Privacy by Design: strategically embedded privacy

During the training, you will receive an action plan on how to create a privacy-friendly product, master the technique of designed privacy and be able to make decisions that do not violate user privacy.


Time: 14:00-18:00 (СЕТ)

Language: Russian, English

Price: 700 EURO


Why is Privacy by Design important?

According to Article 25 of the Regulation, it is necessary to comply with the principles of Privacy by Design (designed privacy). 

Effective PR strategy.
Companies like Apple, Mozilla, DuckDuckGo, Ecosia, Telegram, Bumble, Corona-App (DE), Signal, NextCloud have already succeeded in this. And it really works, because everyone even turns a blind eye to their imperfection in terms of security and advanced technologies. 

Trust and respect for the product.
Compliance with principles is not due to laws, but due to opportunity. After all, only a company can prevent an imbalance, where the person who uses the product has much less power over his personal information than the business.

A winning model.
The GDPR, despite the 30-page guidelines, contains general requirements and advice on what to do, but there is no checklist. Strategic Privacy by Design is a methodology that involves developing a clear plan of action. 

During the training you will learn how to:


  1. Identify sources of threats for a company. 
  2. Build and implement Designed Privacy from scratch.
  3. Predict privacy violations.
  4. Use tactics and strategies that mitigate privacy risks.
  5. Calculate the consequences of a violation of privacy for the user.
  6. Create a FAIR (Factor analysis of information risk) risk assessment model.
  7. Create a blueprint and step-by-step guide for applying Engineered Privacy principles to your products and services.


Each step of the model will be worked out in practical exercises on the case. Theory will give logic and understanding, and practice will help develop a habit and learn a step-by-step algorithm for creating a plan. And a nice bonus will be a certificate of completion of the training.


Privacy by Design Trainer
Speaker and writer on the subject of Privacy, including presentations at multiple IAPP events, the Privacy and Security Forum, the Intel Security Conference. Guest lecturer at Florida State University and Indiana University. Certified Information Privacy Professional (CIPP/US), Certified Information Privacy Technologist (CIPT), Certified Information Privacy Manager (CIPM)
Maria Arnst CIPM, TÜV, Strategic Privacy by Design, DPP
Data Protection Officer, GDPR Consultant, Privacy researcher
Certified Information Privacy Manager, member of International Association of Privacy Professionals with experience of being a Data Protection Officer for European companies, including those focused on privacy and data security. Certified as Data Protection Officer by TÜV (Germany's leading and one of the world's leading independent testing and certification services group), trained in Strategic Privacy by Design.

For whom?


Companies that have websites, applications or services. Companies that work with information about employees or users. It is relevant for startups, because in an ideal world, the principles of Privacy by Design are built in at the initial stages. It is also useful for large companies that have conquered the market for a long time, since it is never too late to rethink and strive for environmental friendliness of business.



The Privacy by Design training is suitable for all professionals and managers who are involved in the creation of a new product and its development in the international market.



✔ CEO, since they make strategic decisions and the fate of the entire project depends on their will.

✔ CTO, architects, as they lay the “foundation” and principles of the system.

✔ Product Owner and Product Manager, as they are responsible for the product and its development. 

✔ Project Manager, as they make functional and non-functional requirements for the product even before the start of development.

Business analysts, as they make decisions on planning and building processes.

✔ Data analysts, as they work with databases and manage changes.

✔ Inspired by DPO and privacy lawyers, as they can influence and motivate privacy changes in the process, product, company.

The program


Click on"" to see details.


Introduction to Privacy by Design
Principles PbD, according to Ann Cavoukian.
GDPR a look at PbD.
Why embed privacy?
Imbalance company vs individual (information imbalance, time imbalance, power imbalance).
Roles in the Privacy by Design strategic model
What is a threat and who are the targets of the threat?
Who is at risk?
High-risk individuals.
Types of privacy violations - D. Solove Taxonomy
processing for more information.
Collecting information.
Risk assessment - FAIR vs GDPR risk assessment
How does the GDPR suggest risk assessment?
What is risk?
What are the consequences of risk?
What is a quantitative approach to risk assessment?
How to embed privacy? Strategies and tactics by J. Hoepman
Technical strategies (design, secure).
Process strategies (monitor, balance).


R. Jason Cronk
Open format
14 April - 15 April 14:00-18:00
700 EURO

Sign up

    The course is loading, wait a few seconds