Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.

Introducing ISACA Certified Data Privacy Solutions Engineer (CDPSE)

In this webinar, you’ll be introduced to a cutting-edge data privacy-focused certification programme just put together by ISACA, one of the world’s leading certification bodies in cyber security.


The CDPSE is the first experience-based, technical certification of its kind. It’s designed around three domains: Privacy Governance, Privacy Architecture, and Data Cycle. This webinar introduces the new certification, as well as the domains which together make for the core skills covered by the programme. 

Presented by highly experienced industry experts in privacy, this webinar will provide viewers with a comprehensive understanding of the areas of knowledge covered by the programme and how these skills connect with the current job landscape.



In this webinar, each of these domains will be introduced and covered by the following experts:

  • Steve Connors - Partner with Haines Watts, a top 15 UK accountancy and business advisory firm, leading their Governance Risk & Compliance practice

  • Olivia Bosch PhD -  Director, Government and Regulatory Affairs (GRA), ISACA London Chapter

  • Kal Taheem -  Expert in Governance, Risk Management, Privacy, Controls/Security, Compliance, and Audit/Assurance

  • Richard Millett - Renowned expert in cybersecurity and risk, instructor at Firebrand Training

Expected outcomes

This webinar should present you with a solid outline of the core skills that are conjoined into the certification, and to keep you in sync with the digital future we’re moving towards.


Agenda and topics covered

Domain 1: Privacy Governance (34%)

A. Governance

  • Personal Data and Information
  • Privacy Laws and Standards across Jurisdictions
  • Privacy Documentation (e.g., Policies, Guidelines)
  • Legal Purpose, Consent, and Legitimate Interests and accelerated 1-day courses
  • Data Subject Rights

B. Management

  • Roles and Responsibilities related to Data
  • Privacy Training and Awareness
  • Vendor and Third-Party Management
  • Audit Process
  • Privacy Incident Management

C. Risk Management

  • Risk Management Process
  • Privacy Impact Assessment (PIA) 
  • Threats, Attacks, and Vulnerabilities related to Privacy

Domain 2: Privacy Architecture (36%)

A. Infrastructure

  • Cloud-based Services
  • Endpoints
  • Remote Access
  • System Hardening

B. Applications and Software

  • Secure Development Lifecycle
  • Applications and Software Hardening
  • APIs and Services
  • Tracking Technologies

C. Technical Privacy Controls

  • Communication and Transport Protocols
  • Encryption, Hashing, and De-identification
  • Key Management
  • Monitoring and Logging
  • Identity and Access Management

Domain 3: Data Cycle (30%)

A. Data Purpose

  • Data Inventory and Classification (e.g., Tagging, Tracking, SOR)
  • Data Quality and Accuracy
  • Dataflow and Usage Diagrams
  • Data Use Limitation
  • Data Analytics (e.g., Aggregation, AI, Machine Learning, Big Data)

B. Data Persistence

  • Data Minimisation (e.g., De-identification, Anonymisation)
  • Data Migration
  • Data Storage
  • Data Warehousing (e.g., Data Lake)
  • Data Retention and Archiving
  • Data Destruction

Similar courses

Corporate One Day Pass - Max 30 attendees

One day pass for a private corporate event for any displayed content.

More Information
Security in the Cloud, Where are we today, is my data secure in the cloud?

Cloud identity and access management, Data encryption in the cloud, Key management in the cloud, Data residency

More Information
Cloud First, Tools and tips to turn your on-premise focused IT department into a cloud first IT department.

Why is cloud first here to stay, Focusing on the user, Making use of open source and open standards, Sharing, Reuse and Collaboration, Tools to use in a cloud first world

More Information
DevOps, where to start? Tools and stratagems for those new to the DevOps world

The goals of DevOps, Building a DevOps culture, Continuous integration, delivery, and deployment (CI/CD), DevOps Tools

More Information
A lifetime of learning, Techniques and tools to assist you in making learning an on-going part of your life

Setting goals, Building a learning community, Keeping up-to-date with advances in technology, Becoming comfortable with saying “I don’t know” , Learning resources (tools and website to assist with learning)

More Information
AWS Cloud Practitioner Essentials

The fundamental-level full day course is intended for individuals who seek an overall understanding of the AWS Cloud, independent of specific technical roles. It provides a detailed overview of cloud concepts, AWS services, security, architecture, pricing, and support. It includes lab exercises reinforcing some of the core concepts of the lecture. This course also helps you prepare for the AWS Certified Cloud Practitioner exam.

