- Identify sources of threats for a company.
- Build and implement Designed Privacy from scratch.
- Predict privacy violations.
- Use tactics and strategies that mitigate privacy risks.
- Calculate the consequences of a violation of privacy for the user.
- Create a FAIR (Factor analysis of information risk) risk assessment model.
- Create a blueprint and step-by-step guide for applying Engineered Privacy principles to your products and services.
Each step of the model will be worked out in practical exercises on the case. Theory will give logic and understanding, and practice will help develop a habit and learn a step-by-step algorithm for creating a plan. And a nice bonus will be a certificate of completion of the training.