SlideShare une entreprise Scribd logo
1  sur  75
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
A day in the life of a GDPR breach
The General Data Protection Regulation of
the European Union
Elizabeth Davies | Director Risk Management and Data
Protection, Data Protection Officer (DPO), Splunk
Mathieu Dessus | Presales Engineer
July 2017 Name
Title
© 2017 SPLUNK INC.
Elizabeth Davies Mathieu Dessus
▶ Director Risk Management and Data
Protection, Data Protection Officer
(DPO)
▶ Presales Engineer, France
Your hosts of today
From Splunk
© 2017 SPLUNK INC.
Legal Disclaimer
3
The information in this presentation was compiled from
sources believed to be reliable for informational and
discussion purposes only.
The information contained herein is not intended to
constitute legal advice. You should consult with your
own legal teams when developing programs and
policies. You should not take, or refrain from taking,
action based on its content. We do not guarantee the
accuracy of this information and assume no liability in
connection with therewith.
© 2017 SPLUNK INC.
What’s the
GDPR
What
activities are
happening
within
organizations
to prepare for
What tools
and
processes a
DPO relies on
How a day in
the life of a
GDPR breach
can look like
Why Splunk
What you will learn
© 2017 SPLUNK INC.
Has your
organization already
started to prepare for
the GDPR?
© 2017 SPLUNK INC.
DPO’s View
© 2017 SPLUNK INC.
An Outsider’s
Perspective On GDPR
Why GDPR Is So
Important to US
Security First Mindset
Agenda
GDPR: Quick Overview
© 2017 SPLUNK INC.
Individual Rights
(Right of Access, Rectification, Erasure,
Portability, Restriction)
(Arts. 15-20)
Record of Processing
Activities
(Data Mapping and DPIA—Art. 30/35)
Breach Notification
(Art. 33-34)
Secure Processing
(Art. 32)
GDPR
GDPR: General Data Protection Regulation
Highlights of Key Areas
© 2017 SPLUNK INC.
Your Vendors
(Processors) Must
Report Events to
Your Business
Your Business
(Controllers) Must
Report to the
Authorities (DPAs)
You Business May
Also Need to Report
to the Individual
Affected
GDPR: Breach Notification Across EU
A harmonized/tiered reporting obligation, but with tight response times (72 hours)
Reporting Obligations: Your Business, Authorities and Affected Individuals
© 2017 SPLUNK INC.
Your Vendor
Notifies Your
Business
Your Business
Notifies the DPA
Your
Business
Notifies the
Individual
Affected
When Do You Need to Report?
Without “Undue Delay” and Often within 72 hours
Without undue delay after
becoming aware of breach
Not later than 72 hours
after becoming aware of
breach if likely to result
in risk to rights and
freedoms
Without undue delay if
likely to result in high
risk to rights and
freedoms
© 2017 SPLUNK INC.
▶ Nature of the breach, including
category/number of affected
individuals and categories/number of
personal data records concerned
▶ Contact info—if you have a DPO
theirs are required
▶ Likely consequences of breach
▶ Measures taken to mitigate breach
What Do You Need to
Report?
At a minimum, the following:
© 2017 SPLUNK INC.
Detection + Escalation
(Global: $0.99M)
Notification
(Global: $0.19M)
Post-Breach Response
(Global: $0.93M)
Lost Business
(Global: $1.51M)
Costs of Data Breaches
(Global Average Costs Per Breach)
Source: Ponemon Inst.
2017 Cost of Data Breach
Study – United States and
2017 Cost of Data Breach
Study - Global
Average total cost of data breach
Global: $3.62M
$
© 2017 SPLUNK INC.
You will need log file reporting tools to help you determine:
• If you have a breach—unauthorized access, disclosure,
leak of information
• If the breach is consequential enough to report—what
kind of information was exposed, for how long, how many
affected, was it anonymized/encrypted, etc.
• What steps you will need to take to mitigate—take
systems or users off line, shunt access, create sink
holes, etc.
So What Can You Do to Prepare?
Some essential tools will help
© 2017 SPLUNK INC.
▶ At Splunk, our employees are our canaries in the
coal mine
▶ You can’t notify customers, DPAs, or consumers, if you
don’t know there is a problem