More Information
AWS Security Essentials

This course covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, you learn where you are responsible for implementing security in the AWS Cloud and what security-oriented services are available to you and why and how the security services can help meet the security needs of your organization.

More Information
Migrating to AWS

Migrating to AWS focuses on planning and migrating existing workloads to the AWS Cloud. The course covers various cloud migration strategies with a detailed discussion on each phase of the migration process, including portfolio discovery, application migration planning and design, migration execution, and post-migration validation and application optimization.

More Information
Azure Fundamentals - Course AZ-900T01-A

This course will provide foundational-level knowledge of cloud services and how those services are provided with Microsoft Azure. The course can be taken as an optional first step in learning about cloud services and Microsoft Azure, before taking further Microsoft Azure or Microsoft cloud services courses.

More Information
Microsoft Power Platform Fundamentals - Course PL-900T00-A

Learn the business value and product capabilities of Power Platform. Create a simple PowerApp, connect data with CDS, build a Power BI Dashboard, and automate a process with Microsoft Flow.

More Information
Microsoft 365 Fundamentals - Course MS-900T01-A

This course provides foundational knowledge on the considerations and benefits of adopting cloud services and the Software as a Service (SaaS) cloud model, with a specific focus on Microsoft 365 cloud service offerings. You will begin by learning about cloud fundamentals, including an overview of cloud computing and specifically Microsoft cloud services. You will be introduced to Microsoft Azure, and you will examine the differences between Microsoft 365 and Office 365

More Information
Microsoft Dynamics 365 Fundamentals - Course MB-901T00-A

This course provides learners with a broad overview of Dynamics 365 applications. We will introduce you each of the applications, articulate their business value, and discuss and demo core functionality. We will cover Dynamics 365 security, reporting, and familiarize you with data and product integrations available

More Information
Secrets to Successful Cloud Transformations

In this course, you will learn how to select the right strategy, people, migration plan, and financial management methodology to move your workloads to the AWS Cloud. You will learn how to build a holistic cloud adoption plan and how to hire people to execute that plan. You will learn best practices for choosing workloads to migrate from your on-premises environment to AWS. You will also learn best practices for managing your AWS expenses and dealing with internal chargebacks. This course focuses on the business aspects of cloud transformation, rather than the technical aspects

More Information
AWS Hybrid Network Connectivity

During this course learners will be taught key AWS technologies that they will need to master to connect their networks with AWS. Learners will be taken on a journey from isolated VPCs to highly available hybrid architectures. This course will cover topics such as site-to-site VPNs using virtual private gateways and transit gateways, connectivity using AWS Direct Connect, security for hybrid connections and billing.

More Information
Exam Readiness: AWS Certified Solutions Architect – Professional

The AWS Certified Solutions Architect – Professional exam validates advanced technical skills and experience in designing distributed applications and systems on the AWS platform

More Information
Exam Readiness: AWS Certified Solutions Architect – Associate

The AWS Certified Solutions Architect – Associate exam validates technical expertise in designing and deploying scalable, highly available, and fault-tolerant systems on AWS. Join this half-day, intermediate-level training to learn how to prepare for the exam by exploring the exam’s topic areas and how they map to architecting on AWS and to specific areas to study.

More Information
Running Container-Enabled Microservices on AWS

Running Container-Enabled Microservices on AWS is designed to teach you how to manage and scale container-enabled applications by using Amazon EC2 Container Service (ECS). The course highlights the challenges of running containerized applications at scale and provides guidance on creating and using Amazon ECS to develop and deploy containerized microservices-based applications

More Information
Building a Serverless Data Lake on AWS

In this one-day, advanced course, you will learn to design, build, and operate a serverless data lake solution with AWS services. This course will include topics such as ingesting data from any data source at large scale, storing the data securely and durably, enabling the capability to use the right tool to process large volumes of data, and understanding the options available for analysing the data in near-real time

More Information
Which Cloud Provider? Overview of home working and cloud services that support home working

Types of homeworking Benefits of homeworking Consideration of homeworking for employers Connectivity for home workers Collaboration tools for home workers Security of data when working from home

More Information
Protect your Microsoft cloud identities

We are living unprecedented times. Every day we are learning new ways of working and interacting with each other’s and of course this also applies to the workforce. Hackers are also finding new ways of “working” and are taking advantage of the lack of well configured and prepared Systems. Spoofing, phishing are very know terms for IT Professionals and we get surprise by how so simple some attacks against identities are. Still users fall for then. There is a lot of awareness to be made on the user side, nevertheless we, IT Professionals should prevent this. In this Firebrand One I will share the best practices I have been advising customers around to world to protect their identities. We will speak and demo features like MFA, Self-password reset, Conditional access, PIM, FIDO, …. Join us and see how you can provide a safe cloud identity infrastructure to your users.

