SlideShare une entreprise Scribd logo
1  sur  38
The EU GDPR
What Is It & Why Should I Care?
Brian Honan
CEO of BH Consulting – Independent Information Security Firm
Founder & Head of IRISSCERT – Ireland’s first Computer
Emergency Response Team
Special Advisor on Internet Security Europol's CyberCrime
Centre (EC3)
Adjunct Lecturer at University College Dublin
Expert Advisor to European Network & Information Security
Agency (ENISA)
Regularly comments on media stories –
BBC, Forbes, Bloomberg, FT, Guardian, Sunday Times
Who Am I?
“Why do you rob
banks?”
“Because that's
where
the money is.”
Willie Sutton
“Why do you hack
companies?”
“Because that's
where
the Data is.”
CyberWillie Sutton
 The EU General Data Protection Regulation (GDPR)
is the update to the EU Data Protection Directive
 Came into Force 24th May 2016
 Will Apply Across All 28 EU Member States
25th May 2018
(Just over 15 months to be ready)
What is GDPR?
 Updates the EU Data Protection Directive with a
Strong Focus on Individual’s Privacy Rights
 Harmonises the Data Protection Regime Across All
28 EU Member States
 Will Apply Across All 28 EU Member States
 Significant (and Fines) Obligations on Organisations
Holding Personal Data
What is GDPR?
 Personal Data
‘personal data’ means any information relating to an
identified or identifiable natural person (‘data
subject’); an identifiable natural person is one who
can be identified, directly or indirectly, in particular
by reference to an identifier such as a name, an
identification number, location data, an online
identifier or to one or more factors specific to the
physical, physiological, genetic, mental, economic,
cultural or social identity of that natural person;’
What is GDPR?
EU GDPR Applies to EU Member States
EU GDPR Also Applies Globally
 The Right to be Informed
 The Right of Access
 The Right to Rectification
 The Right to Erasure
Otherwise Known As The Right to Be Forgotten
 The Right to Restrict Processing
 The Right to Data Portability
 The Right to Object
 Rights in Relation to Automated Decision Making and
Profiling
What it Means to The Individual
 Obtain Clear Consent
 Obtain parental consent if Data Subject Under 16
 Provide a Copy of an Individual’s Personal Data on
Request
 Erase all Personally Identifiable Records if Requested
 Provide “Adequate Security”
 Privacy Impact Assessments
 One Supervisory Authority to Deal With
 You Can Select your Preferred Supervisory Authority
What it Means to Organisations?
 If Personal Data Breach
“likely to result in a risk to the rights and freedoms
of individuals”
 Notify The Supervisory Authority Within 72 Hours of
Becoming Aware of Breach
 If High Risk Breach Likely To Affect Rights and
Freedoms of Individuals
“ You Must Notify Those Concerned Directly”
Mandatory Breach Notifications
 The Nature of the Personal Data Breach Including:
 Categories and Approximate Number of Individuals
Impacted;
 Categories and Approximate Number of Personal Data
Records Concerned;
 Contact Details of the Data Protection Officer or Other Contact
Point;
 Description of Likely consequences of the Personal Data
Breach;
 Description of Measures Taken, or Will be Taken to;
 Deal with the Breach
 Measures (if appropriate) Taken to Mitigate any Possible
Adverse Effects.
Mandatory Breach Notifications
 Mandatory For
 A Public Authority (with some exceptions);
 Companies with;
 Large Scale Systematic Monitoring of Individuals,
 Large Scale Processing of Special Categories of Data
 Large Scale Processing of Data Relating to Criminal
Convictions and Offence
 Data Protection Officer Must
 Report to the Highest Management Level of
Organisation
 Operates independently
 Is not Dismissed or Penalised for Performing their
Task.
 Have Adequate Resources are Provided
Appoint A Data Protection Officer
Significant Fines
 Supervisory Authority Can Fine;
 Up to €20,000,000 (or 4% of total annual global turnover,
whichever is greater) for the most serious infringements
 Failing to notify a breach when required to do so can result
in a significant fine up to 10 million Euros or 2 per cent of
your global turnover
 On Top of Fine for the Breach itself
 An Individual(s) Can
 Complain to Supervisory Authority
 Right To Compensation
 Potential for Group Actions
Trend Micro's UK Study re GDPR
 50% of UK IT decision makers were unaware of the
impending legislation
 25% percent adamant that compliance is not
achievable
Ready for GDPR?
May 25th 2018
Identify Key Data Assets
Establish Policies
Use Existing Frameworks
 ISO/IEC 27001:2013 Information Security Standard
 ISO/IEC/27002:2013 Guidance
 NIST CyberSecurity Framework
 The Center for Internet Security - Critical Security
Controls
Security
Awareness
Training
Monitor & Respond
Start Your GDPR Project Now
@BrianHonan
Brian.honan@bhconsulting.ie
1000s
of successful
customer
deployments
Trusted
by half the
Fortune 500
96%
customer
satisfaction
20M
critical
endpoints
covered
globally
Extensive library of security
configuration best-practices to establish
and monitor configurations
Detection and alerts on all changes to
established baseline—what, who and
business context
Discover assets, vulnerabilities and
malicious changes, and help automate
the workflow and process of remediation
Automate manual processes associated
with dealing with change—isolate and
escalate changes and events of interest
Assess configurations
against security policies
Detect unauthorized changes
Identify risks on assets
Deal with security
data overload
Out-of-the-box audit report templates,
and automated compliance reporting
Industry’s most comprehensive library of
policy tests for all major standards
Logging of changes to in-scope assets
with details on who and when
Continuous monitoring and
reporting to flag remediation
needed to stay compliant
Reduce the time spent
on compliance
Demonstrate compliance with
standards
Produce data for audits
and for forensics
Maintain compliance
over time
Configuration &
Compliance
Management
Log
Management
Vulnerability
Management
Integrity
Monitoring
Configuration &
Compliance
Management
Log
Management
Vulnerability
Management
20 Critical Security Controls
Tripwire
Solutions
CSC1
Inventory of Authorized and
Unauthorized Devices
CSC2
Inventory of Authorized and
Unauthorized Software
CSC3
Secure Configurations for Hardware
and Software
CSC4
Continuous Vulnerability Assessment
and Remediation
CSC5
Controlled Use of Administrative
Privileges
CSC6
Maintenance, Monitoring, and Analysis
of Audit Logs
CSC7 Email and Web Browser Protections
CSC8 Malware Defenses
CSC9 Limitation and Control of Network Ports
CSC10 Data Recovery Capability
CSC11
Secure Configurations for Network
Devices
CSC12 Boundary Defense
CSC13 Data Protection
CSC14
Controlled Access Based on the Need
to Know
CSC15 Wireless Access Control
CSC16 Account Monitoring and Control
CSC17
Security Skills Assessment and
Appropriate Training to Fill Gaps
CSC18 Application Software Security
CSC19 Incident Response and Management
CSC20
Penetration Tests and Red Team
Exercises
tripwire.com | @TripwireInc
http://www.tripwire.com

Contenu connexe

Tendances

EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?
VYTIS MALECKAS
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection Regulation
Ghostery, Inc.
 

Tendances (20)

Are you preparing for GDPR?
Are you preparing for GDPR?Are you preparing for GDPR?
Are you preparing for GDPR?
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your business
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection Regulation
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
 
Findability Day 2016 - What is GDPR?
Findability Day 2016 - What is GDPR?Findability Day 2016 - What is GDPR?
Findability Day 2016 - What is GDPR?
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution
 
GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality
 
The Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationThe Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection Regulation
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPR
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance
 
2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar
 
GDPR for dummies
GDPR for dummies  GDPR for dummies
GDPR for dummies
 
GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 

En vedette

Survival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient OrganizationSurvival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient Organization
Tripwire
 

En vedette (15)

Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
 
Survival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient OrganizationSurvival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient Organization
 
8 Tips on Creating a Security Culture in the Workplace
8 Tips on Creating a Security Culture in the Workplace8 Tips on Creating a Security Culture in the Workplace
8 Tips on Creating a Security Culture in the Workplace
 
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
 
Tripwire University Boot Camp – Economy of Bad
Tripwire University Boot Camp – Economy of BadTripwire University Boot Camp – Economy of Bad
Tripwire University Boot Camp – Economy of Bad
 
Taking the Pain out of PCI Compliance
Taking the Pain out of PCI ComplianceTaking the Pain out of PCI Compliance
Taking the Pain out of PCI Compliance
 
Leveraging Change Control for Security
Leveraging Change Control for SecurityLeveraging Change Control for Security
Leveraging Change Control for Security
 
Tripwire University Boot Camp – The Shifting Landscape: Know Your Battlefield
Tripwire University Boot Camp – The Shifting Landscape: Know Your BattlefieldTripwire University Boot Camp – The Shifting Landscape: Know Your Battlefield
Tripwire University Boot Camp – The Shifting Landscape: Know Your Battlefield
 
PCI Change Detection: Thinking Beyond the Checkbox
PCI Change Detection: Thinking Beyond the CheckboxPCI Change Detection: Thinking Beyond the Checkbox
PCI Change Detection: Thinking Beyond the Checkbox
 
