Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Illegitimate Data Protection Requests - To Delete or Address?

Black Hat via YouTube

Overview

Explore the emerging threat of illegitimate data protection requests in this 41-minute Black Hat conference talk. Delve into how cyber-attackers are exploiting privacy regulations by submitting seemingly valid data subject access requests that conceal malware. Learn about the innovative exploitation scenarios that go beyond traditional privacy-by-design principles, and understand how these attacks can be executed with minimal resources or skills. Examine the potential for rapid malware spread within targeted organizations' internal networks. Gain insights from speakers Larisa Munteanu and Mark Povey on this critical cybersecurity issue that challenges organizations to balance data protection compliance with security measures.

Syllabus

Illegitimate Data Protection Requests - To Delete or to Address?

Taught by

Black Hat

Reviews

Start your review of Illegitimate Data Protection Requests - To Delete or Address?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.