-
Data Security and Privacy in a Data Driven Organisation (EN)
-
The importance of data and its value is becoming increasingly clear. At the same time, more and more attention is being paid to Data Privacy. How do you deal with this? This question is central to this training.
Training codeCGADSPDGCESpoken LanguageEnglishLanguage MaterialsEnglishDayparts2Price€800,00excl. VAT No extra costs.Book Data Security and Privacy in a Data Driven Organisation (EN) now
In group training, we use several learning methods to help you obtain the knowledge, give you helpful insights and get you inspired. Check the Spoken language and Language materials on the left for language info.
Data Security and Privacy in a Data Driven Organisation (EN)
10
9.5
0
2 reviewsWhat is Data Security and Privacy in a Data Driven Organisation
The importance of data and the value derived from it is becoming increasingly clear to organizations. With the introduction of the GDPR, attention to Data Security and Data Privacy has grown. This training focuses on maximizing the value from your data while ensuring GDPR compliance. You will learn to navigate the balance between GDPR and your information needs, understand how to grant data access to your employees, protect personal data within data flows, and apply methods and techniques to safeguard personal data. The training emphasizes the application of theory in practical cases, delivered by expert trainers.
Our trainers infuse a tangible aspect into abstract theories, offering insights rooted in real-world scenarios and tried-and-true practices. This hands-on expertise elevates the learning journey, transforming the training from a mere theoretical drill into a practical, applicable experience.
Who should attend Data Security and Privacy in a Data Driven Organisation
- Enterprise architects and data architects: Professionals who need to include data security and data privacy in their architecture.
- Business Analysts and Information Analysts: Professionals who work with data and need to understand how to properly design solutions while protecting personal data.
- Data Analysts: Professionals who work with data and need to understand the implications of GDPR on their work.
- Data Scientists: Individuals who create models and algorithms and need to ensure they are compliant with data privacy regulations.
- IT Managers: Professionals who oversee data systems and need to ensure their organization is compliant.
- Data Protection Officers: Individuals responsible for overseeing data protection strategy and implementation to ensure compliance with GDPR requirements.
- Compliance Officers: Professionals who ensure that their organizations adhere to legal standards and in-house policies.
Prerequisites
There are no specific requirements to participate in this training. During the training you need a laptop.
Objectives
At the end of the training you will be able to estimate when which data can be made available to whom and what conditions are required for this.
The importance of data and its value is becoming increasingly clear. At the same time, more and more attention is being paid to Data Privacy. How do you deal with this? This question is central to this training.
Training codeCGADSPDGCESpoken LanguageEnglishLanguage MaterialsEnglishDayparts2Price€800,00excl. VAT No extra costs.With an Incompany training you have several advantages:
- You choose the location
- You experience the training with your colleagues, so it is always in line with your practice
- The trainer can tailor explanations, examples and assignments to your organization
- In consultation exercises can be adapted to organization-specific questions
Request more information or a quote.Data Security and Privacy in a Data Driven Organisation (EN)
10
9.5
0
2 reviewsWhat is Data Security and Privacy in a Data Driven Organisation
The importance of data and the value derived from it is becoming increasingly clear to organizations. With the introduction of the GDPR, attention to Data Security and Data Privacy has grown. This training focuses on maximizing the value from your data while ensuring GDPR compliance. You will learn to navigate the balance between GDPR and your information needs, understand how to grant data access to your employees, protect personal data within data flows, and apply methods and techniques to safeguard personal data. The training emphasizes the application of theory in practical cases, delivered by expert trainers.
Our trainers infuse a tangible aspect into abstract theories, offering insights rooted in real-world scenarios and tried-and-true practices. This hands-on expertise elevates the learning journey, transforming the training from a mere theoretical drill into a practical, applicable experience.
Who should attend Data Security and Privacy in a Data Driven Organisation
- Enterprise architects and data architects: Professionals who need to include data security and data privacy in their architecture.
- Business Analysts and Information Analysts: Professionals who work with data and need to understand how to properly design solutions while protecting personal data.
- Data Analysts: Professionals who work with data and need to understand the implications of GDPR on their work.
- Data Scientists: Individuals who create models and algorithms and need to ensure they are compliant with data privacy regulations.
- IT Managers: Professionals who oversee data systems and need to ensure their organization is compliant.
- Data Protection Officers: Individuals responsible for overseeing data protection strategy and implementation to ensure compliance with GDPR requirements.
- Compliance Officers: Professionals who ensure that their organizations adhere to legal standards and in-house policies.
Prerequisites
There are no specific requirements to participate in this training. During the training you need a laptop.
Objectives
At the end of the training you will be able to estimate when which data can be made available to whom and what conditions are required for this.
-
Brochure
Related
e-CF competences with this course
At Capgemini Academy we believe in transparency and clarity in the training landscape. That is why, in the table below, we show you to which e-CF competence this training or certification contributes. For more information about how to use the e-Competence Framework read more here. If you want to know how you can apply the e-CF within your organization, read more on this page.
e-Competence Level | 1 | 2 | 3 | 4 | 5 |
---|---|---|---|---|---|
D.1.Information Security Strategy Development | |||||
B.2.Component Integration | |||||
D.10.Information and Knowledge Management | |||||
E.8.Information Security Management |