{"id":10662,"date":"2022-01-20T11:55:47","date_gmt":"2022-01-20T10:55:47","guid":{"rendered":"https:\/\/www.dp-institute.eu\/?p=10662"},"modified":"2024-01-09T16:26:04","modified_gmt":"2024-01-09T15:26:04","slug":"why-threat-modeling-is-important-for-dpos","status":"publish","type":"post","link":"https:\/\/www.dp-institute.eu\/nl\/why-threat-modeling-is-important-for-dpos\/","title":{"rendered":"Why Threat Modeling is important for DPOs"},"content":{"rendered":"
A Data Protection Impact Assessment (DPIA) is a process to help you identify and minimize the data protection risks of a project.<\/p>\n
In our DPIA & DTIA training<\/a> you already learn that a DPIA typically includes steps like:<\/p>\n <\/p>\n This not only involves the privacy risks, but also cybersecurity risks for your project or system.<\/p>\n Understanding and managing cybersecurity risks for systems can be a daunting task. Especially if you do not have a lot of experience in the cyber security field.<\/p>\n These threat modeling steps will help you create better DPIAs and support the important aspect of building in Privacy by Design.<\/p>\n With DPI we developed a two-month hybrid learning journey for threat modeling practitioners. This hybrid online training<\/a> gives you the tools you need to become a threat modeling practitioner, teaching you how to threat model and build in security as an integral aspect of your secure development practice. This training is based on Toreon\u2019s international rewarded\u00a0whiteboard hacking training<\/a>\u00a0that was released in 2016. It\u2019s a course that blends self-paced digital work with action-packed, hands-on live labs run by our seasoned threat modeling experts.<\/p>\n One of the important responsibilities of a DPO is to assure that a DPIA is performed for new processing or systems that include personal data. A Data Protection Impact Assessment (DPIA) is a process to help you identify and minimize the data protection risks of a project. In our DPIA & DTIA training you already […]<\/p>\n","protected":false},"author":10,"featured_media":10663,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[30,20,29],"tags":[],"class_list":["post-10662","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dpo","category-nieuws","category-opleidingen"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/posts\/10662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/comments?post=10662"}],"version-history":[{"count":11,"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/posts\/10662\/revisions"}],"predecessor-version":[{"id":13561,"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/posts\/10662\/revisions\/13561"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/media\/10663"}],"wp:attachment":[{"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/media?parent=10662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/categories?post=10662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/tags?post=10662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\n
That is where Threat Modeling as a technique will help you. Threat Modeling is a way to analyze the risk inherent to a system\u2019s design. Originating from application\u00a0security circles, the technique has been found to be effective in many circumstances for many types of systems. The Threat Modeling process is done in two phases, split up in two workshops: data modeling and threat modeling.<\/h5>\n
You will become a better DPO when you add threat modeling<\/a> as technique to your tool belt.<\/h5>\n","protected":false},"excerpt":{"rendered":"