
Cybersecurity and Privacy Law Introduction
convocourses
LOCKIN your organization's COMPLIANCE! KNOW THE LAW
This is an introduction to the cybersecurity and privacy laws that you need to know. This indispensable resource is tailored for those who deal with IT and legal practice:
Know what laws apply:Industry-Specific Insights: Practical Integration: Narrated by Kim Pepper
Duration - 3h 11m.
Author - ConvoCourses.
Narrator - Kim Pepper.
Published Date - Friday, 03 January 2025.
Copyright - © 2023 Bruce Brown ©.
Location:
United States
Description:
LOCKIN your organization's COMPLIANCE! KNOW THE LAW This is an introduction to the cybersecurity and privacy laws that you need to know. This indispensable resource is tailored for those who deal with IT and legal practice: Know what laws apply:Industry-Specific Insights: Practical Integration: Narrated by Kim Pepper Duration - 3h 11m. Author - ConvoCourses. Narrator - Kim Pepper. Published Date - Friday, 03 January 2025. Copyright - © 2023 Bruce Brown ©.
Language:
English
Cybersecurity & Privacy Law Introduction
Duración:00:00:11
Convocourses
Duración:00:00:17
Chapter 1- fundamentals of cyber sec and privacy laws
Duración:00:06:11
Chapter 1- what are cyber laws
Duración:00:02:30
Chapter 1- privacy laws
Duración:00:04:40
Chapter 1- privacy laws vs security laws
Duración:00:01:46
Chapter 1- why do we need security and privacy laws
Duración:00:01:58
Chapter 1- impact of cyber laws
Duración:00:03:21
Chapter 1- intellectual property
Duración:00:01:36
Chapter 2 - key us cybersec laws and regs processed
Duración:00:00:25
Chapter 2 - federal information security modernization act
Duración:00:08:56
Chapter 2 - computer fraud and abuse act
Duración:00:04:14
Chapter 2 - privacy act of 1974
Duración:00:01:18
Chapter 2 - freedom of information act
Duración:00:01:16
Chapter 2 - cybersecurity information sharing act
Duración:00:05:17
Chapter 2 - gramm leach bliley act
Duración:00:04:07
Chapter 2 - california consumer privacy act
Duración:00:04:47
Chapter 2 - children's online privacy protection act
Duración:00:02:24
Chapter 2 - electronic communications privacy act
Duración:00:02:41
Chapter 3 - understanding the nist 800 rmf framework
Duración:00:00:41
Chapter 3 - what is the nist rmf framework
Duración:00:02:34
Chapter 3 - how to manage security and privacy risk
Duración:00:10:53
Chapter 3 - executing the rmf
Duración:00:00:52
Chapter 4 - global cybersecurity laws and regulations
Duración:00:00:30
Chapter 4 - europe
Duración:00:07:50
Chapter 4 - japan
Duración:00:06:53
Chapter 4 - china
Duración:00:04:45
Chapter 4 - singapore
Duración:00:03:51
Chapter 4 - india
Duración:00:02:44
Chapter 5 - industry specific cybersec laws and regs
Duración:00:04:01
Chapter 5 - healthcare
Duración:00:08:17
Chapter 5 - retail
Duración:00:05:20
Chapter 5 - financial sector
Duración:00:05:02
Chapter 6 - cybersecurity laws in govt and defense
Duración:00:00:48
Chapter 6 - nasa cybersec policies
Duración:00:06:09
Chapter 7 - how to implement cybersecurity law compliance in your org
Duración:00:00:41
Chapter 7 - what laws to comply with
Duración:00:04:01
Chapter 7 - using the nist csf to ensure compliance with laws and regs
Duración:00:05:14
Chapter 7 - education on laws and compliance
Duración:00:02:02
Chapter 7 - risk assessments
Duración:00:06:41
Chaprer 7 - choosing a framework
Duración:00:01:39
Chapter 7 - setting and updating policies and controls
Duración:00:01:18
Chapter 7 - monitor respond and iterate
Duración:00:01:21
Chapter 8 - privacy laws and their impact on cybersec
Duración:00:00:54
Chapter 8 - privacy is not the same as security
Duración:00:02:04
Chapter 8 - common challenges
Duración:00:03:21
Chapter 8 - impact of privacy laws on orgs
Duración:00:01:45
Chapter 8 - security and privacy together
Duración:00:00:54
Chapter 9 - cybersecurity laws and system certifications
Duración:00:01:26
Chapter 9 - certifications in the law
Duración:00:02:12
Chapter 9 - iso 27001
Duración:00:03:24
Chapter 9 - certifications for pci dss
Duración:00:02:08
Chapter 9 - hippa certification
Duración:00:02:40
Chapter 9 - coppa safe harbor program
Duración:00:00:17
Chapter 9 - gdpr certification
Duración:00:03:20
Chapter 10 - future of cybersecurity laws
Duración:00:00:30
Chapter 10 - cybersecurity for the iot
Duración:00:02:27
Chapter 10 - child privacy laws
Duración:00:01:18
Chapter 10 - ai laws
Duración:00:05:11
Conclusion final
Duración:00:04:51
Ending Credits
Duración:00:00:18