▶ No DPO/CPO/CISO/CIO can be everywhere, all the
time
▶ Loss, destruction, leakage, unauthorized access—they
can happen anywhere, not simply at your firewall
▶ You need everyone to play their part
You Will Also Need Training
It takes a village
(Security/IT/Legal/Customer Relations/Marketing/HR)
© 2017 SPLUNK INC.
• Eliminate duplication,
streamline and
enhance baseline
education for all
• Supplemental training
where needed
Enhanced
Privacy/Security
Training
• Enhance first
responder base when
needed
• Develop org-wide
“muscle memory"
Volunteer
Firefighting
• Enhance messaging
campaign globally
about who, when and
where to report
security/privacy events
• Make this know-how
second nature
Revised IR Plan
Enhanced
Messaging
At Splunk, We Are Focusing On Three Key Areas
All designed to get us ready for May 2018
© 2017 SPLUNK INC.
1. Security and Privacy are team sports—rally
your team (Security/IT/Legal/HR/Marketing/Customer
Relations)
2. Training and IR Plan updates can be done easily
and quickly—an ounce of prevention is worth
a pound of cure
3. Don’t get overwhelmed, it won’t help
4. Put together a workable—not a perfect—plan
and get going
5. Start with the easy stuff first—build team
confidence
Don’t let perfection be
the enemy of the
good—GDPR is here to
stay—plenty of time
ahead to improve
Key
Takeaways
© 2017 SPLUNK INC.
Helen Keller
“Life is either a
great adventure or nothing.”
© 2017 SPLUNK INC.
Has your
organization
identified which
processes and
technologies are
required to adjust for
the GDPR?
© 2017 SPLUNK INC.
A day in the life of a
GDPR Breach
© 2017 SPLUNK INC.
“Les personnages et les situations de ce
récit étant purement fictifs, toute
ressemblance avec des personnes ou
des situations existantes, ayant existé,
ou qui existeront dans le futur, ne
saurait être que fortuite.
© 2017 SPLUNK INC.
What if
tomorrow is
© 2017 SPLUNK INC.
What if you’re
responsible
for Security?
© 2017 SPLUNK INC.
You wake up
in the morning
and you even
haven’t had
your coffee
© 2017 SPLUNK INC.
Your friendly
Data Privacy
Officer is on
the phone
© 2017 SPLUNK INC.
Someone
claims to sell
PI data you
hold
© 2017 SPLUNK INC.
How does the DPO
know?
Your threat
Intelligence
provider
informed you
and provided
you samples
© 2017 SPLUNK INC.
There is data in the
deep web
It may be your
data!
© 2017 SPLUNK INC.
He hangs up!
What’s next?
© 2017 SPLUNK INC.
Your incident
investigation
plan kicks in
© 2017 SPLUNK INC.
Does your
organization have an
incident investigation
process defined and
in place in case
you’re breached?
© 2017 SPLUNK INC.
DPO
IT
PR/Media Team
Legal
(CEO)
Coordination
© 2017 SPLUNK INC.
Emergency
call
Emergency
chatroom
© 2017 SPLUNK INC.
The fire alarm
button is
pulled down
© 2017 SPLUNK INC.
© 2017 SPLUNK INC.
Internal Leak
External Leak
Incident
commander
T- 70h
© 2017 SPLUNK INC.
“We need to
investigate!!!”
Reaching out
to your
security
operations
team
T- 65h
© 2017 SPLUNK INC.
People and
Processes
T- 60h
© 2017 SPLUNK INC.
Where is that
data stored in
your
environment?
T- 55h
© 2017 SPLUNK INC.
First Action
Is data still
leaking?
T- 45h
© 2017 SPLUNK INC.
How will you
watch them?
T- 40h
© 2017 SPLUNK INC.
Nice,
structured,
tidy data
T- 39h
© 2017 SPLUNK INC.
Diving deep into
the digital
infrastructure
T- 35h
© 2017 SPLUNK INC.
time series, in motion,
unstructured
Machine data
43
T- 34h
© 2017 SPLUNK INC.
It can be big
data…
T- 33h
© 2017 SPLUNK INC.
… it is lazy
T- 32h
© 2017 SPLUNK INC.
… and it is
hard to
understand…
T- 30h
© 2017 SPLUNK INC.
Worst Case
External
authorities
might come in
to your
organization
and say:
“Don’t stop it”
T- 25h
© 2017 SPLUNK INC.
Take response
actions to stop
data leakage
T- 20h
© 2017 SPLUNK INC.
Understand
T- 15h
© 2017 SPLUNK INC.
How much
data will be
needed for
this?
© 2017 SPLUNK INC.
Who
processed
your
information?
T- 10h
© 2017 SPLUNK INC.
Which user or
systems was
involved?
T- 8h
© 2017 SPLUNK INC.
You know what you
know
You know what you
don’t know
Painting the
picture
T- 5h
© 2017 SPLUNK INC.
Does your organization
collect the machine data to
analyse with your SIEM
