Embracing Privacy Engineering: Going Beyond Checkbox Compliance

17h30
18h30

Join us online on the 19th of March to dive into the fascinating world of privacy engineering and its vital role in today’s digital landscape. As privacy becomes an ever-growing concern, understanding how to properly implement privacy protections is crucial.

Agenda:

  1. Introduction to Privacy Engineering
    Defining privacy engineering and its core principles.
    The significance of privacy in modern software development.
  2. Privacy Engineering and Security Engineering: A Symbiotic Relationship
    How privacy and security work together to protect data.
    Understanding the overlap and distinctions between the two fields.
  3. The Role of Threat Modeling in Privacy Engineering
    Why threat modeling is essential to identifying and mitigating privacy risks.
    Practical steps to incorporate threat modeling into your privacy efforts.
  4. The Evolving Landscape of Privacy Engineering
    Trends, challenges, and opportunities in privacy engineering.
    Emerging technologies and regulatory changes shaping the domain.
  5. Closing Action Points
    Key takeaways to help you apply privacy engineering principles effectively.
    Recommended next steps and resources for continuous learning.

Speaker

Kim Wuyts

Dr. Kim Wuyts is a leading privacy engineering expert with over 15 years of experience in security and privacy. Before joining PwC Belgium as Manager Cyber & Privacy, Kim was a senior researcher at KU Leuven where she led the development and extension of LINDDUN, a popular privacy threat modeling framework.

Her mission is to raise privacy awareness and get organizations to embrace privacy engineering best practices. She is a guest lecturer, experienced speaker, and invited keynote at international privacy and security conferences such as OWASP Global AppSec, BruCon, RSA, Troopers, CPDP, APF and IAPP DPC. In the last few years, Kim has been delivering privacy awareness and privacy threat modeling training at many events, including academic guest lectures and corporate training.

Kim is also a co-author of the Threat Modeling Manifesto+Capabilities, program co-chair of the International Workshop on Privacy Engineering (IWPE), and a member of ENISA’s working group on Data Protection Engineering.

Date

Time

17h30
18h30

Costs

Free
Exempted From VAT article 44, §2 - 4° of the Belgian VAT Code

Location

Online

A Teams link will be provided to the attendees

Organizer

ISACA BE Education
eb.acasi@noitacude

Join us online on the 19th of March to dive into the fascinating world of privacy engineering and its vital role in today’s digital landscape. As privacy becomes an ever-growing concern, understanding how to properly implement privacy protections is crucial.

Agenda:

  1. Introduction to Privacy Engineering
    Defining privacy engineering and its core principles.
    The significance of privacy in modern software development.
  2. Privacy Engineering and Security Engineering: A Symbiotic Relationship
    How privacy and security work together to protect data.
    Understanding the overlap and distinctions between the two fields.
  3. The Role of Threat Modeling in Privacy Engineering
    Why threat modeling is essential to identifying and mitigating privacy risks.
    Practical steps to incorporate threat modeling into your privacy efforts.
  4. The Evolving Landscape of Privacy Engineering
    Trends, challenges, and opportunities in privacy engineering.
    Emerging technologies and regulatory changes shaping the domain.
  5. Closing Action Points
    Key takeaways to help you apply privacy engineering principles effectively.
    Recommended next steps and resources for continuous learning.

Speaker

Kim Wuyts

Dr. Kim Wuyts is a leading privacy engineering expert with over 15 years of experience in security and privacy. Before joining PwC Belgium as Manager Cyber & Privacy, Kim was a senior researcher at KU Leuven where she led the development and extension of LINDDUN, a popular privacy threat modeling framework.

Her mission is to raise privacy awareness and get organizations to embrace privacy engineering best practices. She is a guest lecturer, experienced speaker, and invited keynote at international privacy and security conferences such as OWASP Global AppSec, BruCon, RSA, Troopers, CPDP, APF and IAPP DPC. In the last few years, Kim has been delivering privacy awareness and privacy threat modeling training at many events, including academic guest lectures and corporate training.

Kim is also a co-author of the Threat Modeling Manifesto+Capabilities, program co-chair of the International Workshop on Privacy Engineering (IWPE), and a member of ENISA’s working group on Data Protection Engineering.

register now

Date

Time

17h30
18h30

Costs

Free

Location

Online

A Teams link will be provided to the attendees

Organizer

ISACA BE Education
eb.acasi@noitacude

We do our best with using as less posible cookies and tracking. By continuing to use this site, you acknowledge and accept our use of functional cookies. However, some external services require your permission to place cookies.

Accept All Accept Required Only