ISMS-P & ISO27001/ISO27701 인증 교육
양승호 정보보안
ISMS-P 인증 취득 및 ISO27001/ISO27701 인증 취득을 위한 교육
중급이상
ISMS-P, CPPG(개인정보관리사), 정보보안기사
Training on assessing the current status and inspecting personal (credit) information processing systems, pursuant to the Notification on Personal Information Security Measures and Appendix 3 of the Supervisory Regulations on Credit Information Act.
1 students are taking this course
Understanding Laws Related to Personal Information
Personal (Credit) Information Processing System Inspection Method
– Provides checklists and inspection points that practitioners must know
These days, as personal information leaks become increasingly sophisticated, threats targeting loopholes in system security and management and supervision systems continue to occur. In particular , systems that process personal (credit) information require thorough management and inspection within companies and organizations in accordance with the Personal Information Protection Act and related laws.
This lecture was prepared in this era of change.
**"Personal (Credit) Information Processing System Inspection Training"** is a specialized lecture centered on technical and management inspection items and response methods that practitioners must be familiar with.
Chief Privacy Officers (CPOs) and practitioners of organizations and companies
Information security team, IT department system operation and management practitioner
Security consultants and external experts performing consulting/auditing work
Introduction to the general procedure for checking personal information processing systems that must be performed regularly in accordance with Article 29 of the Personal Information Protection Act and related notices
Provides an inspection checklist that can be used immediately in practice
Complete summary of the on-site inspection method for each essential item , including authority management, authentication, access logs, encryption, masking, destruction, and physical security
Practical lectures including actual inspection documents, screen captures, and guides for submitting supporting documents
Establishment of a personal (credit) information processing system identification and inspection system
Written Inspection Checklist Item-by-Item Explanation
Management of authorization, revocation, and change history and error prevention measures
Description of technical measures such as session timeout, encryption method, and DMZ section inspection
Access log storage and backup, public account approval process, external transmission encryption management
System masking processing, security solution application status, destruction and separate storage methods
Provides real improvement cases for risk points that practitioners often miss
Lecture format : Online (recorded lectures and inspection checklist files provided)
Instructor : Security consulting specialist
How to apply : Refer to the institution's internal guidance or separate course application page
You can respond in advance without panicking when inspected by an auditor or supervisory agency.
You can check and improve the status of system management within your department.
Systematically understand the entire process of establishing an internal management plan → inspection → proof → improvement report
Apply for training today and take your organization's privacy protection to the next level.
Practical training that can address technical protection measures and on-site inspections at the same time .
You can find the answer in the ‘Personal (Credit) Information Processing System Inspection Training’.
Who is this course right for?
Privacy Officer and IT Officer
Consulting
Need to know before starting?
Experience with personal information
All
4 lectures ∙ (46min)
Check out other courses by the instructor!
Explore other courses in the same field!