SlideShare une entreprise Scribd logo
1  sur  25
GDPR
Common sense and technology solutions
21th june 2017
Jan Guldentops ( j@ba.be )
Accidental security expert

Jan Guldentops (°1973)

Founder of Better Access (°1996) en BA (°2003)

Open Source Fundamentalist (after hours)

Practical background in ICT and security

Security expert by accident
• Documented the security problems of the first Belgian
internet bank in 1996, have been doing security ever
since
• R&D (vooral security)
– Basta, Febelfin, Safeshops, etc.
What we really do:
COMMON SENSE
AS A SERVICE
(CAAS)
Nil Nove sub sole...
Why GDPR ?
● Enormous
databreaches
● E.g. NMBS
● Personal data of
700.000
● “et alors?”
● No consequences
GDPR – the new Y2K?
Magic solutions
Nothing new for the industry
● For the industry it is nothing new
● BS(1)7799, ISO27k family
●
Based on existing privacy law
● Based on existing best practices
● e.g. Cobit
● Problems / Challenges are the same
● The paradigm hasn’t shifted
● New :
● Big Stick
– 4% / 20.000.000
● DPO (but you often
should have a security
officer )
● Right to be forgotten
● Notification obligation
(72h!)
Common sense
● Common sense is
often so rare, you can
start to consider it a
superpower
● Understanding and
thinking about the
requirements solves a
lot of problems.
● Think !
Realism
● There is no such thing as
absolute security
● Plan for the worst !
● You will have a security
/privacy breach sooner or
later!
● So act like it !
● Educate your management
● Make contingency plans
● Nobody is infalliable ! ( except
the pope )
No paper tigers !
The human factor
Don’t store personal data if
you don’t need it
Other Common Sense
elements
● Outsourcing / insourcing
● Security / privacy by design
● No bolt-on security
● Think before you develop / implement
● Conflict with the current development thinking
Technology is your
friend
Encryption = magic bullet ?
● “The communication of a personal data breach to the
data subject shall not be required if the controller
demonstrates to the satisfaction of the supervisory
authority that it has implemented appropriate
technological protection measures, and that those
measures were applied to the data concerned by the
personal data breach. Such technological protection
measures should render the data unintelligible to any
person who is not authorised to access it.”
● Magic bullet ? Get out-of-jail-for-free card ?
Encryption can help
● Encrypt everything ?
● Devices
● Communication
● Datastores
● Servers
● Data in rest
● (Parts of) databases
● Helps with difficult tasks like
● Right to be forgotten
BUT!
● There is only one thing worse than not using encryption ->
using bad encryption
● Choose the right software and algoritmes
● Manage your keys !
– Almost nobody has structured key management infrastructure
– You have to be able to delete, revoke keys
– No keys = no data
● Encryption is not only about confidentiality but also
integrity
● If you implement encryption don’t only use it for confidentiality
also for integrity.
Authentication and Access
Control
● We are still using passwords !
● Need strong authentication ! ( 2factor)
● We need a centralised authentication system
● One directory for all
● Now often multiple authentication systems
● Role and policy based management of
access to data
● à la tête du client
Tracebility
● You want to know what happened so you need to log what
happens on your systems / with your data.
● Log what you need to know
● E.g. administrative access, access to files, access to applications, etc.
● Make it irrefutable
● Create tools for analysing these tools
● SIEM
● Advanced tools : track everything your employee does.
Buy the right tools
● Companies offering your software to manage :
● ISMS
● GDPR
● Inventories
● Etc.
● Excell or documents
● The tools you use for other things
Automate
● We need 250.000 security
experts in the coming 5 years.
● No we need to automate things
● In systemmanagement :
– Puppet, Ansible, System center, etc.
●
Choose your poison
– Automated, managed updates
● e.g. #wannacry
● In development
– Devops
– Automated testing
● In audit
● Etc.
Audit
● Traditional audits are extremely expensive, take
time and will usually only be held every 3 to 5
years.
● Audit yourself :
● Vulnerability assessment tools ( Nessus, qualsys )
● Do an access audit
● Or using open source : KALI
– A large stack of online tools
Thank You
Contact us
016/29.80.45
016/29.80.46
www.ba.be / Twitter: batweets
Remy Toren
Vaartdijk 3/501
B-3018 Wijgmaal
info@ba.be
Twitter: JanGuldentops
http://be.linkedin.com/in/janguldentops/

Contenu connexe

Plus de B.A.

Plus de B.A. (20)

GDPR Revealed: EU privacy wetgeving in het juiste perspectief
GDPR Revealed: EU privacy wetgeving in het juiste perspectiefGDPR Revealed: EU privacy wetgeving in het juiste perspectief
GDPR Revealed: EU privacy wetgeving in het juiste perspectief
 
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginners
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginnersBelgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginners
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginners
 
Van brandweerman tot brandpreventieadviseur
Van brandweerman tot brandpreventieadviseurVan brandweerman tot brandpreventieadviseur
Van brandweerman tot brandpreventieadviseur
 
Business Continuity & Disaster Recovery introductie
Business Continuity & Disaster Recovery introductieBusiness Continuity & Disaster Recovery introductie
Business Continuity & Disaster Recovery introductie
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learned
 
Presentatie Proactieve Monitoring ( BA Monitoring )
Presentatie Proactieve Monitoring ( BA Monitoring )Presentatie Proactieve Monitoring ( BA Monitoring )
Presentatie Proactieve Monitoring ( BA Monitoring )
 
Storage: trends, oplossingen, caveats
Storage: trends, oplossingen, caveatsStorage: trends, oplossingen, caveats
Storage: trends, oplossingen, caveats
 
De verschillende beveiligingsrisico’s van mobiele toepassingen en Devices
De verschillende beveiligingsrisico’s van mobiele toepassingen en DevicesDe verschillende beveiligingsrisico’s van mobiele toepassingen en Devices
De verschillende beveiligingsrisico’s van mobiele toepassingen en Devices
 
Random thoughts on security
Random thoughts on securityRandom thoughts on security
Random thoughts on security
 
Safeshops ? Nadenken over veiligheidsaspecten van E-shops/Commerce
Safeshops ?  Nadenken over veiligheidsaspecten van E-shops/CommerceSafeshops ?  Nadenken over veiligheidsaspecten van E-shops/Commerce
Safeshops ? Nadenken over veiligheidsaspecten van E-shops/Commerce
 
Proactive monitoring tools or services - Open Source
Proactive monitoring tools or services - Open Source Proactive monitoring tools or services - Open Source
Proactive monitoring tools or services - Open Source
 
Zarafa Tour 2014: "Where Zarafa can make a difference"
Zarafa Tour 2014: "Where Zarafa can make a difference"Zarafa Tour 2014: "Where Zarafa can make a difference"
Zarafa Tour 2014: "Where Zarafa can make a difference"
 
INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...
INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...
INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...
 
Veiliger door gezond verstand - Presentatie Safe@schools 27 mei 2014
Veiliger door gezond verstand - Presentatie Safe@schools 27 mei 2014Veiliger door gezond verstand - Presentatie Safe@schools 27 mei 2014
Veiliger door gezond verstand - Presentatie Safe@schools 27 mei 2014
 
ICT & Gezond verstand
ICT & Gezond verstandICT & Gezond verstand
ICT & Gezond verstand
 
Social media security
Social media securitySocial media security
Social media security
 
Het begint allemaal bij gezond verstand
Het begint allemaal bij gezond verstandHet begint allemaal bij gezond verstand
Het begint allemaal bij gezond verstand
 
BA Netapp Event - Always there IT Infrastructuur
BA Netapp Event - Always there IT InfrastructuurBA Netapp Event - Always there IT Infrastructuur
BA Netapp Event - Always there IT Infrastructuur
 
Quickintro2webapps
Quickintro2webappsQuickintro2webapps
Quickintro2webapps
 
Cloud: Frisse lucht of gebakken lucht ?
Cloud: Frisse lucht of gebakken lucht ?Cloud: Frisse lucht of gebakken lucht ?
Cloud: Frisse lucht of gebakken lucht ?
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Common sense and technical solutions applied to GDPR

  • 1. GDPR Common sense and technology solutions 21th june 2017 Jan Guldentops ( j@ba.be )
  • 2. Accidental security expert  Jan Guldentops (°1973)  Founder of Better Access (°1996) en BA (°2003)  Open Source Fundamentalist (after hours)  Practical background in ICT and security  Security expert by accident • Documented the security problems of the first Belgian internet bank in 1996, have been doing security ever since • R&D (vooral security) – Basta, Febelfin, Safeshops, etc.
  • 3.
  • 4. What we really do: COMMON SENSE AS A SERVICE (CAAS)
  • 5. Nil Nove sub sole...
  • 6. Why GDPR ? ● Enormous databreaches ● E.g. NMBS ● Personal data of 700.000 ● “et alors?” ● No consequences
  • 7. GDPR – the new Y2K?
  • 9. Nothing new for the industry ● For the industry it is nothing new ● BS(1)7799, ISO27k family ● Based on existing privacy law ● Based on existing best practices ● e.g. Cobit ● Problems / Challenges are the same ● The paradigm hasn’t shifted ● New : ● Big Stick – 4% / 20.000.000 ● DPO (but you often should have a security officer ) ● Right to be forgotten ● Notification obligation (72h!)
  • 10. Common sense ● Common sense is often so rare, you can start to consider it a superpower ● Understanding and thinking about the requirements solves a lot of problems. ● Think !
  • 11. Realism ● There is no such thing as absolute security ● Plan for the worst ! ● You will have a security /privacy breach sooner or later! ● So act like it ! ● Educate your management ● Make contingency plans ● Nobody is infalliable ! ( except the pope )
  • 14. Don’t store personal data if you don’t need it
  • 15. Other Common Sense elements ● Outsourcing / insourcing ● Security / privacy by design ● No bolt-on security ● Think before you develop / implement ● Conflict with the current development thinking
  • 17. Encryption = magic bullet ? ● “The communication of a personal data breach to the data subject shall not be required if the controller demonstrates to the satisfaction of the supervisory authority that it has implemented appropriate technological protection measures, and that those measures were applied to the data concerned by the personal data breach. Such technological protection measures should render the data unintelligible to any person who is not authorised to access it.” ● Magic bullet ? Get out-of-jail-for-free card ?
  • 18. Encryption can help ● Encrypt everything ? ● Devices ● Communication ● Datastores ● Servers ● Data in rest ● (Parts of) databases ● Helps with difficult tasks like ● Right to be forgotten
  • 19. BUT! ● There is only one thing worse than not using encryption -> using bad encryption ● Choose the right software and algoritmes ● Manage your keys ! – Almost nobody has structured key management infrastructure – You have to be able to delete, revoke keys – No keys = no data ● Encryption is not only about confidentiality but also integrity ● If you implement encryption don’t only use it for confidentiality also for integrity.
  • 20. Authentication and Access Control ● We are still using passwords ! ● Need strong authentication ! ( 2factor) ● We need a centralised authentication system ● One directory for all ● Now often multiple authentication systems ● Role and policy based management of access to data ● à la tête du client
  • 21. Tracebility ● You want to know what happened so you need to log what happens on your systems / with your data. ● Log what you need to know ● E.g. administrative access, access to files, access to applications, etc. ● Make it irrefutable ● Create tools for analysing these tools ● SIEM ● Advanced tools : track everything your employee does.
  • 22. Buy the right tools ● Companies offering your software to manage : ● ISMS ● GDPR ● Inventories ● Etc. ● Excell or documents ● The tools you use for other things
  • 23. Automate ● We need 250.000 security experts in the coming 5 years. ● No we need to automate things ● In systemmanagement : – Puppet, Ansible, System center, etc. ● Choose your poison – Automated, managed updates ● e.g. #wannacry ● In development – Devops – Automated testing ● In audit ● Etc.
  • 24. Audit ● Traditional audits are extremely expensive, take time and will usually only be held every 3 to 5 years. ● Audit yourself : ● Vulnerability assessment tools ( Nessus, qualsys ) ● Do an access audit ● Or using open source : KALI – A large stack of online tools
  • 25. Thank You Contact us 016/29.80.45 016/29.80.46 www.ba.be / Twitter: batweets Remy Toren Vaartdijk 3/501 B-3018 Wijgmaal info@ba.be Twitter: JanGuldentops http://be.linkedin.com/in/janguldentops/

Notes de l'éditeur

  1. Belangrijk om te onthouden : 2 manieren waarop wij werken met lokale besturen : Leveren van volledige oplossingen Leveren van huurlingen : consultants die tijdelijk de kennis van de ict-manager aanvullen Leveren van technische ondersteuning en troubleshooting Leveren oplossingen aan lokale besturen sinds 1996