Soumettre la recherche
Mettre en ligne
GDPR is Here. Now What?
•
1 j'aime
•
190 vues
Forcepoint LLC
Suivre
How prepared are you for GDPR today?
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 13
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
Forcepoint LLC
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365
Forcepoint LLC
Securing Beyond the Cloud Generation
Securing Beyond the Cloud Generation
Forcepoint LLC
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Forcepoint LLC
Brochure forcepoint dlp_en
Brochure forcepoint dlp_en
Seenee Permal, CISA, CISM
CASB: Securing your cloud applications
CASB: Securing your cloud applications
Forcepoint LLC
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
Stephen Bates
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPS
Larry Austin
Recommandé
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
Forcepoint LLC
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365
Forcepoint LLC
Securing Beyond the Cloud Generation
Securing Beyond the Cloud Generation
Forcepoint LLC
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Forcepoint LLC
Brochure forcepoint dlp_en
Brochure forcepoint dlp_en
Seenee Permal, CISA, CISM
CASB: Securing your cloud applications
CASB: Securing your cloud applications
Forcepoint LLC
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
Stephen Bates
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPS
Larry Austin
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
MarketingArrowECS_CZ
Combatting Insider Threats Presentation
Combatting Insider Threats Presentation
Sara Thomason
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
Digital Transformation EXPO Event Series
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Bitglass
June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report
Netskope
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
Symantec
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
Netskope
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
Bitglass
63 Requirements for CASB
63 Requirements for CASB
Kyle Watson
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
Bitglass
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Netskope
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Bitglass
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
OneLogin
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good Thing
Netskope
Improving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & Security
Doug Copley
Introduction to Cloud Security
Introduction to Cloud Security
Susanne Tedrick
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
JoAnna Cheshire
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
Bitglass
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure
GDPR: the IBM journey to compliance
GDPR: the IBM journey to compliance
DataWorks Summit
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec
Contenu connexe
Tendances
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
MarketingArrowECS_CZ
Combatting Insider Threats Presentation
Combatting Insider Threats Presentation
Sara Thomason
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
Digital Transformation EXPO Event Series
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Bitglass
June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report
Netskope
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
Symantec
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
Netskope
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
Bitglass
63 Requirements for CASB
63 Requirements for CASB
Kyle Watson
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
Bitglass
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Netskope
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Bitglass
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
OneLogin
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good Thing
Netskope
Improving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & Security
Doug Copley
Introduction to Cloud Security
Introduction to Cloud Security
Susanne Tedrick
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
JoAnna Cheshire
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
Bitglass
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure
Tendances
(20)
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
Combatting Insider Threats Presentation
Combatting Insider Threats Presentation
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
63 Requirements for CASB
63 Requirements for CASB
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good Thing
Improving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & Security
Introduction to Cloud Security
Introduction to Cloud Security
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
Similaire à GDPR is Here. Now What?
GDPR: the IBM journey to compliance
GDPR: the IBM journey to compliance
DataWorks Summit
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
Matt Stubbs
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
Cloudera, Inc.
Findability Day 2016 - What is GDPR?
Findability Day 2016 - What is GDPR?
Findwise
GDPR: Data Privacy in the New
GDPR: Data Privacy in the New
accenture
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
IBM Sverige
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
Capgemini
Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)
Jean-Michel Franco
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
Integrate
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Delphix
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
European Collaboration Summit
Frukostseminarium om molntjänster
Frukostseminarium om molntjänster
Transcendent Group
CBC GDPR The Physics
CBC GDPR The Physics
Jason Chapman
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
Cloudera, Inc.
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your Downfall
Splunk
GDPR How to get started?
GDPR How to get started?
Peter Witsenburg
Similaire à GDPR is Here. Now What?
(20)
GDPR: the IBM journey to compliance
GDPR: the IBM journey to compliance
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
Findability Day 2016 - What is GDPR?
Findability Day 2016 - What is GDPR?
GDPR: Data Privacy in the New
GDPR: Data Privacy in the New
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
Frukostseminarium om molntjänster
Frukostseminarium om molntjänster
CBC GDPR The Physics
CBC GDPR The Physics
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR How to get started?
GDPR How to get started?
Plus de Forcepoint LLC
Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)
Forcepoint LLC
Sparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security Behaviors
Forcepoint LLC
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
Forcepoint LLC
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Forcepoint LLC
AI and ML in Cybersecurity
AI and ML in Cybersecurity
Forcepoint LLC
Using Language Modeling to Verify User Identities
Using Language Modeling to Verify User Identities
Forcepoint LLC
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
Forcepoint LLC
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
Forcepoint LLC
A Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human Focus
Forcepoint LLC
Cyber Convergence, Warfare and You
Cyber Convergence, Warfare and You
Forcepoint LLC
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Forcepoint LLC
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
Forcepoint LLC
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
Forcepoint LLC
Embracing the Millennial Tsunami
Embracing the Millennial Tsunami
Forcepoint LLC
Shift the Burden
Shift the Burden
Forcepoint LLC
Revolutionary, Not Evolutionary
Revolutionary, Not Evolutionary
Forcepoint LLC
Cybersecurity and the Human Psyche
Cybersecurity and the Human Psyche
Forcepoint LLC
The Human Point
The Human Point
Forcepoint LLC
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
Forcepoint LLC
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
Forcepoint LLC
Plus de Forcepoint LLC
(20)
Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)
Sparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security Behaviors
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
AI and ML in Cybersecurity
AI and ML in Cybersecurity
Using Language Modeling to Verify User Identities
Using Language Modeling to Verify User Identities
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
A Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human Focus
Cyber Convergence, Warfare and You
Cyber Convergence, Warfare and You
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
Embracing the Millennial Tsunami
Embracing the Millennial Tsunami
Shift the Burden
Shift the Burden
Revolutionary, Not Evolutionary
Revolutionary, Not Evolutionary
Cybersecurity and the Human Psyche
Cybersecurity and the Human Psyche
The Human Point
The Human Point
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
Dernier
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Dernier
(20)
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
GDPR is Here. Now What?
