SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
The GDPR – One Year On
Ilias Chantzos - Sr
Director
Government Affairs
Ramses Gallego –
Strategist &
Evangelist, Officeof
the CTO
Are organisations truly ready?
What has improved:
• New data governance mindset and structures
• New policies, plans, procedures, documentation
• New internal structures, roles, reporting lines, collaboration
• New investmentsin services, training, technology
• New attention to accountability,compliance, documentation,
demonstrability
• New consideration for data subject rights
Persisting challenges:
• Acknowledgement that emphasis is on outcomes
• Translating legislative needs into technology decisions
• GDPR interpretation and some conflicting DPA guidance
• Concurrent compliance needs (sectorial or national)
Process
Retain &
Secure
Collect
Manage
Information
Lifecycle
Is enforcement happening?
• Supervisor Authorities (SAs) enhanced their capabilities
(structure, headcount, processes, technology)
• 10s of 1000s of notifications and complaints received
• Over-notifications are an issue (with conflicting indications
by SAs)
• Investigationshave been carried-out (including backlog
from pre-GDPR era) and WILL continue
• Fines have been handed, some hefty (e.g. to Google by
CNIL)
• Security breaches appear to be, anecdotally, a major source
of notifications
POLL QUESTION 1
• Have notifications been filled against your organization ?
1. YES
2. NO
3. Don’t know
4
Managing complexity (What data do you really process?)
Some of the key unchartered GDPR complexities:
• Realization of the sheer scale of data involved
• Managing data flows vs. business needs – Across infrastructures
• Managing the information cycle
• Managing Privacy vs. Security (e.g. employee endpoint)
• Protecting customer, employee and supply chain data
• Ensuring the supply chain is compliant - Accountability
• Data Subject requests – Number vs. quality
• New data sets to consider: metadata, cloud data, office applications,
shadow data/shadow apps, ‘concealed’ personal data (“indirectly
identifying”)
Difference Between On-premise & Cloud?
None in terms of the GDPR security & compliance
requirements.
Shadow IT
+1500Cloud Apps in Use by the Average
Enterprise
Shadow Data
1 in 3 orgs have more data in the
Cloud than on-premises
Account Takeover
81%of Data BreachesInvolve
LeveragingWeak or Stolen Passwords
Cloud Chaos
13%of Cloud Docs are
Broadly Shared*
*2018 Shadow Data Report
Shadow IT - The Impact on GDPR Compliance
7
• Purpose Limitation,Storage Limitation,
Confidentiality and Integrity (Article 5)
• Transparency And Information To Data
Subjects (Articles 12-14)
• Exercise Of Data Subject Rights (Articles 15-
22)
• Privacy By Design and By Default (Article 25)
• Risk Of Joint Controllership (Article 26)
• Processor Obligations and Sub-Processing
(Article 28)
• Controller-ProcessorRelationship (Article 29)
• Documentation Of ProcessingOperations
(Article 30)
• Security Of Processing (Article 32)
• Data Breach Detection And Notification
(Article 33 and 34)
• Risk Assessment, DPIA Accuracy, Prior
Consultation (Articles 35-36)
• International Transfers (Chapter V)
• Compensation And Liability (Article 82)
• Overall Accountability(Articles 5 & 24)
• Sanctions (Article 83)
POLL QUESTION 2
• Have you identified Shadow IT in your organization ?
1. YES
2. NO
3. NOT SURE
8
What are the GDPR pain-points for technologists?
• Identifying data location - Ambiguous boundaries
• The risk of a security breach:
o Increasing surface of attack and vulnerabilities
o Increasing level of sophisticationof attacks
o Insider threat – Whether malicious or not
• Managing the cloud
o Multiple suppliers
o Data sets being uploaded & downloaded
o Shadow data a severe compliance risk factor
• Loss of availability (e.g. through ransomware)
And How Security Technical Controls Fit
Key GDPR Compliance Considerations
10
Can you determine whatyour risk profile is?
What broad areas do I needto focus on for GDPR?
How do I manageand report on my informationrisk managementpractices?
What personal data is out thereand where is it?
Can we control what personal data is accessible andwho can accessit?
Can we control where data resides?
Can we encrypt / obfuscate personal data?
Can we detect unauthorised accessor breachesof personal data?
Can we quicklyand thoroughly notify in the eventof a breach?
Can we continuouslyevaluate the effectivenessof our security?
Risk Management
Compliance Assessments
Information Centric Security
DLP / CASB
Authentication
Encryption
Tokenisation
Breach Response
ManagedSecurity and Incident
Response Services
Security Analytics
Is there enough GDPR guidance?
• Like any legislation the GDPR is prone to interpretation
• Guidance published by Regulators both at EU and MS level
• European Data Protection Board (EDPB)
guidance/consultation material
• But guidance is never enough
• Complex internal contradictions of the GDPR
• E.g.: The level of monitoring of employees’ endpoint (National
labour legislations) or Controller/Processor relationship
POLL QUESTION 3
• What other areas do you see as major paint points to GDPR compliance ?
1. Complaint handling
2. Shadow IT
3. Record Management
4. Breach notification
5. Employee privacy rights
12
Summary
The GDPR One year later
• Majors improvements in data governance across organisations
• Enforcement is happening and there will be no complacency
• Full GDPR compliance doesn’t exist, the posture of the data needs
to be constantlyre evaluated and monitored.
• Digital transformation adds additional pressure on technologist
• GDPR is the model for other similar regulations worldwide
13

Contenu connexe

Tendances

Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
Yun Lu
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
PECB
 
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
David Cunningham
 

Tendances (20)

Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance
 
Come cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoCome cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeo
 
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 
DLP
DLPDLP
DLP
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & Analytics
 

Similaire à Symantec Webinar: GDPR 1 Year On

Similaire à Symantec Webinar: GDPR 1 Year On (20)

GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
DPO Circle 2018
DPO Circle 2018 DPO Circle 2018
DPO Circle 2018
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
 
DAMA Ireland - GDPR
DAMA Ireland - GDPRDAMA Ireland - GDPR
DAMA Ireland - GDPR
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?
 
What is CT- DPO.pdf
What is CT- DPO.pdfWhat is CT- DPO.pdf
What is CT- DPO.pdf
 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The Physics
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data Protection
 
General Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian FirmsGeneral Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian Firms
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 

Plus de Symantec

Plus de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Symantec Webinar: GDPR 1 Year On

  • 1. The GDPR – One Year On Ilias Chantzos - Sr Director Government Affairs Ramses Gallego – Strategist & Evangelist, Officeof the CTO
  • 2. Are organisations truly ready? What has improved: • New data governance mindset and structures • New policies, plans, procedures, documentation • New internal structures, roles, reporting lines, collaboration • New investmentsin services, training, technology • New attention to accountability,compliance, documentation, demonstrability • New consideration for data subject rights Persisting challenges: • Acknowledgement that emphasis is on outcomes • Translating legislative needs into technology decisions • GDPR interpretation and some conflicting DPA guidance • Concurrent compliance needs (sectorial or national) Process Retain & Secure Collect Manage Information Lifecycle
  • 3. Is enforcement happening? • Supervisor Authorities (SAs) enhanced their capabilities (structure, headcount, processes, technology) • 10s of 1000s of notifications and complaints received • Over-notifications are an issue (with conflicting indications by SAs) • Investigationshave been carried-out (including backlog from pre-GDPR era) and WILL continue • Fines have been handed, some hefty (e.g. to Google by CNIL) • Security breaches appear to be, anecdotally, a major source of notifications
  • 4. POLL QUESTION 1 • Have notifications been filled against your organization ? 1. YES 2. NO 3. Don’t know 4
  • 5. Managing complexity (What data do you really process?) Some of the key unchartered GDPR complexities: • Realization of the sheer scale of data involved • Managing data flows vs. business needs – Across infrastructures • Managing the information cycle • Managing Privacy vs. Security (e.g. employee endpoint) • Protecting customer, employee and supply chain data • Ensuring the supply chain is compliant - Accountability • Data Subject requests – Number vs. quality • New data sets to consider: metadata, cloud data, office applications, shadow data/shadow apps, ‘concealed’ personal data (“indirectly identifying”)
