SlideShare a Scribd company logo
1 of 29
Boards’ Eye view
of Digital Risk &
GDPR
Graham Mann
Managing Director & Co-founder
CyberSpace Defence Ltd.
International House, 24 Holborn Viaduct, London
EC1A 2BN
g.mann@cyberspacedefence.com
Mobile 07714210433
Why care about digital risk?
It makes good business sense
It demonstrates customer focus
It safeguards a key asset – data
It underpins the business
It secures IP and corporate secrets
Increased governance = decreased fines
Drivers for digital risk
Increasing importance of data and its relative worth
Impact of personal data loss on people’s lives
Action to address data risk at the governmental level –
compliance [GDPR in Europe]
Exponential increase in cyber attacks
Ever-increasing fines for non-compliance with local
governance
Lack of an holistic approach to security within many
organisations
The need for a digital
strategy
A plan or in the digital world a roadmap for the application
of information and technology.
This will inevitably include data and thereby have
implications for data risk management.
Critical to all businesses in this connected age
Underpins business agility
Enables good data governance by providing advanced
notice of new data requirements or new processing
requirements.
Digital ‘Risk’ Strategy
Supports the Digital Strategy
Digital risk is an organisation-wide responsibility
Digital risk needs a clear goal and a plan
It supports good governance [GDPR]
Vital for boards to manage digital risk
This is essentially about managing your data
ho’s responsible?
hat’s the relative importance?
here it resides
ho should have, and who has access?
Data can no longer be an
afterthought
Organisations are expected to protect data by design and
default.
In this context, by design means that whenever business
practices, IT processes or physical infrastructures are
conceptualised, maintaining privacy, and data security
must be integrated at the outset.
Requirement for data impact risk assessments to be
made.
Basic Questions
You’ll need to be able to answer some basic questions
about your data:
hat data is being processed?
hy?
y whom?
or what purpose?
ho is it being shared with?
Can it be justified under GDPR or other governance
Digital Assets – Data
Management
GDPR
Classification of data
Storage, Encryption, Back-up and Removal
ata retention policy
here is the data?
Access rights – who has access to the data and under
what conditions?
Data leaks –what’s the plan?
Risk Appetite
Digital Risk spend v likelihood, impact & cost of a breach.
Based on what data?
GDPR changes established views
t’s now about proving you did all you could to protect
personally identifiable data.
he tide has changed in favour of the individual
reach detection has been brought into sharp focus
Data must be a key part of the ‘risk management
framework’.
Risk Appetite (cont’d)
Critical to have an external review of Digital Risk to cross-
compare against the internal
Parameters to the digital risk decision
Current security position
Reasonable expectation of security
Data strategy and plans
External factors – types of attacks, sectors targeted,
Need for business agility
Investment [in security] need
Governance
Organisation
Roles & Responsibilities
Board responsibilities
Senior management responsibilities
Data Protection Officer (GDPR requirement in some circumstances)
IT Team responsibilities
Security Team responsibilities (if you have one)
Employee responsibilities
Executive Risk Committee [digital and physical]
Security Working Groups
Auditors [internal if you have one]
Communication between key groups
R, Legal, Finance, Security, IT, HR…..
reach plan and procedures
The Board
Must set the agenda on data governance and digital risk
Need to determine which committees will have
responsibility for reviewing the detail and implementation
of data protection measures.
Company Secretary has an instrumental role
Reporting to the Board on all matters pertaining to
GDPR, data governance and breaches.
The Human Element
Education, education. education
Social networking activity by employees
Social engineering (Phishing)
Pre-employment security checks
Recruitment of cyber security professionals
Outsourced Services
Open environment for reporting potential data breach
issues
Communications
Digital risk
Environment
Governance, Standards &
Certifications
It makes life easier adopting a standard like ISO 27001/2,
Cyber Essentials, NIST, etc.
If you haven’t already, you are strongly advised to adhere
to a certification/standard
A standard will provide structure to the cyber security
protecting your digital assets
You will almost certainly need to comply with GDPR -
General Data Protection Regulation
ompliance relating to personal data
GDPR – in a nutshell
Covers personal identifiable data on European subjects
held and/or processed by you or a body authorised by
you.
Fines are potentially eyewatering.
If you suffer a breach you need to notify the authorities
within 72 hours
You need to be able to demonstrate compliance, so
processes and record keeping are essential
You’re jointly responsible for your service provider
breaches
Personal data: If you don’t need it, don’t keep it
Personal Data
Individuals have the right under GDPR to:
ccess their own data, or
equest rectification or
rasure of data; and
he right to request a restriction to processing or
o ask for data to be handed over for use by another
processor.
Are you geared up for this?
Risk Landscape (Cyber
attacks and threats)
Despite more money being spent on cyber security - $$$
A plethora of very clever cyber security solutions
A huge base of highly-qualified cyber security
professionals
……the risk landscape is worse than ever:
why?
Well, Here’s Why…
the readily available and cheap attack tool-kits
the chronic lack of cyber security professionals
the high rewards to the hackers and criminals;
the insatiable drive for business agility;
the sheer number of cyber security solutions;
the complexity of our networks;
the explosion in the Internet of Things
…and an ever-increasing connected world.
The issue is compounded
by..
Sector-based implications and associated risk levels
Antiquated network/security architecture
Supply chain risk implications (soft underbelly)
Lack of sufficient digital risk due diligence in M&A
No data-centric approach
Too much reliance on IT, security people and a technical
solution
Organisations require a top-down approach to digital risk
Digital Risk
Planning
Plan for an attack
Response
all-out
ommunication
Internal and external
Defences
Identification
Forensics
Strategy
...and if all fails insurance
Supportive Technology
Technology isn’t the entire solution
stablished suppliers v start-up technology
echnology v Services
endering issues
Inclusive digital risk awareness/training programme
Continuous assessments
Acceptance that humans are the weakest link whatever
technology you put in place
An inclusive approach
Interaction between physical & digital risk [security]
Convergence of digital & physical security
Corporate structure – does it support the digital risk
strategy?
Digital Risk permeates every part of business and any
plan must be inclusive to succeed.
That means everyone
Fiduciary responsibility
Can’t emphasise enough the boards’ role
Need for a digital strategy and a digital risk strategy
Protect your digital assets
Sector comparisons
Justification process
ormula for allocations
Return on investment
Governance
Digital Risk Reporting
Essential at various levels throughout the organisation
Needs to be applicable to the subject matter
Should enable issues to be easily identified [drill down]
Linked to compliance/governance
Must be relevant to the audience it’s addressing [simple
traffic lights]
Jargon buster
Accurate and truthful
Public Trust
Get your marketing people engaged
GDPR is an opportunity to communicate with all you
stakeholders.
Be seen to embrace GDPR
Winning public trust is worth the effort.
In conclusion
Re-evaluate your approach, your structure and your
systems in relation to digital assets/risk
Digital risk must be a focal point of the business –
develop a strategy
It affects everyone and must encompass everyone
Digital risk is fluid and needs constant review
Recognise your defences are fragile - plan for an attack
Embrace the changes that GDPR will bring

More Related Content

What's hot

Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
William Godwin
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
William McBorrough
 
Cybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best PracticesCybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best Practices
Tony Moroney
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Jacqueline Fick
 
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
360 BSI
 

What's hot (20)

The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data Security
 
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPRHow an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
 
A Guide to Managed Security Services
A Guide to Managed Security ServicesA Guide to Managed Security Services
A Guide to Managed Security Services
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency Solutions
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Approche intégrée de la gestion des risques, de la sécurité de l’information,...
Approche intégrée de la gestion des risques, de la sécurité de l’information,...Approche intégrée de la gestion des risques, de la sécurité de l’information,...
Approche intégrée de la gestion des risques, de la sécurité de l’information,...
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Cybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best PracticesCybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best Practices
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
 
Cyber Crime Simulation Game - incl quick overview of ISO 27001
Cyber Crime Simulation Game - incl quick overview of ISO 27001Cyber Crime Simulation Game - incl quick overview of ISO 27001
Cyber Crime Simulation Game - incl quick overview of ISO 27001
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
 
Task 3
Task 3Task 3
Task 3
 

Similar to Boards' Eye View of Digital Risk & GDPR

Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challenge
FERMA
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
 
Data_Security_Guide_Everything_You_Need_to_Know.pdf
Data_Security_Guide_Everything_You_Need_to_Know.pdfData_Security_Guide_Everything_You_Need_to_Know.pdf
Data_Security_Guide_Everything_You_Need_to_Know.pdf
Mehdi Ahmadi
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
ekyklos Κύκλος Ιδεών για τη Εθνική Ανασυγκρότηση
 

Similar to Boards' Eye View of Digital Risk & GDPR (20)

Ensuring Data Protection Compliance.docx.pdf
Ensuring Data Protection Compliance.docx.pdfEnsuring Data Protection Compliance.docx.pdf
Ensuring Data Protection Compliance.docx.pdf
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challenge
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
 
Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Data_Security_Guide_Everything_You_Need_to_Know.pdf
Data_Security_Guide_Everything_You_Need_to_Know.pdfData_Security_Guide_Everything_You_Need_to_Know.pdf
Data_Security_Guide_Everything_You_Need_to_Know.pdf
 
Data Security.pptx
Data Security.pptxData Security.pptx
Data Security.pptx
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutions
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Did You Know Managed IT Services Can Enhance Data Security?
Did You Know Managed IT Services Can Enhance Data Security?Did You Know Managed IT Services Can Enhance Data Security?
Did You Know Managed IT Services Can Enhance Data Security?
 

Recently uploaded

Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
lizamodels9
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 

Recently uploaded (20)

Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 

Boards' Eye View of Digital Risk & GDPR

  • 1. Boards’ Eye view of Digital Risk & GDPR Graham Mann Managing Director & Co-founder CyberSpace Defence Ltd. International House, 24 Holborn Viaduct, London EC1A 2BN g.mann@cyberspacedefence.com Mobile 07714210433
  • 2. Why care about digital risk? It makes good business sense It demonstrates customer focus It safeguards a key asset – data It underpins the business It secures IP and corporate secrets Increased governance = decreased fines
  • 3. Drivers for digital risk Increasing importance of data and its relative worth Impact of personal data loss on people’s lives Action to address data risk at the governmental level – compliance [GDPR in Europe] Exponential increase in cyber attacks Ever-increasing fines for non-compliance with local governance Lack of an holistic approach to security within many organisations
  • 4. The need for a digital strategy A plan or in the digital world a roadmap for the application of information and technology. This will inevitably include data and thereby have implications for data risk management. Critical to all businesses in this connected age Underpins business agility Enables good data governance by providing advanced notice of new data requirements or new processing requirements.
  • 5. Digital ‘Risk’ Strategy Supports the Digital Strategy Digital risk is an organisation-wide responsibility Digital risk needs a clear goal and a plan It supports good governance [GDPR] Vital for boards to manage digital risk This is essentially about managing your data ho’s responsible? hat’s the relative importance? here it resides ho should have, and who has access?
  • 6. Data can no longer be an afterthought Organisations are expected to protect data by design and default. In this context, by design means that whenever business practices, IT processes or physical infrastructures are conceptualised, maintaining privacy, and data security must be integrated at the outset. Requirement for data impact risk assessments to be made.
  • 7. Basic Questions You’ll need to be able to answer some basic questions about your data: hat data is being processed? hy? y whom? or what purpose? ho is it being shared with? Can it be justified under GDPR or other governance
  • 8. Digital Assets – Data Management GDPR Classification of data Storage, Encryption, Back-up and Removal ata retention policy here is the data? Access rights – who has access to the data and under what conditions? Data leaks –what’s the plan?
  • 9. Risk Appetite Digital Risk spend v likelihood, impact & cost of a breach. Based on what data? GDPR changes established views t’s now about proving you did all you could to protect personally identifiable data. he tide has changed in favour of the individual reach detection has been brought into sharp focus Data must be a key part of the ‘risk management framework’.
  • 10. Risk Appetite (cont’d) Critical to have an external review of Digital Risk to cross- compare against the internal Parameters to the digital risk decision Current security position Reasonable expectation of security Data strategy and plans External factors – types of attacks, sectors targeted, Need for business agility Investment [in security] need Governance
  • 12. Roles & Responsibilities Board responsibilities Senior management responsibilities Data Protection Officer (GDPR requirement in some circumstances) IT Team responsibilities Security Team responsibilities (if you have one) Employee responsibilities Executive Risk Committee [digital and physical] Security Working Groups Auditors [internal if you have one] Communication between key groups R, Legal, Finance, Security, IT, HR….. reach plan and procedures
  • 13. The Board Must set the agenda on data governance and digital risk Need to determine which committees will have responsibility for reviewing the detail and implementation of data protection measures. Company Secretary has an instrumental role Reporting to the Board on all matters pertaining to GDPR, data governance and breaches.
  • 14. The Human Element Education, education. education Social networking activity by employees Social engineering (Phishing) Pre-employment security checks Recruitment of cyber security professionals Outsourced Services Open environment for reporting potential data breach issues Communications
  • 16. Governance, Standards & Certifications It makes life easier adopting a standard like ISO 27001/2, Cyber Essentials, NIST, etc. If you haven’t already, you are strongly advised to adhere to a certification/standard A standard will provide structure to the cyber security protecting your digital assets You will almost certainly need to comply with GDPR - General Data Protection Regulation ompliance relating to personal data
  • 17. GDPR – in a nutshell Covers personal identifiable data on European subjects held and/or processed by you or a body authorised by you. Fines are potentially eyewatering. If you suffer a breach you need to notify the authorities within 72 hours You need to be able to demonstrate compliance, so processes and record keeping are essential You’re jointly responsible for your service provider breaches Personal data: If you don’t need it, don’t keep it
  • 18. Personal Data Individuals have the right under GDPR to: ccess their own data, or equest rectification or rasure of data; and he right to request a restriction to processing or o ask for data to be handed over for use by another processor. Are you geared up for this?
  • 19. Risk Landscape (Cyber attacks and threats) Despite more money being spent on cyber security - $$$ A plethora of very clever cyber security solutions A huge base of highly-qualified cyber security professionals ……the risk landscape is worse than ever: why?
  • 20. Well, Here’s Why… the readily available and cheap attack tool-kits the chronic lack of cyber security professionals the high rewards to the hackers and criminals; the insatiable drive for business agility; the sheer number of cyber security solutions; the complexity of our networks; the explosion in the Internet of Things …and an ever-increasing connected world.
  • 21. The issue is compounded by.. Sector-based implications and associated risk levels Antiquated network/security architecture Supply chain risk implications (soft underbelly) Lack of sufficient digital risk due diligence in M&A No data-centric approach Too much reliance on IT, security people and a technical solution Organisations require a top-down approach to digital risk
  • 23. Plan for an attack Response all-out ommunication Internal and external Defences Identification Forensics Strategy ...and if all fails insurance
  • 24. Supportive Technology Technology isn’t the entire solution stablished suppliers v start-up technology echnology v Services endering issues Inclusive digital risk awareness/training programme Continuous assessments Acceptance that humans are the weakest link whatever technology you put in place
  • 25. An inclusive approach Interaction between physical & digital risk [security] Convergence of digital & physical security Corporate structure – does it support the digital risk strategy? Digital Risk permeates every part of business and any plan must be inclusive to succeed. That means everyone
  • 26. Fiduciary responsibility Can’t emphasise enough the boards’ role Need for a digital strategy and a digital risk strategy Protect your digital assets Sector comparisons Justification process ormula for allocations Return on investment Governance
  • 27. Digital Risk Reporting Essential at various levels throughout the organisation Needs to be applicable to the subject matter Should enable issues to be easily identified [drill down] Linked to compliance/governance Must be relevant to the audience it’s addressing [simple traffic lights] Jargon buster Accurate and truthful
  • 28. Public Trust Get your marketing people engaged GDPR is an opportunity to communicate with all you stakeholders. Be seen to embrace GDPR Winning public trust is worth the effort.
  • 29. In conclusion Re-evaluate your approach, your structure and your systems in relation to digital assets/risk Digital risk must be a focal point of the business – develop a strategy It affects everyone and must encompass everyone Digital risk is fluid and needs constant review Recognise your defences are fragile - plan for an attack Embrace the changes that GDPR will bring