VIDEO

Five ways to build a bulletproof PBD program with your security partners


Published: 14 Feb. 2023

Brought to you by TerraTrue
This web conference explores strategies on how privacy and security can create processes for pre-deployment insights from product and engineering teams, how to leverage privacy and security teams’ shared needs on third-party vendor reviews and record of processing activities and battle-tested tips on how to avoid getting ambushed for last-minute approval requests from the business.

Five ways to build a bulletproof PBD program with your security partner

View upcoming IAPP web conferences
CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Contributors:

Angelique Carson

Director of Content Strategy

TerraTrue

Chris Handman

Co-founder, Chief Operating Officer

TerraTrue

R. Jason Cronk

CIPP/US, CIPM, CIPT, FIP

President

Institute of Operational Privacy Design


Tags:

Data securityPrivacy engineeringStrategy and governancePrivacyCybersecurity law
VIDEO

Five ways to build a bulletproof PBD program with your security partners

Published: 14 Feb. 2023


Contributors:

Angelique Carson

Director of Content Strategy

TerraTrue

Chris Handman

Co-founder, Chief Operating Officer

TerraTrue

R. Jason Cronk

CIPP/US, CIPM, CIPT, FIP

President

Institute of Operational Privacy Design


Brought to you by TerraTrue
This web conference explores strategies on how privacy and security can create processes for pre-deployment insights from product and engineering teams, how to leverage privacy and security teams’ shared needs on third-party vendor reviews and record of processing activities and battle-tested tips on how to avoid getting ambushed for last-minute approval requests from the business.

Five ways to build a bulletproof PBD program with your security partner

View upcoming IAPP web conferences
CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Tags:

Data securityPrivacy engineeringStrategy and governancePrivacyCybersecurity law

Related resources