SlideShare a Scribd company logo
1 of 19
Download to read offline
Beyond GDPR Compliance
How IT Audit can support General Data Protection
Regulation (GDPR) remediation activities
Omo Osagiede, CISSP, CISA
November, 2017
Sub-section
OUTLINE
• Internal Audit as a strategic partner
• The GDPR Audit Universe
• How can Internal Audit support?
• DPIA
• Big picture view of personal data
• Data subject rights
• Pseudonymisation
• Cloud processing
• Big data
@OmoruyiOsagiede
Beyond GDPR compliance…
• Many organisations are only focused on May 25, 2018 when the GDPR
becomes enforceable.

• More than merely complying with regulation, GDPR encourages good
practices for data privacy and data protection which should become
embedded within organisations beyond May 2018 

• There is increasing expectation from senior stakeholders for Internal
Audit to add value in more strategic business risk areas.

• GDPR compliance is fundamentally a risk management exercise, which
Internal Audit is well equipped to support.

• While maintaining independence, internal auditors can play a significant
role by ensuring that the right data privacy/protection controls are built-
in at the front-end of the compliance journey.
@OmoruyiOsagiede
1
The growing strategic partnership role of IA
Traditional role of IA - project focused on its core
competency, reinforcing and monitoring internal control
environment and compliance.
Provide high quality and relevant business
insights to support organisational change.
Serve as subject matter
experts to business
management, supporting
key objectives and
strategic initiatives.
Core IA
competency
@OmoruyiOsagiede
Strategic business
advisor
Expertise
Relationship
andinsight
2
Examples of strategic partnership under GDPR
Provide ‘big picture
view’ of GDPR beyond
individual work streams
and highlight control
interdependencies.
Support the cultural
mindset shift from
‘company owns data’ to
‘customer owns data
and we are custodians’.
Highlight potential
control design gaps in
GDPR remediation
activities through early
identification.
Advocate for data
privacy risk to be
considered alongside
digital transformation
and other strategic
initiatives.
IA
#1
#3
#2
#4
@OmoruyiOsagiede
3
One view of the GDPR ‘Audit Universe’
Data privacy
risk
management
Data
management/
Inventory
Privacy
principles,
policies &
procedures
Information
security
Privacy
training and
awareness
Data breach
incident
management
Compliance
monitoring
Vendor
Management/
cross border
transfers
Governance /
Program
Management
GDPR
- GAPP
- ICO
@OmoruyiOsagiede
4
Examples of GDPR technology considerations
• What types of data do you hold?
• Where is the data held?
• Is unstructured data in-scope?
• How transparent are the
secondary uses of data?
• Are you catering for non-
obvious personal data
identifiers e.g., IP addresses,
RFID tags, cookies, CCTV and
sensitive personal data?
• How are you managing data
subject rights across all
service platforms: voice, web
and mobile?
• How are you discerning
information service users
below legal age limit? (16 - UK)
• How are you managing
privacy in cloud service
environments?
• Can you provide data
subjects with data in
portable formats?
• How are you embedding
privacy into systems
development lifecycles?
• How do you determine
appropriateness of
safeguards: Minimisation,
pseudonymisation,
encryption?
@OmoruyiOsagiede
5
How can Internal Audit support?
1. Facilitate Data Protection Impact Assessments
Ref: Article 35 & 36 | Recitals 74 to 96
Embedding DPIA into business-as-usual has benefits for:
Existing data
processing estate
In-flight IT projects
(development & acquisition)
Future dev &
business change
IA acting as an SME can facilitate a risk-
based DPIA approach
Internal Audit should challenge the business to institutionalise DPIA across:
Privacy risk
management
Privacy-by-
design
Vendor
management
Information
security
@OmoruyiOsagiede
6
2. Support a ‘big picture view’ of personal data
Objective: To demonstrate
compliance, controller or processor
should maintain records of processing
activities under its responsibility and
implement technical and
organisational measures.
Objective: Ensure the governance
and management of data as a
strategic business asset in order
to derive maximum value from it.
Article 30 | Recitals 82, 89, 90
GDPR
Business
@OmoruyiOsagiede
7
Pseudonymised
data with attribution
IP
addresses
CCTV
images
MAC
addresses
Cookie
identifiers
RFID tags
Name
Date of
birth
Sexual
orientation
Racial
origin
Political
opinions
Religion or
beliefs
Address
Biometric &
genetic data
National
Insurance
number
Criminal
convictions
Trade Union
Membership
Email address
Social media
posts
Bank details
Personal
data
landscape
@OmoruyiOsagiede
8
3. Conduct data flow mapping review
Provide assurance on the data flow
mapping process. Ensure mapping
considers all flows. For example:
Customer Organisation
Vendor (inc cloud)Business
Vendor Vendor
EU organisation Non-EU org
At what point in data generation or
collection is lawful processing
determined?
Questions IA should flag during data
flow mapping exercise
At what point is consent captured (if
used as grounds for processing)?
Do storage locations and formats easily
facilitate data subject rights including:
SARs, right to erasure, rectification,
portability?
Are data retention periods documented?
Are confidentiality, integrity and
availability requirements identified?
What data items are being collected and
in what formats?
@OmoruyiOsagiede
9
4. Identify opportunities to improve data governance
GDPR presents an opportunity for your organisation to join up data governance/
digital transformation work streams with data privacy/protection compliance
objectives.
GDPR data
management/
Inventory
Data architecture &
management
Data modelling & data
development
Reference & Master
Data Management
Data warehouse &
Business Intelligence
Document & Content
Management
Data integration
Database operations
management
Data security
Meta-data
management
Data quality
management
Source: DMBOK Functional Framework v3 (DAMA)
@OmoruyiOsagiede
10
5a. Prepare for the potential increase in data
subject rights requests
18,300
Total data protection concerns brought
to ICO in 2016/17 - 2,000 more than
previous year. Trending upwards

