Certified Data Security Specialist (CDSS) Training

What You Will Learn

    Practical drivers for improving data privacy and security capabilitiesThe latest techniques for measuring the efficacy of data security strategies and the shortcomings of quantitative techniques
  • The case for combining data protection and data privacy (security) strategy development
  • Similarities between data protection and data security models and methods
  • A methodology for building an effective data security strategy
  • The prospects for improving data privacy services by coordinating their assignment/delivery via a cognitive data management practice

Who Should Attend

    Business managers who are involved in governance, risk and compliance planning for their organizationsIT operatives who are tasked with security the data assets of their organizations against loss, corruption and unauthorized disclosure

The Data Management Institute is pleased to join with Virtualization Review to host its third training and certification program, this time addressing best practices for creating a Data Protection and Data Security (Privacy) strategy.

This training course will examine the two topics that are front of mind for virtually all business IT planners: creating a viable information security strategy in an era of phishing and ransomware, and strengthening disaster avoidance and data protection capabilities. Truth be told, the topics have always been closely intertwined despite the artificial separation between the disciplines of data asset protection and information security provisioning.

Taking on the challenges from the perspective of data management, DMI offers a hybrid solution to protecting data and ensuring its privacy and security.

The Program

The Certified Data Security Specialist (CDSS) workshop will comprise six sessions:

Session 1: The Changing Attack Surface of IT and How IT Requires a Comprehensive Data Protection and Information Security Strategy

This session will cover the changing requirements for data protection and security in an increasingly interconnected, mobile and cloud-ified world. A case will be made that technologies such as virtualization, Internet of Things, mobile commerce, and cloud service delivery have increased, rather than diminished, the vulnerability of organizations to unplanned interruption events stemming from both natural and man-made hazards.

Session 2: Together at Last – Data Protection/Disaster Recovery Planning and Information Security (DR/IS) Planning

This session presents a collaborative approach and unified model for data protection planning that combines techniques for addressing interruption events (commonly thought of as disasters) and information security threats.

Session 3: Know thy Data – Analyzing the Threat and Identifying Assets at Risk

This session covers the all-important pre-planning tasks of DR/IS planning, including the characterization and classification of data assets to determine what is at risk, various methods to quantify risk itself, and how to establish priorities for protection and restoral.

Session 4: Elements of an Information Security Strategy

This session peels back the layers of defense in depth strategies for information security. We will look at the security processes that are involved in defending data assets that are at rest in storage repositories and in motion, traversing local, metropolitan, and wide area networks whether in support of hybrid cloud strategies or mobile computing.

Session 5: The Only Way to Protect Data is to Make a Copy

This session surveys data protection techniques that may be part of a multi-layer disaster recovery capability. We will examine the efficacy of different approaches and suggest the best fit of techniques based on asset protection and recovery requirements. We will also review the capabilities and limitations of cloud-based approaches to data protection (such as Backup as a Service and DR as a Service). 

Session 6: A Unified Approach, Enabled by Cognitive Data Management

In this session, we will set forth a strategy for integrating DR/IS processes and for applying protection and privacy services in a granular and consistent way, via dynamic data management policies, to all data assets over their useful life using Cognitive Data Management.  

The Certification

Attendees of this event will receive a Certified Information Security Specialist credential from the Data Management Institute, which represents another skills certification that builds toward DMI’s Certified Data Management Architect (CDMA) status.

This course is available on-line at Virtualization Review. Some additional registration is required.

CDSS Prerequisites

The CDSS training and certification program is designed for trainees who possess a basic understanding of information technology and data governance, risk and compliance.