SlideShare a Scribd company logo
1 of 32
Download to read offline
New EU security legislation and
open source management
Dan Hedley, Irwin Mitchell LLP
Some scene setting
79,000 known OSS vulnerabilities, 30,000 reported since 2000
96% of applications scanned found open source components with an average of 147 unique
components per application
67% of applications scanned had known open source vulnerabilities
Those vulnerabilities known on average for more than four years
• e.g. almost 200,000 devices with the Heartbleed vulnerability still on the Internet (Shodan
2017)
OSS vulnerabilities are attractive targets:
• OSS is ubiquitous
• Victim often doesn’t know OSS is there
• For everyone:
• General Data Protection Regulation
• For some businesses:
• NIS Directive
• Electronic Identification Regulation
Why this matters – some key new legislation
• Comprehensive reform of data privacy law
• In force 25 May 2018
• NEW – extra-territorial effect
• NEW – direct obligations for processors
• NEW –more detailed and prescriptive security requirements
• NEW – obligation to document security decisions and processes
• NEW – mandatory detailed breach reporting for everyone (most of the time)
GDPR – what it is and what it does
APPLIES TO:
“the processing of personal data wholly or partly by automated means and to the processing other
than by automated means of personal data which form part of a filing system or are intended to form
part of a filing system”
“processing” = “any operation or set of operations which is performed on personal data or on sets of
personal data, whether or not by automated means, such as collection, recording, organisation,
structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission,
dissemination or otherwise making available, alignment or combination, restriction, erasure or
destruction”
“personal data” = “any information relating to an identified or identifiable natural person (‘data
subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular
by reference to an identifier such as a name, an identification number, location data, an online
identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic,
cultural or social identity of that natural person”
GDPR – subject matter scope (art 2)
• Applies if processing takes place in the context of the
activities of an establishment in a member state (regardless
of data location).
• ALSO applies if NO establishment in a member state BUT:
• Offering goods or services to data subjects located in
member states (no payment required)
• Monitoring behaviour of data subjects in member states
GDPR – territorial scope (art 3)
• Under current law, data processors (e.g. IT service providers) have no
direct liability to data subjects or regulators.
• Only exposure is contractual, to the controller
• Failure to deal with contractually = controller’s problem
• Under GDPR, processors have direct obligations and direct liability for a
range of obligations, including obligations to secure data, to ensure it has a
compliant contractual obligation to the controller to secure it, & to
cooperate with the regulator.
GDPR – application to data processors
“Personal data shall be processed in a manner that ensures appropriate
security of the personal data, including protection against unauthorised
or unlawful processing and against accidental loss, destruction or
damage, using appropriate technical or organisational measures”
• Fleshed out more in art 32 (next slides)
• Burden of proof of compliance on data controller
GDPR – security principle - art 5(1)(f)
1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and
purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural
persons, the controller and the processor shall implement appropriate technical and organisational measures to
ensure a level of security appropriate to the risk, including inter alia as appropriate:
(a) the pseudonymisation and encryption of personal data;
(b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and
services;
(c) the ability to restore the availability and access to personal data in a timely manner in the event of a physical
or technical incident;
(d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational
measures for ensuring the security of the processing.
2. In assessing the appropriate level of security account shall be taken in particular of the risks that are
presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorised
disclosure of, or access to personal data transmitted, stored or otherwise processed.
GDPR – security (art 32)
• Core obligation to “implement appropriate technical and
organisational measures”
• Requires a risk assessment
• So, must know what the risks are!
• Balance risk against state of the art, cost
• Risks to consider include “accidental or unlawful destruction,
loss, alteration, unauthorised disclosure of, or access to personal
data transmitted, stored or otherwise processed”
Unpacking article 32 /1
Then a list of things must consider and either implement or have
a reason to reject, incl.
• “the ability to ensure the ongoing confidentiality, integrity,
availability and resilience of processing systems and services”
• “a process for regularly testing, assessing and evaluating the
effectiveness of technical and organisational measures for
ensuring the security of the processing”
Unpacking article 32 /2
• Controllers and processors must comply with record keeping
obligations.
• INCLUDES record of security measures and decisions taken
under art 32
• Make avail to regulator on request
• Only exception = <250 staff AND only occasional processing,
no likely risk to DSs, no “special categories” of data
GDPR – obligation to document (art 30)
• Controller – to regulator UNLESS unlikely to result in a risk to rights and
freedoms
• 72 hours unless not “feasible” (basically, have a v good reason)
• Time runs from “awareness”
• WP29 guidance that awareness of processor = awareness of controller!
• Processor – to controller
• Without undue delay – means “as soon as possible”
• Controller – to data subjects IF high risk to rights and freedoms
• Without undue delay
• Information to be provided to regulator includes
• Nature of the breach (i.e. how it happened, who affected etc.)
• Likely consequences of the breach
• Mitigation and remediation measures
GDPR – mandatory breach reporting
• Much of it devoted to establishment of agencies and a cross-border infosec
cooperation framework
• But ch IV & V also addnl obligations for some businesses:
• “Operators of essential services”
• Energy, transport, banking, financial infrastructure, healthcare, water supply, digital infrastructure
• “Digital service providers”
• Online marketplace, online search engine, cloud computing platforms
• Transposition deadline May 2018
Network and Information Security Directive /1
• From a security perspective, covers a lot of the same ground
• Applies based on activities and characteristics of ENTITY, not characteristics of
affected DATA
• If GDPR-compliant, prob. most of the way there BUT devil is in the detail esp.
notification requirements
• Micro and small business exception for digital service providers
• Additional regulators
• OES – by sector
NIS Directive – what does it add to GDPR?
“Operators of essential services”
•Designated by the state
•“appropriate and proportionate technical and organisational measures”
to “manage the risks posed” to security of networks and information
systems
•Mandatory breach notification “without undue delay”
Network and Information Security Directive /2
“Digital Service Providers”
•“appropriate and proportionate technical and organisational measures to manage the risks posed to
the security of network and information systems which they use in the context of offering …”
