Embracing Privacy Engineering: Going Beyond Checkbox Compliance

Join us online on the 19th of March to dive into the fascinating world of privacy engineering and its vital role in today’s digital landscape. As privacy becomes an ever-growing concern, understanding how to properly implement privacy protections is crucial.

Agenda:

  1. Introduction to Privacy Engineering
    Defining privacy engineering and its core principles.
    The significance of privacy in modern software development.
  2. Privacy Engineering and Security Engineering: A Symbiotic Relationship
    How privacy and security work together to protect data.
    Understanding the overlap and distinctions between the two fields.
  3. The Role of Threat Modeling in Privacy Engineering
    Why threat modeling is essential to identifying and mitigating privacy risks.
    Practical steps to incorporate threat modeling into your privacy efforts.
  4. The Evolving Landscape of Privacy Engineering
    Trends, challenges, and opportunities in privacy engineering.
    Emerging technologies and regulatory changes shaping the domain.
  5. Closing Action Points
    Key takeaways to help you apply privacy engineering principles effectively.
    Recommended next steps and resources for continuous learning.

Speaker

Date

Time

Costs

Free
Exempted From VAT article 44, §2 - 4° of the Belgian VAT Code

Location

Online

A Teams link will be provided to the attendees

Organizer

ISACA BE Education
eb.acasi@noitacude

Join us online on the 19th of March to dive into the fascinating world of privacy engineering and its vital role in today’s digital landscape. As privacy becomes an ever-growing concern, understanding how to properly implement privacy protections is crucial.

Agenda:

  1. Introduction to Privacy Engineering
    Defining privacy engineering and its core principles.
    The significance of privacy in modern software development.
  2. Privacy Engineering and Security Engineering: A Symbiotic Relationship
    How privacy and security work together to protect data.
    Understanding the overlap and distinctions between the two fields.
  3. The Role of Threat Modeling in Privacy Engineering
    Why threat modeling is essential to identifying and mitigating privacy risks.
    Practical steps to incorporate threat modeling into your privacy efforts.
  4. The Evolving Landscape of Privacy Engineering
    Trends, challenges, and opportunities in privacy engineering.
    Emerging technologies and regulatory changes shaping the domain.
  5. Closing Action Points
    Key takeaways to help you apply privacy engineering principles effectively.
    Recommended next steps and resources for continuous learning.

Speaker

register now

Date

Time

Costs

Free

Location

Online

A Teams link will be provided to the attendees

Organizer

ISACA BE Education
eb.acasi@noitacude

We do our best with using as less posible cookies and tracking. By continuing to use this site, you acknowledge and accept our use of functional cookies. However, some external services require your permission to place cookies.

Accept All Accept Required Only