Objective
With the General Data Protection Regulation (GDPR) and ISO 27701 Privacy Information Management System, the European Union has set the rules and become the focal point of the global dialogue on individual data privacy. EU law protects all personal data, regardless of who collects it or how it is processed.The ISO/IEC 27701:2019 standard is the first international privacy standard, which outlines the requirements for implementing a Privacy Information Management System (PIMS) to govern personal data, called Personal Identifiable Information (PII) in ISO 27701.
Part I of the ISO 27701 course starts with an introduction to ISO 27701 and underlying fundamental concepts. The course learnings include knowledge about driving factors, the need for ISO 27701, the relationship between various ISO standards e.g., ISO 27701, ISO 27001, and ISO 27002, controllers, processors, and comparison with GDPR.
This interactive training course will ensure professionals and practitioners at all levels understand their roles and responsibilities, new developments, resources, and hallmarks of an effective compliance program. In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning, followed by the end of the course final assessment.
What you will learn:
• Learn about ISO 27701 Privacy Information Management System
• Understand the fundamental concepts of ISO/IEC 27701
• Understand the ISO 27701 driving factors
• Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002
• Learn about the ISO 27701 driving factors and need for ISO 27701
• Learn the ISO 27701 terms and definitions
• Learn about the identifiable personal information
• Learn about a different type of PII data
• Learn about controllers and processors in context of ISO 27701 and comparison with GDPR
Advanced Persistent Threat or Intrusion
What you will learn:
|
Anti Money Laundering (AML) Awareness
What you will learn:
- What it is and how does it work?
- Why people and organizations launder money?
- How money laundering works: basic process
- Legal consequences for money laundering, including state and federal (U.S.) penalties
- Applicable laws and regulation
- Insider trading
Architectural Solutions
What you will learn:
|
Asset Management
What you will learn:
|
Backup and Recovery
What you will learn:
|
Breach Management
What you will learn:
What you will learn:
The training promotes the objectiveof informed management for better decision-making. raining provides managementand employees with a basic understanding of underlying concepts and recommendationsfor managing challenges. Each section informed you about additional trainingrequirements and recommended courses. In the next 10minutes, you will learn:
- What is the importance of abreach notification?
- What is a data breach?
- In what circumstances wouldnotification of a data breach be required and to whom?
- Suggested e-Learning courses toenhance the knowledge.
(Note - The suggested e-Learningprogram is a two-part series.)
Breach Notification Part I - Awareness
What you will learn:
- What is the importance of a breach notification?
- What is a data breach?
- In what circumstances would notification of a data breach be required and to whom?
- When and how should notification of a data breach be provided?
- Framework for Effective Data Breach Notification Legislation
- Timing of Notification to Affected Individuals
- Post Data Breach Immediate Action Items
- Breach Notification to Authorities
Breach Notification Part II - Advanced
What you will learn:
- Breach Management
- Effective Breach Response
- Data Breach Checklist
- Breach Notification Notice Content
- Notification Timelines
- Lifecycle of a Data Breach
- Public Relations Strategy
Bring Your Own Device
What you will learn:
|
Business Continuity & Disaster Recovery (BCP / DR) Part I - Awareness
What you will learn:
- Disaster
- Business Continuity and Disaster Recovery
- Use Cases
- Risks Covered by DR
- Driving Factors
- Challenges in Developing DR Plan
- Technical Challenges
- Key Factors in DR Plan