What is the CDPSE difference?
Certified Data Privacy Solutions Engineer® (CDPSE®) is focused on validating the technical skills and knowledge it takes to assess, build and implement comprehensive data privacy measures. CDPSE holders help fill the technical privacy skills gap so that your organization has competent privacy technologists to build and implement solutions that mitigate risk and enhance efficiency.
Job practice areas tested for and validated by a CDPSE certification
ISACA’S commitment
SACA offers a variety of CDPSE exam preparation resources including group training, self-paced training and study resources in various languages to help you prepare for your certification exam. We also have our online Engage community where you can reach out to peers for exam guidance. Choose what works for your schedule and your studying needs.
Identify issues requiring remediation and opportunities for process improvement.
- Identify the internal and external privacy requirements specific to the organization’s governance and risk management programs and practices.
- Participate in the evaluation of privacy policies, programs and policies for their alignment with legal requirements, regulatory requirements and/or industry best practices.
- Coordinate and/or perform privacy impact assessments (PIA) and other privacy-focused assessments.
- Participate in the development of procedures that align with privacy policies and business needs.
- Implement procedures that align with privacy policies.
- Participate in the management and evaluation of contracts, service levels and practices of vendors and other external parties.
- Participate in the privacy incident management process.
- Collaborate with cybersecurity personnel on the security risk assessment process to address privacy compliance and risk mitigation.
- Collaborate with other practitioners to ensure that privacy programs and practices are followed during the design, development and implementation of systems, applications and infrastructure.
- Develop and/or implement a prioritization process for privacy practices.
- Develop, monitor and/or report performance metrics and trends related to privacy practices.
- Report on the status and outcomes of privacy programs and practices to relevant stakeholders.
- Participate in privacy training and promote awareness of privacy practices.
- Identify issues requiring remediation and opportunities for process improvement.
A—ORGANIZATIONAL GOVERNANCE
- Organizational Strategy, Goals, and Objectives
- Organizational Structure, Roles and Responsibilities
- Organizational Culture
- Policies and Standards
- Business Processes
- Organizational Assets
B—RISK GOVERNANCE
- Enterprise Risk Management and Risk Management Framework
- Three Lines of Defense
- Risk Profile
- Risk Appetite and Risk Tolerance
- Legal, Regulatory and Contractual Requirements
- Professional Ethics of Risk Management
Collaborate with other practitioners to ensure that privacy programs and practices are followed during the design, development and implementation of systems, applications and infrastructure.
- Coordinate and/or perform privacy impact assessment (PIA) and other privacy-focused assessments to identify appropriate tracking technologies and technical privacy controls.
- Participate in the development of privacy control procedures that align with privacy policies and business needs.
- Implement procedures related to privacy architecture that align with privacy policies.
- Collaborate with cybersecurity personnel on the security risk assessment process to address privacy compliance and risk mitigation
- Collaborate with other practitioners to ensure that privacy programs and practices are followed during the design, development and implementation of systems, applications and infrastructure.
- Evaluate the enterprise architecture and information architecture to ensure it supports privacy by design principles and considerations.
- Evaluate advancements in privacy-enhancing technologies and changes in the regulatory landscape.
- Identify, validate and/or implement appropriate privacy and security controls according to data classification procedures.
A—IT RISK IDENTIFICATION
- Risk Events (e.g., contributing conditions, loss result)
- Threat Modelling and Threat Landscape
- Vulnerability and Control Deficiency Analysis (e.g., root cause analysis)
- Risk Scenario Development
B—IT RISK ANALYSIS AND EVALUATION
- Risk Assessment Concepts, Standards and Frameworks
- Risk Register
- Risk Analysis Methodologies
- Business Impact Analysis
- Inherent and Residual Risk
Participate in the development of data lifecycle procedures that align with privacy policies and business needs.
- Identify the internal and external privacy requirements relating to the organization’s data lifecycle practices.
- Coordinate and/or perform privacy impact assessments (PIA) and other privacy-focused assessments relating to the organization’s data lifecycle practices.
- Participate in the development of data lifecycle procedures that align with privacy policies and business needs.
- Implement procedures related to data lifecycle that align with privacy policies.
- Collaborate with other practitioners to ensure that privacy programs and practices are followed during the design, development and implementation of systems, applications and infrastructure.
- Evaluate the enterprise architecture and information architecture to ensure it supports privacy by design principles and data lifecycle considerations.
