Learn how to apply information security methodologies to protect personal identifiable information (PII) in this 25-minute conference talk. Explore the process of identifying critical information assets, classifying sensitive data, and assigning impact values. Discover techniques for conducting a family personal assessment, evaluating third-party risks, and addressing privacy gaps. Gain insights into testing policies, documenting vulnerabilities, and identifying opportunities for improvement in safeguarding personal data.
Extending Information Security Methodologies for Personal User in Protecting PII