Certified Information Privacy Technologist (CIPT)
Privacy SWAN is an Official Training Partner of the International Association of Privacy Professionals (IAPP) which is the largest association of privacy professionals in the world. The CIPT is the first and original certification in Privacy Technology Management. Along with the training program, the IAPP also provides an ANSI/ISO-accredited certification. Come learn how to develop and manage a global privacy and data protection program today.
Course description
This class is offered on Friday and Saturday for those busy professionals who can only afford to take off one day of the work week. This instructor-led training is conducted over two days. Privacy in Technology training is the how-to course on privacy and data protection practices in the development, engineering, deployment, and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. It prepares you for the tough challenges you will encounter as you talk to your technical teams about incorporating privacy into their design. You will be provided with real-life examples and templates that help deal with the ever-changing privacy landscape. These news skills will advance your career. In addition to the highly sought-after training, the following benefits are provided by Privacy SWAN:
IAPP Strategic Privacy by Design Textbook (only for the first four students who register)
IAPP Introduction to Privacy for Technology Professionals Textbook (Digital only - $75 value)
Participant training materials (only available with training)
Exam Voucher - if purchased ($550 value)
One year of IAPP Membership or renewal of existing Membership ($295 value)
Privacy SWAN custom training materials
Who should attend
Technology, InfoSec, and Engineering professionals with a primary focus on securing the integrity, confidentiality, and availability of corporate data. Anyone who can understand highly complex interconnected technologies and who needs to incorporate a robust privacy program to ensure compliance with global data protection regulations.
Chief Information Security Officers
Security Managers
Information Managers
Product Managers
Auditors
Contract Managers
Compliance Officers
Privacy Managers
Chief Privacy Officers
Data Protection Officers
What you will learn
How to protect personal data by applying critical privacy concepts and practices that impact technology and use technology to design data privacy into products and services and establish privacy practices for data security and control, such as data minimization, perturbing the data, and de-identification techniques. Factor privacy into data classification and emerging technology, such as cloud computing, facial recognition, and surveillance. Communicate and collaborate on privacy issues with management, development, marketing, and legal departments. Understand consumer privacy expectations and best practices, while proactively addressing privacy issues with the Internet of Things.
Foundational Principles in Technology Summarizes the foundational elements for embedding privacy in technology through privacy by design and value-sensitive design; reviews the data life cycle and common privacy risk models and frameworks
The Tech Pro’s role in privacy Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security
Neutralizing Threats and Enhancing Privacy Identify inherent risks throughout the stages of the data life cycle and explore how software security helps mitigate privacy threats; examine the impacts that behavioral advertising, cyberbullying, and social engineering have on privacy within the technological environment
Privacy Engineering Explores the role of privacy engineering within an organization, including the objectives of privacy engineering, privacy design patterns, and software privacy risks
Technological Challenges for Privacy Examine the unique challenges that come from online privacy issues, including automated decision making, tracking and surveillance technologies, anthropomorphism, ubiquitous computing, and mobile social computing
Pricing
We provide discounts for security professionals with other certifications and we provide a discount if you register more than 4 individuals. Contact us to learn more.
Register for CIPT Training
Virtual live training on March 22 and March 23 between 9 am and 5 pm MT. This class is offered on Friday and Saturday for those busy professionals who can only afford to take off one day of the work week.