  • 6. Difference Between On-premise & Cloud? None in terms of the GDPR security & compliance requirements. Shadow IT +1500Cloud Apps in Use by the Average Enterprise Shadow Data 1 in 3 orgs have more data in the Cloud than on-premises Account Takeover 81%of Data BreachesInvolve LeveragingWeak or Stolen Passwords Cloud Chaos 13%of Cloud Docs are Broadly Shared* *2018 Shadow Data Report
  • 7. Shadow IT - The Impact on GDPR Compliance 7 • Purpose Limitation,Storage Limitation, Confidentiality and Integrity (Article 5) • Transparency And Information To Data Subjects (Articles 12-14) • Exercise Of Data Subject Rights (Articles 15- 22) • Privacy By Design and By Default (Article 25) • Risk Of Joint Controllership (Article 26) • Processor Obligations and Sub-Processing (Article 28) • Controller-ProcessorRelationship (Article 29) • Documentation Of ProcessingOperations (Article 30) • Security Of Processing (Article 32) • Data Breach Detection And Notification (Article 33 and 34) • Risk Assessment, DPIA Accuracy, Prior Consultation (Articles 35-36) • International Transfers (Chapter V) • Compensation And Liability (Article 82) • Overall Accountability(Articles 5 & 24) • Sanctions (Article 83)
  • 8. POLL QUESTION 2 • Have you identified Shadow IT in your organization ? 1. YES 2. NO 3. NOT SURE 8
  • 9. What are the GDPR pain-points for technologists? • Identifying data location - Ambiguous boundaries • The risk of a security breach: o Increasing surface of attack and vulnerabilities o Increasing level of sophisticationof attacks o Insider threat – Whether malicious or not • Managing the cloud o Multiple suppliers o Data sets being uploaded & downloaded o Shadow data a severe compliance risk factor • Loss of availability (e.g. through ransomware)
  • 10. And How Security Technical Controls Fit Key GDPR Compliance Considerations 10 Can you determine whatyour risk profile is? What broad areas do I needto focus on for GDPR? How do I manageand report on my informationrisk managementpractices? What personal data is out thereand where is it? Can we control what personal data is accessible andwho can accessit? Can we control where data resides? Can we encrypt / obfuscate personal data? Can we detect unauthorised accessor breachesof personal data? Can we quicklyand thoroughly notify in the eventof a breach? Can we continuouslyevaluate the effectivenessof our security? Risk Management Compliance Assessments Information Centric Security DLP / CASB Authentication Encryption Tokenisation Breach Response ManagedSecurity and Incident Response Services Security Analytics
  • 11. Is there enough GDPR guidance? • Like any legislation the GDPR is prone to interpretation • Guidance published by Regulators both at EU and MS level • European Data Protection Board (EDPB) guidance/consultation material • But guidance is never enough • Complex internal contradictions of the GDPR • E.g.: The level of monitoring of employees’ endpoint (National labour legislations) or Controller/Processor relationship
  • 12. POLL QUESTION 3 • What other areas do you see as major paint points to GDPR compliance ? 1. Complaint handling 2. Shadow IT 3. Record Management 4. Breach notification 5. Employee privacy rights 12
  • 13. Summary The GDPR One year later • Majors improvements in data governance across organisations • Enforcement is happening and there will be no complacency • Full GDPR compliance doesn’t exist, the posture of the data needs to be constantlyre evaluated and monitored. • Digital transformation adds additional pressure on technologist • GDPR is the model for other similar regulations worldwide 13