Главная
Study mode:
on
1
Intro
2
Why are we here
3
This is not a checklist
4
The methodology
5
Application of methodologies
6
Who am I
7
What are you protecting
8
Identify critical information assets
9
Identify sensitive information
10
Identify where sensitive information exists
11
Separate data by classification
12
Assign impact value
13
Assign highwater mark
14
Family Personal Assessment
15
Third Parties
16
Gap in Privacy
17
The Basic Process
18
Testing Policies
19
Evaluating Information
20
Document Vulnerability
21
Number
22
Results
23
Opportunities for Improvement
Description:
Learn how to apply information security methodologies to protect personal identifiable information (PII) in this 25-minute conference talk. Explore the process of identifying critical information assets, classifying sensitive data, and assigning impact values. Discover techniques for conducting a family personal assessment, evaluating third-party risks, and addressing privacy gaps. Gain insights into testing policies, documenting vulnerabilities, and identifying opportunities for improvement in safeguarding personal data.

Extending Information Security Methodologies for Personal User in Protecting PII

Add to list
0:00 / 0:00