from all applications and
systems that are
processing personal
information?
© 2017 SPLUNK INC.
Maybe resulting in a
non event?
Puts the breach
data subjects at
risk?
© 2017 SPLUNK INC.
Do individuals need to
be informed
additionally?
How sensitive
was the data?
© 2017 SPLUNK INC.
before chatter explodes
• Inform Authority
• Inform affected
Individuals
• (Inform Public)
As an
organization
you want to
control the
story
T- 0h
© 2017 SPLUNK INC.
Worst
Practice:
Yahoo!
“Yahoo later admitted to an even
larger breach from 2013
© 2017 SPLUNK INC.
Best Practice:
ABTA Breach
© 2017 SPLUNK INC.
Best Practice:
ABTA Breach
© 2017 SPLUNK INC.
© 2017 SPLUNK INC.
2+ weeks later out of
the news
Example
ABTA Breach
© 2017 SPLUNK INC.
© 2017 SPLUNK INC.
Someone
knocks on
your door
T+ 1 Week
© 2017 SPLUNK INC.
Have you deployed
“countermeasures
appropriate to the risk”?
Have you used “state
of the art” best
practices?
Data Privacy
Audits
T+ 1 Week
© 2017 SPLUNK INC.
Massive Fines
T+ 1 Week
© 2017 SPLUNK INC.
What did you know?
When did you know?
How did you know
about it?
Prove
T+ 2 Weeks
© 2017 SPLUNK INC.
Logs become
your digital
fingerprints
© 2017 SPLUNK INC.
Why Splunk?
Splunk can help
© 2017 SPLUNK INC.
Prove GDPR security
controls are enforced
Splunk helps to detect,
prevent and investigate
breaches
Search and report
on personal data
processing
What GDPR use cases does Splunk help solve?
Breach Investigation Notification: 72 Hours
© 2017 SPLUNK INC.
Three Use Cases that bring
different person’s on the
same level and speak the
same language, each:
▶ Real World Scenario
(IT-Manager)
▶ Relevant GDPR Articles
and what they mean
(Data Privacy Officer)
▶ How machine data
helps with (Splunk
Champion)
Whitepaper: How machine data helps with GDPR
https://www.splunk.com/en_us/form/white-paper-how-machine-data-supports-gdpr-compliance.html
https://www.splunk.com/de_de/form/wie-maschinendaten-die-eu-dsgvo.html
https://www.splunk.com/fr_fr/form/les-donnees-machine-facilitent-la-conformite-au-rgpd.html
© 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Industry Leading Platform For Machine Data
Custom
dashboards
Report and
analyze
Monitor
and alert
Developer
Platform
Ad hoc
searchOn-Premises
Private Cloud
Public
Cloud
Storage
Online
Shopping Cart
Telecoms
Desktops
Security
Web
Services
Networks
Containers
Web
Clickstreams
RFID
Smartphones
and Devices
Servers
Messaging
GPS
Location
Packaged
Applications
Custom
Applications
Online
Services
DatabasesCall Detail
Records
Energy MetersFirewall
Intrusion
Prevention
Platform Support (Apps / API / SDKs)
Enterprise Scalability
Universal Indexing
Machine Data: Any Location, Type, Volume Answer Any Question
© 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Industry Leading Platform For Machine Data
Custom
dashboards
Report and
analyze
Monitor
and alert
Developer
Platform
Ad hoc
searchOn-Premises
Private Cloud
Public
Cloud
Storage
Online
Shopping Cart
Telecoms
Desktops
Security
Web
Services
Networks
Containers
Web
Clickstreams
RFID
Smartphones
and Devices
Servers
Messaging
GPS
Location
Packaged
Applications
Custom
Applications
Online
Services
DatabasesCall Detail
Records
Energy MetersFirewall
Intrusion
Prevention
Platform Support (Apps / API / SDKs)
Enterprise Scalability
Universal Indexing
Machine Data: Any Location, Type, Volume Answer Any Question
Any Amount, Any Location, Any Source
Schema
on-the-fly
Universal
indexing
No
back-end
RDBMS
No need
to filter
data
© 2017 SPLUNK INC.
Download our
Whitepaper “How
machine supports
GDPR compliance”
▶ https://www.splunk.com/en_us/form/whit
e-paper-how-machine-data-supports-
gdpr-compliance.html
Ask for a Workshop
▶ GDPR Article
Mapping
▶ Data Obfuscation
Explore Splunk Hands on
▶ Cloud | Sandbox | On
Prem
▶ www.splunk.com/
Machine data plays a critical role under the upcoming EU-GDPR
and Splunk's universal machine data platform allows
organizations to quickly ask any question they have.
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Thank You for attending
▶ Fill out our Survey Monkey to rate the
webinar and give us feedback
▶ Questions

