Privacy Management PII is a must today. Clients, employees and other stakeholders expect their information to be held private when given to an organization. This is even in the face of breach.
There are so many regulations each having slightly different requirements on how PII is to be treated. General Data Protection Regulation of the European Union (GDPR), California, US California Consumer Privacy Act, Asia Pacific Data Protection and Cyber Security Regulation and South Africa's Protection of Personal Information Act (POPIA, , as well as many others.
It all seems complicated, but it can be mapped so that the requirements are much easier to meet.
Why should you Attend: Attend this session by our expert speaker, Dr. Michael C. Redmond, and learn what is important, how to implement the common requirements, and how to still have time left over.
Michael will help your organization to manage designing, developing, procuring, architecting, testing, maintaining, and operating systems where privacy controls are required for the functioning of PII. Learn about control objectives, controls and guidelines for implementing controls.
You will receive valuable information that you can implement. This is a must in the new world that is facing new Privacy issues every year.
Areas Covered in the Session:
Operating information and communication technology systems
Implementing privacy controls are required for the functioning of PII
Learn how to create, manage and maintain a Privacy Information Management System (ISMS)
Learn designing, developing, procuring, architecting, testing, maintaining, and operating information and communication technology systems where privacy controls are required for the functioning of PII
Learn PII Controllers guidance
Managing different privacy standards
- Security Planners
- Technology Managers
- All Large Corporations
- Association of Contingency Planners
- Audit Associations
- Internal Auditors Association
- Continuity Planners
- Business Continuity Planners
- Disaster Recovery Continuity Planners
- Risk Managers
- Internal Auditors
• Security Planners
• Technology Managers
• All Large Corporations
• Association of Contingency Planners
• Audit Associations
• Internal Auditors Association
• Continuity Planners
• Business Continuity Planners
• Disaster Recovery Continuity Planners
• Risk Managers
• Internal Auditors