Do You Need CIPT Certification?

With data breaches a common topic of headlines and the number of cyberattacks on the rise, data privacy and protection has been on the minds of many organizations.

Consider this:

AWS Builder Community Hub
  • Cybersecurity company Gemalto’s Breach Level Index shows that every hour, 252,539 records are lost or stolen — that’s 70 every second!
  • The number of small and medium businesses who said they experienced a cyberattack in the last 12 months grew in 2018 to 67 percent. This is up from 61 percent in 2017 and from 54 percent in 2016, according to 2018 and 2017 studies by Keeper Security, conducted by Ponemon Institute.
  • In 2018, the Identity Theft Resource Center saw a 126 percent increase in the number of exposed records containing sensitive information

While the risk of sensitive data exposure is growing, at the same time regulations like European Union’s GDPR are tightening up requirements for safeguarding consumers’ data. As organizations look to build up their data-privacy infrastructure and implement stronger data protection, they need qualified information security (IS) professionals who have expertise and skills in this area. Certified Information Privacy Technologist (CIPT) is a credential that can help IT and IS practitioners to demonstrate their qualifications and advance in their field.

What Is CIPT Certification?

The International Association of Privacy Professionals (IAPP) has been offering the CIPT certification since 2014. Founded in 2000, the nonprofit organization has the mission to “define, support and improve the privacy profession globally.” To that end, it offers various professional development programs, including three certification programs. According to the IAPP, CIPT is the first and only certification of its kind.

The credential covers a broad range of data-protection knowledge, from privacy laws like GDPR to techniques that help mitigate security threats. Here’s a general outline of the knowledge you’ll need for the CIPT (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Rodika Tollefson. Read the original post at: