VIDEO

Five ways to build a bulletproof PBD program with your security partners


Published: 14 Feb. 2023

Brought to you by TerraTrue
This web conference explores strategies on how privacy and security can create processes for pre-deployment insights from product and engineering teams, how to leverage privacy and security teams’ shared needs on third-party vendor reviews and record of processing activities and battle-tested tips on how to avoid getting ambushed for last-minute approval requests from the business.

Five ways to build a bulletproof PBD program with your security partner

View upcoming IAPP web conferences
CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Contributors:

Chris Handman

Co-founder, Chief Operating Officer, TerraTrue

Angelique Carson

Director of Content Strategy, TerraTrue

R. Jason Cronk

President, Institute of Operational Privacy Design

CIPP/US, CIPM, CIPT, FIP


Tags:

Data securityPrivacy engineeringStrategy and governancePrivacyCybersecurity law
VIDEO

Five ways to build a bulletproof PBD program with your security partners

Published: 14 Feb. 2023


Contributors:

Chris Handman

Co-founder, Chief Operating Officer, TerraTrue

Angelique Carson

Director of Content Strategy, TerraTrue

R. Jason Cronk

President, Institute of Operational Privacy Design

CIPP/US, CIPM, CIPT, FIP


Brought to you by TerraTrue
This web conference explores strategies on how privacy and security can create processes for pre-deployment insights from product and engineering teams, how to leverage privacy and security teams’ shared needs on third-party vendor reviews and record of processing activities and battle-tested tips on how to avoid getting ambushed for last-minute approval requests from the business.

Five ways to build a bulletproof PBD program with your security partner

View upcoming IAPP web conferences
CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Tags:

Data securityPrivacy engineeringStrategy and governancePrivacyCybersecurity law

Related resources