[marketplace, search engine, cloud services etc.]
•“A level of security of network and information systems appropriate to the risk posed” & taking into
account a range of factors including
• “the security of systems and facilities”
• “monitoring, auditing and testing”
• Mandatory notification without undue delay of “any incident having a substantial impact on the
provision of a [digital service] that they offer in the Union”
Network and Information Security Directive /3
In the UK, govt issued draft “high level principles” and NCSC has issued
initial generic guidance.
Of interest:
• A.2 Risk Management
“There should be efforts to seek an understanding of potential system vulnerabilities that the identified threats might attempt to take
advantage of. This might include technical vulnerabilities, misuse of legitimate business processes or anything else that could impact
the essential service.”
• B.4 System Security
“Software should be supported and up to date with security patches applied. Where patching is technically problematic there are other
possible mitigations but these should be viewed as sub-optimal and care must be taken to ensure that they are effective.”
Network and Information Security Directive /4
• Applies to “trust service providers”
“appropriate technical and organisational measures to manage the risks posed to the security
of the trust services they provide. Having regard to the latest technological developments,
those measures shall ensure that the level of security is commensurate to the degree of risk.
In particular, measures shall be taken to prevent and minimise the impact of security
incidents and inform stakeholders of the adverse effects of any such incidents.”
• Mandatory breach notification within 24 hours if “a significant impact on the trust
service provided or on the personal data maintained therein”
•Potentially to several bodies
Electronic Identification Regulation
• Legislation is technology neutral
• Compliance is self-assessed at the time, retrospectively re-
assessed by regulators post breach
• Strong legal obligations to secure
• Unlikely that 3P vendors will take much if any liability for OSS
• It is for the breached party to show that its security was
“adequate”
Relevance to OSS management /1
• From 2014 guidance published by the ICO, the UK data privacy regulator (emphasis added):
“It is ... important that any software you use to process personal data is subject to an appropriate
security updates policy ... you must also ensure that no relevant components are ignored. This is a
common risk where responsibility for updates is split between multiple people, or where third-party
libraries or frameworks are used.”
• The UK ICO at least has fined people specifically for failure to do this.
•E.g. Gloucester City Council
•& under GDPR, fines potentially get much much bigger …
• Reminder: 67% of applications scanned by Black Duck in 2016 contained unpatched OSS
vulnerabilities.
Relevance to OSS management /2
How does it get into org:
• From vendor, due diligence and ongoing dialog as to patch
and security management
• Contractual? Sometimes. Starting to see in regulated industries e.g.
finance
• Clarity as to who is responsible for what is key
• Patching reporting and SLA?
• From own code base, check-in processes and scanning tools
• Other sessions covering this in some detail
Relevance to OSS management /3
• Potential for very large fines (up to EUR20mn / 4% of global turnover under
GDPR)
• NB turnover of “undertaking” - in EU case law tends to mean an economic unit,
not legal person, so potential for measurement by reference to whole group
• Reputational damage (e.g. TalkTalk, Yahoo!)
• Damages claims by data subjects
• Regulatory intervention
• Possibility under GDPR of class actions led by charities and campaign groups
Consequences of failure
• Equifax happened pre-GDPR
• Full facts yet to be established
• Based on what we know … about 700,000 EU citizens affected
• Might be investigated by one or more regulators, depending on who is affected (i.e. geography)
and “context of establishment”
• Regulators have power to carry out joint ops.
• Issues would be:
1. Whether the fact of the breach would mean a failure to comply with article 32
2. Whether the delay in reporting would be a breach of articles 33 and/or 34
3. If so, whether that breach is symptomatic of systemic problems leading to the failure to notify which
themselves amount to a breach of article 32
4. What the data of EU residents was doing on Equifax’s US servers in the first place, and whether that data
export had been done lawfully
How would Equifax have played out under GDPR?
• Breach “made possible” through Apache Struts vuln notified on 8 March
• Equifax had a patching policy, backed with some kind of scanning tool.
• Both failed. Vuln never patched.
• Parallels with Gloucester City Council:
• Data controller aware of vuln
• Knows it must patch
• Fails to do so
• Bad Things Happen
• Attackers apparently had access to data from 13 May, Equifax failed to detect until 29 July
• Data not encrypted at rest – but would that have helped?
• Response/mitigation botched? (art 83(2)(c) GDPR explicitly makes mitigation a factor)
Issue 1 – breach of article 32?
• To authorities, 72 hours unless unlikely to result in risk to people concerned
• Low threshold, clearly met in this case
• Time runs from “awareness” – when was Equifax aware?
• WP29 – “reasonable degree of certainty” that a breach has occurred and personal data
compromised as a result
• Investigation to get to that point must still be “prompt”
• 15 August(ish) – so report by 18 August
• Phased reporting acceptable (so incomplete investigation does not obviate need to report)
• To data subjects, “without undue delay”
• 7 September i.e. ~1 month
• Might reas. take the view that scale, impact of going public and necessity to prepare would
allow that delay? Authority would have power to instruct
Issue 2 – breach of notification obligations?
• Issue 3 don’t have enough facts to assess yet
• Issue 4:
• Equifax’s EU systems apparently not affected
• EU citizens’ data present on US systems “because of an oversight”
• Enough to catch Equifax’s Irish entity?
• Suggests export was not lawful in the first place
• PLUS but for the unlawful export, would they have been affected at all?
Issues 3 and 4
• General point about fines stands i.e. not going to leap to the maximum for
every breach
• BUT authorities (incl. ICO) lobbied for these powers for “the most serious
breaches”
• Articles 32, 33 and 34 are 2%/10mn infringements
• BUT infringement of article 5(1)(f) basic security principle is a 4% / 20mn
infringement
• Fines for multiple breaches capped at the maximum for most serious breach
(art 83(3) GDPR).
Consequences – administrative fines
• Mandatory arbitration clauses and adverse compulsory
venue clauses are basically unenforceable against
consumers in EU (cf USA)
• So, prospect of action in EU courts by affected people
• Consumer group class action provisions
• Remains to be seen how e.g. US courts might treat judgment
of an EU court on this (and I’m open to views on the subject
from US lawyers!)
Consequences - right of action for affected people
• The law has caught up with infosec risks
• Compliance is self-assessed at the time, but its adequacy is
retrospectively considered by the authorities post breach – so you
need to have a good story to tell
• OSS is not a special case and is not a get-out clause
• Failure to manage OSS vulnerabilities is unlikely to be accepted as an
excuse by regulators
• Financial and other consequences can be very serious
Conclusions and takeaways
Questions?
Dan Hedley
Irwin Mitchell LLP
+44 (0) 1293 742 717
daniel.hedley@irwinmitchell.com
@DanHedleyIM

