SlideShare a Scribd company logo
1 of 20
© 2016 Blancco Oy Ltd. All Rights Reserved.
Cloud Storage: How to Fight
Off Data Security Threats &
Stay Compliant
MEET OUR SPEAKERS
2
Russ Ernst
VP, Product Management
Blancco Technology
Group
Roger Grimes
Security Columnist
InfoWorld
Alice MacGregor
Deputy Editor at
the Stack
© 2016 Blancco Oy Ltd. All Rights Reserved.
What We’ll Cover:
Key Factors Driving Cloud Storage Adoption
Top Data Security Priorities in the Cloud
The Realities & Dangers of Shadow IT
Uncertainty of Data Loss/Theft and Need for Data Removal
Can Exacerbate Security Risks
Why Regular Audits & Monitoring Can Help Thwart Security
Threats
Data Erasure Is Key When Migrating Data &
Decommissioning Data Centers
© 2016 Blancco Oy Ltd. All Rights Reserved.
Enterprise Adoption of Cloud Storage Grows
4
Key Factors Driving Reliance on Cloud
Storage:
• Migrating away from internal data centers
• Lower costs
• Greater flexibility
• Centralized IT control & management
© 2016 Blancco Oy Ltd. All Rights Reserved.
Choosing the Right Cloud Storage Provider Isn’t
Always Easy
5
• Know when to diversify &
consolidate
• Think about the physical
location of data
• Don’t overlook data security
regulations
• Learn about all scenarios
where data removal is
essential
© 2016 Blancco Oy Ltd. All Rights Reserved.
Fighting Off APTs, Compromised Credentials and
Hacked Interfaces Are Top Cloud Security Priorities
6
Reasons Why Incomplete/Improper Data
Removal Is Often Low Priority:
• Lack of understanding about the
difference between insecure deletion and
secure erasure
• Insufficient budgets to implement
necessary policies, processes and tools
• Unaware of dangers that persist if/when
data isn’t properly erased in various
scenarios
• Incomplete view and management of data
across its lifecycle
© 2016 Blancco Oy Ltd. All Rights Reserved.
Live Poll
7
How confident are you that your IT team knows about all cloud
storage providers being used?
• Very Confident
• Confident
• Somewhat Confident
• Not Confident
© 2016 Blancco Oy Ltd. All Rights Reserved.
Shadow IT Is a Serious Problem for Organizations
8
Ways to Reduce Shadow IT:
• Identify where all data resides (in-house, data
centers and in the cloud)
• Monitor if, where and when shadow IT occurs
• Monitor if employees install WiFi hotspots on
company network
• Monitor network for known and unknown devices
• Establish guidelines for how cloud data is
managed by cloud providers
• Conduct frequent, unscheduled audits of cloud
providers
• Assess security of data in the cloud
© 2016 Blancco Oy Ltd. All Rights Reserved.
Uncertainty of Data Loss/Theft & Need for Data
Removal Looms
9
Important Scenarios When Data Removal Is Critical:
• When migrating to a new cloud provider
• When migrating from one physical server to another
• When servers or storage devices are being replaced
• When regulatory requirements dictate
• When customers based in EU cite “right to be
forgotten”
• When terminating virtual machines in Infrastructure
as a Service environments
• When spinning down unneeded development server
• When data cleansing as part of regular document
management and archiving practices
• After disaster recovery exercises are performed
© 2016 Blancco Oy Ltd. All Rights Reserved.
Live Poll
10
How frequently do you conduct audits of your cloud storage providers?
• Once every month
• Once every 3 months
• Once every 6 months
• Once every 9 months
• Once a year
• Every 2-3 years
• Rarely
• Never
• I don’t know
© 2016 Blancco Oy Ltd. All Rights Reserved.
Why Regular Audits & Monitoring Are Important
11
© 2016 Blancco Oy Ltd. All Rights Reserved.
UK Data Protection Act
12
Data Protection principles
Schedule 1 to the Data Protection Act lists the data protection principles in the following terms:
1. Personal data shall be processed fairly and lawfully and, in particular, shall not be processed
unless –
(a) at least one of the conditions in Schedule 2 is met, and
(b) in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also
met.
2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall
not be further processed in any manner incompatible with that purpose or those purposes.
3. Personal data shall be adequate, relevant and not excessive in relation to the purpose or
purposes for which they are processed.
4. Personal data shall be accurate and, where necessary, kept up to date.
5. Personal data processed for any purpose or purposes shall not be kept longer than is
necessary for that purpose or those purposes.
6. Personal data shall be processed in accordance with the rights of data subjects under this
act.
7. Appropriate technical and organisational measures shall be taken against unauthorised or
unlawful processing of personal data and against accidental loss or destruction of, or damage
to, personal data.
8. Personal data shall not be transferred to a country or territory outside the European Economic
Area unless that country or territory ensures an adequate level of protection for the rights and
freedoms of data subjects in relation to the processing of personal data.
© 2016 Blancco Oy Ltd. All Rights Reserved.
EU GDPR’s Right to Erasure
13
When does the right to erasure apply?
The right to erasure does not provide an absolute ‘right to be forgotten’.
Individuals have a right to have personal data erased and to prevent processing in specific
circumstances;
• Where the personal data is no longer necessary in relation to the purpose for which it
was originally collected/processed.
• When the individual withdraws consent.
• When the individual objects to the processing and there is no overriding legitimate
interest for continuing the processing.
• The personal data was unlawfully processed (ie otherwise in breach of the GDPR).
• The personal data has to be erased in order to comply with a legal obligation.
• The personal data is processed in relation to the offer of information society services to
a child.
Under the DPA, the right to erasure is limited to processing that causes unwarranted and
substantial damage or distress. Under the GDPR, this threshold is not present. However, if
the processing does cause damage or distress, this is likely to make the case for erasure
stronger.
© 2016 Blancco Oy Ltd. All Rights Reserved.
Cloud Industry recommendations for all providers
Data Life Cycle
According to the Cloud
Security Alliance, it falls
to
“…the provider to keep
that data secure, and
when it is deleted, the
provider should ensure
(or be able to prove) that
it is permanently
destroyed.”
© 2016 Blancco Oy Ltd. All Rights Reserved.
ISO Security Standards impacting Data Centers
and Cloud providers
Protection of privacy and personal data in the cloud -
IMPLEMENTED in H2 2014
Includes:
• Cloud provider should enable the right to erase personal
data.
• Cloud provider should securely erase any temporary files
in systems.
• Cloud provider should ensure that whenever data storage
space is re-assigned, previously residing data is not
recoverable.
© 2016 Blancco Oy Ltd. All Rights Reserved.
Data Erasure Is Key When Migrating Data &
Decommissioning Data Centers
16
© 2016 Blancco Oy Ltd. All Rights Reserved.
Blancco Data Erasure Management
LUNs and
Virtual Machines
17
© 2016 Blancco Oy Ltd. All Rights Reserved.
Blancco LUN Blancco Virtual
Why Blancco Data Erasure Solutions?
Benefits:
• Automated erasure
• Simultaneous shredding of
multiple units
• More cost effective than replacing
or destroying hard drives
• Improved operational efficiencies
• Detailed reporting for audit trail
and regulatory compliance
Benefits:
• Enhance existing cloud security
offering (‘right to be forgotten’)
• Ensure compliance with
customers’ internal requirements
• Drive compliance with regulatory
requirements (i.e. PCI DSS,
HIPAA, ISO 27001, EU GDPR,
etc.)
• Detailed reporting for audit trail
and regulatory compliance
Q&A
© 2016 Blancco Oy Ltd. All Rights Reserved.
20
Content You May Find Useful:
“Lost in the Cloud: Data Security Challenges & Risks”:
http://info.blancco.com/en-rs-lost-in-the-cloud-data-security-challenges-and-risks.html
“The CIO’s Guide to Optimizing Data Security in the Cloud”:
https://www.blancco.com/resources/white-papers/optimizing-data-security-cloud/
“The Information End Game: What You Need to Know to Protect Corporate Data Throughout its Lifecycle”:
http://www2.blancco.com/en/white-paper/the-information-end-game-what-you-need-to-know-to-protect-
corporate-data

More Related Content

What's hot

HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTKimberly Simon MBA
 
GDPR non-compliance risks & GDPR365
GDPR non-compliance risks & GDPR365GDPR non-compliance risks & GDPR365
GDPR non-compliance risks & GDPR365Jaco Liebenberg
 
What is GDPR Data Flow Mapping
What is GDPR Data Flow MappingWhat is GDPR Data Flow Mapping
What is GDPR Data Flow MappingVISTA InfoSec
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? SecurityScorecard
 
Op tijd klaar voor de naderende gdpr avg privacywet - Janus de Visser
Op tijd klaar voor de naderende gdpr avg privacywet - Janus de VisserOp tijd klaar voor de naderende gdpr avg privacywet - Janus de Visser
Op tijd klaar voor de naderende gdpr avg privacywet - Janus de VisserNetprofiler
 
Forrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardForrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardSecurityScorecard
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016SteveAtHPE
 
Infographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyInfographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyCheapSSLsecurity
 
dcVAST GDPR Compliance One Pager
dcVAST GDPR Compliance One PagerdcVAST GDPR Compliance One Pager
dcVAST GDPR Compliance One PagerdcVAST
 
Third-Party Risk Management: How to Identify, Assess & Act
Third-Party Risk Management: How to Identify, Assess & ActThird-Party Risk Management: How to Identify, Assess & Act
Third-Party Risk Management: How to Identify, Assess & ActTrustArc
 
New Requirements of Fraud Prevention
New Requirements of Fraud PreventionNew Requirements of Fraud Prevention
New Requirements of Fraud PreventionGuardian Analytics
 
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)Data Driven Innovation
 
Data Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPRData Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPRCorporater
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareDoug Copley
 
Scott Edmunds: Access to Information Consultation Recomendations
Scott Edmunds: Access to Information Consultation RecomendationsScott Edmunds: Access to Information Consultation Recomendations
Scott Edmunds: Access to Information Consultation RecomendationsScott Edmunds
 
Innovation_chrishenry_FIC_October2015-lowres
Innovation_chrishenry_FIC_October2015-lowresInnovation_chrishenry_FIC_October2015-lowres
Innovation_chrishenry_FIC_October2015-lowres- Chris - Henry -
 

What's hot (20)

Avoid the Audit Trap
Avoid the Audit TrapAvoid the Audit Trap
Avoid the Audit Trap
 
Don't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You UpDon't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You Up
 
Red7 Medical Identity Security and Data Protection
Red7 Medical Identity Security and Data ProtectionRed7 Medical Identity Security and Data Protection
Red7 Medical Identity Security and Data Protection
 
HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUST
 
GDPR non-compliance risks & GDPR365
GDPR non-compliance risks & GDPR365GDPR non-compliance risks & GDPR365
GDPR non-compliance risks & GDPR365
 
What is GDPR Data Flow Mapping
What is GDPR Data Flow MappingWhat is GDPR Data Flow Mapping
What is GDPR Data Flow Mapping
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
Op tijd klaar voor de naderende gdpr avg privacywet - Janus de Visser
Op tijd klaar voor de naderende gdpr avg privacywet - Janus de VisserOp tijd klaar voor de naderende gdpr avg privacywet - Janus de Visser
Op tijd klaar voor de naderende gdpr avg privacywet - Janus de Visser
 
Forrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardForrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the Standard
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
Infographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyInfographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management Study
 
dcVAST GDPR Compliance One Pager
dcVAST GDPR Compliance One PagerdcVAST GDPR Compliance One Pager
dcVAST GDPR Compliance One Pager
 
Third-Party Risk Management: How to Identify, Assess & Act
Third-Party Risk Management: How to Identify, Assess & ActThird-Party Risk Management: How to Identify, Assess & Act
Third-Party Risk Management: How to Identify, Assess & Act
 
New Requirements of Fraud Prevention
New Requirements of Fraud PreventionNew Requirements of Fraud Prevention
New Requirements of Fraud Prevention
 
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
 
Data Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPRData Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPR
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in Healthcare
 
Scott Edmunds: Access to Information Consultation Recomendations
Scott Edmunds: Access to Information Consultation RecomendationsScott Edmunds: Access to Information Consultation Recomendations
Scott Edmunds: Access to Information Consultation Recomendations
 