Contenu connexe

Tendances

Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVOSplunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVOSplunk
 
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017Splunk
 
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...Splunk
 
Splunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk
 
SplunkLive! London 2017 - An End-To-End Approach: Detect via Behavious and Re...
SplunkLive! London 2017 - An End-To-End Approach: Detect via Behavious and Re...SplunkLive! London 2017 - An End-To-End Approach: Detect via Behavious and Re...
SplunkLive! London 2017 - An End-To-End Approach: Detect via Behavious and Re...Splunk
 
Threat Hunting with Deceptive Defense and Splunk Enterprise Security
Threat Hunting with Deceptive Defense and Splunk Enterprise SecurityThreat Hunting with Deceptive Defense and Splunk Enterprise Security
Threat Hunting with Deceptive Defense and Splunk Enterprise SecuritySatnam Singh
 
Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017Splunk
 
The Hitchhiker's Guide to Service Intelligence Workshop
The Hitchhiker's Guide to Service Intelligence WorkshopThe Hitchhiker's Guide to Service Intelligence Workshop
The Hitchhiker's Guide to Service Intelligence WorkshopSplunk
 
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with SplunkReactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with SplunkSplunk
 
Learn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security OperationsLearn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security OperationsSplunk
 
Splunk Discovery Indianapolis - October 10, 2017
Splunk Discovery Indianapolis - October 10, 2017Splunk Discovery Indianapolis - October 10, 2017
Splunk Discovery Indianapolis - October 10, 2017Splunk
 
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk OverviewSplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk OverviewSplunk
 
Rage WITH the machine, not against it: Machine learning for Event Management
Rage WITH the machine, not against it: Machine learning for Event ManagementRage WITH the machine, not against it: Machine learning for Event Management
Rage WITH the machine, not against it: Machine learning for Event ManagementSplunk
 
Analytics-Driven Security - How to Start and Continue the Journey
Analytics-Driven Security - How to Start and Continue the JourneyAnalytics-Driven Security - How to Start and Continue the Journey
Analytics-Driven Security - How to Start and Continue the JourneySplunk
 
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...Splunk
 
John Lewis at Gartner IOM 2017
John Lewis at Gartner IOM 2017John Lewis at Gartner IOM 2017
John Lewis at Gartner IOM 2017Splunk
 
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with SplunkSplunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with SplunkSplunk
 
The Hitchhiker's Guide to Service Intelligence
The Hitchhiker's Guide to Service IntelligenceThe Hitchhiker's Guide to Service Intelligence
The Hitchhiker's Guide to Service IntelligenceSplunk
 
Splunk Discovery: Milan 2018 - Intro to Security Analytics Methods
Splunk Discovery: Milan 2018 - Intro to Security Analytics MethodsSplunk Discovery: Milan 2018 - Intro to Security Analytics Methods
Splunk Discovery: Milan 2018 - Intro to Security Analytics MethodsSplunk
 
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with SplunkReactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with SplunkSplunk
 

Tendances (20)

Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVOSplunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
 
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
 
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
 
Splunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk workshop-Threat Hunting
Splunk workshop-Threat Hunting
 
SplunkLive! London 2017 - An End-To-End Approach: Detect via Behavious and Re...
SplunkLive! London 2017 - An End-To-End Approach: Detect via Behavious and Re...SplunkLive! London 2017 - An End-To-End Approach: Detect via Behavious and Re...
SplunkLive! London 2017 - An End-To-End Approach: Detect via Behavious and Re...
 
Threat Hunting with Deceptive Defense and Splunk Enterprise Security
Threat Hunting with Deceptive Defense and Splunk Enterprise SecurityThreat Hunting with Deceptive Defense and Splunk Enterprise Security
Threat Hunting with Deceptive Defense and Splunk Enterprise Security
 
Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017
 
The Hitchhiker's Guide to Service Intelligence Workshop
The Hitchhiker's Guide to Service Intelligence WorkshopThe Hitchhiker's Guide to Service Intelligence Workshop
The Hitchhiker's Guide to Service Intelligence Workshop
 
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with SplunkReactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
 
Learn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security OperationsLearn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security Operations
 
Splunk Discovery Indianapolis - October 10, 2017
Splunk Discovery Indianapolis - October 10, 2017Splunk Discovery Indianapolis - October 10, 2017
Splunk Discovery Indianapolis - October 10, 2017
 
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk OverviewSplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
 
Rage WITH the machine, not against it: Machine learning for Event Management
Rage WITH the machine, not against it: Machine learning for Event ManagementRage WITH the machine, not against it: Machine learning for Event Management
Rage WITH the machine, not against it: Machine learning for Event Management
 
Analytics-Driven Security - How to Start and Continue the Journey
Analytics-Driven Security - How to Start and Continue the JourneyAnalytics-Driven Security - How to Start and Continue the Journey
Analytics-Driven Security - How to Start and Continue the Journey
 
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
 
John Lewis at Gartner IOM 2017
John Lewis at Gartner IOM 2017John Lewis at Gartner IOM 2017
John Lewis at Gartner IOM 2017
 
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with SplunkSplunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
 
The Hitchhiker's Guide to Service Intelligence
The Hitchhiker's Guide to Service IntelligenceThe Hitchhiker's Guide to Service Intelligence
The Hitchhiker's Guide to Service Intelligence
 
Splunk Discovery: Milan 2018 - Intro to Security Analytics Methods
Splunk Discovery: Milan 2018 - Intro to Security Analytics MethodsSplunk Discovery: Milan 2018 - Intro to Security Analytics Methods
Splunk Discovery: Milan 2018 - Intro to Security Analytics Methods
 
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with SplunkReactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
 

Similaire à A Day in the Life of a GDPR Breach - September 2017: France

Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk
 
Splunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR ComplianceSplunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR ComplianceMarketingArrowECS_CZ
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallSplunk
 
Machine Learning für Event Management
Machine Learning für Event ManagementMachine Learning für Event Management
Machine Learning für Event ManagementSplunk
 
The effects of the GDPR
The effects of the GDPRThe effects of the GDPR
The effects of the GDPRiText Group nv
 
Build a Security Portfolio That Strengthens Your Security Posture
Build a Security Portfolio That Strengthens Your Security PostureBuild a Security Portfolio That Strengthens Your Security Posture
Build a Security Portfolio That Strengthens Your Security PostureSplunk
 
EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights Blancco
 
SplunkLive! London 2017 - Getting Started with Splunk IT Service Intelligence
SplunkLive! London 2017 - Getting Started with Splunk IT Service IntelligenceSplunkLive! London 2017 - Getting Started with Splunk IT Service Intelligence
SplunkLive! London 2017 - Getting Started with Splunk IT Service IntelligenceSplunk
 
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - WebinarUsing Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - WebinarSplunk
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017Doug Copley
 
Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...
Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...
Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...Financial Poise
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Puneet Kukreja
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityReading Works Detroit
 
12th July GDPR event slides
12th July GDPR event slides12th July GDPR event slides
12th July GDPR event slidesExponential_e
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsForcepoint LLC
 
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AISplunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AISplunk
 
ISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_KukrejaISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_KukrejaPuneet Kukreja
 

Similaire à A Day in the Life of a GDPR Breach - September 2017: France (20)

What you will take away from this session
What you will take away from this sessionWhat you will take away from this session
What you will take away from this session
 
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
 
Splunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR ComplianceSplunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR Compliance
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your Downfall
 
Machine Learning für Event Management
Machine Learning für Event ManagementMachine Learning für Event Management
Machine Learning für Event Management
 
The effects of the GDPR
The effects of the GDPRThe effects of the GDPR
The effects of the GDPR
 
Build a Security Portfolio That Strengthens Your Security Posture
Build a Security Portfolio That Strengthens Your Security PostureBuild a Security Portfolio That Strengthens Your Security Posture
Build a Security Portfolio That Strengthens Your Security Posture
 
EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights
 
Ritz 4th-july-gdpr
Ritz 4th-july-gdprRitz 4th-july-gdpr
Ritz 4th-july-gdpr
 
SplunkLive! London 2017 - Getting Started with Splunk IT Service Intelligence
SplunkLive! London 2017 - Getting Started with Splunk IT Service IntelligenceSplunkLive! London 2017 - Getting Started with Splunk IT Service Intelligence
SplunkLive! London 2017 - Getting Started with Splunk IT Service Intelligence
 
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - WebinarUsing Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
 
Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...
Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...
Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in Cybersecurity
 
12th July GDPR event slides
12th July GDPR event slides12th July GDPR event slides
12th July GDPR event slides
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AISplunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
 
ISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_KukrejaISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_Kukreja
 

