وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Building a Privacy Program in the Age of GenAI

سرفصل های دوره

Dive into the world of privacy and data governance as Nishant Bhajaria—a privacy and security leader—guides you through essential topics such as data classification, inventory, and the importance of timely data deletion. Discover how to implement robust third-party risk management processes, ensuring that your company's external partnerships contribute to a secure data ecosystem. Understand the risks of data exfiltration, poisoning, and bias in AI systems, and explore best practices for mitigating these threats. Learn how to enhance transparency with users and maintain regulatory compliance through privacy impact assessments and robust review processes. Find out how technical privacy reviews can preemptively improve product design and prevent bad code deployment. When you complete this course, you'll be equipped to transform privacy from a compliance requirement into a strategic advantage for your organization.


01 - Introduction
  • 01 - What privacy means in the age of GenAI
  • 02 - Who this course is for

  • 02 - 1. Introduction to Privacy
  • 01 - The real meaning of big data
  • 02 - Privacy and security
  • 03 - Regulations and standards
  • 04 - Privacy and internal stakeholders
  • 05 - Building data governance into organizational operations

  • 03 - 2. Privacy and Key Governance Milestones
  • 01 - Code governance
  • 02 - Data classification
  • 03 - Data inventory
  • 04 - Third-party risk assessment

  • 04 - 3. Adapting Privacy to the GenAI Era
  • 01 - Understanding privacy risks posed by GenAI
  • 02 - Managing security risks posed by GenAI
  • 03 - Data minimization, consent, and deletion
  • 04 - Bias and fairness
  • 05 - Transparency
  • 06 - Robustness and safety
  • 07 - Building a truly modern privacy review process

  • 05 - 4. Building Privacy Tooling, Processes, Hierarchies, and Consolidations
  • 01 - Data deletion
  • 02 - Data sharing
  • 03 - Build vs. buy
  • 04 - Decentralized vs. centralized
  • 05 - Privacy leadership and the chief privacy officer
  • 06 - Data Subject Access Requests (DSARs) and rights management

  • 06 - Conclusion
  • 01 - Next steps
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 45488
    حجم: 199 مگابایت
    مدت زمان: 75 دقیقه
    تاریخ انتشار: ۱۳ دی ۱۴۰۴
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید