SlideShare une entreprise Scribd logo
1  sur  42
Challenges &
Opportunities the
Data Privacy Act
Brings
Robert “Bob” Reyes
www.bobreyes.com
bob@bobreyes.com
@bobreyes
About Me
 GM & CTO of TurfSite Web Services.
 Mozilla Representative to the PHL.
 Tech News Columnist at the Manila Bulletin.
 Hobby Blogger, Photographer.
 Dad of Xeon & Haswell.
Being an Open Source Dev
What is
Mozilla?
History of Mozilla
On 23 Feb 1998,
Netscape Communications Corp.
created a project called
Mozilla (Mosaic + Godzilla).
Mozilla was launched 31 Mar 1998.
Mozilla’s Mission
To ensure the Internet
is a global public
resource, open &
accessible to all.
Mozilla
Data Privacy
Principles
Data Privacy Principles
The following five principles stem from the Mozilla Manifesto
& inform how we:
 Develop our products & services
 Manage user data we collect
 Select & interact with partners
 Shape our public policy & advocacy work
Data Privacy Principles
1. No Surprises
 Use & share information in a way that is transparent & benefits the user.
2. User Control
 Develop products & advocate for best practices that put users in control of their
data & online experiences.
3. Limited Data
 Collect what we need, de-identify where we can & delete when no longer
necessary.
4. Sensible Settings
 Design for a thoughtful balance of safety & user experience.
5. Defense in Depth
 Maintain multi-layered security controls & practices, many of which are publicly
verifiable.
Get Smart on the Web
Lightbeam for Firefox
Lightbeam for Firefox
https://www.mozilla.org/en-US/lightbeam/
Lightbeam for Firefox
https://www.mozilla.org/en-US/lightbeam/
Tracking
& Privacy
Tracking & Privacy
 Not all tracking is bad.
 Many services rely on user data to provide relevant
content & enhance your online experience.
 But tracking can happen without the user’s knowledge.
 That’s not okay for some.
 It should be you who decides when, how & if you want
your browsing data to be shared.
 We recognize the importance of transparency & our
mission is all about empowering users — both with
tools & information.
Tracking & Privacy
https://www.mozilla.org/en-US/lightbeam/
Lightbeam for Firefox
https://www.mozilla.org/en-US/lightbeam/
Challenges in
Data Privacy
Challenges in Data Privacy
It is essential for IT & business leaders to understand the full
risk potential of data privacy threats & how to address these
issues:
1. Data Privacy is more than compliance.
2. A strategic investment, not a cost.
3. Build it, deploy it, test it, modernize it.
4. Technology usage trends increase vulnerabilities.
Challenge 1:
Data Privacy is more
than compliance.
Challenge 1:
More Than Compliance
 Compliance is a critical factor driving interest in, & adoption
of, data privacy solutions.
 Building data privacy defenses simply to pass an annual
audit by a regulatory body is just the beginning when it
comes to protecting data privacy.
 Data privacy must be ensured every day, because privacy
threats are fluid & ever evolving.
 The incidence of zero-day attacks (security breaches for
which IT professionals had no time to prepare a prior
defense) for Internet Explorer doubled in 2014 from the
year prior.
Challenge 1:
More Than Compliance
 There’s also the impact of highly-negative publicity & loss of
consumer confidence of privacy breaches that may occur
without notice.
 A recent study indicated that 226 million personal records
about Europeans have been compromised in the past
decade.
 In addition, a number of data privacy breaches aren’t
covered under compliance statutes, such as theft of
intellectual property including new product diagrams,
competitive analysis documents & marketing campaigns.
Solution 1:
Data Privacy is more
than compliance.
Solution 1:
More Than Compliance
 Data privacy must be protected on a continuous, ongoing
basis, far beyond the requirements of simply passing
external or internal compliance audits.
 Protecting data privacy must be part of a comprehensive
corporate strategy that embraces the three P’s of Privacy:
 People
 Products
 Processes
Solution 1:
More Than Compliance
 Not only do organizations need to ensure that data privacy
reports to a senior corporate executive, but the organization
must take steps to ensure that all employees & virtual staff
(partners, contractors, etc.) use smart privacy protection
techniques.
 Organizations must be committed to investing in solutions
that help ensure data privacy beyond the basics, including
malware detection & identity management.
 Privacy should be embedded into all business processes,
from onboarding new employees to sharing data over
unsecured networks.
Challenge 2:
A Strategic
Investment,
Not a Cost
Challenge 2:
Strategic Investment, Not a Cost
 Measuring the economic impact of a breach goes far
beyond regulatory penalties or the cost of securing
defenses.
 What is the cost of negative headlines about Social
Security numbers, user IDs, passwords, & other identities
being hacked?
 It’s important to recognize the financial risk of not
pursuing… data protection processes. The status quo isn’t
free. Ignoring those measures will incur a cost.
 You must understand the potential catastrophic impact of
competitors gaining access to proprietary information such
as customer lists, specially negotiated discount pricing, &
product launch timelines.
Solution 2:
A Strategic
Investment,
Not a Cost
Solution 2:
Strategic Investment, Not a Cost
 Organizations need to make well-thought-out investments
in technologies to ensure that data defenses are as resilient
as possible & that data can be recovered, restored,
retained, & reclaimed as circumstances require.
 Key technologies that should be a part of any organization’s
data privacy defense include snapshotting, high availability
infrastructure, backup & archiving.
Challenge 3:
Build it, Deploy it,
Test it, Modernize it
Challenge 3:
Build it, Deploy it, Test it, Modernize it
 Most companies have some sort of data privacy plan, but
it’s usually a component in a broader disaster recovery or
business continuity strategy.
 It may be a dedicated chapter or a few isolated passages in
that plan document.
 It needs to be embedded in all aspects of business
continuity in real-world practice.
 Sadly, business continuity plan documents often act as
shelfware that is rarely tested & updated to reflect changes
in business conditions.
Solution 3:
Build it, Deploy it,
Test it, Modernize it
Solution 3:
Build it, Deploy it, Test it, Modernize it
 Organizations need a dynamic planning, testing, &
deployment strategy for data privacy
 One that is developed & supported by senior executives &
business stakeholders, not just the IT department or even a
chief information security officer.
 While internal IT staff & business leaders have the
advantage of understanding the ins & outs of how data is
captured, stored, & used within their organization, it’s not
unusual for internal staff to become insulated to both
external threats & to new ideas on how to ensure higher
levels of data privacy.
Challenge 4:
Technology Usage
Trends Increase
Vulnerabilities
Challenge 4:
Technology Usage Trends Increase Vulnerabilities
 Industry trends such as Bring Your Own Device (BYOD),
the impact of social media, increased adoption of affordable
cloud computing services, & widespread use of sync-and-
store services for data storage have raised new &
potentially damaging data privacy vulnerabilities.
 Many of the latest identity thefts & cyber attacks have
occurred as a result of delivering malware as advertising
through tablets & smartphones.
 “Consumerization of IT” increases employee productivity,
but many of those end-user devices operate without
sufficient IT oversight & security frameworks.
Solution 4:
Technology Usage
Trends Increase
Vulnerabilities
Solution 4:
Technology Usage Trends Increase Vulnerabilities
 IT departments & business stakeholders shouldn’t
necessarily restrict usage of consumer devices,
applications, & services, but should develop smart policies
that reflect both their benefits to employees & their threats
to data privacy.
 Make employees aware of best practices to ensure data
privacy, & to do continuous vulnerability testing to surface
unexpected problems.
 Organizations to take pains to ensure all relevant parties
understand that new uses of technology often increase
data privacy risks & must be accounted for.
Opportunities in Data
Privacy
Opportunities
in Data Privacy
 DATA is the new BLACK GOLD.
 Technology innovation & the power of data analytics
present tremendous value.
 New job opportunities related to Data Privacy compliance.
 2016-2017  Data Scientists
 2017-2018  Data Protection Officers (DPO)
Job Opportunities
in Data Privacy
 Data Protection Officer (DPO)
 Counsel – Compliance & Privacy
 Security Engineer
 Security Analyst
 InfoSec Engineer
 IT Specialist (InfoSec)
 Health Records Privacy Director
 Staff Information Security Engineer
 Product Security Analyst
Maraming
Salamat po!
📬 bob@bobreyes.com
📬 bob@mozillaph.org
🐦 @bobreyes

Contenu connexe

Tendances

Poland’s A2 Motorway
Poland’s A2 MotorwayPoland’s A2 Motorway
Poland’s A2 Motorway
Ankit Agarwal
 
EY Price Point: global oil and gas market outlook
EY Price Point: global oil and gas market outlookEY Price Point: global oil and gas market outlook
EY Price Point: global oil and gas market outlook
EY
 
DaimlerChrysler: Post Merger News Case Analysis
DaimlerChrysler: Post Merger News Case AnalysisDaimlerChrysler: Post Merger News Case Analysis
DaimlerChrysler: Post Merger News Case Analysis
Karan Jaidka
 

Tendances (20)

EY Price Point: global oil and gas market outlook, Q2, April 2020
EY Price Point: global oil and gas market outlook, Q2, April 2020EY Price Point: global oil and gas market outlook, Q2, April 2020
EY Price Point: global oil and gas market outlook, Q2, April 2020
 
COVID-19 Rapid Response Crisis Checklist
COVID-19 Rapid Response Crisis ChecklistCOVID-19 Rapid Response Crisis Checklist
COVID-19 Rapid Response Crisis Checklist
 
People Express Airlines (Case Study)
People Express Airlines (Case Study)People Express Airlines (Case Study)
People Express Airlines (Case Study)
 
Bridging the Trust Gap: Data Misuse and Stewardship by the Numbers
Bridging the Trust Gap: Data Misuse and Stewardship by the NumbersBridging the Trust Gap: Data Misuse and Stewardship by the Numbers
Bridging the Trust Gap: Data Misuse and Stewardship by the Numbers
 
Poland’s A2 Motorway
Poland’s A2 MotorwayPoland’s A2 Motorway
Poland’s A2 Motorway
 
Great Leadership and Talent Pay Off
Great Leadership and Talent Pay OffGreat Leadership and Talent Pay Off
Great Leadership and Talent Pay Off
 
Chinese Internet Economy White Paper 2.0 - Decoding the Chinese Internet 2.0:...
Chinese Internet Economy White Paper 2.0 - Decoding the Chinese Internet 2.0:...Chinese Internet Economy White Paper 2.0 - Decoding the Chinese Internet 2.0:...
Chinese Internet Economy White Paper 2.0 - Decoding the Chinese Internet 2.0:...
 
New horizons in transportation: mobility, innovation, economic development an...
New horizons in transportation: mobility, innovation, economic development an...New horizons in transportation: mobility, innovation, economic development an...
New horizons in transportation: mobility, innovation, economic development an...
 
InsurTech: PwC Top Issues
InsurTech: PwC Top IssuesInsurTech: PwC Top Issues
InsurTech: PwC Top Issues
 
Addressing Homelessness in King County
Addressing Homelessness in King CountyAddressing Homelessness in King County
Addressing Homelessness in King County
 
Presentation by National University of Singapore - Winners of CBS Case Compet...
Presentation by National University of Singapore - Winners of CBS Case Compet...Presentation by National University of Singapore - Winners of CBS Case Compet...
Presentation by National University of Singapore - Winners of CBS Case Compet...
 
Retail Banking in the New Reality – Summary Survey Findings
Retail Banking in the New Reality – Summary Survey FindingsRetail Banking in the New Reality – Summary Survey Findings
Retail Banking in the New Reality – Summary Survey Findings
 
Loreal HBR case analysis- Global brand local knowledge
Loreal HBR case analysis- Global brand local knowledgeLoreal HBR case analysis- Global brand local knowledge
Loreal HBR case analysis- Global brand local knowledge
 
Accenture Consumer Behavior Research: The value shake-up
Accenture Consumer Behavior Research: The value shake-upAccenture Consumer Behavior Research: The value shake-up
Accenture Consumer Behavior Research: The value shake-up
 
EY Price Point: global oil and gas market outlook
EY Price Point: global oil and gas market outlookEY Price Point: global oil and gas market outlook
EY Price Point: global oil and gas market outlook
 
The globalization of cemex
The globalization of cemexThe globalization of cemex
The globalization of cemex
 
EY Price Point Q3 2022
EY Price Point Q3 2022EY Price Point Q3 2022
EY Price Point Q3 2022
 
What’s Chipping Away at Automotive Production
What’s Chipping Away at Automotive ProductionWhat’s Chipping Away at Automotive Production
What’s Chipping Away at Automotive Production
 
DaimlerChrysler: Post Merger News Case Analysis
DaimlerChrysler: Post Merger News Case AnalysisDaimlerChrysler: Post Merger News Case Analysis
DaimlerChrysler: Post Merger News Case Analysis
 
COVID-19 Auto & Mobility Consumer Insights
COVID-19 Auto & Mobility Consumer InsightsCOVID-19 Auto & Mobility Consumer Insights
COVID-19 Auto & Mobility Consumer Insights
 

Similaire à Challenges & Opportunities the Data Privacy Act Brings

Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 
Mitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersMitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker Dealers
Broadridge
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
sodhi3
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
 

Similaire à Challenges & Opportunities the Data Privacy Act Brings (20)

EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
Mitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersMitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker Dealers
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
 
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
Term assignment
Term assignmentTerm assignment
Term assignment
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
 

Plus de Robert 'Bob' Reyes

Plus de Robert 'Bob' Reyes (20)

Localization at Mozilla
Localization at MozillaLocalization at Mozilla
Localization at Mozilla
 
Firefox Dev Tools for WordPress Developers (WordCamp Iloilo 2019)
Firefox Dev Tools for WordPress Developers (WordCamp Iloilo 2019)Firefox Dev Tools for WordPress Developers (WordCamp Iloilo 2019)
Firefox Dev Tools for WordPress Developers (WordCamp Iloilo 2019)
 
Build (Web)VR with A-Frame (COSCUP 2019 Taipei)
Build (Web)VR with A-Frame (COSCUP 2019 Taipei)Build (Web)VR with A-Frame (COSCUP 2019 Taipei)
Build (Web)VR with A-Frame (COSCUP 2019 Taipei)
 
Rust 101 (2017 edition)
Rust 101 (2017 edition)Rust 101 (2017 edition)
Rust 101 (2017 edition)
 
Building a Rust Community from Scratch (COSCUP 2017)
Building a Rust Community from Scratch (COSCUP 2017)Building a Rust Community from Scratch (COSCUP 2017)
Building a Rust Community from Scratch (COSCUP 2017)
 
Mozilla + Rust at PCU Manila 02 DEC 2016
Mozilla + Rust at PCU Manila 02 DEC 2016Mozilla + Rust at PCU Manila 02 DEC 2016
Mozilla + Rust at PCU Manila 02 DEC 2016
 
MozillaPH Localization in 2016
MozillaPH Localization in 2016MozillaPH Localization in 2016
MozillaPH Localization in 2016
 
Mozilla & Connected Devices
Mozilla & Connected DevicesMozilla & Connected Devices
Mozilla & Connected Devices
 
HTML 5 - The Future is Now
HTML 5 - The Future is NowHTML 5 - The Future is Now
HTML 5 - The Future is Now
 
MozillaPH Rust Hack & Learn Session 2
MozillaPH Rust Hack & Learn Session 2MozillaPH Rust Hack & Learn Session 2
MozillaPH Rust Hack & Learn Session 2
 
MozillaPH Rust Hack & Learn Session 1
MozillaPH Rust Hack & Learn Session 1MozillaPH Rust Hack & Learn Session 1
MozillaPH Rust Hack & Learn Session 1
 
Introduction to Rust Programming Language
Introduction to Rust Programming LanguageIntroduction to Rust Programming Language
Introduction to Rust Programming Language
 
MozillaPH Rust Users Group Kick Off Meeting
MozillaPH Rust Users Group Kick Off MeetingMozillaPH Rust Users Group Kick Off Meeting
MozillaPH Rust Users Group Kick Off Meeting
 
Getting started on MDN (Mozilla Developer Network)
Getting started on MDN (Mozilla Developer Network)Getting started on MDN (Mozilla Developer Network)
Getting started on MDN (Mozilla Developer Network)
 
Connected Devices, MozVR & Firefox Developer Tools
Connected Devices, MozVR & Firefox Developer ToolsConnected Devices, MozVR & Firefox Developer Tools
Connected Devices, MozVR & Firefox Developer Tools
 
Mozilla & the Open Web
Mozilla & the Open WebMozilla & the Open Web
Mozilla & the Open Web
 
Firefox OS
Firefox OSFirefox OS
Firefox OS
 
MozTour University of Perpetual Help System - Laguna (Binan)
MozTour University of Perpetual Help System - Laguna (Binan)MozTour University of Perpetual Help System - Laguna (Binan)
MozTour University of Perpetual Help System - Laguna (Binan)
 
Firefox 101 (FSA Camp Philippines 2015)
Firefox 101 (FSA Camp Philippines 2015)Firefox 101 (FSA Camp Philippines 2015)
Firefox 101 (FSA Camp Philippines 2015)
 
FOSSASIA 2015: Building an Open Source Community
FOSSASIA 2015: Building an Open Source CommunityFOSSASIA 2015: Building an Open Source Community
FOSSASIA 2015: Building an Open Source Community
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 

Challenges & Opportunities the Data Privacy Act Brings

  • 1. Challenges & Opportunities the Data Privacy Act Brings Robert “Bob” Reyes www.bobreyes.com bob@bobreyes.com @bobreyes
  • 2. About Me  GM & CTO of TurfSite Web Services.  Mozilla Representative to the PHL.  Tech News Columnist at the Manila Bulletin.  Hobby Blogger, Photographer.  Dad of Xeon & Haswell.
  • 3.
  • 4. Being an Open Source Dev
  • 6. History of Mozilla On 23 Feb 1998, Netscape Communications Corp. created a project called Mozilla (Mosaic + Godzilla). Mozilla was launched 31 Mar 1998.
  • 7. Mozilla’s Mission To ensure the Internet is a global public resource, open & accessible to all.
  • 9. Data Privacy Principles The following five principles stem from the Mozilla Manifesto & inform how we:  Develop our products & services  Manage user data we collect  Select & interact with partners  Shape our public policy & advocacy work
  • 10. Data Privacy Principles 1. No Surprises  Use & share information in a way that is transparent & benefits the user. 2. User Control  Develop products & advocate for best practices that put users in control of their data & online experiences. 3. Limited Data  Collect what we need, de-identify where we can & delete when no longer necessary. 4. Sensible Settings  Design for a thoughtful balance of safety & user experience. 5. Defense in Depth  Maintain multi-layered security controls & practices, many of which are publicly verifiable.
  • 11. Get Smart on the Web
  • 16. Tracking & Privacy  Not all tracking is bad.  Many services rely on user data to provide relevant content & enhance your online experience.  But tracking can happen without the user’s knowledge.  That’s not okay for some.  It should be you who decides when, how & if you want your browsing data to be shared.  We recognize the importance of transparency & our mission is all about empowering users — both with tools & information.
  • 20. Challenges in Data Privacy It is essential for IT & business leaders to understand the full risk potential of data privacy threats & how to address these issues: 1. Data Privacy is more than compliance. 2. A strategic investment, not a cost. 3. Build it, deploy it, test it, modernize it. 4. Technology usage trends increase vulnerabilities.
  • 21. Challenge 1: Data Privacy is more than compliance.
  • 22. Challenge 1: More Than Compliance  Compliance is a critical factor driving interest in, & adoption of, data privacy solutions.  Building data privacy defenses simply to pass an annual audit by a regulatory body is just the beginning when it comes to protecting data privacy.  Data privacy must be ensured every day, because privacy threats are fluid & ever evolving.  The incidence of zero-day attacks (security breaches for which IT professionals had no time to prepare a prior defense) for Internet Explorer doubled in 2014 from the year prior.
  • 23. Challenge 1: More Than Compliance  There’s also the impact of highly-negative publicity & loss of consumer confidence of privacy breaches that may occur without notice.  A recent study indicated that 226 million personal records about Europeans have been compromised in the past decade.  In addition, a number of data privacy breaches aren’t covered under compliance statutes, such as theft of intellectual property including new product diagrams, competitive analysis documents & marketing campaigns.
  • 24. Solution 1: Data Privacy is more than compliance.
  • 25. Solution 1: More Than Compliance  Data privacy must be protected on a continuous, ongoing basis, far beyond the requirements of simply passing external or internal compliance audits.  Protecting data privacy must be part of a comprehensive corporate strategy that embraces the three P’s of Privacy:  People  Products  Processes
  • 26. Solution 1: More Than Compliance  Not only do organizations need to ensure that data privacy reports to a senior corporate executive, but the organization must take steps to ensure that all employees & virtual staff (partners, contractors, etc.) use smart privacy protection techniques.  Organizations must be committed to investing in solutions that help ensure data privacy beyond the basics, including malware detection & identity management.  Privacy should be embedded into all business processes, from onboarding new employees to sharing data over unsecured networks.
  • 28. Challenge 2: Strategic Investment, Not a Cost  Measuring the economic impact of a breach goes far beyond regulatory penalties or the cost of securing defenses.  What is the cost of negative headlines about Social Security numbers, user IDs, passwords, & other identities being hacked?  It’s important to recognize the financial risk of not pursuing… data protection processes. The status quo isn’t free. Ignoring those measures will incur a cost.  You must understand the potential catastrophic impact of competitors gaining access to proprietary information such as customer lists, specially negotiated discount pricing, & product launch timelines.
  • 30. Solution 2: Strategic Investment, Not a Cost  Organizations need to make well-thought-out investments in technologies to ensure that data defenses are as resilient as possible & that data can be recovered, restored, retained, & reclaimed as circumstances require.  Key technologies that should be a part of any organization’s data privacy defense include snapshotting, high availability infrastructure, backup & archiving.
  • 31. Challenge 3: Build it, Deploy it, Test it, Modernize it
  • 32. Challenge 3: Build it, Deploy it, Test it, Modernize it  Most companies have some sort of data privacy plan, but it’s usually a component in a broader disaster recovery or business continuity strategy.  It may be a dedicated chapter or a few isolated passages in that plan document.  It needs to be embedded in all aspects of business continuity in real-world practice.  Sadly, business continuity plan documents often act as shelfware that is rarely tested & updated to reflect changes in business conditions.
  • 33. Solution 3: Build it, Deploy it, Test it, Modernize it
  • 34. Solution 3: Build it, Deploy it, Test it, Modernize it  Organizations need a dynamic planning, testing, & deployment strategy for data privacy  One that is developed & supported by senior executives & business stakeholders, not just the IT department or even a chief information security officer.  While internal IT staff & business leaders have the advantage of understanding the ins & outs of how data is captured, stored, & used within their organization, it’s not unusual for internal staff to become insulated to both external threats & to new ideas on how to ensure higher levels of data privacy.
  • 35. Challenge 4: Technology Usage Trends Increase Vulnerabilities
  • 36. Challenge 4: Technology Usage Trends Increase Vulnerabilities  Industry trends such as Bring Your Own Device (BYOD), the impact of social media, increased adoption of affordable cloud computing services, & widespread use of sync-and- store services for data storage have raised new & potentially damaging data privacy vulnerabilities.  Many of the latest identity thefts & cyber attacks have occurred as a result of delivering malware as advertising through tablets & smartphones.  “Consumerization of IT” increases employee productivity, but many of those end-user devices operate without sufficient IT oversight & security frameworks.
  • 37. Solution 4: Technology Usage Trends Increase Vulnerabilities
  • 38. Solution 4: Technology Usage Trends Increase Vulnerabilities  IT departments & business stakeholders shouldn’t necessarily restrict usage of consumer devices, applications, & services, but should develop smart policies that reflect both their benefits to employees & their threats to data privacy.  Make employees aware of best practices to ensure data privacy, & to do continuous vulnerability testing to surface unexpected problems.  Organizations to take pains to ensure all relevant parties understand that new uses of technology often increase data privacy risks & must be accounted for.
  • 40. Opportunities in Data Privacy  DATA is the new BLACK GOLD.  Technology innovation & the power of data analytics present tremendous value.  New job opportunities related to Data Privacy compliance.  2016-2017  Data Scientists  2017-2018  Data Protection Officers (DPO)
  • 41. Job Opportunities in Data Privacy  Data Protection Officer (DPO)  Counsel – Compliance & Privacy  Security Engineer  Security Analyst  InfoSec Engineer  IT Specialist (InfoSec)  Health Records Privacy Director  Staff Information Security Engineer  Product Security Analyst
  • 42. Maraming Salamat po! 📬 bob@bobreyes.com 📬 bob@mozillaph.org 🐦 @bobreyes

Notes de l'éditeur

  1. 1
  2. Hackers and governments using the web browser as vectors to steal data from users. Huge numbers of these (exploits) released every year. Mozilla addressed this issue by creating a new programming language.
  3. 8
  4. 12
  5. 15
  6. http://www.ironmountain.com/Knowledge-Center/Reference-Library/View-by-Document-Type/Solution-Briefs/D/Data-Privacy-Day.aspx
  7. 19
  8. http://www.ironmountain.com/Knowledge-Center/Reference-Library/View-by-Document-Type/Solution-Briefs/D/Data-Privacy-Day.aspx
  9. 21
  10. 24
  11. 27
  12. 29
  13. 31
  14. 33
  15. 35
  16. 37
  17. 39
  18. 42