Plus de Splunk

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routineSplunk
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTVSplunk
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)Splunk
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank InternationalSplunk
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett Splunk
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)Splunk
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...Splunk
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...Splunk
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)Splunk
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)Splunk
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College LondonSplunk
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSplunk
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability SessionSplunk
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - KeynoteSplunk
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform SessionSplunk
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security SessionSplunk
 

Plus de Splunk (20)

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

A Day in the Life of a GDPR Breach - September 2017: France

  • 1. © 2017 SPLUNK INC.© 2017 SPLUNK INC. A day in the life of a GDPR breach The General Data Protection Regulation of the European Union Elizabeth Davies | Director Risk Management and Data Protection, Data Protection Officer (DPO), Splunk Mathieu Dessus | Presales Engineer July 2017 Name Title
  • 2. © 2017 SPLUNK INC. Elizabeth Davies Mathieu Dessus ▶ Director Risk Management and Data Protection, Data Protection Officer (DPO) ▶ Presales Engineer, France Your hosts of today From Splunk
  • 3. © 2017 SPLUNK INC. Legal Disclaimer 3 The information in this presentation was compiled from sources believed to be reliable for informational and discussion purposes only. The information contained herein is not intended to constitute legal advice. You should consult with your own legal teams when developing programs and policies. You should not take, or refrain from taking, action based on its content. We do not guarantee the accuracy of this information and assume no liability in connection with therewith.
  • 4. © 2017 SPLUNK INC. What’s the GDPR What activities are happening within organizations to prepare for What tools and processes a DPO relies on How a day in the life of a GDPR breach can look like Why Splunk What you will learn
  • 5. © 2017 SPLUNK INC. Has your organization already started to prepare for the GDPR?
  • 6. © 2017 SPLUNK INC. DPO’s View
  • 7. © 2017 SPLUNK INC. An Outsider’s Perspective On GDPR Why GDPR Is So Important to US Security First Mindset Agenda GDPR: Quick Overview
  • 8. © 2017 SPLUNK INC. Individual Rights (Right of Access, Rectification, Erasure, Portability, Restriction) (Arts. 15-20) Record of Processing Activities (Data Mapping and DPIA—Art. 30/35) Breach Notification (Art. 33-34) Secure Processing (Art. 32) GDPR GDPR: General Data Protection Regulation Highlights of Key Areas
  • 9. © 2017 SPLUNK INC. Your Vendors (Processors) Must Report Events to Your Business Your Business (Controllers) Must Report to the Authorities (DPAs) You Business May Also Need to Report to the Individual Affected GDPR: Breach Notification Across EU A harmonized/tiered reporting obligation, but with tight response times (72 hours) Reporting Obligations: Your Business, Authorities and Affected Individuals
  • 10. © 2017 SPLUNK INC. Your Vendor Notifies Your Business Your Business Notifies the DPA Your Business Notifies the Individual Affected When Do You Need to Report? Without “Undue Delay” and Often within 72 hours Without undue delay after becoming aware of breach Not later than 72 hours after becoming aware of breach if likely to result in risk to rights and freedoms Without undue delay if likely to result in high risk to rights and freedoms
  • 11. © 2017 SPLUNK INC. ▶ Nature of the breach, including category/number of affected individuals and categories/number of personal data records concerned ▶ Contact info—if you have a DPO theirs are required ▶ Likely consequences of breach ▶ Measures taken to mitigate breach What Do You Need to Report? At a minimum, the following:
  • 12. © 2017 SPLUNK INC. Detection + Escalation (Global: $0.99M) Notification (Global: $0.19M) Post-Breach Response (Global: $0.93M) Lost Business (Global: $1.51M) Costs of Data Breaches (Global Average Costs Per Breach) Source: Ponemon Inst. 2017 Cost of Data Breach Study – United States and 2017 Cost of Data Breach Study - Global Average total cost of data breach Global: $3.62M $
