All Episodes

Displaying 41 - 60 of 71 in total

Episode 41 — Use encryption and hashing correctly so privacy goals match cryptographic reality (Domain 4B-5 Encryption and Hashing)

This episode clarifies how encryption and hashing support privacy goals, and it corrects the common misunderstanding that “hashed” automatically means “anonymous” or “...

Episode 42 — Build monitoring and logging that supports privacy without creating new exposure (Domain 4B-6 Monitoring and Logging)

This episode teaches how to design monitoring and logging so it improves detection, troubleshooting, and auditability without quietly increasing privacy risk through o...

Episode 43 — Implement consent tagging that travels with data and survives system boundaries (Domain 4C-1 Consent Tagging)

This episode explains consent tagging as a practical mechanism for making consent enforceable across pipelines, services, and vendors, rather than treating consent as ...

Episode 44 — Govern tracking technologies and cookie management with clear, enforceable rules (Domain 4C-2 Tracking Technologies)

This episode covers tracking technologies and cookie management as a governance-and-implementation problem that spans websites, mobile apps, SDKs, and third-party tags...

Episode 45 — Apply anonymization and pseudonymization with honest limits and verification (Domain 4C-3 Anonymization and Pseudonymization)

 This episode explains anonymization and pseudonymization in the way CDPSE expects: as risk-reduction techniques with strict limits, not magic labels that eliminate ob...

Episode 46 — Choose privacy enhancing technologies that match threats, data, and architecture (Domain 4C-4 Privacy Enhancing Technologies)

This episode introduces privacy enhancing technologies as a toolbox that must be matched to a specific threat model, dataset, and system architecture, because “use a P...

Episode 47 — Address AI and ML privacy considerations before models ship to production (Domain 4C-5 AI/Machine Learning (ML) Considerations)

This episode explains AI and ML privacy considerations in a way that maps to CDPSE objectives, focusing on what must be decided before a model ever reaches production....

Episode 48 — Detect AI and ML privacy pitfalls like inference, drift, and overcollection risks (Domain 4C-5 AI/Machine Learning (ML) Considerations)

This episode focuses on privacy pitfalls that appear after AI and ML systems go live, including inference risks, drift-driven behavior change, and overcollection throu...

Episode 49 — Spaced Retrieval Review: Privacy engineering decisions across stacks, controls, and data (Domain 4A-1 to 4C-5)

This review episode strengthens rapid recall across Domain 4 by connecting infrastructure choices, operational controls, and privacy-enhancing techniques into a single...

Episode 50 — Identify internal and external requirements that shape every privacy program decision (Task 1)

This episode teaches you to identify and reconcile the internal and external requirements that drive privacy program decisions, because CDPSE frequently tests how you ...

Episode 51 — Review programs for legal alignment, best practices, and data subject expectations (Task 2)

This episode teaches how to review a privacy program for legal and regulatory alignment while also checking whether it matches best practices and real data subject exp...

Episode 52 — Advise on data life cycle policies so data governance reflects privacy reality (Task 3)

This episode focuses on advising leaders and teams on data life cycle policies so governance reflects how systems actually collect, use, share, store, and delete perso...

Episode 53 — Design and evaluate technical and operational controls for classification and life cycle (Task 4)

This episode teaches how to design and evaluate controls that make data classification and life cycle governance real in day-to-day operations, because CDPSE scenarios...

Episode 54 — Perform PIAs and privacy-focused assessments without missing real-world impacts (Task 5)

This episode explains how to perform PIAs and privacy-focused assessments in a way that captures real-world impacts, not just formal requirements, which is a core CDPS...

Episode 55 — Integrate privacy principles into procedures and operational manuals people follow (Task 6)

This episode teaches how to integrate privacy principles into procedures and operational manuals so people can actually follow them under time pressure, which is often...

Episode 56 — Collaborate to ensure Privacy by Design is applied through build and rollout (Task 7)

This episode focuses on collaboration patterns that make Privacy by Design real from early requirements through build, testing, deployment, and operational monitoring....

Episode 57 — Identify and assess privacy threats and vulnerabilities with repeatable rigor (Task 8)

This episode teaches a repeatable method for identifying and assessing privacy threats and vulnerabilities so your conclusions are defensible, consistent, and actionab...

Episode 58 — Evaluate vendor contracts, SLAs, and practices, then monitor for compliance evidence (Task 9)

This episode explains how to evaluate vendors beyond marketing claims by reviewing contracts, SLAs, and actual operating practices, then setting up monitoring that pro...

Episode 59 — Participate in incident management to address privacy impacts and drive remediation (Task 10)

his episode focuses on participating in incident management with a privacy lens, emphasizing how to identify privacy impacts quickly, make defensible decisions, and dr...

Episode 60 — Collaborate with stakeholders to resolve privacy compliance gaps and risk responses (Task 11)

This episode teaches how to collaborate with stakeholders to resolve compliance gaps and select appropriate risk responses, because CDPSE often tests your ability to m...

Broadcast by