Certified Information Privacy Manager (CIPM)

by SUTD Claim Listing

Data Protection Officer (DPO) is an emerging job role. Almost all the data protection laws in the world require organisations to appoint a DPO by law. There is a shortage of data protection officers worldwide, including Singapore. DPO is ideal for mid-career PMET in the digital economy.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

SUTD Logo

img Duration

3 Days

Course Details

Data Protection Officer (DPO) is an emerging job role. Almost all the data protection laws in the world require organisations to appoint a DPO by law. There is a shortage of data protection officers worldwide, including Singapore. DPO is ideal for mid-career PMET in the digital economy.

This course is designed to transform the knowledge of data protection regulations and policies into implementable and practical day-to-day operations.

Participants will learn the benefits of data protection, the principles and regulations of data protection, and how to implement an effective data protection management programme with the necessary knowledge, skills, tools, and methods.

Participants will learn how to draft a data protection policy, build a data protection team, compile a data inventory map, assess data management risk, embed Privacy by Design into systems and processes, conduct Data Protection Impact Assessment (DPIA), plan for data breach response, conduct data protection audit, and measure the effectiveness of the data protection management programme.

This course will further prepare learners for the optional IAPP certification examination (not included in this course) which participants are encouraged to sit for.

The IAPP privacy certifications (CIPM, CIPP, CIPT) are widely recognised by recruiters and sought-after credentials for privacy professionals such as data protection officers, risk and compliance, data protection auditors, data protection consultants, and legal professionals. 

One will learn the many practical aspects of implementing a workable data protection programme in one's organisation, from how to create a company vision in data protection, how to structure a data protection team, how to develop and implement system frameworks, to how to communicate to stakeholders, and how to measure the data protection programme's effectiveness and performance, and more.

  • East Branch

    8 Somapah Road, East

Check out more Network Security courses in Singapore

Stag Match Institute Logo

Cyber Security Program

Cybersecurity professionals are always busy outsmarting black hat hackers, patching vulnerabilities and analyzing the risk of an organization.

by Stag Match Institute [Claim Listing ]
ICDL Foundation Logo

Cyber Security

Successful candidates will be able to apply good IT security principles to manage connections, devices, and data effectively and safely. After passing this module, candidates will feel confident keeping information and data secure.

by ICDL Foundation [Claim Listing ]
KnowledgeTree Training Centre Logo

Basic Cybersecurity Response

BCSR – Basic Cybersecurity Response aims to provide learners with the fundamentals of detecting cybersecurity threats and the various ways to respond to them.

by KnowledgeTree Training Centre [Claim Listing ]
Trainocate Singapore Logo

SCOR - Implementing And Operating Cisco Security Core Technologies v1.0

The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In this certification & training course.

by Trainocate Singapore [Claim Listing ]
SUTD Logo

A Primer On Cybersecurity

The objective of this 2-day course is to provide an overview of cybersecurity to a broad audience. We will cover foundational topics but will emphasize examples, applications and techniques to raise awareness on the most fundamental cybersecurity concepts, attack vectors and good practices.

by SUTD [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy