Privacy Management PII in the Face of all the New Requirements

Attend this session to learn what is important, how to implement the common requirements, and how to still have time left over, Michael will help your organization to manage designing, developing, procuring, architecting, testing, maintaining, and operating systems where privacy controls are required for the functioning of PII.

Ms. Michael Redmond
Instructor:
Ms. Michael Redmond
Date:
Thursday, August 22, 2019
Time:
10:00 AM PDT | 01:00 PM EDT
Duration:
60 Minutes

More Trainings by this Expert   Product Id : 502636

Price Details
$150 Live
$290 Corporate Live
$190 Recorded
$390 Corporate Recorded
Combo Offers
Live + Recorded
$289 $340 Live + Recorded
Corporate (Live + Recorded)
$599 $680 Corporate
(Live + Recorded)
Price Detail Options
Overview:

Privacy Management PII is a must today. Clients, employees and other stakeholders expect their information to be held private when given to an organization. This is even in the face of breach.

There are so many regulations each having slightly different requirements on how PII is to be treated. General Data Protection Regulation of the European Union (GDPR), California, US California Consumer Privacy Act, Asia Pacific Data Protection and Cyber Security Regulation and South Africa's Protection of Personal Information Act (POPIA, , as well as many others.

It all seems complicated, but it can be mapped so that the requirements are much easier to meet.

Why should you Attend: Attend this session by our expert speaker, Dr. Michael C. Redmond, and learn what is important, how to implement the common requirements, and how to still have time left over.

Michael will help your organization to manage designing, developing, procuring, architecting, testing, maintaining, and operating systems where privacy controls are required for the functioning of PII. Learn about control objectives, controls and guidelines for implementing controls.

You will receive valuable information that you can implement. This is a must in the new world that is facing new Privacy issues every year.

Areas Covered in the Session:

  • Designing
  • Developing
  • Procuring
  • Architecting
  • Testing
  • Maintaining
  • Operating information and communication technology systems
  • Implementing privacy controls are required for the functioning of PII

Learning Objectives:
  • Learn how to create, manage and maintain a Privacy Information Management System (ISMS)
  • Learn designing, developing, procuring, architecting, testing, maintaining, and operating information and communication technology systems where privacy controls are required for the functioning of PII
  • Learn PII Controllers guidance
  • Managing different privacy standards

Who Will Benefit:
  • Security Planners
  • CEOs
  • CIOs
  • CFOs
  • CIOs
  • COOs
  • Technology Managers
  • Compliance
  • Auditors
  • All Large Corporations
  • ISSA
  • ISACA
  • Association of Contingency Planners
  • Audit Associations
  • Internal Auditors Association
  • Continuity Planners
  • Business Continuity Planners
  • Disaster Recovery Continuity Planners
  • Risk Managers
  • Internal Auditors


Speaker Profile
Ms. Michael Redmond is a Consultant, Speaker and Author. She also conducts ISO Certification Training for PECB. Michael is the Chapter President for Association of Contingency Planners Eastern Great Lake Chapter and an active member of ISSA.

Michael is certified as a Lead Implementer in ISO 27001 Information Security Management, ISO 27035 Security Incident Response, ISO 22301 Business Continuity Management and ISO 21500 Project Management. She is a Certified Instructor for ISO Certification Courses through PECB. Also certified Project Manager PMP, and 2 Master Certifications (MBCP) (FBCI) in Disaster Recovery and CEM Emergency Management

She has consulted in the area of Cyber Security for clients in the arenas of Healthcare, Insurance, Financial and Manufacturing. Her projects have included:

SIEM Security information and event management which is Combining software products and services combining security information management (SIM) and security event management (SEM).

(CSIRT) which is Cyber Security Incident Response Programs, Plans, Playbooks, Training and Testing.

Audit of CSIRT programs and documentation.

Information Security Programs and Implementation.

She has 2 books which are coming out in 2016 and are being published by one of the Top International Publishers in the world. The first is a Cyber Security book and the second is a Business Continuity and Disaster Recovery book Michael has a series of Audio Training that receive CEU's from Disaster Recovery Institute (DRI) and other certifying organizations.

They are: Cyber Security Training for - 6 CEU's. Business Continuity Management for 20 CEU's. www.rwknowledge.com Michael's been honored as Top Woman in her field at a White House Luncheon and was selected out of the world to write the prolog for the chapter on RISK Management by the United Nations for their Disaster Book which was given to the head of state for every UN member nation. She has recently been named on the list of "Women of Distinction for 2015" by Women of Distinction Magazine for her work in Cyber Security. She was selected to speak on Cyber Security Incident Response and SIEM at such recent conferences as: International ISSA Conference in Chicago. NYS Cyber Security Conference - Co Spoke with Acting CISO for New York State. ISACA Western New York Conference. Metric Stream Round Table in New York City.




Your Recently Viewed Webinars

Payment Methods

Contact Us

NetZealous LLC,
39658 Mission Boulevard, Fremont,
CA 94539, USA.

Information

  Refund Policy
  +1-800-447-9407
  Fax: 302 288 6884
  support@compliance4All.com