  • 13. © 2017 SPLUNK INC. You will need log file reporting tools to help you determine: • If you have a breach—unauthorized access, disclosure, leak of information • If the breach is consequential enough to report—what kind of information was exposed, for how long, how many affected, was it anonymized/encrypted, etc. • What steps you will need to take to mitigate—take systems or users off line, shunt access, create sink holes, etc. So What Can You Do to Prepare? Some essential tools will help
  • 14. © 2017 SPLUNK INC. ▶ At Splunk, our employees are our canaries in the coal mine ▶ You can’t notify customers, DPAs, or consumers, if you don’t know there is a problem ▶ No DPO/CPO/CISO/CIO can be everywhere, all the time ▶ Loss, destruction, leakage, unauthorized access—they can happen anywhere, not simply at your firewall ▶ You need everyone to play their part You Will Also Need Training It takes a village (Security/IT/Legal/Customer Relations/Marketing/HR)
  • 15. © 2017 SPLUNK INC. • Eliminate duplication, streamline and enhance baseline education for all • Supplemental training where needed Enhanced Privacy/Security Training • Enhance first responder base when needed • Develop org-wide “muscle memory" Volunteer Firefighting • Enhance messaging campaign globally about who, when and where to report security/privacy events • Make this know-how second nature Revised IR Plan Enhanced Messaging At Splunk, We Are Focusing On Three Key Areas All designed to get us ready for May 2018
  • 16. © 2017 SPLUNK INC. 1. Security and Privacy are team sports—rally your team (Security/IT/Legal/HR/Marketing/Customer Relations) 2. Training and IR Plan updates can be done easily and quickly—an ounce of prevention is worth a pound of cure 3. Don’t get overwhelmed, it won’t help 4. Put together a workable—not a perfect—plan and get going 5. Start with the easy stuff first—build team confidence Don’t let perfection be the enemy of the good—GDPR is here to stay—plenty of time ahead to improve Key Takeaways
  • 17. © 2017 SPLUNK INC. Helen Keller “Life is either a great adventure or nothing.”
  • 18. © 2017 SPLUNK INC. Has your organization identified which processes and technologies are required to adjust for the GDPR?
  • 19. © 2017 SPLUNK INC. A day in the life of a GDPR Breach
  • 20. © 2017 SPLUNK INC. “Les personnages et les situations de ce récit étant purement fictifs, toute ressemblance avec des personnes ou des situations existantes, ayant existé, ou qui existeront dans le futur, ne saurait être que fortuite.
  • 21. © 2017 SPLUNK INC. What if tomorrow is
  • 22. © 2017 SPLUNK INC. What if you’re responsible for Security?
  • 23. © 2017 SPLUNK INC. You wake up in the morning and you even haven’t had your coffee
  • 24. © 2017 SPLUNK INC. Your friendly Data Privacy Officer is on the phone
  • 25. © 2017 SPLUNK INC. Someone claims to sell PI data you hold
  • 26. © 2017 SPLUNK INC. How does the DPO know? Your threat Intelligence provider informed you and provided you samples
  • 27. © 2017 SPLUNK INC. There is data in the deep web It may be your data!
  • 28. © 2017 SPLUNK INC. He hangs up! What’s next?
  • 29. © 2017 SPLUNK INC. Your incident investigation plan kicks in
  • 30. © 2017 SPLUNK INC. Does your organization have an incident investigation process defined and in place in case you’re breached?
  • 31. © 2017 SPLUNK INC. DPO IT PR/Media Team Legal (CEO) Coordination
  • 32. © 2017 SPLUNK INC. Emergency call Emergency chatroom
  • 33. © 2017 SPLUNK INC. The fire alarm button is pulled down
  • 35. © 2017 SPLUNK INC. Internal Leak External Leak Incident commander T- 70h
  • 36. © 2017 SPLUNK INC. “We need to investigate!!!” Reaching out to your security operations team T- 65h
  • 37. © 2017 SPLUNK INC. People and Processes T- 60h
  • 38. © 2017 SPLUNK INC. Where is that data stored in your environment? T- 55h
  • 39. © 2017 SPLUNK INC. First Action Is data still leaking? T- 45h
  • 40. © 2017 SPLUNK INC. How will you watch them? T- 40h
  • 41. © 2017 SPLUNK INC. Nice, structured, tidy data T- 39h
  • 42. © 2017 SPLUNK INC. Diving deep into the digital infrastructure T- 35h
  • 43. © 2017 SPLUNK INC. time series, in motion, unstructured Machine data 43 T- 34h
  • 44. © 2017 SPLUNK INC. It can be big data… T- 33h
  • 45. © 2017 SPLUNK INC. … it is lazy T- 32h
  • 46. © 2017 SPLUNK INC. … and it is hard to understand… T- 30h
  • 47. © 2017 SPLUNK INC. Worst Case External authorities might come in to your organization and say: “Don’t stop it” T- 25h
  • 48. © 2017 SPLUNK INC. Take response actions to stop data leakage T- 20h