Innovation_chrishenry_FIC_October2015-lowres
Innovation_chrishenry_FIC_October2015-lowresInnovation_chrishenry_FIC_October2015-lowres
Innovation_chrishenry_FIC_October2015-lowres
 
BRG_TAP_IG_20150826_WEB
BRG_TAP_IG_20150826_WEBBRG_TAP_IG_20150826_WEB
BRG_TAP_IG_20150826_WEB
 

Similar to Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant

Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Blancco
 
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...Blancco
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingIT Governance Ltd
 
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...IDERA Software
 
An Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud EraserAn Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud EraserBlancco
 
DV 2016: Making Sense of the Current Legal Landscape
DV 2016: Making Sense of the Current Legal LandscapeDV 2016: Making Sense of the Current Legal Landscape
DV 2016: Making Sense of the Current Legal LandscapeTealium
 
Cloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerCloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerIdan Tohami
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudErik Von Schlehenried
 
Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)Jean-Michel Franco
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
Toronto Event- How to Protect Data Throughout Its Lifecycle
Toronto Event- How to Protect Data Throughout Its Lifecycle Toronto Event- How to Protect Data Throughout Its Lifecycle
Toronto Event- How to Protect Data Throughout Its Lifecycle Blancco
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, RubrikVMUG IT
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudGurbir Singh
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Data protection within development
Data protection within developmentData protection within development
Data protection within developmentowaspsuffolk
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
Understanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarUnderstanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarCipherCloud
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptxNguyenNM
 

Similar to Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant (20)

Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files
 
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
 
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
 
An Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud EraserAn Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud Eraser
 
DV 2016: Making Sense of the Current Legal Landscape
DV 2016: Making Sense of the Current Legal LandscapeDV 2016: Making Sense of the Current Legal Landscape
DV 2016: Making Sense of the Current Legal Landscape
 
Cloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerCloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran Adler
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)
 
2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Toronto Event- How to Protect Data Throughout Its Lifecycle
Toronto Event- How to Protect Data Throughout Its Lifecycle Toronto Event- How to Protect Data Throughout Its Lifecycle
Toronto Event- How to Protect Data Throughout Its Lifecycle
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Data protection within development
Data protection within developmentData protection within development
Data protection within development
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Understanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarUnderstanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: Webinar
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
 

More from Blancco

Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Blancco
 
Enabling End-to-End Mobile Customer Journey
Enabling End-to-End Mobile Customer JourneyEnabling End-to-End Mobile Customer Journey
Enabling End-to-End Mobile Customer JourneyBlancco
 
Blancco Recharge - BMDE Optimizations & Updates
Blancco Recharge - BMDE Optimizations & UpdatesBlancco Recharge - BMDE Optimizations & Updates
Blancco Recharge - BMDE Optimizations & UpdatesBlancco
 
Blancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADsBlancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADsBlancco
 
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...Blancco
 
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...Blancco
 
Making the Case- Blancco Data Center Eraser Solution
Making the Case- Blancco Data Center Eraser Solution Making the Case- Blancco Data Center Eraser Solution
Making the Case- Blancco Data Center Eraser Solution Blancco
 
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...Blancco
 
EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights Blancco
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...Blancco
 
Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report Blancco
 
Solid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go AwaySolid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go AwayBlancco
 
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State DrivesWebinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State DrivesBlancco
 
Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Blancco
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksBlancco
 
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...Blancco
 

More from Blancco (16)

Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
 
Enabling End-to-End Mobile Customer Journey
Enabling End-to-End Mobile Customer JourneyEnabling End-to-End Mobile Customer Journey
Enabling End-to-End Mobile Customer Journey
 
Blancco Recharge - BMDE Optimizations & Updates
Blancco Recharge - BMDE Optimizations & UpdatesBlancco Recharge - BMDE Optimizations & Updates
Blancco Recharge - BMDE Optimizations & Updates
 
Blancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADsBlancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADs
 
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
 
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...
 
