Illegitimate Data Protection Requests - To Delete or Address?
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the emerging threat of illegitimate data protection requests in this 41-minute Black Hat conference talk. Delve into how cyber-attackers are exploiting privacy regulations by submitting seemingly valid data subject access requests that conceal malware. Learn about the innovative exploitation scenarios that go beyond traditional privacy-by-design principles, and understand how these attacks can be executed with minimal resources or skills. Examine the potential for rapid malware spread within targeted organizations' internal networks. Gain insights from speakers Larisa Munteanu and Mark Povey on this critical cybersecurity issue that challenges organizations to balance data protection compliance with security measures.
Syllabus
Illegitimate Data Protection Requests - To Delete or to Address?
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network