SlideShare a Scribd company logo
1 of 29
Boards’ Eye view
of Digital Risk &
GDPR
Graham Mann
Managing Director & Co-founder
CyberSpace Defence Ltd.
International House, 24 Holborn Viaduct, London
EC1A 2BN
g.mann@cyberspacedefence.com
Mobile 07714210433
Why care about digital risk?
It makes good business sense
It demonstrates customer focus
It safeguards a key asset – data
It underpins the business
It secures IP and corporate secrets
Increased governance = decreased fines
Drivers for digital risk
Increasing importance of data and its relative worth
Impact of personal data loss on people’s lives
Action to address data risk at the governmental level –
compliance [GDPR in Europe]
Exponential increase in cyber attacks
Ever-increasing fines for non-compliance with local
governance
Lack of an holistic approach to security within many
organisations
The need for a digital
strategy
A plan or in the digital world a roadmap for the application
of information and technology.
This will inevitably include data and thereby have
implications for data risk management.
Critical to all businesses in this connected age
Underpins business agility
Enables good data governance by providing advanced
notice of new data requirements or new processing
requirements.
Digital ‘Risk’ Strategy
Supports the Digital Strategy
Digital risk is an organisation-wide responsibility
Digital risk needs a clear goal and a plan
It supports good governance [GDPR]
Vital for boards to manage digital risk
This is essentially about managing your data
Who’s responsible?
What’s the relative importance?
Where it resides
Who should have, and who has access?
Data can no longer be an
afterthought
Organisations are expected to protect data by design and
default.
In this context, by design means that whenever business
practices, IT processes or physical infrastructures are
conceptualised, maintaining privacy, and data security
must be integrated at the outset.
Requirement for data impact risk assessments to be
made.
Basic Questions
You’ll need to be able to answer some basic questions
about your data:
What data is being processed?
Why?
By whom?
For what purpose?
Who is it being shared with?
Can it be justified under GDPR or other governance
models?
Is there a data classification process?
Digital Assets – Data
Management
GDPR
Classification of data
Storage, Encryption, Back-up and Removal
Data retention policy
Where is the data?
Access rights – who has access to the data and under
what conditions?
Data leaks –what’s the plan?
Risk Appetite
Digital Risk spend v likelihood, impact & cost of a breach.
Based on what data?
GDPR changes established views
It’s now about proving you did all you could to protect personally identifiable data.
The tide has changed in favour of the individual
Breach detection has been brought into sharp focus
Data must be a key part of the ‘risk management
framework’.
Risk Appetite (cont’d)
Critical to have an external review of Digital Risk to cross-
compare against the internal
Parameters to the digital risk decision
Current security position
Reasonable expectation of security
Data strategy and plans
External factors – types of attacks, sectors targeted,
Need for business agility
Investment [in security] need
Governance
Organisation
Roles & Responsibilities
Board responsibilities
Senior management responsibilities
Data Protection Officer (GDPR requirement in some circumstances)
IT Team responsibilities
Security Team responsibilities (if you have one)
Employee responsibilities
Executive Risk Committee [digital and physical]
Security Working Groups
Auditors [internal if you have one]
Communication between key groups
PR, Legal, Finance, Security, IT, HR…..
Breach plan and procedures
The Board
Must set the agenda on data governance and digital risk
Need to determine which committees will have
responsibility for reviewing the detail and implementation
of data protection measures.
Company Secretary has an instrumental role
Reporting to the Board on all matters pertaining to
GDPR, data governance and breaches.
The Human Element
Education, education. education
Social networking activity by employees
Social engineering (Phishing)
Pre-employment security checks
Recruitment of cyber security professionals
Outsourced Services
Open environment for reporting potential data breach
issues
Communications
Digital risk
Environment
Governance, Standards &
Certifications
It makes life easier adopting a standard like ISO 27001/2,
Cyber Essentials, NIST, etc.
If you haven’t already, you are strongly advised to adhere
to a certification/standard
A standard will provide structure to the cyber security
protecting your digital assets
You will almost certainly need to comply with GDPR -
General Data Protection Regulation
Compliance relating to personal data
GDPR – in a nutshell
Covers personal identifiable data on European subjects
held and/or processed by you or a body authorised by
you.
Fines are potentially eyewatering.
If you suffer a breach you need to notify the authorities
within 72 hours
You need to be able to demonstrate compliance, so
processes and record keeping are essential
You’re jointly responsible for your service provider
breaches
Personal data: If you don’t need it, don’t keep it
Personal Data
Individuals have the right under GDPR to:
access their own data, or
request rectification or
erasure of data; and
the right to request a restriction to processing or
to ask for data to be handed over for use by another processor.
Are you geared up for this?
Do you know your rights and responsibilities?
Risk Landscape (Cyber
attacks and threats)
Despite more money being spent on cyber security - $$$
A plethora of very clever cyber security solutions
A huge base of highly-qualified cyber security
professionals
……the risk landscape is worse than ever:
why?
Well, Here’s Why…
the readily available and cheap attack tool-kits
the chronic lack of cyber security professionals
the high rewards to the hackers and criminals;
the insatiable drive for business agility;
the sheer number of cyber security solutions;
the complexity of our networks;
the explosion in the Internet of Things
…and an ever-increasing connected world.
The issue is compounded
by..
Sector-based implications and associated risk levels
Antiquated network/security architecture
Supply chain risk implications (soft underbelly)
Lack of sufficient digital risk due diligence in M&A
No data-centric approach
Too much reliance on IT, security people and a technical
solution
Organisations require a top-down approach to digital risk
Digital Risk
Planning
Plan for an attack
Response
Fall-out
Communication (Internal and external)
Defences
Identification
Forensics
Strategy
...and if all fails insurance
Supportive Technology
Technology isn’t the entire solution
Established suppliers v start-up technology
Technology v Services
Tendering issues
Inclusive digital risk awareness/training programme
Continuous assessments
Acceptance that humans are the weakest link whatever
technology you put in place
An inclusive approach
Interaction between physical & digital risk [security]
Convergence of digital & physical security
Corporate structure – does it support the digital risk
strategy?
Digital Risk permeates every part of business and any
plan must be inclusive to succeed.
That means everyone
Fiduciary responsibility
Can’t emphasise enough the boards’ role
Need for a digital strategy and a digital risk strategy
Protect your digital assets
Sector comparisons
Justification process
Formula for allocations
Return on investment
Governance
Digital Risk Reporting
Essential at various levels throughout the organisation
Needs to be applicable to the subject matter
Should enable issues to be easily identified [drill down]
Linked to compliance/governance
Must be relevant to the audience it’s addressing [simple
traffic lights]
Jargon buster
Accurate and truthful
Public Trust
Get your marketing people engaged
GDPR is an opportunity to communicate with all you
stakeholders.
Be seen to embrace GDPR
Winning public trust is worth the effort.
In conclusion
Re-evaluate your approach, your structure and your
systems in relation to digital assets/risk
Digital risk must be a focal point of the business –
develop a strategy
It affects everyone and must encompass everyone
Digital risk is fluid and needs constant review
Recognise your defences are fragile - plan for an attack
Embrace the changes that GDPR will bring

More Related Content

What's hot

The Concept of Luxury Brands - Presentation
The Concept of Luxury Brands - PresentationThe Concept of Luxury Brands - Presentation
The Concept of Luxury Brands - Presentation
Klaus Heine
 
Very Denim Marketing Straregy and Comms Plan
Very Denim Marketing Straregy and Comms PlanVery Denim Marketing Straregy and Comms Plan
Very Denim Marketing Straregy and Comms Plan
Becca Pow
 

What's hot (20)

Managing the digital firm
Managing the digital firmManaging the digital firm
Managing the digital firm
 
Business & Society
Business & SocietyBusiness & Society
Business & Society
 
business ethics
business ethicsbusiness ethics
business ethics
 
Business ethics..
Business ethics..Business ethics..
Business ethics..
 
MANGO (6)
MANGO (6)MANGO (6)
MANGO (6)
 
Zara 5 marketing key points
Zara 5 marketing key points Zara 5 marketing key points
Zara 5 marketing key points
 
The Concept of Luxury Brands - Presentation
The Concept of Luxury Brands - PresentationThe Concept of Luxury Brands - Presentation
The Concept of Luxury Brands - Presentation
 
MIS 201 ch1.ppt
MIS 201 ch1.pptMIS 201 ch1.ppt
MIS 201 ch1.ppt
 
History of corporate social responsibility
History of corporate social responsibilityHistory of corporate social responsibility
History of corporate social responsibility
 
Csr ppt
Csr pptCsr ppt
Csr ppt
 
Very Denim Marketing Straregy and Comms Plan
Very Denim Marketing Straregy and Comms PlanVery Denim Marketing Straregy and Comms Plan
Very Denim Marketing Straregy and Comms Plan
 
Corporate social responsibility
Corporate social responsibilityCorporate social responsibility
Corporate social responsibility
 
Corporate Social Responsibility (CSR)
Corporate Social Responsibility (CSR) Corporate Social Responsibility (CSR)
Corporate Social Responsibility (CSR)
 
HUMAN AND CULTURAL VARIABLES IN GLOBAL ORGANIZATION
HUMAN AND CULTURAL VARIABLES IN GLOBAL ORGANIZATIONHUMAN AND CULTURAL VARIABLES IN GLOBAL ORGANIZATION
HUMAN AND CULTURAL VARIABLES IN GLOBAL ORGANIZATION
 
Challenges Of Corporate Social Responsibility
Challenges Of Corporate Social ResponsibilityChallenges Of Corporate Social Responsibility
Challenges Of Corporate Social Responsibility
 
Gucci- Social Media Marketing Strategies using Internet & social networking s...
Gucci- Social Media Marketing Strategies using Internet & social networking s...Gucci- Social Media Marketing Strategies using Internet & social networking s...
Gucci- Social Media Marketing Strategies using Internet & social networking s...
 