42%
Data protection concerns relating to
Subject Access Requests. Same as
previous year
11%
Data protection concerns relating to
inaccurate data. Lower than previous
year
70%
70% of concerns reported to the ICO centred on
areas where customer service is a key factor.
Source: Information Commissioner’s Annual Report and Financial Statements 2016/17
@OmoruyiOsagiede
11
Will these trends
change after May
2018?
5b. Support enhancements to IT systems
Right to erasure
Data portability
Subject access requests
Consent management
Rectification of
inaccurate data
Restriction of processing
Potential increase in data subject rights requests could result in the need for
technology investment to operationalise business processes to help address
projected volumes and improve customer service.
System requirements
System design &
testing
Systems
implementation
Business process
design & testing
Data subject rights
(customers & employees)
Ref: Articles 13 to 23
@OmoruyiOsagiede
12
6. Ensure segregation: Data pseudonymisation
Questions IA should ask about pseudonymisation:
Does system design permit the
attribution of pseudonymised data
to natural persons through data
enrichment?
Is domain segregation applied to
separate attribution data from
pseudonymised data?
Is access to attribution information
segregated from pseudonymised
data? Who retains the key?
Psuedonymised data
(prod, dev, test)
Attribution data
permitting
re-identification
Process A Process BToxic
combination
Ref: Recitals: 26, 28, 29 | Article 4(5), 25(1), 32(1)a
Domain
separation
Inappropriate
access
Risk-based approach to applying
pseudonymisation? (i.e., are
avoidance, encryption, anonymisation
more appropriate?)
User
@OmoruyiOsagiede
13
7. Review data privacy in cloud processing
Assumption: Your organisation (data controller) may already use a
public cloud (processor) service provider (IaaS, PaaS, SaaS).
Does the org
maintain records of
data processing in
the cloud?
*Do CSP contracts
& MSAs include
relevant clauses for
data protection in
line with GDPR
requirements?
Does cloud solution
architecture provide
data location control
to the org?
Ref: Articles 4(7&8), 24(1), 26 (1), 28, 29, 36
Can CSP assure
support access to
client data is
restricted to EU-
based employees
only?
Who controls
master keys for
encrypting data-at-
rest and in-transit?
Have controller,
processor and
sub-processor
responsibilities
been defined?
Have cloud DPIAs
been performed?
Can CSP support
the delivery of data
subject rights?
Have CSP’s data
protection practices
been reviewed?
*See: CSA Code of Conduct for GDPR Compliance
@OmoruyiOsagiede
14
8. Enable big data WITH privacy
Fairness
Transparency
& Purpose
Limitation Privacy
Enhancing
Technologies
Data
Minimisation
Rights of
individuals
How do you ensure
algorithms are not
repurposed in
unexpected ways and
drawing unexpected
conclusions about data
subjects?
Has organisation
considered other lawful
processing options
other than traditional
consent - which is not
always practical in big
data scenarios where
repurposing is
common?
How do you avoid
excessive data
collection? How do you
guarantee retention and
right-to-erasure?
Does the organisation
maintain adequate meta-
data to facilitate delivery
of data subject rights?
How do you ensure
PETs are designed by
default into big data
solutions?
Business benefits of big data (‘3 Vs*’) - including analysis through artificial
intelligence & machine learning - must be balanced with privacy risks.
Some questions which IA should ask Data Scientists include:
@OmoruyiOsagiede
*Volume, velocity and variety
15
How can IA achieve strategic partnership with the business?
Omo Osagiede
https://www.linkedin.com/in/omoosagiede/ @borderless_i
•Thing beyond GDPR compliance.
•Think beyond the annual audit plan.
•Provide the big picture view.
•Keep the business outcomes for GDPR in mind.
•Actively look for opportunities to add value.
•Build relationships.
•Maintain independence.

