Overview
Learn how to exploit the "Right of Access" provision in the European Union's General Data Protection Regulation (GDPR) to steal sensitive information. Understand the GDPR process, forms of identity theft, and proposed bills related to online businesses. The course teaches social engineering skills, data hygiene practices, and the implications of privacy laws on identity theft. Intended for individuals interested in cybersecurity, data protection, and privacy regulations.
Syllabus
Intro
Agenda
Why GDP
Fear
Bad Decisions
Time Pressure
Flexible Language
Right of Access
Right of Access Process
Letter to Organizations
Reasonable Measures
Three Bad Options
The GDPR Process
Forms of Identity
Example
Proposed Bill
Online Businesses
Legislators
Data Hygiene
Conclusion
Taught by
Black Hat