Prada Business Model Evolution and Future
Prada Business Model Evolution and FuturePrada Business Model Evolution and Future
Prada Business Model Evolution and Future
 
Social Responsibility & Business Ethics
Social Responsibility & Business EthicsSocial Responsibility & Business Ethics
Social Responsibility & Business Ethics
 
Organization Structure and Design
Organization Structure and DesignOrganization Structure and Design
Organization Structure and Design
 
Business Ethics an Introduction
Business Ethics an IntroductionBusiness Ethics an Introduction
Business Ethics an Introduction
 

Similar to Boards' Eye View of Digital Risk & GDPR v2

Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challenge
FERMA
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Jacqueline Fick
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
ekyklos Κύκλος Ιδεών για τη Εθνική Ανασυγκρότηση
 
Data_Security_Guide_Everything_You_Need_to_Know.pdf
Data_Security_Guide_Everything_You_Need_to_Know.pdfData_Security_Guide_Everything_You_Need_to_Know.pdf
Data_Security_Guide_Everything_You_Need_to_Know.pdf
Mehdi Ahmadi
 

Similar to Boards' Eye View of Digital Risk & GDPR v2 (20)

Ensuring Data Protection Compliance.docx.pdf
Ensuring Data Protection Compliance.docx.pdfEnsuring Data Protection Compliance.docx.pdf
Ensuring Data Protection Compliance.docx.pdf
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challenge
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
 
Data_Security_Guide_Everything_You_Need_to_Know.pdf
Data_Security_Guide_Everything_You_Need_to_Know.pdfData_Security_Guide_Everything_You_Need_to_Know.pdf
Data_Security_Guide_Everything_You_Need_to_Know.pdf
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Data Security.pptx
Data Security.pptxData Security.pptx
Data Security.pptx
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutions
 

Recently uploaded

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
Renandantas16
 

Recently uploaded (20)

Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 

Boards' Eye View of Digital Risk & GDPR v2

  • 1. Boards’ Eye view of Digital Risk & GDPR Graham Mann Managing Director & Co-founder CyberSpace Defence Ltd. International House, 24 Holborn Viaduct, London EC1A 2BN g.mann@cyberspacedefence.com Mobile 07714210433
  • 2. Why care about digital risk? It makes good business sense It demonstrates customer focus It safeguards a key asset – data It underpins the business It secures IP and corporate secrets Increased governance = decreased fines
  • 3. Drivers for digital risk Increasing importance of data and its relative worth Impact of personal data loss on people’s lives Action to address data risk at the governmental level – compliance [GDPR in Europe] Exponential increase in cyber attacks Ever-increasing fines for non-compliance with local governance Lack of an holistic approach to security within many organisations
  • 4. The need for a digital strategy A plan or in the digital world a roadmap for the application of information and technology. This will inevitably include data and thereby have implications for data risk management. Critical to all businesses in this connected age Underpins business agility Enables good data governance by providing advanced notice of new data requirements or new processing requirements.
  • 5. Digital ‘Risk’ Strategy Supports the Digital Strategy Digital risk is an organisation-wide responsibility Digital risk needs a clear goal and a plan It supports good governance [GDPR] Vital for boards to manage digital risk This is essentially about managing your data Who’s responsible? What’s the relative importance? Where it resides Who should have, and who has access?
  • 6. Data can no longer be an afterthought Organisations are expected to protect data by design and default. In this context, by design means that whenever business practices, IT processes or physical infrastructures are conceptualised, maintaining privacy, and data security must be integrated at the outset. Requirement for data impact risk assessments to be made.
  • 7. Basic Questions You’ll need to be able to answer some basic questions about your data: What data is being processed? Why? By whom? For what purpose? Who is it being shared with? Can it be justified under GDPR or other governance models? Is there a data classification process?
  • 8. Digital Assets – Data Management GDPR Classification of data Storage, Encryption, Back-up and Removal Data retention policy Where is the data? Access rights – who has access to the data and under what conditions? Data leaks –what’s the plan?
  • 9. Risk Appetite Digital Risk spend v likelihood, impact & cost of a breach. Based on what data? GDPR changes established views It’s now about proving you did all you could to protect personally identifiable data. The tide has changed in favour of the individual Breach detection has been brought into sharp focus Data must be a key part of the ‘risk management framework’.
  • 10. Risk Appetite (cont’d) Critical to have an external review of Digital Risk to cross- compare against the internal Parameters to the digital risk decision Current security position Reasonable expectation of security Data strategy and plans External factors – types of attacks, sectors targeted, Need for business agility Investment [in security] need Governance
  • 12. Roles & Responsibilities Board responsibilities Senior management responsibilities Data Protection Officer (GDPR requirement in some circumstances) IT Team responsibilities Security Team responsibilities (if you have one) Employee responsibilities Executive Risk Committee [digital and physical] Security Working Groups Auditors [internal if you have one] Communication between key groups PR, Legal, Finance, Security, IT, HR….. Breach plan and procedures
  • 13. The Board Must set the agenda on data governance and digital risk Need to determine which committees will have responsibility for reviewing the detail and implementation of data protection measures. Company Secretary has an instrumental role Reporting to the Board on all matters pertaining to GDPR, data governance and breaches.
  • 14. The Human Element Education, education. education Social networking activity by employees Social engineering (Phishing) Pre-employment security checks Recruitment of cyber security professionals Outsourced Services Open environment for reporting potential data breach issues Communications
  • 16. Governance, Standards & Certifications It makes life easier adopting a standard like ISO 27001/2, Cyber Essentials, NIST, etc. If you haven’t already, you are strongly advised to adhere to a certification/standard A standard will provide structure to the cyber security protecting your digital assets You will almost certainly need to comply with GDPR - General Data Protection Regulation Compliance relating to personal data
  • 17. GDPR – in a nutshell Covers personal identifiable data on European subjects held and/or processed by you or a body authorised by you. Fines are potentially eyewatering. If you suffer a breach you need to notify the authorities within 72 hours You need to be able to demonstrate compliance, so processes and record keeping are essential You’re jointly responsible for your service provider breaches Personal data: If you don’t need it, don’t keep it
  • 18. Personal Data Individuals have the right under GDPR to: access their own data, or request rectification or erasure of data; and the right to request a restriction to processing or to ask for data to be handed over for use by another processor. Are you geared up for this? Do you know your rights and responsibilities?
  • 19. Risk Landscape (Cyber attacks and threats) Despite more money being spent on cyber security - $$$ A plethora of very clever cyber security solutions A huge base of highly-qualified cyber security professionals ……the risk landscape is worse than ever: why?
  • 20. Well, Here’s Why… the readily available and cheap attack tool-kits the chronic lack of cyber security professionals the high rewards to the hackers and criminals; the insatiable drive for business agility; the sheer number of cyber security solutions; the complexity of our networks; the explosion in the Internet of Things …and an ever-increasing connected world.
  • 21. The issue is compounded by.. Sector-based implications and associated risk levels Antiquated network/security architecture Supply chain risk implications (soft underbelly) Lack of sufficient digital risk due diligence in M&A No data-centric approach Too much reliance on IT, security people and a technical solution Organisations require a top-down approach to digital risk
  • 23. Plan for an attack Response Fall-out Communication (Internal and external) Defences Identification Forensics Strategy ...and if all fails insurance
  • 24. Supportive Technology Technology isn’t the entire solution Established suppliers v start-up technology Technology v Services Tendering issues Inclusive digital risk awareness/training programme Continuous assessments Acceptance that humans are the weakest link whatever technology you put in place
  • 25. An inclusive approach Interaction between physical & digital risk [security] Convergence of digital & physical security Corporate structure – does it support the digital risk strategy? Digital Risk permeates every part of business and any plan must be inclusive to succeed. That means everyone
  • 26. Fiduciary responsibility Can’t emphasise enough the boards’ role Need for a digital strategy and a digital risk strategy Protect your digital assets Sector comparisons Justification process Formula for allocations Return on investment Governance
  • 27. Digital Risk Reporting Essential at various levels throughout the organisation Needs to be applicable to the subject matter Should enable issues to be easily identified [drill down] Linked to compliance/governance Must be relevant to the audience it’s addressing [simple traffic lights] Jargon buster Accurate and truthful
  • 28. Public Trust Get your marketing people engaged GDPR is an opportunity to communicate with all you stakeholders. Be seen to embrace GDPR Winning public trust is worth the effort.
  • 29. In conclusion Re-evaluate your approach, your structure and your systems in relation to digital assets/risk Digital risk must be a focal point of the business – develop a strategy It affects everyone and must encompass everyone Digital risk is fluid and needs constant review Recognise your defences are fragile - plan for an attack Embrace the changes that GDPR will bring