More Information
Architecting Applications on Azure

We are living unprecedented times. Every day we are learning new ways of working and interacting with each other’s and of course this also applies to the workforce. Microsoft Azure is not only getting more services and in new features on existing services, but with COVID-19 is growing at an extreme fast rate. Cloud adoption is not easy, especially on large size organizations. While some teams want to move their solutions to the cloud, others resist on the move, blocking innovation for the all company. In order to design state of the art solutions, it's crucial for IT Professional and Developers to have at least concept level knowledge of all services and how they interact with each other. This Firebrand One will provide the capacity to create a real-world design ready for the cloud. We will review application designs and identify the tradeoffs in order to make decisions for public and hybrid cloud solutions. We will use language-agnostic patterns in order to have designs that can be implemented with different technologies. It will be covered designs possible to implemented in organizations of all sizes.

More Information
Cryptography in a day.

Demistifying the concepts of cryptography and PKI in the working environment and beyond.

More Information
Network Security for the non technical. How the concepts of TCP/IP work and what should we be thinking about from a security standpoint.

Using the OSI and TCP/IP Models to explain how networks communicate and what security aspects should be considered at each layer. Using non technical analogy and putting it into a real world context.

More Information
First Responder. How to think and act like a police interceptor when handling a computer incident.

Using several national and international frameworks (NIST and NPCC guidelines) what should an incident handler be thinking of and how should a response be organised when dealing with a computer incident. What are the laws surrounding these actions and how should I preserve material evidence at the potential scene of a crime.

More Information
User Training and Awareness Sessions. The Good, The Bad and the Ineffective. How to make your users aware and stay aware of the security risks around them.

An effective User Training and Awareness Police is a must for all organisations. But how effective they are depends upon the level of commitment, knowledge and process that is put in to make the information they convey stick. This session will explore the concepts, talk about the types of risks which are currently in focus and how to deliver a multi-honed awareness campaign that should get everybody on board.

More Information
Understanding of the different locking terms between Relational DataBase Management (SQL Server) and Entity Attribute Value (Azure Cosmos DB) systems.

The session will be divided into four one hour sessions. First one for those new to Relational databases. Second one for those new to EAV databases. Third bringing the two together. The final hour can be used for discussion, questions, and answers..When dealing with data storage and access, it is important to use the correct granularity of access to balance the quality of the data being accessed to the information that is required to be communicated by the data.

More Information
AWS Hybrid Network Connectivity Duplicate

During this course learners will be taught key AWS technologies that they will need to master in order to connect their networks with AWS. Learners will be taken on a journey from isolated VPCs to highly available hybrid architectures. This course will cover topics such as site-to-site VPNs using virtual private gateways and transit gateways, connectivity using AWS Direct Connect, security for hybrid connections and billing.

More Information
Introducing AWS

This course will introduce learners to AWS and the key services that most AWS cloud projects use. During this course learners will be taught about AWS identity and access managment (IAM), Elastic Compute Cloud (EC2) virtual machines, intro to AWS networking, Billing, Storage and an introduction to AWS database services.

More Information
So, you want to pass the AWS Solutions Architect Associate exam?

In this half day session we will cover exam techniques, we will go through the Solutions Architect Associate exam overview (publicly available) we will discuss booking an online exam and the process on the day. We will highlight key exam topics before finishing the session with an exam focused Q&A. We will also explain the next levels of certification and how they can be achieved by learning at Firebrand.

More Information
How statistics are used in modern businesses

How statistics are used in modern businesses - How statistics and correlation of data can assist a modern business

More Information
Intro to Machine Learning

Intro to Machine Learning - How ML is impacting our everyday lives, its origins and its link to wider AI

More Information
Foundation Data Science Understanding

Foundation Data Science Understanding - What is DS, how is it being used in business today, what terms to look out for, how to commission some DS work

More Information
How to manage analysts

How to manage analysts - Learners will understand what makes and effective analytical environment, how to empower analysts to use their skills to drive business insight, the type of tasks that an analysts should be able to complete

More Information
Resiliency with .NET Core: How to consume services over the overloaded VPN connection.

