YoVDO

Secure Application Design with High Data Privacy Requirements

Offered By: OWASP Foundation via YouTube

Tags

Application Security Courses Cryptography Courses Risk Management Courses Identity Management Courses Data Privacy Courses Supply Chain Security Courses Data Retention Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore secure application design principles for high data privacy requirements in this 40-minute OWASP Foundation talk by James Bohem. Delve into the evolution of data privacy concerns and learn practical strategies for managing identity data, implementing cryptography for data storage, and ensuring logging accountability. Discover techniques for data de-identification, retention, and supply chain management. Gain insights into risk management practices and future-proofing applications. Acquire valuable resources to enhance your understanding of secure application design in the context of stringent data privacy regulations.

Syllabus

Intro
Background
What we're covering
How did we get here?
We don't have to...
What should we do?
Identity Data Management
Identity records
Live data access
Cryptography - data storage
Cryptography – practices
Cryptography - key considerations
Logging and accountability
Data de-identification
Data retention
Basic practices
Supply chain management
Risk management
Future-proofing
Resources


Taught by

OWASP Foundation

Related Courses

Cyber Security in Manufacturing
University at Buffalo via Coursera
Supply Chain and Operations Management Tips
LinkedIn Learning
Kubernetes Security: Implementing Supply Chain Security
Pluralsight
Implement Cybersecurity Best Practices in Your Organization
Salesforce via Trailhead
ISC2 Certified Secure Software Life-Cycle Professional (CSSLP)
Cybrary