Data Governance: Understanding Data Privacy and Security
This course is a full walkthrough of how to include security and data privacy into your data governance program. You will explore how current standards, laws, and regulations apply and how to address risks.
Some of the most important things you can do to protect your data are to set policies, align controls, and educate your employees on data privacy and security best practices. This course will help you to understand your role in protecting the organization’s data and to avoid the misuse of sensitive data that could lead to an incident. In this course, Data Governance: Understanding Data Privacy and Security, you’ll gain the ability to understand your data, understand the standards and laws that govern your data, and identify and mitigate the risks of that data. First, you’ll explore the various regulations and laws that govern the use of different classifications of data across many industries. Next, you’ll go through frameworks that provide organizations with a set of best practices for protecting their data, along with specific methods that organizations can use to implement data security standards. Finally, you’ll look at data governance risk management – the process of identifying, assessing, and mitigating risks to data assets – which is an essential part of data governance, ensuring the confidentiality, integrity, and availability of data. When you’re finished with this course, you’ll have the skills and knowledge of how data privacy and data security fit into the overall data governance program at your organization.
Author Name: Mike Woolard
Author Description:
Mike is an information security manager who has worked in the IT and Information Security fields for 22+ years. A broad background from helpdesk to sysadmin, system engineer, networking, DB and development work. Most of Mike’s work now centers around pentests and risk assessments, but an integral part will always be awareness training. An active member in various local security groups, Mike volunteers, speaks, or attends various information security cons.
There are no reviews yet.