  • 49. © 2017 SPLUNK INC. Understand T- 15h
  • 50. © 2017 SPLUNK INC. How much data will be needed for this?
  • 51. © 2017 SPLUNK INC. Who processed your information? T- 10h
  • 52. © 2017 SPLUNK INC. Which user or systems was involved? T- 8h
  • 53. © 2017 SPLUNK INC. You know what you know You know what you don’t know Painting the picture T- 5h
  • 54. © 2017 SPLUNK INC. Does your organization collect the machine data to analyse with your SIEM from all applications and systems that are processing personal information?
  • 55. © 2017 SPLUNK INC. Maybe resulting in a non event? Puts the breach data subjects at risk?
  • 56. © 2017 SPLUNK INC. Do individuals need to be informed additionally? How sensitive was the data?
  • 57. © 2017 SPLUNK INC. before chatter explodes • Inform Authority • Inform affected Individuals • (Inform Public) As an organization you want to control the story T- 0h
  • 58. © 2017 SPLUNK INC. Worst Practice: Yahoo! “Yahoo later admitted to an even larger breach from 2013
  • 59. © 2017 SPLUNK INC. Best Practice: ABTA Breach
  • 60. © 2017 SPLUNK INC. Best Practice: ABTA Breach
  • 62. © 2017 SPLUNK INC. 2+ weeks later out of the news Example ABTA Breach
  • 64. © 2017 SPLUNK INC. Someone knocks on your door T+ 1 Week
  • 65. © 2017 SPLUNK INC. Have you deployed “countermeasures appropriate to the risk”? Have you used “state of the art” best practices? Data Privacy Audits T+ 1 Week
  • 66. © 2017 SPLUNK INC. Massive Fines T+ 1 Week
  • 67. © 2017 SPLUNK INC. What did you know? When did you know? How did you know about it? Prove T+ 2 Weeks
  • 68. © 2017 SPLUNK INC. Logs become your digital fingerprints
  • 69. © 2017 SPLUNK INC. Why Splunk? Splunk can help
  • 70. © 2017 SPLUNK INC. Prove GDPR security controls are enforced Splunk helps to detect, prevent and investigate breaches Search and report on personal data processing What GDPR use cases does Splunk help solve? Breach Investigation Notification: 72 Hours
  • 71. © 2017 SPLUNK INC. Three Use Cases that bring different person’s on the same level and speak the same language, each: ▶ Real World Scenario (IT-Manager) ▶ Relevant GDPR Articles and what they mean (Data Privacy Officer) ▶ How machine data helps with (Splunk Champion) Whitepaper: How machine data helps with GDPR https://www.splunk.com/en_us/form/white-paper-how-machine-data-supports-gdpr-compliance.html https://www.splunk.com/de_de/form/wie-maschinendaten-die-eu-dsgvo.html https://www.splunk.com/fr_fr/form/les-donnees-machine-facilitent-la-conformite-au-rgpd.html
  • 72. © 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC. Industry Leading Platform For Machine Data Custom dashboards Report and analyze Monitor and alert Developer Platform Ad hoc searchOn-Premises Private Cloud Public Cloud Storage Online Shopping Cart Telecoms Desktops Security Web Services Networks Containers Web Clickstreams RFID Smartphones and Devices Servers Messaging GPS Location Packaged Applications Custom Applications Online Services DatabasesCall Detail Records Energy MetersFirewall Intrusion Prevention Platform Support (Apps / API / SDKs) Enterprise Scalability Universal Indexing Machine Data: Any Location, Type, Volume Answer Any Question
  • 73. © 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC. Industry Leading Platform For Machine Data Custom dashboards Report and analyze Monitor and alert Developer Platform Ad hoc searchOn-Premises Private Cloud Public Cloud Storage Online Shopping Cart Telecoms Desktops Security Web Services Networks Containers Web Clickstreams RFID Smartphones and Devices Servers Messaging GPS Location Packaged Applications Custom Applications Online Services DatabasesCall Detail Records Energy MetersFirewall Intrusion Prevention Platform Support (Apps / API / SDKs) Enterprise Scalability Universal Indexing Machine Data: Any Location, Type, Volume Answer Any Question Any Amount, Any Location, Any Source Schema on-the-fly Universal indexing No back-end RDBMS No need to filter data
  • 74. © 2017 SPLUNK INC. Download our Whitepaper “How machine supports GDPR compliance” ▶ https://www.splunk.com/en_us/form/whit e-paper-how-machine-data-supports- gdpr-compliance.html Ask for a Workshop ▶ GDPR Article Mapping ▶ Data Obfuscation Explore Splunk Hands on ▶ Cloud | Sandbox | On Prem ▶ www.splunk.com/ Machine data plays a critical role under the upcoming EU-GDPR and Splunk's universal machine data platform allows organizations to quickly ask any question they have.
  • 75. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Thank You for attending ▶ Fill out our Survey Monkey to rate the webinar and give us feedback ▶ Questions