More Related Content

What's hot

Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceGeek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceIDERA Software
 
Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?Ulf Mattsson
 
Getting Started with GDPR Compliance
Getting Started with GDPR ComplianceGetting Started with GDPR Compliance
Getting Started with GDPR ComplianceDATAVERSITY
 
Quick Introduction to the EU GDPR by Sami Zahran
Quick Introduction to the EU GDPR by Sami ZahranQuick Introduction to the EU GDPR by Sami Zahran
Quick Introduction to the EU GDPR by Sami ZahranDr. Sami Zahran
 
Building the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceBuilding the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceIndex Engines Inc.
 
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readinessGeneral Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readinessOmo Osagiede
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsUlf Mattsson
 
Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017Index Engines Inc.
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowIntegrate
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Zoodikers
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesOgilvy Consulting
 
Webianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection frameworkWebianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection frameworkLeigh Hill
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
 
Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO
 
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...CIO Edge
 
GDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratgGDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratgCyber StratG
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by QualsysQualsys Ltd
 
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...DATUM LLC
 

What's hot (20)

Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceGeek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
 
Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?
 
Getting Started with GDPR Compliance
Getting Started with GDPR ComplianceGetting Started with GDPR Compliance
Getting Started with GDPR Compliance
 
Quick Introduction to the EU GDPR by Sami Zahran
Quick Introduction to the EU GDPR by Sami ZahranQuick Introduction to the EU GDPR by Sami Zahran
Quick Introduction to the EU GDPR by Sami Zahran
 
Building the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceBuilding the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR Compliance
 
GDPR - 5 Months On!
GDPR - 5 Months On!GDPR - 5 Months On!
GDPR - 5 Months On!
 
Gdpr action plan
Gdpr action plan Gdpr action plan
Gdpr action plan
 
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readinessGeneral Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
Webianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection frameworkWebianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection framework
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy
 
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
 
GDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratgGDPR most actionable cheatsheet and checklist by cyberstratg
GDPR most actionable cheatsheet and checklist by cyberstratg
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
 

Similar to Beyond GDPR Compliance - Role of Internal Audit

Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationGDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationDenodo
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerCapgemini
 
Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPRJuan Niekerk
 
Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPRJuan Niekerk
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
Unified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphUnified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphVaticle
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCapgemini
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKUlf Mattsson
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaUlf Mattsson
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
GDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationGDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationDenodo
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataNeo4j
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protectionUlf Mattsson
 

Similar to Beyond GDPR Compliance - Role of Internal Audit (20)

Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationGDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data Virtualization
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPR
 
Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPR
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
Unified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphUnified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge Graph
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
GDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationGDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data Virtualization
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protection
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
 

Recently uploaded

Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardsticksaastr
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 

Recently uploaded (20)

Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 

Beyond GDPR Compliance - Role of Internal Audit

  • 1. Beyond GDPR Compliance How IT Audit can support General Data Protection Regulation (GDPR) remediation activities Omo Osagiede, CISSP, CISA November, 2017
  • 2. Sub-section OUTLINE • Internal Audit as a strategic partner • The GDPR Audit Universe • How can Internal Audit support? • DPIA • Big picture view of personal data • Data subject rights • Pseudonymisation • Cloud processing • Big data @OmoruyiOsagiede
  • 3. Beyond GDPR compliance… • Many organisations are only focused on May 25, 2018 when the GDPR becomes enforceable. • More than merely complying with regulation, GDPR encourages good practices for data privacy and data protection which should become embedded within organisations beyond May 2018 • There is increasing expectation from senior stakeholders for Internal Audit to add value in more strategic business risk areas. • GDPR compliance is fundamentally a risk management exercise, which Internal Audit is well equipped to support. • While maintaining independence, internal auditors can play a significant role by ensuring that the right data privacy/protection controls are built- in at the front-end of the compliance journey. @OmoruyiOsagiede 1
  • 4. The growing strategic partnership role of IA Traditional role of IA - project focused on its core competency, reinforcing and monitoring internal control environment and compliance. Provide high quality and relevant business insights to support organisational change. Serve as subject matter experts to business management, supporting key objectives and strategic initiatives. Core IA competency @OmoruyiOsagiede Strategic business advisor Expertise Relationship andinsight 2
  • 5. Examples of strategic partnership under GDPR Provide ‘big picture view’ of GDPR beyond individual work streams and highlight control interdependencies. Support the cultural mindset shift from ‘company owns data’ to ‘customer owns data and we are custodians’. Highlight potential control design gaps in GDPR remediation activities through early identification. Advocate for data privacy risk to be considered alongside digital transformation and other strategic initiatives. IA #1 #3 #2 #4 @OmoruyiOsagiede 3
  • 6. One view of the GDPR ‘Audit Universe’ Data privacy risk management Data management/ Inventory Privacy principles, policies & procedures Information security Privacy training and awareness Data breach incident management Compliance monitoring Vendor Management/ cross border transfers Governance / Program Management GDPR - GAPP - ICO @OmoruyiOsagiede 4
  • 7. Examples of GDPR technology considerations • What types of data do you hold? • Where is the data held? • Is unstructured data in-scope? • How transparent are the secondary uses of data? • Are you catering for non- obvious personal data identifiers e.g., IP addresses, RFID tags, cookies, CCTV and sensitive personal data? • How are you managing data subject rights across all service platforms: voice, web and mobile? • How are you discerning information service users below legal age limit? (16 - UK) • How are you managing privacy in cloud service environments? • Can you provide data subjects with data in portable formats? • How are you embedding privacy into systems development lifecycles? • How do you determine appropriateness of safeguards: Minimisation, pseudonymisation, encryption? @OmoruyiOsagiede 5
  • 8. How can Internal Audit support?
  • 9. 1. Facilitate Data Protection Impact Assessments Ref: Article 35 & 36 | Recitals 74 to 96 Embedding DPIA into business-as-usual has benefits for: Existing data processing estate In-flight IT projects (development & acquisition) Future dev & business change IA acting as an SME can facilitate a risk- based DPIA approach Internal Audit should challenge the business to institutionalise DPIA across: Privacy risk management Privacy-by- design Vendor management Information security @OmoruyiOsagiede 6
  • 10. 2. Support a ‘big picture view’ of personal data Objective: To demonstrate compliance, controller or processor should maintain records of processing activities under its responsibility and implement technical and organisational measures. Objective: Ensure the governance and management of data as a strategic business asset in order to derive maximum value from it. Article 30 | Recitals 82, 89, 90 GDPR Business @OmoruyiOsagiede 7
  • 11. Pseudonymised data with attribution IP addresses CCTV images MAC addresses Cookie identifiers RFID tags Name Date of birth Sexual orientation Racial origin Political opinions Religion or beliefs Address Biometric & genetic data National Insurance number Criminal convictions Trade Union Membership Email address Social media posts Bank details Personal data landscape @OmoruyiOsagiede 8