Keep Your Guard: Stay Compliant and Be Secure
Keep Your Guard: Stay Compliant and Be SecureKeep Your Guard: Stay Compliant and Be Secure
Keep Your Guard: Stay Compliant and Be Secure
 
Threat Intelligence from Honeypots for Active Defense
Threat Intelligence from Honeypots for Active DefenseThreat Intelligence from Honeypots for Active Defense
Threat Intelligence from Honeypots for Active Defense
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected
 
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
Tripwire University: Cyberwar Boot Camp – Introduction and OverviewTripwire University: Cyberwar Boot Camp – Introduction and Overview
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
 
Achieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationAchieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security Automation
 

Similaire à An Essential Guide to EU GDPR

The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
stevemeltzer
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
blogzilla
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
padler01
 

Similaire à An Essential Guide to EU GDPR (20)

Board Priorities for GDPR Implementation
Board Priorities for GDPR ImplementationBoard Priorities for GDPR Implementation
Board Priorities for GDPR Implementation
 
GPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-RightGPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-Right
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
Why GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkWhy GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC Framework
 
GDPR (En) JM Tyszka
GDPR (En)  JM TyszkaGDPR (En)  JM Tyszka
GDPR (En) JM Tyszka
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
GDPR for Security Professionals
GDPR for Security ProfessionalsGDPR for Security Professionals
GDPR for Security Professionals
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 

Plus de Tripwire

Plus de Tripwire (20)

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber Moments
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

An Essential Guide to EU GDPR

  • 1. The EU GDPR What Is It & Why Should I Care? Brian Honan
  • 2. CEO of BH Consulting – Independent Information Security Firm Founder & Head of IRISSCERT – Ireland’s first Computer Emergency Response Team Special Advisor on Internet Security Europol's CyberCrime Centre (EC3) Adjunct Lecturer at University College Dublin Expert Advisor to European Network & Information Security Agency (ENISA) Regularly comments on media stories – BBC, Forbes, Bloomberg, FT, Guardian, Sunday Times Who Am I?
  • 3.
  • 4.
  • 5. “Why do you rob banks?” “Because that's where the money is.” Willie Sutton
  • 6. “Why do you hack companies?” “Because that's where the Data is.” CyberWillie Sutton
  • 7.  The EU General Data Protection Regulation (GDPR) is the update to the EU Data Protection Directive  Came into Force 24th May 2016  Will Apply Across All 28 EU Member States 25th May 2018 (Just over 15 months to be ready) What is GDPR?
  • 8.  Updates the EU Data Protection Directive with a Strong Focus on Individual’s Privacy Rights  Harmonises the Data Protection Regime Across All 28 EU Member States  Will Apply Across All 28 EU Member States  Significant (and Fines) Obligations on Organisations Holding Personal Data What is GDPR?
  • 9.  Personal Data ‘personal data’ means any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person;’ What is GDPR?
  • 10. EU GDPR Applies to EU Member States
  • 11. EU GDPR Also Applies Globally
  • 12.  The Right to be Informed  The Right of Access  The Right to Rectification  The Right to Erasure Otherwise Known As The Right to Be Forgotten  The Right to Restrict Processing  The Right to Data Portability  The Right to Object  Rights in Relation to Automated Decision Making and Profiling What it Means to The Individual
  • 13.  Obtain Clear Consent  Obtain parental consent if Data Subject Under 16  Provide a Copy of an Individual’s Personal Data on Request  Erase all Personally Identifiable Records if Requested  Provide “Adequate Security”  Privacy Impact Assessments  One Supervisory Authority to Deal With  You Can Select your Preferred Supervisory Authority What it Means to Organisations?
  • 14.  If Personal Data Breach “likely to result in a risk to the rights and freedoms of individuals”  Notify The Supervisory Authority Within 72 Hours of Becoming Aware of Breach  If High Risk Breach Likely To Affect Rights and Freedoms of Individuals “ You Must Notify Those Concerned Directly” Mandatory Breach Notifications
  • 15.  The Nature of the Personal Data Breach Including:  Categories and Approximate Number of Individuals Impacted;  Categories and Approximate Number of Personal Data Records Concerned;  Contact Details of the Data Protection Officer or Other Contact Point;  Description of Likely consequences of the Personal Data Breach;  Description of Measures Taken, or Will be Taken to;  Deal with the Breach  Measures (if appropriate) Taken to Mitigate any Possible Adverse Effects. Mandatory Breach Notifications
  • 16.  Mandatory For  A Public Authority (with some exceptions);  Companies with;  Large Scale Systematic Monitoring of Individuals,  Large Scale Processing of Special Categories of Data  Large Scale Processing of Data Relating to Criminal Convictions and Offence  Data Protection Officer Must  Report to the Highest Management Level of Organisation  Operates independently  Is not Dismissed or Penalised for Performing their Task.  Have Adequate Resources are Provided Appoint A Data Protection Officer
  • 17. Significant Fines  Supervisory Authority Can Fine;  Up to €20,000,000 (or 4% of total annual global turnover, whichever is greater) for the most serious infringements  Failing to notify a breach when required to do so can result in a significant fine up to 10 million Euros or 2 per cent of your global turnover  On Top of Fine for the Breach itself  An Individual(s) Can  Complain to Supervisory Authority  Right To Compensation  Potential for Group Actions
  • 18. Trend Micro's UK Study re GDPR  50% of UK IT decision makers were unaware of the impending legislation  25% percent adamant that compliance is not achievable Ready for GDPR?
  • 21.
  • 23. Use Existing Frameworks  ISO/IEC 27001:2013 Information Security Standard  ISO/IEC/27002:2013 Guidance  NIST CyberSecurity Framework  The Center for Internet Security - Critical Security Controls
  • 26. Start Your GDPR Project Now
  • 28.
  • 29. 1000s of successful customer deployments Trusted by half the Fortune 500 96% customer satisfaction 20M critical endpoints covered globally
  • 30. Extensive library of security configuration best-practices to establish and monitor configurations Detection and alerts on all changes to established baseline—what, who and business context Discover assets, vulnerabilities and malicious changes, and help automate the workflow and process of remediation Automate manual processes associated with dealing with change—isolate and escalate changes and events of interest Assess configurations against security policies Detect unauthorized changes Identify risks on assets Deal with security data overload
  • 31. Out-of-the-box audit report templates, and automated compliance reporting Industry’s most comprehensive library of policy tests for all major standards Logging of changes to in-scope assets with details on who and when Continuous monitoring and reporting to flag remediation needed to stay compliant Reduce the time spent on compliance Demonstrate compliance with standards Produce data for audits and for forensics Maintain compliance over time
  • 34.
  • 35. 20 Critical Security Controls Tripwire Solutions CSC1 Inventory of Authorized and Unauthorized Devices CSC2 Inventory of Authorized and Unauthorized Software CSC3 Secure Configurations for Hardware and Software CSC4 Continuous Vulnerability Assessment and Remediation CSC5 Controlled Use of Administrative Privileges CSC6 Maintenance, Monitoring, and Analysis of Audit Logs CSC7 Email and Web Browser Protections CSC8 Malware Defenses CSC9 Limitation and Control of Network Ports CSC10 Data Recovery Capability CSC11 Secure Configurations for Network Devices CSC12 Boundary Defense CSC13 Data Protection CSC14 Controlled Access Based on the Need to Know CSC15 Wireless Access Control CSC16 Account Monitoring and Control CSC17 Security Skills Assessment and Appropriate Training to Fill Gaps CSC18 Application Software Security CSC19 Incident Response and Management CSC20 Penetration Tests and Red Team Exercises
  • 36.
  • 37.

Notes de l'éditeur

  1. PURPOSE = purpose of meeting & decisions to be made by end of conversation SALES REP AGENDA = goals & questions, challenges, actions results PROSPECT AGENDA = embed objections, use 3rd party stories TIME = confirm time available OUTCOME = proceed or stop the selling process, clear yes or no outcome
  2. Most people know us for File Integrity Monitoring – this was our first product and we are still the best in the industry at detecting integrity changes and not just on files We’ve added configuration and policy management to our core capability to make it more robust and useful, and added automation to reduce the workload associated with compliance management We added log management capabilities to make sense of the data generated by your operations And we acquired technology that helps you identify the biggest risks on your network, with the industry’s most precise risk scoring algorithm so you can set actionable priorities We’ve integrated all these capabilities to work together seamlessly for real risk reduction And finally we have an open architecture so we can exchange our unique asset state data with many of the most used vendors in the IT security and operations space
  3. Most people know us for File Integrity Monitoring – this was our first product and we are still the best in the industry at detecting integrity changes and not just on files We’ve added configuration and policy management to our core capability to make it more robust and useful, and added automation to reduce the workload associated with compliance management We added log management capabilities to make sense of the data generated by your operations And we acquired technology that helps you identify the biggest risks on your network, with the industry’s most precise risk scoring algorithm so you can set actionable priorities We’ve integrated all these capabilities to work together seamlessly for real risk reduction And finally we have an open architecture so we can exchange our unique asset state data with many of the most used vendors in the IT security and operations space