1.
Copyright © 2018
Forcepoint. | 1 Karlene Berger Solution Director, User & Data Security Forcepoint June 6, 2018 GDPR is Here. Now What?
2.
Copyright © 2018
Forcepoint. | 2 KICKOFF POLL - QUESTION: How prepared are you for GDPR today?
3.
Copyright © 2018
Forcepoint. | 3 General Wide-Ranging Data Personal Records (PII) Protection Data/Privacy Regulation By-law/Instruction
4.
Copyright © 2018
Forcepoint. | 4 KEY FACTORS IN NAVIGATING GDPR It applies to entities that process or control EU citizen data. Requires inventorying, management, and control of personal data Reporting data breaches within 72 hoursController - Offer goods or services to EU residents and/or profile EU residents Processor - Processes personal data belonging to EU residents on behalf of an organization
5.
Copyright © 2018
Forcepoint. | 5 Data Loss Prevention and CASB POST-BREACHPRE-BREACH IDENTIFY Personal data that you control or process and where it resides PROTECT Protect personal data from compromise and misuse DETECT Provide detection of insider threats and data incidents RESPOND Reduce response times to incidents to comply and protect the organisation RECOVER Get back to ‘normal’ and learn from the event – use feedback to ‘prepare’ Inventory for Personal Data Map, Manage & Control Personal Data Flows Respond to Data Incidents in a Timely Manner Technologies mapped to the GDPR User & Entity Behavioral Analytics GDPR WITHIN THE NIST FRAMEWORK
6.
Copyright © 2018
Forcepoint. | 6 CHALLENGES IN INVENTORYING PERSONAL DATA DATA IS EVERYWHERE Cloud DatabaseEmail Network Storage Laptop Drives INDICATORS OF THEFT XXX-XXX-XXX-XXX Described Learned VS.XXX-XXX-XXX-XXX XXX-XXX-XXX-XXX Structured Un-Structured VS. XXX-XXX XXX-XXX XXX-XXX XXX-XXX XXX-XXX XXX-XXX XXX-XXX XXX-XXX XXX-XXX XXX-XXX XXX-XXX XXX-XXX File Tags Scanning VS. DATA IS NOT ALWAYS EASY TO FIND DATA ISN’T JUST LOST, IT CAN BE STOLEN TOO
7.
Copyright © 2018
Forcepoint. | 7 HOW DO YOU MANAGE AND CONTROL DATA WHEN ITS IN USE & IN MOTION? Who Human Resources Customer Service Finance Accounting Legal Sales / Marketing Marketing Technical Support Engineering What Source Code Credit Card Data M&A Plans Employee Salary Personal Data Financial Report Customer Records Manufacturing Docs Research Where Evernote Dropbox Facebook OneDrive Removable Media Malicious Server Business Partner Competitor Customer How File Transfer Instant Messaging Peer-to-Peer Print Email Web Confirm Notify Remove Quarantine Encrypt Block File Copy Copy/Paste Print Screen Action Confirm Audit Notify
8.
Copyright © 2018
Forcepoint. | 8 CONSIDERATIONS FOR MONITORING DATA FLOWS ENDPOINT Data in Use & in Motion NETWORK Data in Motion Active Sync IM FTP Printer Email Media Web & Cloud Storage IM FTP Email Network Printer Web & Cloud Active Sync CLOUD Data In Use & in Motion Monitor Uploads Monitor File Changes Discover Cloud Use
9.
Copyright © 2018
Forcepoint. | 9 MANAGE AND CONTROL PERSONAL DATA FLOWS INVENTORY PERSONAL DATA DLP: Manage and control data across Network, Endpoint, Web, and Email CASB and DLP: Discover where personal data lives within your organization DLP AND CASB CAN DRIVE GDPR WITHIN YOUR ORGANIZATION CASB: Manage and control data within critical cloud applications
10.
Copyright © 2018
Forcepoint. | 10 RESPONDING AND REMEDIATING WITHIN 72 HOURS– WITH UEBA DATA SOURCES ANALYTIC ENGINE INFORMED NARRATIVE⟩ ⟩
11.
Copyright © 2018
Forcepoint. | 11 ❑ Assess current data protection practices ❑ Create a data protection governance structure ❑ Maintain a personal data inventory ❑ Create information notices ❑ Maintain consent mechanisms ❑ Apply technical and organisational controls ❑ Perform Data Protection Impact Assessments (DPIA) ❑ Report personal data breaches to Supervisory Authority (SA) GDPR PRACTICAL CHECKLIST: Source: https://www.forcepoint.com/solutions/need/eu-general-data-protection-regulation-gdpr GDPR: http://ec.europa.eu/justice/data-protection/reform/files/regulation_oj_en.pdf Forcepoint is here to help!
12.
Copyright © 2018
Forcepoint. | 12 Learn More! https://www.forcepoint.com/GDPR
13.
Copyright © 2018
Forcepoint. | 13 Join us for our next webcast Have You Outgrown Your Web Security? Wednesday, June 13, 2018 2:00 pm EST |1:00 pm CST | 11:00 am PST
Télécharger maintenant