Privacy Knowledge is the Advantage You Need in Technology
The collection, processing and transfer of personally identifiable information is creating a widening gap between the development and implementation of technology and society’s privacy. This leaves data open to hackers and corporations vulnerable to significant fines and damage to their reputation.
Technologists with privacy skills will:
- Enjoy greater opportunities for career advancement through their unique, desirable skillset.
- Elevate their industry status by holding the first globally recognized, ANSI/ISO-accredited privacy technologist certification.
- Become leaders that operations trust to identify privacy challenges and architect technical solutions, while ensuring privacy principles are in place.
Can You Be Considered a Technology Expert if You Do Not Know Privacy?
A CIPT designation is the perfect complement to other important technology certifications, such as CISSP, CIMP, CEH, CISM, CompTIA Security+, GSEC, GSLC, GSNA, GISP, GSTRT, GLEG, GCPM, MCSD, AWS, Cisco DevNet, OCJP and PCPP. It focuses on improving operational responses through employment of technological approaches, such as Privacy by Design, Privacy Engineering, and frameworks.
To become the technology leader companies are looking for, a CIPT designation is the best proof of technical skills and privacy knowledge for those already holding ISC2, ISACA, PMI, Microsoft, Cisco, CompTIA, GIAC, EC-Council, and ITIL Certifications.
Those who will benefit include data scientists, data analysts, software engineers, designers, privacy engineers, developers, system administrators, data architects, UX designers, cybersecurity professionals, and those who work in technology acquisition, risk management and compliance.
What You’ll Learn
In addition to critical privacy in technology concepts and practices, we have added “Privacy Engineering” and “Privacy by Design Methodology” as two new domains. We also have new content in the following areas:
- Privacy risk models and frameworks.
- Value-sensitive design.
- Privacy responsibilities of the technology professional.
- Privacy technologies for the Internet of Things.
- Intrusion, decisional Interference and self-representation.
- Software security.
- Data-oriented strategies.
- Process-oriented strategies.
- The privacy engineering role in the organization.
- Privacy engineering objectives.
- Privacy design patterns.
- Privacy risks in software.
- The Privacy by Design (PbD) process.
- Ongoing vigilance of PbD.
- Mobile social computing.
- 2 full-day training sessions
- One-year IAPP membership (applied as a renewal for current members)
- Exam cost included
- Sample questions for the exam
- An electronic version of the textbook
- Participant guide
- Light refreshments (In-person Sessions)