Making the Case- Blancco Data Center Eraser Solution
Making the Case- Blancco Data Center Eraser Solution Making the Case- Blancco Data Center Eraser Solution
Making the Case- Blancco Data Center Eraser Solution
 
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
 
EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
 
Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report
 
Solid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go AwaySolid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go Away
 
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State DrivesWebinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
 
Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Data Sanitization: When, Why & How
Data Sanitization: When, Why & How
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
 
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant

  • 1. © 2016 Blancco Oy Ltd. All Rights Reserved. Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
  • 2. MEET OUR SPEAKERS 2 Russ Ernst VP, Product Management Blancco Technology Group Roger Grimes Security Columnist InfoWorld Alice MacGregor Deputy Editor at the Stack
  • 3. © 2016 Blancco Oy Ltd. All Rights Reserved. What We’ll Cover: Key Factors Driving Cloud Storage Adoption Top Data Security Priorities in the Cloud The Realities & Dangers of Shadow IT Uncertainty of Data Loss/Theft and Need for Data Removal Can Exacerbate Security Risks Why Regular Audits & Monitoring Can Help Thwart Security Threats Data Erasure Is Key When Migrating Data & Decommissioning Data Centers
  • 4. © 2016 Blancco Oy Ltd. All Rights Reserved. Enterprise Adoption of Cloud Storage Grows 4 Key Factors Driving Reliance on Cloud Storage: • Migrating away from internal data centers • Lower costs • Greater flexibility • Centralized IT control & management
  • 5. © 2016 Blancco Oy Ltd. All Rights Reserved. Choosing the Right Cloud Storage Provider Isn’t Always Easy 5 • Know when to diversify & consolidate • Think about the physical location of data • Don’t overlook data security regulations • Learn about all scenarios where data removal is essential
  • 6. © 2016 Blancco Oy Ltd. All Rights Reserved. Fighting Off APTs, Compromised Credentials and Hacked Interfaces Are Top Cloud Security Priorities 6 Reasons Why Incomplete/Improper Data Removal Is Often Low Priority: • Lack of understanding about the difference between insecure deletion and secure erasure • Insufficient budgets to implement necessary policies, processes and tools • Unaware of dangers that persist if/when data isn’t properly erased in various scenarios • Incomplete view and management of data across its lifecycle
  • 7. © 2016 Blancco Oy Ltd. All Rights Reserved. Live Poll 7 How confident are you that your IT team knows about all cloud storage providers being used? • Very Confident • Confident • Somewhat Confident • Not Confident
  • 8. © 2016 Blancco Oy Ltd. All Rights Reserved. Shadow IT Is a Serious Problem for Organizations 8 Ways to Reduce Shadow IT: • Identify where all data resides (in-house, data centers and in the cloud) • Monitor if, where and when shadow IT occurs • Monitor if employees install WiFi hotspots on company network • Monitor network for known and unknown devices • Establish guidelines for how cloud data is managed by cloud providers • Conduct frequent, unscheduled audits of cloud providers • Assess security of data in the cloud
  • 9. © 2016 Blancco Oy Ltd. All Rights Reserved. Uncertainty of Data Loss/Theft & Need for Data Removal Looms 9 Important Scenarios When Data Removal Is Critical: • When migrating to a new cloud provider • When migrating from one physical server to another • When servers or storage devices are being replaced • When regulatory requirements dictate • When customers based in EU cite “right to be forgotten” • When terminating virtual machines in Infrastructure as a Service environments • When spinning down unneeded development server • When data cleansing as part of regular document management and archiving practices • After disaster recovery exercises are performed
  • 10. © 2016 Blancco Oy Ltd. All Rights Reserved. Live Poll 10 How frequently do you conduct audits of your cloud storage providers? • Once every month • Once every 3 months • Once every 6 months • Once every 9 months • Once a year • Every 2-3 years • Rarely • Never • I don’t know
  • 11. © 2016 Blancco Oy Ltd. All Rights Reserved. Why Regular Audits & Monitoring Are Important 11
