Cybersecurity and Privacy Law Introduction
convocourses
LOCKIN your organization's COMPLIANCE! KNOW THE LAW
This is an introduction to the cybersecurity and privacy laws that you need to know. This indispensable resource is tailored for those who deal with IT and legal practice:
Know what laws apply:Industry-Specific Insights: Practical Integration: Narrated by Kim Pepper
Duration - 3h 11m.
Author - ConvoCourses.
Narrator - Kim Pepper.
Published Date - Saturday, 18 January 2025.
Copyright - © 2023 Bruce Brown ©.
Location:
United States
Description:
LOCKIN your organization's COMPLIANCE! KNOW THE LAW This is an introduction to the cybersecurity and privacy laws that you need to know. This indispensable resource is tailored for those who deal with IT and legal practice: Know what laws apply:Industry-Specific Insights: Practical Integration: Narrated by Kim Pepper Duration - 3h 11m. Author - ConvoCourses. Narrator - Kim Pepper. Published Date - Saturday, 18 January 2025. Copyright - © 2023 Bruce Brown ©.
Language:
English
Cybersecurity & Privacy Law Introduction
Duration:00:00:11
Convocourses
Duration:00:00:17
Chapter 1- fundamentals of cyber sec and privacy laws
Duration:00:06:11
Chapter 1- what are cyber laws
Duration:00:02:30
Chapter 1- privacy laws
Duration:00:04:40
Chapter 1- privacy laws vs security laws
Duration:00:01:46
Chapter 1- why do we need security and privacy laws
Duration:00:01:58
Chapter 1- impact of cyber laws
Duration:00:03:21
Chapter 1- intellectual property
Duration:00:01:36
Chapter 2 - key us cybersec laws and regs processed
Duration:00:00:25
Chapter 2 - federal information security modernization act
Duration:00:08:56
Chapter 2 - computer fraud and abuse act
Duration:00:04:14
Chapter 2 - privacy act of 1974
Duration:00:01:18
Chapter 2 - freedom of information act
Duration:00:01:16
Chapter 2 - cybersecurity information sharing act
Duration:00:05:17
Chapter 2 - gramm leach bliley act
Duration:00:04:07
Chapter 2 - california consumer privacy act
Duration:00:04:47
Chapter 2 - children's online privacy protection act
Duration:00:02:24
Chapter 2 - electronic communications privacy act
Duration:00:02:41
Chapter 3 - understanding the nist 800 rmf framework
Duration:00:00:41
Chapter 3 - what is the nist rmf framework
Duration:00:02:34
Chapter 3 - how to manage security and privacy risk
Duration:00:10:53
Chapter 3 - executing the rmf
Duration:00:00:52
Chapter 4 - global cybersecurity laws and regulations
Duration:00:00:30
Chapter 4 - europe
Duration:00:07:50
Chapter 4 - japan
Duration:00:06:53
Chapter 4 - china
Duration:00:04:45
Chapter 4 - singapore
Duration:00:03:51
Chapter 4 - india
Duration:00:02:44
Chapter 5 - industry specific cybersec laws and regs
Duration:00:04:01
Chapter 5 - healthcare
Duration:00:08:17
Chapter 5 - retail
Duration:00:05:20
Chapter 5 - financial sector
Duration:00:05:02
Chapter 6 - cybersecurity laws in govt and defense
Duration:00:00:48
Chapter 6 - nasa cybersec policies
Duration:00:06:09
Chapter 7 - how to implement cybersecurity law compliance in your org
Duration:00:00:41
Chapter 7 - what laws to comply with
Duration:00:04:01
Chapter 7 - using the nist csf to ensure compliance with laws and regs
Duration:00:05:14
Chapter 7 - education on laws and compliance
Duration:00:02:02
Chapter 7 - risk assessments
Duration:00:06:41
Chaprer 7 - choosing a framework
Duration:00:01:39
Chapter 7 - setting and updating policies and controls
Duration:00:01:18
Chapter 7 - monitor respond and iterate
Duration:00:01:21
Chapter 8 - privacy laws and their impact on cybersec
Duration:00:00:54
Chapter 8 - privacy is not the same as security
Duration:00:02:04
Chapter 8 - common challenges
Duration:00:03:21
Chapter 8 - impact of privacy laws on orgs
Duration:00:01:45
Chapter 8 - security and privacy together
Duration:00:00:54
Chapter 9 - cybersecurity laws and system certifications
Duration:00:01:26
Chapter 9 - certifications in the law
Duration:00:02:12
Chapter 9 - iso 27001
Duration:00:03:24
Chapter 9 - certifications for pci dss
Duration:00:02:08
Chapter 9 - hippa certification
Duration:00:02:40
Chapter 9 - coppa safe harbor program
Duration:00:00:17
Chapter 9 - gdpr certification
Duration:00:03:20
Chapter 10 - future of cybersecurity laws
Duration:00:00:30
Chapter 10 - cybersecurity for the iot
Duration:00:02:27
Chapter 10 - child privacy laws
Duration:00:01:18
Chapter 10 - ai laws
Duration:00:05:11
Conclusion final
Duration:00:04:51
Ending Credits
Duration:00:00:18