Privacy, Data Theft and Digital Fraud
4 CPE Credits, 0 Ethics Credits
Course Description
How did Home Depot wind up sharing customer information with Meta? How did a Cincinnati hospital wind up sending patient information to Meta and other third parties? Why did a Mall use facial recognition software to target shoppers inside the building?
There’s no two ways about it. Cybersecurity is on everyone’s mind; however, not everyone knows the steps involved in preventing or managing a breach. Data breaches have dominated the news cycle long enough for individuals, small and large businesses, front-line employees, and risk managers alike to know how serious cybersecurity risk can be. But what happens when the data wasn’t stolen but willingly shared?
Privacy Impact Audits are essential for any sustainable privacy compliance framework to ensure that organizations are aware, from the outset, of the possible consequences of their data leaking to outside sources. The role of internal audit is especially important regarding this topic and how to mitigate risk of data exposure
What You Will Learn
You will learn:
- The three lines of defence in managing risk
- The importance of executive suite/board level involvement and commitment
- How to promote a culture of skepticism and risk management
- How to make employee training more than a “tick the box” exercise
- About the threat from a compromised employee and from third-party vendors and how to mitigate these risks
- The protocols and policies needed to prevent cyber breaches and to manage the breach when it occurs
- How to conduct a Privacy Impact Audit
- The risks of free promotional materials and how to assess them.
- The importance of having an action plan in place to manage a breach when it does happen