IBM DataFirst Data Privacy introduction-IBM DataFirst Data Privacy introduction lesson
Course disclaimer
Meet Christopher Giardina
()
Meet Tim Davis
()
Meet Paul Christensen
()
Transforming your business with modern data and AI architectures
()
What is an IBM DataFirst engagement?
()
Data governance and organizational structures-Data governance and organizational structures lesson
Data governance and organizational structures introduction
()
DataFirst
()
Structures and roles
()
Organization governance structures
()
Use case example
()
Questions to consider
()
Dealing with regulation-Dealing with regulation lesson
Introduction to considering data privacy rights
()
Data protection, privacy and regulations overview
()
Exploring regulations
What is personal data?
Core Principles
A "Privacy Principles" approach
Getting started
Demonstrating compliance
Example of a deployment
()
Data privacy regulations and initiatives
()
Data governance intersections-Data governance intersections lesson
Data governance intersections introduction
()
Why data governance?
()
Private data, use case types, and governance building blocks
()
Key governance components: Who and what?
()
What is metadata?
()
Key governance components: Where, why, how?
()
Data Privacy policies and procedures examples
()
Example assessment guidance
()
Questions to consider
()
ODPi Egeria
Data privacy vs security-Data privacy vs security lesson
Data privacy vs security introduction
()
Underlying principles
()
The difference between data privacy and security
()
Privacy mechanisms
()
Security mechanisms
()
Governance driven protection and use case introduction
()
Test data management use case
()
Analytics and data science use case
()
Summary
()
An end-to-end framework for privacy at scale
Data privatization mechanisms-Data privatization mechanisms lesson
Data privacy and the changing landscape
()
Data privatization mechanisms introduction
()
Personal data privatization vs. privatization of personal data
()
Personal data categories
()
Data topologies, use cases, and the data strategy perspective
()
Typical mechanisms overview
()
Data masking
()
Tokenization
()
Anonymization
()
Data fabrication
()
Personal data re-identification risk assessment
()
Other related approaches
()
Choosing privatization techniques and considerations
()
Conducting the workshop-Conducting the workshop lesson
Conducting the workshop introduction
()
DataFirst engagement
()
The agenda
()
The participants
()
Day one
()
Days two and three
()
Days four and five
()
Typical work products and deliverables
()
High level data flow approach
()
Breakdown of processes approach
()
People, process, and technology views
()
Drill down approach
()
Roadmap guidance example
()