Practical Privacy for Products and Services
Practical Privacy for Products and Services
What you’ll learn
Skills you’ll gain
One of the biggest threats to your personal information is a lack of cybersecurity. The same rings true for organizations that are looking to protect their data. In this course, Chief Information Security Officer and tenured security leader Cassio Goldschmidt shares his guidelines for protecting your information and that of your organization. He first shares processes for identifying data that needs to be protected, as well as how to classify and sort the data most effectively. He then reviews common mistakes that can occur when going through the data processing cycle. He provides you with a detailed look into privacy policies, trainings, and breaches, as well as sharing proven strategies to better manage privacy risks. You will leave this course with a strong understanding of what you can do as individual contributor to help keep your organization's data safe.
Syllabus
Download syllabus-
1
Personal Identifiable Information Any person can be identified in many ways based on their personal identifiable information (PII). 4m
-
2
What is not personal data There is often confusion between PII and data that is not PII. 2m
-
3
Finding and classifying data The identification of all sources of data collection is essential to determine what needs to be protected. 4m
-
4
Data processing ecosystem Often, organizations depend on services provided by other organizations to conduct their business. 2m
-
5
Working with data processors Your organization likely works with third party processors or data management systems. 2m
-
1
Common mistakes in data processing Improper processing of data can have several long-lasting consequences. 3m
-
2
Bias in data processing Processing bias is when certain elements of a dataset are misrepresented. 2m
-
3
Data and data processing risks Inadequate security and data processing can result in harm for individuals in multiple ways. 3m
-
1
Internal privacy policies Transparency and inclusion are key qualities of a privacy program customers can trust. 3m
-
2
External privacy notices Using privacy notices can be a quick and easy way to alert users of the data being collected, and why. 3m
-
3
Privacy training Training the workforce and third parties engaged in data processing in privacy awareness education is an important step to achieve the organization's goals. 4m
-
4
Communicating breaches An organization should strive for transparency of process and procedures related to privacy. 4m
-
1
The information life cycle Activities related to the data lifecycle starts before the data is collected and lives until the data is securely destroyed. 2m
-
2
Obtaining consent Privacy activities start before any data is collected. 2m
-
3
Collecting data Think of personal data as the gold that you mine -- you need to handle it delicately and keep a keen eye on it. 2m
-
4
Retaining data Retaining data is a liability for an organization, but it can also be important to hang onto. 2m
-
5
Processing data Data processing is the point in which the data you've collected transforms into meaningful information. 4m
-
6
Disclosing data Users must be able to review, transmit, disclose, alter, and delete their data. 3m
-
7
Transferring data There are many circumstances in which transferring data becomes necessary. 3m
-
8
Archiving data Believe it or not, improperly archived data is one of the easiest targets for hackers. 2m
-
9
Destroying data Once data reaches the end of life, it must be destroyed. 3m
-
1
Security is in your hands Thanks for taking this course! 1m
Certificate
Certificate of Completion
Awarded upon successful completion of the course.
Instructor
Cassio Goldschmidt
Cassio Goldschmidt is regarded as an internationally recognized security expert, with multiple accolades including recognition of the 2021 Top 100 Chief Information Security Officer from CISO Connect, 2019 (ISC)² Information Security Leadership Award for all Americas, Nominee for 2019 TEN Information Security Executive Award for North America, Winner of 2011 (ISC)² Cybersecurity Community Services Star Award for all Americas, and Nominee for the 2012 OWASP Web Application Security Person of the Year (WASPY) Awards.An avid and enthusiastic contributor to the information security industry, Cassio has held leadership positions at companies such as Symantec, Intuit, NCR, AON, and ServiceTitan. Cassio is the founder and leader of the OWASP Los Angeles Chapter, a former contributor of Forbes technology council, and a frequent speaker in conferences and podcasts.
Cassio Goldschmidt
Chief Information Security Officer at ServiceTitan
Accreditations
Link to awardsHow GoSkills helped Chris
I got the promotion largely because of the skills I could develop, thanks to the GoSkills courses I took. I set aside at least 30 minutes daily to invest in myself and my professional growth. Seeing how much this has helped me become a more efficient employee is a big motivation.