- Identify, validate and/or implement appropriate privacy and security controls according to data classification procedures.
- Design, implement and/or monitor processes and procedures to keep the inventory and dataflow records current.
A—RISK RESPONSE
- Risk Treatment / Risk Response Options
- Risk and Control Ownership
- Third-Party Risk Management
- Issue, Finding and Exception Management
- Management of Emerging Risk
B—CONTROL DESIGN AND IMPLEMENTATION
- Control Types, Standards and Frameworks
- Control Design, Selection and Analysis
- Control Implementation
- Control Testing and Effectiveness Evaluation
C—RISK MONITORING AND REPORTING
- Risk Treatment Plans
- Data Collection, Aggregation, Analysis and Validation
- Risk and Control Monitoring Techniques
- Risk and Control Reporting Techniques (heatmap, scorecards, dashboards)
- Key Performance Indicators
- Key Risk Indicators (KRIs)
- Key Control Indicators (KCIs)
Identify the internal and external requirements for the organization’s privacy programs and practices.
Participate in the evaluation of privacy policies, programs and policies for their alignment with legal requirements, regulatory requirements and industry best practices.
Coordinate and/or perform privacy impact assessment (PIA) and other privacy-focused assessments.
Participate in the development of procedures that align with privacy policies and business needs.
Implement procedures that align with privacy policies.
Participate in the management and evaluation of contracts, service levels and practices of vendors and other external parties.
Participate in the privacy incident management process.
Collaborate with cybersecurity personnel on the security risk assessment process to address privacy compliance and risk mitigation.
Collaborate with other practitioners to ensure that privacy programs and practices are followed during the design, development and implementation of systems, applications and infrastructure.
Evaluate the enterprise architecture and information architecture to ensure that it supports privacy by design principles and considerations.
Evaluate advancements in privacy-enhancing technologies and changes in the regulatory landscape.
Identify, validate and/or implement appropriate privacy and security controls according to data classification procedures.
Design, implement and/or monitor processes and procedures to keep the inventory and dataflow records current.
Develop and/or implement a prioritization process for privacy practices.
Develop, monitor and/or report performance metrics and trends related to privacy practices.
Report on the status and outcomes of privacy programs and practices to relevant stakeholders.
Participate in privacy training and promote awareness of privacy practices.
Identify issues requiring remediation and opportunities for process improvement.
A—INFORMATION TECHNOLOGY PRINCIPLES
Enterprise Architecture
IT Operations Management (e.g., change management, IT assets, problems, incidents)
Project Management
Disaster Recovery Management (DRM)
Data Lifecycle Management
System Development Life Cycle (SDLC)
Emerging Technologies
B—INFORMATION SECURITY PRINCIPLES
Information Security Concepts, Frameworks and Standards
Information Security Awareness Training
Business Continuity Management
Data Privacy and Data Protection Principles
Training Details
Training will be held at the IDEL site or a remote site.
Dedicated arrangement for a group of trainees.
40 Hours 5 days
Trainer Nabil Khalil, He holds a master’s degree in computer information systems from the University of Toronto, Canada, and holds an international license certificate in examining networks and systems, in addition to an MSS certificate from EC University New York and from many international institutions in information security and systems. He contributed to the development of international policies for information security and protection, the strategy for responding to information technology security incidents, the strategy for business continuity in many government and private sectors, the legal requirements related to information security, and the development of the training material for the information security awareness project in the financial sector. He also trained information security officers in The public and private sectors, and auditing by adopting best practices within, ITIL, ISO, CMM, COBIT, and he is a member of ISACA, and one of the international authors in information security affiliated with the international organization EC-Council and a certified trainer from EC-Council and Microsoft Corporation, in addition to a trainer Certified Instructor ITIL, IOS 27001, and 24 years of practical experience
Pass the certification exam
Submit application to demonstrate experience requirements
Adhere to the Code of Professional Ethics >
Adhere to the Continuing Professional Education Policy >
Compliance with the Information Systems Auditing Standards >
The CDPSE Certification is required for everyone who manages, monitors, or evaluates an organization’s information technology and business systems. Individuals may wish to become CDPSE certified depending on their own professional aspirations or personal ambitions.
IS/IT auditors/consultants
IT Compliance Managers
Chief Compliance Officers
Chief Risk & Privacy Officers
Security heads/directors
Security managers/architects