Back to All Events

SWAN Virtual Live CIPT Training


Certified Information Privacy Technologist (CIPT)

Privacy SWAN is an Official Training Partner of the International Association of Privacy Professionals (IAPP) which is the largest association of privacy professionals in the world. The CIPT is the first and only certification in Privacy Technology Management. Along with the training program, the IAPP also provides an ANSI/ISO-accredited certification. Come learn how to develop and manage a global privacy and data protection program today.

Course description

Instructor-led training is conducted over three days. Privacy in Technology training is the how-to course on privacy and data protection practices in the development, engineering, deployment, and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. It prepares you for the tough challenges you will encounter as you talk to your technical teams about incorporating privacy into their design. You will be provided with real-life examples and templates that help deal with the ever-changing privacy landscape. These news skills will advance your career. In addition to the highly sought-after training, the following benefits are provided by Privacy SWAN:

  • IAPP Strategic Privacy by Design Textbook

  • IAPP Introduction to Privacy for Technology Professionals Textbook

  • Participant training materials (only available with training)

  • Official sample questions ($35)

  • Exam Voucher - if purchased ($550 value)

  • One year of IAPP Membership or renewal of existing Membership ($275 value)

  • Privacy SWAN custom training materials

Who should attend

Technology, InfoSec, and Engineering professionals with a primary focus on securing the integrity, confidentiality, and availability of corporate data. Anyone who can understand highly complex interconnected technologies and who needs to incorporate a robust privacy program to ensure compliance with global data protection regulations.

  • Chief Information Security Officers

  • Security Managers

  • Information Managers

  • Product Managers

  • Auditors

  • Contract Managers

  • Compliance Officers

  • Privacy Managers

  • Chief Privacy Officers

  • Data Protection Officers

What you will learn

How to protect personal data by applying critical privacy concepts and practices that impact technology and use technology to design data privacy into products and services and establish privacy practices for data security and control, such as data minimization, perturbing the data, and de-identification techniques. Factor privacy into data classification and emerging technology, such as cloud computing, facial recognition, and surveillance. Communicate and collaborate on privacy issues with management, development, marketing, and legal departments. Understand consumer privacy expectations and best practices, while proactively addressing privacy issues with the Internet of Things.

  • Foundational principles of privacy in technology Summarizes the foundational elements for embedding privacy in technology through privacy by design and value-sensitive design; reviews the data life cycle and common privacy risk models and frameworks

  • The role of the technology professional in privacy Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security

  • Privacy threats and violations Identify inherent risks throughout the stages of the data life cycle and explore how software security helps mitigate privacy threats; examine the impacts that behavioral advertising, cyberbullying, and social engineering have on privacy within the technological environment

  • Technical measures and privacy-enhancing technologies Outline the strategies and techniques for enhancing privacy throughout the data life cycle, including identity and access management; authentication, encryption, and aggregation; collection and use of personal information

  • Privacy engineering Explores the role of privacy engineering within an organization, including the objectives of privacy engineering, privacy design patterns, and software privacy risks

  • Privacy-by-design methodology Illustrates the process and methodology of the privacy-by-design model; explores practices to ensure ongoing vigilance when implementing privacy by design

  • Technology challenges for privacy Examine the unique challenges that come from online privacy issues, including automated decision making, tracking and surveillance technologies, anthropomorphism, ubiquitous computing, and mobile social computing

Pricing

We provide discounts for security professionals with other certifications and we provide a discount if you register more than 4 individuals. Contact us to learn more.

Register for CIPT Training

Virtual live training September 27, 28, and 29 between 9 am and 2 pm MT.

Previous
Previous
August 31

SWAN Virtual Live CIPM Training

Next
Next
October 18

IAPP Privacy Program Management