SlideShare a Scribd company logo
1 of 46
Client name
ELCA for
Date
Data Governance Event –
6th February 2018 – Geneva - Warwick Hôtel
Keep your data safe and be compliant via a 360° approach
Nagib Aouini – Head of Cyber Security / Blockchain
Agenda
― Why data breaches will continue to occur
― What is Data Governance
― How to comply with regulations with an effective data governance
program
― 360° Data Security Approach
― Q&A
5
6
1
2
3
4
1
Data breaches stories
©copyright 2017
–Texte
Story #1
Bad identity management practices
Event Data Governance - Feb 6th - Geneva 4
©copyright 2017
–Texte
Event Data Governance - Feb 6th - Geneva 5
©copyright 2017
–Texte
Event Data Governance - Feb 6th - Geneva 6
https://baffle.io/the-threat/equifax-breach/
Story #1
Failed to implement a WAF
and vulnerability mgt
©copyright 2017
–Texte
Event Data Governance - Feb 6th - Geneva 7
©copyright 2017
How those breaches can happen
Source http://blog.wallix.com/uber-hack-pam
• The data of 57 million users has been stolen from Uber.
• Malicious intruders managed to gain access to a GitHub private coding site used by some Uber software
engineers, find AWS credentials, and use them to steal private data.
Story #2
Failed to implement
Two-Factor and Privileged ID Mgt
Event Data Governance - Feb 6th - Geneva 8
©copyright 2017
–Texte
Event Data Governance - Feb 6th - Geneva 9
©copyright 2017
–Texte
Event Data Governance - Feb 6th - Geneva 10
Story #3
Ransomware attack
©copyright 2017
–Texte
Threats to Healthcare IT systems
Event Data Governance - Feb 6th - Geneva11
– Data stolen from a bank quickly becomes
useless once the breach is discovered and
passcodes are changed
– Data from the healthcare industry, which
includes both personal identities and medical
histories, can live a lifetime
– Healthcare IT and apps use are secured only
with simple username / password with no
password policy enforced
– Managing access control and putting strong
security controls is challenging in healthcare
environment because of “Need to work”
principle (emergency access, doctors needs
access to HER …)
This data can be used to launch
Spear phising scams, Identity theft, social engineering
frauds ---
©copyright 2017
–Texte
Use case study : Protecting a medical information system and electronic health record
Event Data Governance - Feb 6th - Geneva
Problem: privacy and control of data shall be
ensured and data center hosted outside Switzerland
is a serious risk for such information, but also
unauthorized access (because of leaked credential).
?
Challenge: Development of a medical portal accross
Switzerland allowing hospitals, doctors and patients
to access medical information hosted on a CRM or
Web app portal (even fat client via Citrix). This portal
contains patient data that is protected by Swiss law
12
Login credentials are lost or stolen, resulting
in unauthorized access to patient record.
Malicious hackers can target physicians via
spear-phishing attack to get credentials.
©copyright 2017
Mentality must evolved
Event Data Governance - Feb 6th - Geneva 13
3
What is Data Governance
Event Data Governance - Feb 6th - Geneva14
©copyright 2017
–Texte
Data Management Program Drivers
Event Data Governance - Feb 6th - Geneva 15
 Need to share and integrate data with external partners
 Alignment with Business Strategy supporting innovation
 Allow the business to identify opportunities being more agile
 Need to cope with different kinds of business built over time with specific priorities and
different subsidiaries
 Rather independent departments/subsidiaries with own processes
 Part of the tools not shared or used differently
 Tools continuously changing
 Control the risk
 Responsibility of the company towards shareholders, customers an authorities (*)
 Information lifecycle must be very well controlled
 The company must be able to provide consistent and reliable information
*: Example: General Data Protection Regulation (Regulation (EU) 2016/679), FINMA Circular 2008/21 “Operational Risks – Banks“,
EU Regulation 73-2010 Aeronautical Data and Information Quality, Solvency II Directive 2009/138/EC ,
©copyright 2017
–Texte
Data Governance
Event Data Governance - Feb 6th - Geneva 16
Data Governance: decision making and oversight process that prioritizes investments, allocates
resources and measures results to insure that data being managed is leveraged to support
business needs
■ Goals:
1. Enable an organisation to manage its data as an asset
2. To sponsor, track, and oversee the delivery of data management projects and services
3. Define, approve, communicate and implement principles, policies, procedures,
metrics, tools, and responsibilities for data management
4. To manage and resolve data related issues
 Data Governance is more than Data Quality, Policies, Standards.
It is about aligning Data Management with Corporate Needs and Strategy, to
optimize its results and to control risks
©copyright 2017
–Texte
DMBOK Data Management Framework
Event Data Governance - Feb 6th - Geneva 17
• A framework for understanding comprehensively
and see relationships between Data Management
components
• The 11 functions (knowledge areas) depend on
one another and need to be aligned
• Ideas and concepts will be applied differently
based on organization industry, culture, maturity
level, strategy, vision and challenges it is facing
3
How to comply with regulations
Event Data Governance - Feb 6th - Geneva18
©copyright 2017
–Texte
Applicable regulations : GDPR
Event Data Governance - Feb 6th - Geneva 19
Replaces and extends European Directive 95/46/EC from
May 25th 2018
Applies to controllers or processors established in the Union
Applies to controllers or processors not established in the Union
where the processing activities relate to the offering of goods or
services to data subjects in the Union; or the monitoring of their
behaviour as far as their behaviour takes place within the Union.
©copyright 2017
–Texte
GDPR roles and entity
20Event Data Governance - Feb 6th - Geneva
©copyright 2017
–Texte
Applicable regulations Swiss Federal Data Protection Act
Event Data Governance - Feb 6th - Geneva 21
The revised DPA is announced for the end of 2018
Needs to be harmonised with EU standards. The Federal
Council has adopted a DPA revision process in Sept.
2017 and released a draft version of the future DPA
Apply to controllers and processors established in
Switzerland
©copyright 2017
–Texte
Data privacy framework by ELCA
Event Data Governance - Feb 6th - Geneva 22
Governance
Operational processes
Legal & compliance
Data privacy policies Data privacy roles &
responsibilities
Data privacy training
& awareness
External criteria
tracking
Inventory of personal
data & data transfers
Respect of the data
subjects’ rights
Data breach
management
Protection of
Personal data
Monitoring of new
operational practices
Data privacy notices Contractual clausesData Privacy Risk
Assessments
Data privacy by
design and by default
Data privacy audits
©copyright 2017
–Texte
FINMA controls
Event Data Governance - Feb 6th - Geneva 23
#1 Governance
#1 Client Identifying data
CID
#3 Location & Access to
Data
#4 Security standards for
IT & Tech
#5 Selection, monitoring
and training of employee
with access to CID
#5 Identifying and
controlling risks related to
the confidentiality of CID
#7 Confidentiality of CID :
risk mitigation
#8 Incidenty related to
the confidentiality of CID,
internal /external comm
#9 Outsourcing providers
and large projects in
regard to CID
Client Identification
Data (CID)
Event Data Governance - Feb 6th - Geneva24
Direct CID Indirect CID
CID
©copyright 2017
Sharepoint compliant platform with SIQ
Sharepoint Farm
Sharepoint user
SSOAccess management
SecurityIQ
SailPointIIQ
Exchange AD
Admin
Client
Business
Interface
Report
And Audit
Indexing
Services
General UI
Supervisor
SIQ
admin
Auditor
User
SailPointRESTAPI
Event
Handler
SQL SecurityIQ
Cluster
Indexing
Server
SecurityIQ
Agent : Permission + Data
classification + Activity Monitor
SailPoint IQ Service
SharePoint
SailPoint IQ Service
SharePoint
Event Data Governance - Feb 6th - Geneva 25
©copyright 2017
How manage CID data in a Sharepoint and being compliant
#5 Identifying and
controlling risks related to
the confidentiality of CID
#1 Client Identifying data
CID
Need to know principle
CID Discovery and tagging
#3 Location & Access to
Data
Who access what ?
Event Data Governance - Feb 6th - Geneva 26
©copyright 2017
–Texte
What is a CASB ?
Event Data Governance - Feb 6th - Geneva 27
…
Visibility
who is using which app and
which data is stored where
Data Loss Prevention
handle information according
to its specificities (ciphering,
tokenization)
Threat protection
detects malware stored in the
cloud and suspect behaviours
Compliance
ensure compliance with specific
industry regulations
©copyright 2017
How CASB could help for GDPR/FINMA compliance
Event Data Governance - Feb 6th - Geneva 28
Identifying personal data
Controlling the flow of personal data
Maintaining data residency and sovereignty
Monitor Risky Activity
Identify Shadow IT
#4 Security standards for
IT & Tech
Two-factor + Encryption
#7 Confidentiality of CID :
risk mitigation
Encryption + Tokenization
#8 Incidenty related to the
confidentiality of CID,
internal /external comm
Shadow IT + Policy violation
©copyright 2017
Example : Protect patient data in CRM Online
Event Data Governance - Feb 6th - Geneva 29
1 - Physicians save a
new contact
2 – CASB intercept the request
and encrypt field before
leaving the enteprise network
3 – Contact is
encrypted and stored
in CRM online. But
user can still see it in
clear
Cloud ProviderHealthcare
ZRITOI POIUYRW
uiiwoow@Hotmail.com
290900202
290909020
289898992
ZRITOI POIUYRW
Home Maker
Noiowp Poowioiw
OUIOIOp Poisowoow
Switzerland
BORIS GUNTERBERG
BORIS GUNTERBERG
DIANE GUNTERBERG
KLAUS GUNTERBERG
SWITZERLAND
“ZRITOI”
“POIUYRW”
“Female”
“Wiioiopp Ppwoioiosyoo”
“3”
“990909-9090-0020”
Hardware
Security M
odule
2a – Encryption Key stays under your sole control and
managed in Switzerland
©copyright 2017
–Texte
SAML / RADIUS
Perimeter Web Application Firewall LDAP / DB / Active Directory
Proxy request
ELCARD / CloudTRUST
appliance
Protecting Healthcare IT systems with ELCARD / CloudTrust
Event Data Governance - Feb 6th - Geneva
SAML 2 SSO / Trust
30
#4 Security standards for
IT & Tech
Two-factor + Encryption
2
360° Data Security Approach
―Identify sensitive, valuable or regulated
data (CID). Provide a mean to
authenticate user based on claims.
―Segregate data to avoid spills
―Authorize access based on data
classification and user or device via
claims
―Protect critical data automatically with
right management and powerful access
control model (like ABAC)
―Audit data activity for full visibility
32
Identify
Segregate
Authorize
Protect
Audit
360° approach
©copyright 2017
–Texte
Discover your sensitive Data
Event Data Governance - Feb 6th - Geneva 33
©copyright 2017
–Texte
Data classification
34
©copyright 2017
–Texte
Onion approach for data security
Protect Data
Detect Data Breach
Track Data Usage
Discover Data
Sensitive
Data
Block data access / encrypt /
mask data
Detect data breach or
accidental data breach/use
Track data export / move of
sensitive data
Discover / classify your
sensitive data
35
©copyright 2017
Data lifecycle and cloud challenge
Event Data Governance - Feb 6th - Geneva
• Generation : trust data ?
• Collection : Which data ?
• Storage : where ?
• Usage : who use it ?
• Sharing : Is it allowed
• Archive : How long ?
• Removal : Definitive ?
36
©copyright 2017
Where is my data ?
Event Data Governance - Feb 6th - Geneva 37
Not stored here
©copyright 2017
–Texte
Always Protected
38
Data
in
Use
Data in
Motion
Data
at
Rest
Source : Microsoft
 Database Encryption
 Credential Encryption
 HSM Key Vaulting
 Anonymization / Tokenization /
Obfuscation
 Network / Server control
 Physical Media Control
 Archive / Destruction
• Privileged Access Management
• Privileged Account
Monitoring
• Workstation Hardening
• Application Access Control
• Data
classification/labelling/tagging
• Removal/media control
• Export control
• Perimeter Security – WAF
• Network traffic
monitoring/blocking L3-L 7 – WAF
• Web application Firewall – L7
• Data collection and classification
• Remote Access
©copyright 2017
–Texte
Classification with SailPoint SecurityIQ
39
©copyright 2017
–Texte
Example with Azure SQL Data classification
40
©copyright 2017
–Texte
Protect your sensitive Data
Event Data Governance - Feb 6th - Geneva 41
©copyright 2017
–Texte
Securing data is challenging
Event Data Governance - Feb 6th - Geneva 42
Business
Partners
Outsourcers
Layer 1: The Back Office
Layer 2:The Front Office
Layer 3: External Extended Enterprise
PDA’s
Mobile Media
Data
Processors
Desktops Laptops
On site
Contractors
Independent
Agents
3rd Party
Analytics
Log Files
Teleworkers
HR/Employee
Reports and
Extracts
3rd Party
Services
Outsourced
Backup
On site
Auditors
FTP
SAN/Shares
CustomersEmail
Portals
Files
Office
Data
Databases
CRM
Billing
Business
Systems
Trading
MortgageWarehouse
Treasury
Applications
Backup
DR
&
Test
©copyright 2017
–Texte
Tokenization
Event Data Governance - Feb 6th - Geneva 43
Tokenization
TokenOriginal Data
Personally identifiable
information
Token Management Data Token
Mr ID | IV | Timestamp | Index
etc
Xe
John Doe ID | IV | Timestamp | Index
etc
JPOwui Oisiypz
01/02/78 ID | IV | Timestamp | Index
etc
24/02/99
 Tokenization Replace live data after capture, after a database lookup
 Encryption still needed for initial data capture & to live data in “Vault”
 Encryption and Tokenization can be used together
 Performance of Token Lookup needs to be considered
Mr John Doe
01/02/78
Xe JPOwui Oisiypz
24/02/99
©copyright 2017
–Texte
Audit access to your sensitive Data
Event Data Governance - Feb 6th - Geneva 44
©copyright 2017
–Texte
All consolidated Logs
Event Data Governance - Feb 6th - Geneva 45
Source : Microsoft
Detect Security Breaches by identiying anormal
user behavior and usage patterns.
Collect near-real time user and devices information
by applying geo-patterns
Present dashboard with Risk and alert with policy
violation to enable pattern detection
©copyright 2017
–Texte
Don’t ask your CISO to protect against
data breach but rather ask him to
prepare to react to a data breach46

More Related Content

What's hot

Cisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & BlockchainCisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & BlockchainMatteo Masi
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewPeter Waher
 
Block Chain Record Management
Block Chain Record ManagementBlock Chain Record Management
Block Chain Record ManagementCharles Moore
 
Protective Monitoring
Protective MonitoringProtective Monitoring
Protective Monitoringjohandev
 
Data Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer DataData Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer DataTrustArc
 
Future Blockchain Applications and Solutions
Future Blockchain Applications and SolutionsFuture Blockchain Applications and Solutions
Future Blockchain Applications and SolutionsScala Blockchain
 
Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99Peter Waher
 
Privacy for IoT with XMPP
Privacy for IoT with XMPPPrivacy for IoT with XMPP
Privacy for IoT with XMPPPeter Waher
 
Digital Asset Management Ltd - Madrid Presentation - Club Financiero
Digital Asset Management Ltd - Madrid Presentation - Club FinancieroDigital Asset Management Ltd - Madrid Presentation - Club Financiero
Digital Asset Management Ltd - Madrid Presentation - Club FinancieroPhilip Vasquez
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - GemaltoHarry Gunns
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchainUlf Mattsson
 
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJSSupply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJSStylight
 
CSPA Keynote: BLOCKCHAIN for Enterprise
CSPA Keynote: BLOCKCHAIN for EnterpriseCSPA Keynote: BLOCKCHAIN for Enterprise
CSPA Keynote: BLOCKCHAIN for EnterpriseDavid Haimes
 
IBM - Blockchain Explained - Introduction for Business
IBM - Blockchain Explained - Introduction for BusinessIBM - Blockchain Explained - Introduction for Business
IBM - Blockchain Explained - Introduction for BusinessIBM Sverige
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarConcept Searching, Inc
 
HDI - Blockchain White Paper
HDI - Blockchain White PaperHDI - Blockchain White Paper
HDI - Blockchain White PaperDavid MANSET
 
Xanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System DevelopmentXanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System DevelopmentAlex G. Lee, Ph.D. Esq. CLP
 

What's hot (20)

Cisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & BlockchainCisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & Blockchain
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
 
Block Chain Record Management
Block Chain Record ManagementBlock Chain Record Management
Block Chain Record Management
 
Protective Monitoring
Protective MonitoringProtective Monitoring
Protective Monitoring
 
Data Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer DataData Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer Data
 
Future Blockchain Applications and Solutions
Future Blockchain Applications and SolutionsFuture Blockchain Applications and Solutions
Future Blockchain Applications and Solutions
 
Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99
 
Barcelona presentationv6
Barcelona presentationv6Barcelona presentationv6
Barcelona presentationv6
 
Privacy for IoT with XMPP
Privacy for IoT with XMPPPrivacy for IoT with XMPP
Privacy for IoT with XMPP
 
Digital Asset Management Ltd - Madrid Presentation - Club Financiero
Digital Asset Management Ltd - Madrid Presentation - Club FinancieroDigital Asset Management Ltd - Madrid Presentation - Club Financiero
Digital Asset Management Ltd - Madrid Presentation - Club Financiero
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - Gemalto
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
 
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJSSupply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
 
CSPA Keynote: BLOCKCHAIN for Enterprise
CSPA Keynote: BLOCKCHAIN for EnterpriseCSPA Keynote: BLOCKCHAIN for Enterprise
CSPA Keynote: BLOCKCHAIN for Enterprise
 
IBM - Blockchain Explained - Introduction for Business
IBM - Blockchain Explained - Introduction for BusinessIBM - Blockchain Explained - Introduction for Business
IBM - Blockchain Explained - Introduction for Business
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
 
HDI - Blockchain White Paper
HDI - Blockchain White PaperHDI - Blockchain White Paper
HDI - Blockchain White Paper
 
Cannabis Technology
Cannabis TechnologyCannabis Technology
Cannabis Technology
 
Xanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System DevelopmentXanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System Development
 

Similar to Keep your data safe and be compliant via a 360° approach

CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCapgemini
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCapgemini
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSAUlf Mattsson
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...IT Governance Ltd
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesDimitri Sirota
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
Secupi - Veri Maskeleme - Anonimleştirme ve Mantıksal Silme Çözümü
Secupi - Veri Maskeleme - Anonimleştirme ve Mantıksal Silme ÇözümüSecupi - Veri Maskeleme - Anonimleştirme ve Mantıksal Silme Çözümü
Secupi - Veri Maskeleme - Anonimleştirme ve Mantıksal Silme ÇözümüSAYGIN SAMAN
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerCapgemini
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...Cohesive Networks
 
eu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associateseu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associatesMohsin Termezy
 
GDPR: the IBM journey to compliance
GDPR: the IBM journey to complianceGDPR: the IBM journey to compliance
GDPR: the IBM journey to complianceDataWorks Summit
 
Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...Eftychia Chalvatzi
 
Security best ways to protect your intellectual capital
Security   best ways to protect your intellectual capitalSecurity   best ways to protect your intellectual capital
Security best ways to protect your intellectual capitalAconex
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRIT Governance Ltd
 
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors
 
sunil_soares_dama_day.pdf
sunil_soares_dama_day.pdfsunil_soares_dama_day.pdf
sunil_soares_dama_day.pdfmsacs
 
05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on financeinnov-acts-ltd
 

Similar to Keep your data safe and be compliant via a 360° approach (20)

CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSA
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Secupi - Veri Maskeleme - Anonimleştirme ve Mantıksal Silme Çözümü
Secupi - Veri Maskeleme - Anonimleştirme ve Mantıksal Silme ÇözümüSecupi - Veri Maskeleme - Anonimleştirme ve Mantıksal Silme Çözümü
Secupi - Veri Maskeleme - Anonimleştirme ve Mantıksal Silme Çözümü
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
eu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associateseu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associates
 
GDPR: the IBM journey to compliance
GDPR: the IBM journey to complianceGDPR: the IBM journey to compliance
GDPR: the IBM journey to compliance
 
Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...Good Practices and Recommendations on the Security and Resilience of Big Data...
Good Practices and Recommendations on the Security and Resilience of Big Data...
 
Security best ways to protect your intellectual capital
Security   best ways to protect your intellectual capitalSecurity   best ways to protect your intellectual capital
Security best ways to protect your intellectual capital
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPR
 
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
SFScon19 - Giuliana Viviano - Big Data e Data Analytics
SFScon19 - Giuliana Viviano - Big Data e Data AnalyticsSFScon19 - Giuliana Viviano - Big Data e Data Analytics
SFScon19 - Giuliana Viviano - Big Data e Data Analytics
 
GDPR: The Regulator's Perspective, Peter Brown, ICO
GDPR: The Regulator's Perspective, Peter Brown, ICOGDPR: The Regulator's Perspective, Peter Brown, ICO
GDPR: The Regulator's Perspective, Peter Brown, ICO
 
sunil_soares_dama_day.pdf
sunil_soares_dama_day.pdfsunil_soares_dama_day.pdf
sunil_soares_dama_day.pdf
 
05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Keep your data safe and be compliant via a 360° approach

  • 1. Client name ELCA for Date Data Governance Event – 6th February 2018 – Geneva - Warwick Hôtel Keep your data safe and be compliant via a 360° approach Nagib Aouini – Head of Cyber Security / Blockchain
  • 2. Agenda ― Why data breaches will continue to occur ― What is Data Governance ― How to comply with regulations with an effective data governance program ― 360° Data Security Approach ― Q&A 5 6 1 2 3 4
  • 4. ©copyright 2017 –Texte Story #1 Bad identity management practices Event Data Governance - Feb 6th - Geneva 4
  • 5. ©copyright 2017 –Texte Event Data Governance - Feb 6th - Geneva 5
  • 6. ©copyright 2017 –Texte Event Data Governance - Feb 6th - Geneva 6 https://baffle.io/the-threat/equifax-breach/ Story #1 Failed to implement a WAF and vulnerability mgt
  • 7. ©copyright 2017 –Texte Event Data Governance - Feb 6th - Geneva 7
  • 8. ©copyright 2017 How those breaches can happen Source http://blog.wallix.com/uber-hack-pam • The data of 57 million users has been stolen from Uber. • Malicious intruders managed to gain access to a GitHub private coding site used by some Uber software engineers, find AWS credentials, and use them to steal private data. Story #2 Failed to implement Two-Factor and Privileged ID Mgt Event Data Governance - Feb 6th - Geneva 8
  • 9. ©copyright 2017 –Texte Event Data Governance - Feb 6th - Geneva 9
  • 10. ©copyright 2017 –Texte Event Data Governance - Feb 6th - Geneva 10 Story #3 Ransomware attack
  • 11. ©copyright 2017 –Texte Threats to Healthcare IT systems Event Data Governance - Feb 6th - Geneva11 – Data stolen from a bank quickly becomes useless once the breach is discovered and passcodes are changed – Data from the healthcare industry, which includes both personal identities and medical histories, can live a lifetime – Healthcare IT and apps use are secured only with simple username / password with no password policy enforced – Managing access control and putting strong security controls is challenging in healthcare environment because of “Need to work” principle (emergency access, doctors needs access to HER …) This data can be used to launch Spear phising scams, Identity theft, social engineering frauds ---
  • 12. ©copyright 2017 –Texte Use case study : Protecting a medical information system and electronic health record Event Data Governance - Feb 6th - Geneva Problem: privacy and control of data shall be ensured and data center hosted outside Switzerland is a serious risk for such information, but also unauthorized access (because of leaked credential). ? Challenge: Development of a medical portal accross Switzerland allowing hospitals, doctors and patients to access medical information hosted on a CRM or Web app portal (even fat client via Citrix). This portal contains patient data that is protected by Swiss law 12 Login credentials are lost or stolen, resulting in unauthorized access to patient record. Malicious hackers can target physicians via spear-phishing attack to get credentials.
  • 13. ©copyright 2017 Mentality must evolved Event Data Governance - Feb 6th - Geneva 13
  • 14. 3 What is Data Governance Event Data Governance - Feb 6th - Geneva14
  • 15. ©copyright 2017 –Texte Data Management Program Drivers Event Data Governance - Feb 6th - Geneva 15  Need to share and integrate data with external partners  Alignment with Business Strategy supporting innovation  Allow the business to identify opportunities being more agile  Need to cope with different kinds of business built over time with specific priorities and different subsidiaries  Rather independent departments/subsidiaries with own processes  Part of the tools not shared or used differently  Tools continuously changing  Control the risk  Responsibility of the company towards shareholders, customers an authorities (*)  Information lifecycle must be very well controlled  The company must be able to provide consistent and reliable information *: Example: General Data Protection Regulation (Regulation (EU) 2016/679), FINMA Circular 2008/21 “Operational Risks – Banks“, EU Regulation 73-2010 Aeronautical Data and Information Quality, Solvency II Directive 2009/138/EC ,
  • 16. ©copyright 2017 –Texte Data Governance Event Data Governance - Feb 6th - Geneva 16 Data Governance: decision making and oversight process that prioritizes investments, allocates resources and measures results to insure that data being managed is leveraged to support business needs ■ Goals: 1. Enable an organisation to manage its data as an asset 2. To sponsor, track, and oversee the delivery of data management projects and services 3. Define, approve, communicate and implement principles, policies, procedures, metrics, tools, and responsibilities for data management 4. To manage and resolve data related issues  Data Governance is more than Data Quality, Policies, Standards. It is about aligning Data Management with Corporate Needs and Strategy, to optimize its results and to control risks
  • 17. ©copyright 2017 –Texte DMBOK Data Management Framework Event Data Governance - Feb 6th - Geneva 17 • A framework for understanding comprehensively and see relationships between Data Management components • The 11 functions (knowledge areas) depend on one another and need to be aligned • Ideas and concepts will be applied differently based on organization industry, culture, maturity level, strategy, vision and challenges it is facing
  • 18. 3 How to comply with regulations Event Data Governance - Feb 6th - Geneva18
  • 19. ©copyright 2017 –Texte Applicable regulations : GDPR Event Data Governance - Feb 6th - Geneva 19 Replaces and extends European Directive 95/46/EC from May 25th 2018 Applies to controllers or processors established in the Union Applies to controllers or processors not established in the Union where the processing activities relate to the offering of goods or services to data subjects in the Union; or the monitoring of their behaviour as far as their behaviour takes place within the Union.
  • 20. ©copyright 2017 –Texte GDPR roles and entity 20Event Data Governance - Feb 6th - Geneva
  • 21. ©copyright 2017 –Texte Applicable regulations Swiss Federal Data Protection Act Event Data Governance - Feb 6th - Geneva 21 The revised DPA is announced for the end of 2018 Needs to be harmonised with EU standards. The Federal Council has adopted a DPA revision process in Sept. 2017 and released a draft version of the future DPA Apply to controllers and processors established in Switzerland
  • 22. ©copyright 2017 –Texte Data privacy framework by ELCA Event Data Governance - Feb 6th - Geneva 22 Governance Operational processes Legal & compliance Data privacy policies Data privacy roles & responsibilities Data privacy training & awareness External criteria tracking Inventory of personal data & data transfers Respect of the data subjects’ rights Data breach management Protection of Personal data Monitoring of new operational practices Data privacy notices Contractual clausesData Privacy Risk Assessments Data privacy by design and by default Data privacy audits
  • 23. ©copyright 2017 –Texte FINMA controls Event Data Governance - Feb 6th - Geneva 23 #1 Governance #1 Client Identifying data CID #3 Location & Access to Data #4 Security standards for IT & Tech #5 Selection, monitoring and training of employee with access to CID #5 Identifying and controlling risks related to the confidentiality of CID #7 Confidentiality of CID : risk mitigation #8 Incidenty related to the confidentiality of CID, internal /external comm #9 Outsourcing providers and large projects in regard to CID
  • 24. Client Identification Data (CID) Event Data Governance - Feb 6th - Geneva24 Direct CID Indirect CID CID
  • 25. ©copyright 2017 Sharepoint compliant platform with SIQ Sharepoint Farm Sharepoint user SSOAccess management SecurityIQ SailPointIIQ Exchange AD Admin Client Business Interface Report And Audit Indexing Services General UI Supervisor SIQ admin Auditor User SailPointRESTAPI Event Handler SQL SecurityIQ Cluster Indexing Server SecurityIQ Agent : Permission + Data classification + Activity Monitor SailPoint IQ Service SharePoint SailPoint IQ Service SharePoint Event Data Governance - Feb 6th - Geneva 25
  • 26. ©copyright 2017 How manage CID data in a Sharepoint and being compliant #5 Identifying and controlling risks related to the confidentiality of CID #1 Client Identifying data CID Need to know principle CID Discovery and tagging #3 Location & Access to Data Who access what ? Event Data Governance - Feb 6th - Geneva 26
  • 27. ©copyright 2017 –Texte What is a CASB ? Event Data Governance - Feb 6th - Geneva 27 … Visibility who is using which app and which data is stored where Data Loss Prevention handle information according to its specificities (ciphering, tokenization) Threat protection detects malware stored in the cloud and suspect behaviours Compliance ensure compliance with specific industry regulations
  • 28. ©copyright 2017 How CASB could help for GDPR/FINMA compliance Event Data Governance - Feb 6th - Geneva 28 Identifying personal data Controlling the flow of personal data Maintaining data residency and sovereignty Monitor Risky Activity Identify Shadow IT #4 Security standards for IT & Tech Two-factor + Encryption #7 Confidentiality of CID : risk mitigation Encryption + Tokenization #8 Incidenty related to the confidentiality of CID, internal /external comm Shadow IT + Policy violation
  • 29. ©copyright 2017 Example : Protect patient data in CRM Online Event Data Governance - Feb 6th - Geneva 29 1 - Physicians save a new contact 2 – CASB intercept the request and encrypt field before leaving the enteprise network 3 – Contact is encrypted and stored in CRM online. But user can still see it in clear Cloud ProviderHealthcare ZRITOI POIUYRW uiiwoow@Hotmail.com 290900202 290909020 289898992 ZRITOI POIUYRW Home Maker Noiowp Poowioiw OUIOIOp Poisowoow Switzerland BORIS GUNTERBERG BORIS GUNTERBERG DIANE GUNTERBERG KLAUS GUNTERBERG SWITZERLAND “ZRITOI” “POIUYRW” “Female” “Wiioiopp Ppwoioiosyoo” “3” “990909-9090-0020” Hardware Security M odule 2a – Encryption Key stays under your sole control and managed in Switzerland
  • 30. ©copyright 2017 –Texte SAML / RADIUS Perimeter Web Application Firewall LDAP / DB / Active Directory Proxy request ELCARD / CloudTRUST appliance Protecting Healthcare IT systems with ELCARD / CloudTrust Event Data Governance - Feb 6th - Geneva SAML 2 SSO / Trust 30 #4 Security standards for IT & Tech Two-factor + Encryption
  • 32. ―Identify sensitive, valuable or regulated data (CID). Provide a mean to authenticate user based on claims. ―Segregate data to avoid spills ―Authorize access based on data classification and user or device via claims ―Protect critical data automatically with right management and powerful access control model (like ABAC) ―Audit data activity for full visibility 32 Identify Segregate Authorize Protect Audit 360° approach
  • 33. ©copyright 2017 –Texte Discover your sensitive Data Event Data Governance - Feb 6th - Geneva 33
  • 35. ©copyright 2017 –Texte Onion approach for data security Protect Data Detect Data Breach Track Data Usage Discover Data Sensitive Data Block data access / encrypt / mask data Detect data breach or accidental data breach/use Track data export / move of sensitive data Discover / classify your sensitive data 35
  • 36. ©copyright 2017 Data lifecycle and cloud challenge Event Data Governance - Feb 6th - Geneva • Generation : trust data ? • Collection : Which data ? • Storage : where ? • Usage : who use it ? • Sharing : Is it allowed • Archive : How long ? • Removal : Definitive ? 36
  • 37. ©copyright 2017 Where is my data ? Event Data Governance - Feb 6th - Geneva 37 Not stored here
  • 38. ©copyright 2017 –Texte Always Protected 38 Data in Use Data in Motion Data at Rest Source : Microsoft  Database Encryption  Credential Encryption  HSM Key Vaulting  Anonymization / Tokenization / Obfuscation  Network / Server control  Physical Media Control  Archive / Destruction • Privileged Access Management • Privileged Account Monitoring • Workstation Hardening • Application Access Control • Data classification/labelling/tagging • Removal/media control • Export control • Perimeter Security – WAF • Network traffic monitoring/blocking L3-L 7 – WAF • Web application Firewall – L7 • Data collection and classification • Remote Access
  • 40. ©copyright 2017 –Texte Example with Azure SQL Data classification 40
  • 41. ©copyright 2017 –Texte Protect your sensitive Data Event Data Governance - Feb 6th - Geneva 41
  • 42. ©copyright 2017 –Texte Securing data is challenging Event Data Governance - Feb 6th - Geneva 42 Business Partners Outsourcers Layer 1: The Back Office Layer 2:The Front Office Layer 3: External Extended Enterprise PDA’s Mobile Media Data Processors Desktops Laptops On site Contractors Independent Agents 3rd Party Analytics Log Files Teleworkers HR/Employee Reports and Extracts 3rd Party Services Outsourced Backup On site Auditors FTP SAN/Shares CustomersEmail Portals Files Office Data Databases CRM Billing Business Systems Trading MortgageWarehouse Treasury Applications Backup DR & Test
  • 43. ©copyright 2017 –Texte Tokenization Event Data Governance - Feb 6th - Geneva 43 Tokenization TokenOriginal Data Personally identifiable information Token Management Data Token Mr ID | IV | Timestamp | Index etc Xe John Doe ID | IV | Timestamp | Index etc JPOwui Oisiypz 01/02/78 ID | IV | Timestamp | Index etc 24/02/99  Tokenization Replace live data after capture, after a database lookup  Encryption still needed for initial data capture & to live data in “Vault”  Encryption and Tokenization can be used together  Performance of Token Lookup needs to be considered Mr John Doe 01/02/78 Xe JPOwui Oisiypz 24/02/99
  • 44. ©copyright 2017 –Texte Audit access to your sensitive Data Event Data Governance - Feb 6th - Geneva 44
  • 45. ©copyright 2017 –Texte All consolidated Logs Event Data Governance - Feb 6th - Geneva 45 Source : Microsoft Detect Security Breaches by identiying anormal user behavior and usage patterns. Collect near-real time user and devices information by applying geo-patterns Present dashboard with Risk and alert with policy violation to enable pattern detection
  • 46. ©copyright 2017 –Texte Don’t ask your CISO to protect against data breach but rather ask him to prepare to react to a data breach46

Editor's Notes

  1. Oversight = supervision / that data being managed is leveraged to support business needs = les données sont utilisées pour supporter les besoins metier) / Enable = permettre
  2. Keep track of = suivre