Loading Events

« All Events

  • This event has passed.

Privacy SWAN Virtual Live CIPT Training

February 29 - March 1

PrivacySWAN is an Official Training Partner of the International Association of Privacy Professionals (IAPP) which is the largest association of privacy professionals in the world. The CIPT is the first and original certification in Privacy Technology Management. Along with the training program, the IAPP also provides an ANSI/ISO-accredited certification. Come learn how to develop and manage a global privacy and data protection program today.

This instructor-led training is conducted over two days. Privacy in Technology training is the how-to course on privacy and data protection practices in the development, engineering, deployment, and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. It prepares you for the tough challenges you will encounter as you talk to your technical teams about incorporating privacy into their design. You will be provided with real-life examples and templates that help deal with the ever-changing privacy landscape. These news skills will advance your career. In addition to the highly sought-after training, the following benefits are provided by Privacy SWAN:

  • IAPP Strategic Privacy by Design Textbook (only for the first four students who register)
  • IAPP Introduction to Privacy for Technology Professionals Textbook (Digital only – $75 value)
  • Participant training materials (only available with training)
  • Exam Voucher – if purchased ($550 value)
  • One year of IAPP Membership or renewal of existing Membership ($295 value)
  • Privacy SWAN custom training materials

 

Who should attend

Technology, InfoSec, and Engineering professionals with a primary focus on securing the integrity, confidentiality, and availability of corporate data. Anyone who can understand highly complex interconnected technologies and who needs to incorporate a robust privacy program to ensure compliance with global data protection regulations.

  • Chief Information Security Officers
  • Security Managers
  • Information Managers
  • Product Managers
  • Auditors
  • Contract Managers
  • Compliance Officers
  • Privacy Managers
  • Chief Privacy Officers
  • Data Protection Officers

 

What you will learn

How to protect personal data by applying critical privacy concepts and practices that impact technology and use technology to design data privacy into products and services and establish privacy practices for data security and control, such as data minimization, perturbing the data, and de-identification techniques. Factor privacy into data classification and emerging technology, such as cloud computing, facial recognition, and surveillance. Communicate and collaborate on privacy issues with management, development, marketing, and legal departments. Understand consumer privacy expectations and best practices, while proactively addressing privacy issues with the Internet of Things.

  • Foundational Principles in Technology Summarizes the foundational elements for embedding privacy in technology through privacy by design and value-sensitive design; reviews the data life cycle and common privacy risk models and frameworks
  • The Tech Pro’s role in privacy Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security
  • Neutralizing Threats and Enhancing Privacy Identify inherent risks throughout the stages of the data life cycle and explore how software security helps mitigate privacy threats; examine the impacts that behavioral advertising, cyberbullying, and social engineering have on privacy within the technological environment
  • Privacy Engineering Explores the role of privacy engineering within an organization, including the objectives of privacy engineering, privacy design patterns, and software privacy risks
  • Technological Challenges for Privacy Examine the unique challenges that come from online privacy issues, including automated decision making, tracking and surveillance technologies, anthropomorphism, ubiquitous computing, and mobile social computing
  • Official IAPP CIPT Get Certified Documents

 

Details

Start:
February 29
End:
March 1
Event Categories:
,
Event Tags:
Website:
https://www.privacyswan.com/privacytraining/feb2024cipt-8uk2

Venue

Virtual

Organizer

Privacy SWAN Consulting
View Organizer Website

Leave a Reply

We are seeking to fill two unpaid positions as members of the IOPD Board of Directors. Terms run for 2 years from appointment. Appointments may be renewed.