Posted on
in Presentations
This session will include a hands-on exercise that will help participants identify potential security and privacy threats and design and implement privacy enhancing technologies (PETs). A further exercise will focus on creation and use of context diagrams to first identify data flows and consumers of data, and then to determine threats, vulnerabilities and risks.
Pre-Requisites: Foundational understanding of data privacy is helpful, but not required.
Pre-Requisites: Foundational understanding of data privacy is helpful, but not required.
Protecting Data & the Supply Chain Ecosystem Privacy
risk & vulnerability assessment privacy PII GDPR ethics
Topic
Protecting Data & the Supply Chain Ecosystem
Privacy
Subtopic
risk & vulnerability assessment
privacy
PII
GDPR
ethics
Share With Your Community