  • 12. © 2016 Blancco Oy Ltd. All Rights Reserved. UK Data Protection Act 12 Data Protection principles Schedule 1 to the Data Protection Act lists the data protection principles in the following terms: 1. Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless – (a) at least one of the conditions in Schedule 2 is met, and (b) in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met. 2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. 3. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. 4. Personal data shall be accurate and, where necessary, kept up to date. 5. Personal data processed for any purpose or purposes shall not be kept longer than is necessary for that purpose or those purposes. 6. Personal data shall be processed in accordance with the rights of data subjects under this act. 7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. 8. Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.
  • 13. © 2016 Blancco Oy Ltd. All Rights Reserved. EU GDPR’s Right to Erasure 13 When does the right to erasure apply? The right to erasure does not provide an absolute ‘right to be forgotten’. Individuals have a right to have personal data erased and to prevent processing in specific circumstances; • Where the personal data is no longer necessary in relation to the purpose for which it was originally collected/processed. • When the individual withdraws consent. • When the individual objects to the processing and there is no overriding legitimate interest for continuing the processing. • The personal data was unlawfully processed (ie otherwise in breach of the GDPR). • The personal data has to be erased in order to comply with a legal obligation. • The personal data is processed in relation to the offer of information society services to a child. Under the DPA, the right to erasure is limited to processing that causes unwarranted and substantial damage or distress. Under the GDPR, this threshold is not present. However, if the processing does cause damage or distress, this is likely to make the case for erasure stronger.
  • 14. © 2016 Blancco Oy Ltd. All Rights Reserved. Cloud Industry recommendations for all providers Data Life Cycle According to the Cloud Security Alliance, it falls to “…the provider to keep that data secure, and when it is deleted, the provider should ensure (or be able to prove) that it is permanently destroyed.”
  • 15. © 2016 Blancco Oy Ltd. All Rights Reserved. ISO Security Standards impacting Data Centers and Cloud providers Protection of privacy and personal data in the cloud - IMPLEMENTED in H2 2014 Includes: • Cloud provider should enable the right to erase personal data. • Cloud provider should securely erase any temporary files in systems. • Cloud provider should ensure that whenever data storage space is re-assigned, previously residing data is not recoverable.
  • 16. © 2016 Blancco Oy Ltd. All Rights Reserved. Data Erasure Is Key When Migrating Data & Decommissioning Data Centers 16
  • 17. © 2016 Blancco Oy Ltd. All Rights Reserved. Blancco Data Erasure Management LUNs and Virtual Machines 17
  • 18. © 2016 Blancco Oy Ltd. All Rights Reserved. Blancco LUN Blancco Virtual Why Blancco Data Erasure Solutions? Benefits: • Automated erasure • Simultaneous shredding of multiple units • More cost effective than replacing or destroying hard drives • Improved operational efficiencies • Detailed reporting for audit trail and regulatory compliance Benefits: • Enhance existing cloud security offering (‘right to be forgotten’) • Ensure compliance with customers’ internal requirements • Drive compliance with regulatory requirements (i.e. PCI DSS, HIPAA, ISO 27001, EU GDPR, etc.) • Detailed reporting for audit trail and regulatory compliance
  • 19. Q&A
  • 20. © 2016 Blancco Oy Ltd. All Rights Reserved. 20 Content You May Find Useful: “Lost in the Cloud: Data Security Challenges & Risks”: http://info.blancco.com/en-rs-lost-in-the-cloud-data-security-challenges-and-risks.html “The CIO’s Guide to Optimizing Data Security in the Cloud”: https://www.blancco.com/resources/white-papers/optimizing-data-security-cloud/ “The Information End Game: What You Need to Know to Protect Corporate Data Throughout its Lifecycle”: http://www2.blancco.com/en/white-paper/the-information-end-game-what-you-need-to-know-to-protect- corporate-data

Editor's Notes

  1. RICHARD TO FILL THIS IN.
  2. The CSA clearly sees the lifecycle of data ending with destruction. See their definition of destruction above in red. The technology enabling data destruction is data erasure with proof (reports).
  3. ISO 27018 is already released and ensures protection of privacy and personal data. ISO 27017 is coming. It ensures security controls for cloud providers.
  4. Infrastructure as a service Virtual storage / dedicated storage on the logical level Outsourced Virtual Storage Logical Level Managing virtual machines Outsourced management of Virtual Machines VM Level
  5. Thanks for taking the time to listen to what I’ve had to say. As a bonus, here’s some additional content that you may find useful.