4
    04:53
  • 49 - How to apply controls part 2.mp4
    04:53
  • 50 - Risk at the organization level.mp4
    04:19
  • 51 - Quantitative Risk Management example 1 part 1.mp4
    08:25
  • 52 - Quantitative Risk Management example 1 part 2.mp4
    05:15
  • 53 - App Example.mp4
    10:20
  • 54 - 412exercisesdocx.zip
  • 54 - Exercises.html
  • 55 - The purpose of this methodology.mp4
    05:24
  • 56 - Quality Attributes.mp4
    03:13
  • 57 - Identify Information Needs.mp4
    04:02
  • 58 - Imposing Controls ARCHITECT & SECURE.mp4
    04:44
  • 59 - Imposing Controls Supervise & Balance.mp4
    05:25
  • 60 - Online Behavioral Advertising & Mobile Phone monitoring.mp4
    05:15
  • 61 - IntegratedRiskAssessmentWorkbook.xls
  • 61 - Integrating privacy by design into the business.mp4
    05:39
  • 61 - Riskassessmenttoolexample.xls
  • 62 - How the methodology meets the initial principles.mp4
    11:57
  • 63 - The App under the methodology.mp4
    03:41
  • 64 - Final Exercises.html
  • 64 - finalexercisesdocx.zip
  • 65 - 1udemymay2022dataprivacygdprccpalearningplanbyrolandcosteav2021xlsx.zip
  • 65 - BONUS Remember my first promise to you Learning plan differences.mp4
    05:53
  • Description


    Learn Privacy by Design Data Protection Methodologies in order to prepare for GDPR,CCPA,LGPD Data Protection compliance

    What You'll Learn?


    • Privacy by Design
    • Privacy Interest
    • Create a Privacy Model
    • Use a Privacy by Design methodology
    • Perform Risk An analysis from privacy perspective

    Who is this for?


  • Privacy Enthusiasts
  • Privacy Law enthusiasts
  • Lawyers that need the privacy focus
  • Audit and Compliance people
  • Data Privacy Officers (DPO)
  • Students of other courses developed by me as a part of the learning plan
  • What You Need to Know?


  • Understand basic IT and privacy concepts
  • Understand Basic risk and security concepts
  • More details


    Description

    Lessons from Chief Security Officer (CISO) of SAP

    also an ex IBM-er, MICROSOFT-er, Accenture, Cognizant, Genpact and Cisco


    5+ hours video content

    60+ lessons

    2023 update


    MY FIRST PROMISE TO YOU is the following: You will be prepared to pass 3 IAPP certifications in less than 30 days if you follow the below learning plan:

    Course 1: Build EU GDPR data protection compliance from scratch (CIPT)

    Course 2: How to succeed in a Data Privacy Officer Role (GDPR DPO, CIPM)

    Course 3: GDPR Privacy Data Protection Case Studies Explained (CIPP/E, CIPM, CIPT)

    Course 4: Ultimate Privacy by Design Guide - step by step strategies with examples (CIPM, CIPT) - we are here!!!

    Course 5: Build Security Incident Response for GDPR Data Protection (incl. parts from CIPT and CIPM also)

    Course 6: (part of CIPP/US): California Consumer Privacy Act (CCPA) - Complete course

    Course 7: Build a cybersecurity career and earn more than 150k per year


    My name is Roland Costea and after spending my last 8 years working for Microsoft, IBM, Genpact and Cognizant as a Privacy & Security Director being able to create hundreds of integrated security & privacy programmes for top organizations in the world, I have decided to put all my experience together in a comprehensive privacy LEARNING PLAN, to show how to actually make Data Privacy operational and most importantly how to think out of the box.

    I have been involved in engineering privacy for a lot of industries including Automotive (Mercedes-Benz, Geely, Volvo) and also provided DPO as a service for several other top companies in Europe and US. I have worked and developed the privacy strategy for Microsoft & IBM for the whole Central & Eastern Europe and also drived Cognizant Security & Privacy business in DACH.