  • 12. 3. Conduct data flow mapping review Provide assurance on the data flow mapping process. Ensure mapping considers all flows. For example: Customer Organisation Vendor (inc cloud)Business Vendor Vendor EU organisation Non-EU org At what point in data generation or collection is lawful processing determined? Questions IA should flag during data flow mapping exercise At what point is consent captured (if used as grounds for processing)? Do storage locations and formats easily facilitate data subject rights including: SARs, right to erasure, rectification, portability? Are data retention periods documented? Are confidentiality, integrity and availability requirements identified? What data items are being collected and in what formats? @OmoruyiOsagiede 9
  • 13. 4. Identify opportunities to improve data governance GDPR presents an opportunity for your organisation to join up data governance/ digital transformation work streams with data privacy/protection compliance objectives. GDPR data management/ Inventory Data architecture & management Data modelling & data development Reference & Master Data Management Data warehouse & Business Intelligence Document & Content Management Data integration Database operations management Data security Meta-data management Data quality management Source: DMBOK Functional Framework v3 (DAMA) @OmoruyiOsagiede 10
  • 14. 5a. Prepare for the potential increase in data subject rights requests 18,300 Total data protection concerns brought to ICO in 2016/17 - 2,000 more than previous year. Trending upwards 42% Data protection concerns relating to Subject Access Requests. Same as previous year 11% Data protection concerns relating to inaccurate data. Lower than previous year 70% 70% of concerns reported to the ICO centred on areas where customer service is a key factor. Source: Information Commissioner’s Annual Report and Financial Statements 2016/17 @OmoruyiOsagiede 11 Will these trends change after May 2018?
  • 15. 5b. Support enhancements to IT systems Right to erasure Data portability Subject access requests Consent management Rectification of inaccurate data Restriction of processing Potential increase in data subject rights requests could result in the need for technology investment to operationalise business processes to help address projected volumes and improve customer service. System requirements System design & testing Systems implementation Business process design & testing Data subject rights (customers & employees) Ref: Articles 13 to 23 @OmoruyiOsagiede 12
  • 16. 6. Ensure segregation: Data pseudonymisation Questions IA should ask about pseudonymisation: Does system design permit the attribution of pseudonymised data to natural persons through data enrichment? Is domain segregation applied to separate attribution data from pseudonymised data? Is access to attribution information segregated from pseudonymised data? Who retains the key? Psuedonymised data (prod, dev, test) Attribution data permitting re-identification Process A Process BToxic combination Ref: Recitals: 26, 28, 29 | Article 4(5), 25(1), 32(1)a Domain separation Inappropriate access Risk-based approach to applying pseudonymisation? (i.e., are avoidance, encryption, anonymisation more appropriate?) User @OmoruyiOsagiede 13
  • 17. 7. Review data privacy in cloud processing Assumption: Your organisation (data controller) may already use a public cloud (processor) service provider (IaaS, PaaS, SaaS). Does the org maintain records of data processing in the cloud? *Do CSP contracts & MSAs include relevant clauses for data protection in line with GDPR requirements? Does cloud solution architecture provide data location control to the org? Ref: Articles 4(7&8), 24(1), 26 (1), 28, 29, 36 Can CSP assure support access to client data is restricted to EU- based employees only? Who controls master keys for encrypting data-at- rest and in-transit? Have controller, processor and sub-processor responsibilities been defined? Have cloud DPIAs been performed? Can CSP support the delivery of data subject rights? Have CSP’s data protection practices been reviewed? *See: CSA Code of Conduct for GDPR Compliance @OmoruyiOsagiede 14
  • 18. 8. Enable big data WITH privacy Fairness Transparency & Purpose Limitation Privacy Enhancing Technologies Data Minimisation Rights of individuals How do you ensure algorithms are not repurposed in unexpected ways and drawing unexpected conclusions about data subjects? Has organisation considered other lawful processing options other than traditional consent - which is not always practical in big data scenarios where repurposing is common? How do you avoid excessive data collection? How do you guarantee retention and right-to-erasure? Does the organisation maintain adequate meta- data to facilitate delivery of data subject rights? How do you ensure PETs are designed by default into big data solutions? Business benefits of big data (‘3 Vs*’) - including analysis through artificial intelligence & machine learning - must be balanced with privacy risks. Some questions which IA should ask Data Scientists include: @OmoruyiOsagiede *Volume, velocity and variety 15
  • 19. How can IA achieve strategic partnership with the business? Omo Osagiede https://www.linkedin.com/in/omoosagiede/ @borderless_i •Thing beyond GDPR compliance. •Think beyond the annual audit plan. •Provide the big picture view. •Keep the business outcomes for GDPR in mind. •Actively look for opportunities to add value. •Build relationships. •Maintain independence.