Learn what GDPR regulation is and what is needed in order to achieve GDPR compliance.
The course starts with GDPR foundations, explains data privacy concepts and what GDPR compliance means and also offers documents, policies and procedures that need to be created and adapted for your own organization in order to start GDPR programme.
A total of 15 documents will be offered as following:
- 2 GDPR gap assessments
- GDPR Implementation Guide
- GDPR Compliance Evidence
- GDPR Preparation Project Plan
- GDPR Incident Response Procedure
- GDPR Roles, Responsibilities and Authorities
- GDPR Personal Data Capture Form
- GDPR Privacy Data Protection Policy
- GDPR Data Subject Request Procedure
- GDPR Data Protection Impact Assessment Process
- GDPR Procedure for International Transfers of Personal Data
- GDPR Example - Personal Data Breach Notification Form
- GDPR Personal Data Breach Notification Procedure
- GDPR Operational Security Procedures
+ BONUS - write me an email and i will give some more templates!!!
The course is a complete A to Z GDPR training, so we will cover everything that you need to know.In this way, we will first create the GDPR implementation plan as a first outcome, then I will teach you the basic theory you need to know for being successful in front of clients or management and also that will help you in achieving your CIPT certification.
What is CIPT certification you may ask. So, for the ones that do not heard about it, CIPT is the only technology related certification related to GDPR, developed by IAPP – International Association of Privacy Professionals.
In the end, every report will end up with recommendations that usually involve technology that can solve GDPR challenges. In this way I will demonstrate some security concepts by using different cloud technologies and we will use Azure cloud as a matter of experiment for this course.
The course is delivered in a mix of over the shoulder lessons and powerpoint presentations. So, either I show you clicks on the screen and how exactly you do different actions, or I present you the full concept using slides. On top of that, you will get downloadable resources that will help you in your journey.
I strongly recommend that you go through every lecture one time and then go back to the beginning and start to take action – in this way everything will get much more sense.
As a student of this course, you will also get regular updates and access to new additional lectures as they are added.
Highly motivated professional with working experience in Information Security Solutions evolving from technical engineer to customer oriented positions as presales/solution/enterprise architect and Information Security Leader, at big companies (> 500) in Central and Eastern Europe (Accenture, Star Storage, Teamnet WPS, IBM, Genpact,Microsoft). Result-oriented individual strongly focused on costumers, trying to offer the best solution based on their needs, capable of implementing complex projects under time pressure, while securing full commitment from key stakeholders and working as a technical architect lead for IBM Security being responsible for IBM Qradar SIEM technical close.
Certifications: CISSP, CISM, CRISC, TOGAF, ITIL-F, LPT, ECSA, CEH, CCNP, CCSP, CCDP, ISO 27001 Lead Auditor, IBM Security QRadar SIEM Certified.