    Certifications I hold: CIPT, CIPM, CISSP, CDPSE, CRISC, CISM, CCSK, CCSP, LPT, CEH, ECSA, TOGAF


    Protecting private information has vital and obvious implications for everyday life, and the only way companies can successfully do this is to create a culture of privacy.

    The only solution -- the only way to change people’s behavior -- is to embed privacy in the very fabric of the organization. That’s why Privacy by Design, a decades-old application design and development strategy, is now being discussed as a foundational strategy for entire organizations.

    The original goal of Privacy by Design was developing best practices that ensured application developers were building privacy into their products from the ground up. Even if concern for customer or employee privacy wasn’t the highest priority, there was always profit -- it is very expensive to re-engineer privacy into a product following a failure.

    Today, these best practices are more important than ever. Increasing amounts of data have created an ever-expanding attack surface, and complex new regulations demand a foundational approach to privacy. In fact, Article 25 of the GDPR is titled “Data Protection & Privacy by Design and by Default.”

    Organizations face an ever-growing number of attack vectors related to privacy, including the internet of things (IoT), government and business data over-collection and unread mobile app permissions such as allowing scanner apps to keep and sell the data they scan.

    This course is not about the GDPR, CCPA or LGPD in essence, though it can certainly be used as a process for data protection & privacy by design and default (Article 25 of the GDPR regulation). Most probably you are already enrolled in my bestseller “Build EU GDPR from scratch course” which goes for GDPR from all perspectives. This course is not meant to comply with any specific regulation, though use of the correct privacy-by-design process herein will help organizations comply with many regulations. This course is about how to build better processes, products and services that consider individuals’ privacy interest as a design requirement. It is about how to build things that people can trust.

    There are four sections I have created. Section 2 provides introductory remarks, including an introduction to Ann Cavoukian’s 7 Foundational Principles of Privacy by Design, a short history of regulatory adoption and past challenges that privacy-by-design practitioners have faced. Given its 10-year history in the privacy professionals’ community, many readers may already be familiar with Cavoukian’s principles. This section also contains something most privacy professionals, outside academia, may not be aware of. Here I discuss what I feel is the impetus for why companies must build privacy into their processes, products and services and not rely on individuals’ self-help to protect their own privacy.

    For those not familiar with the Solove Taxonomy of Privacy or the Hoepman Strategies, most probably the majority of you, Section 3 is a must. The two frameworks form the basis for identifying and mitigating privacy risks in the privacy model developed in that section. Section 4 describes how to analyze the privacy model built in Section 3.

    In the analysis section, a risk model is built using the Factor Analysis of Information Risk with a focus on individual risks over organizational risks and tweaks in the terms and definitions for privacy beyond information security. Designers may never need to determine privacy risk explicitly but understanding the factors that influence privacy risk provides a deeper understanding of why the process is built the way it is. The last section, Section 5, details the design procedure, while using the other sections as reference

    Who this course is for:

    • Privacy Enthusiasts
    • Privacy Law enthusiasts
    • Lawyers that need the privacy focus
    • Audit and Compliance people
    • Data Privacy Officers (DPO)
    • Students of other courses developed by me as a part of the learning plan

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Roland Costea
    Roland Costea
    Instructor's Courses
    My name is Roland Costea and I am working as Chief Security Officer at SAP . Before that i have spent years working for Microsoft, IBM, Genpact, Cognizant or Accenture as a Privacy & Security Director being able to create hundreds of integrated security & privacy programmes for top organizations in the world and I have decided to put all my experience together and create 2 complete programmes to show how to actually start a career in cybersecurity and/or data privacy (1 course) and also how to make privacy operational with technology (6 courses learning plan).I drived security and privacy teams and business units through real success, advised more than 200 top clients (Forbes 500) from all around the world, I have participated in more than 100 interviews as a candidate and I have interviewed and hired more than 100 talents.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 61
    • duration 5:44:49
    • English subtitles has
    • Release Date 2024/05/14