Learners will understand the general patterns for writing code that can tolerate intermittent failures and will see how to implement these approaches with .NET code using the Polly library.

More Information
Deploy to Kubernetes with Azure DevOps

A good CI/CD pipeline is indistinguishable from magic - you commit your code and 2 minutes later the new version of your application is running. Don't believe that you can learn Kubernetes magic in two hours? Challenge accepted, join this course and we'll show you how you can automate a multi-stage docker build and kubectl deployment in just that long.

More Information
Kubernetes routing in the cloud: How to expose your service to the public

You can spin up an AKS cluster and publish a service literally in minutes but hosting a production-grade application will take a little more than that. This course offers a deep dive into kubernetes Services, Ingress Controllers and load balancing.

More Information
Final Exam Q&A Prep for your CCNA

All CCNA related topics - The idea is to prepare students 2 weeks out from their exam, by providing an online Q&A session.

More Information
Cisco SD-Access in a nutshell

Defining the benefits of SD-Access over traditional campus networks - identifying the core SD-Access components.

More Information
Understanding Data Science for Decision Makers

Course Description: DSBIZ (DSZ-110) – CertNexus’ newest THINK level offering – is a credential that offers business leaders, sales and marketing managers, project managers, and other business stakeholders a streamlined course to help make decisions and drive organizational data science strategies. DSBIZ candidates will learn data science concepts, methods of use, plus the challenges and benefits using relative business examples. Successful candidates will earn a DSBIZ digital badge which can be shared via a number of social platforms.

More Information
Why invest in Enterprise Architecture

“In business, you’re either growing or you’re decaying: there’s no middle ground. If you’re standing still you’re decaying.” Alan Arkin. The business world is deterministic – that is to say, every cause has an effect. It is also very complex. The combination of determinism and complexity is chaos and chaotic systems are not readily predictable. What we do know is that to thrive a business must address the perceived threats. We have Security people to address security threats by adjusting the Security Architecture – analogously we are adjusting for Privacy threats and generally we evolve by adjusting for different commercial threats. These include new laws and regulations, process and quality improvements by competitors and a whole myriad of other external changes that threaten our corporate well-being. Understanding how to accommodate responses to subtle threats within our complex corporate environment requires a dispassionate and holistic view which is not easy when it feels like fire-fighting. The role of the Enterprise Architect is to support continuity of business whilst analysing and understanding these threats, then design optimal system modifications to accommodate, reconcile or resist them. This webinar is designed as an overview to the thinking processes that can be used to rationalise the ‘non-security’ commercial threats with a view to understanding the particular skill-set of the Enterprise Architect.

More Information
What is Enterprise Architecture for Architects and the IT community

Understanding how to accommodate responses to subtle threats within our complex corporate environment requires a dispassionate and holistic view which is not easy when it feels like fire-fighting. The role of the Enterprise Architecture is to support continuity of business whilst analysing and understanding these threats, then design optimal system modifications to accommodate, reconcile or resist them. Optimal, in this case, generally includes that they are capable of being implemented whilst minimally compromising the current operational environment – or that a great change is handled with predicted damage limitation. This webinar is designed as an overview to the thinking processes that can be used by the Enterprise Architect to rationalise these seemingly conflicting requirements.

More Information
BCS Blockchain Essentials (BCSBLOCKE) Undertand the basic concepts of blockchain, the potential fields of application, the potential value for the organization and the technology driving the blockchain

Explain how a blockchain works, explain the purpose ledgers have in a blockchain, Identify blockchain vulnerabilities, Explain the role of the public witness in a blockchain, Explain the role of decentralized autonomous organizations (DOA) and sophisticated smart contracts, describe possible applications for a blockchain with regard to identity, identify the possibilities of combining a blockchain with internet of things (IOT) or artifical intelligence (AI), describe the role blockchain can play in the supply chain, explain the use of blockchain technology for the protection of intellectual property (IP) and providence

More Information
AWS Discovery Day

Get a free official introduction to AWS. Delivered online on August 7, 2020

More Information

Press enter to see more results