Главная
Study mode:
on
1
Intro
2
Who am I
3
Data Subject Requests
4
Global Privacy Era
5
Privacy Challenges
6
Response
7
Two Primary Methods
8
HighLevel Overview
9
Legal DDoS
10
Flooded Blizzard
11
Data Subject Request Costs
12
Ship Your Enemies GDPR
13
Fishing Tactics
14
Common Names
15
Confirm Profile Data
16
Spearfishing
17
Twitter
18
The problem
19
Defense strategies
20
Three primary concerns
21
ID Challenge
22
ID Documents
23
Blizzard
24
ID Methods
25
Arecibo
26
Graduated ID Requirements
27
Automated D SARS
28
Red Flags
29
Reportable
30
Cat
31
References
Description:
Explore data access rights exploits under new privacy laws in this conference talk from GrrCON 2019. Delve into the challenges posed by data subject requests in the global privacy era, examining legal DDoS tactics, potential fishing exploits, and defense strategies against malicious actors. Learn about the costs associated with data subject request compliance, identity verification methods, and red flags for automated DSARs. Gain insights into the complexities of privacy legislation implementation and its impact on organizations' data management practices.

Data Access Rights Exploits under New Privacy Laws

Add to list