YoVDO

Illegitimate Data Protection Requests - To Delete or Address?

Offered By: Black Hat via YouTube

Tags

Cybersecurity Courses Network Security Courses Risk Management Courses Social Engineering Courses Compliance Courses Data Protection Courses Malware Courses Cyber Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the emerging threat of illegitimate data protection requests in this 41-minute Black Hat conference talk. Delve into how cyber-attackers are exploiting privacy regulations by submitting seemingly valid data subject access requests that conceal malware. Learn about the innovative exploitation scenarios that go beyond traditional privacy-by-design principles, and understand how these attacks can be executed with minimal resources or skills. Examine the potential for rapid malware spread within targeted organizations' internal networks. Gain insights from speakers Larisa Munteanu and Mark Povey on this critical cybersecurity issue that challenges organizations to balance data protection compliance with security measures.

Syllabus

Illegitimate Data Protection Requests - To Delete or to Address?


Taught by

Black Hat

Related Courses

Cryptography II
Stanford University via Coursera
Microsoft Enterprise Mobility Suite
Microsoft via edX
Social Media - What No One has Told You about Privacy
openHPI
Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX
Health Professional Teaching Skills – Level 3 - Professionalism
University of Toronto via edX