More Related Content

What's hot

Prioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controlsPrioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controlsEnclaveSecurity
 
More practical insights on the 20 critical controls
More practical insights on the 20 critical controlsMore practical insights on the 20 critical controls
More practical insights on the 20 critical controlsEnclaveSecurity
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controlsEnclaveSecurity
 
Using an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized DefenseUsing an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized DefenseEnclaveSecurity
 
Slide Deck CISSP Class Session 2
Slide Deck CISSP Class Session 2Slide Deck CISSP Class Session 2
Slide Deck CISSP Class Session 2FRSecure
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSJohn Gilligan
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementEnclaveSecurity
 
Leveraging Federal Procurement to Improve Cyber Security
Leveraging Federal Procurement to Improve Cyber SecurityLeveraging Federal Procurement to Improve Cyber Security
Leveraging Federal Procurement to Improve Cyber SecurityJohn Gilligan
 
BSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity ModelBSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity ModelCigital
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 
Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...John M. Willis
 
What is a cybersecurity assessment 20210813
What is a cybersecurity assessment  20210813What is a cybersecurity assessment  20210813
What is a cybersecurity assessment 20210813Kinetic Potential
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 

What's hot (20)

Prioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controlsPrioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controls
 
More practical insights on the 20 critical controls
More practical insights on the 20 critical controlsMore practical insights on the 20 critical controls
More practical insights on the 20 critical controls
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
 
Using an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized DefenseUsing an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized Defense
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Slide Deck CISSP Class Session 2
Slide Deck CISSP Class Session 2Slide Deck CISSP Class Session 2
Slide Deck CISSP Class Session 2
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Incident response
Incident responseIncident response
Incident response
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to Measurement
 
Leveraging Federal Procurement to Improve Cyber Security
Leveraging Federal Procurement to Improve Cyber SecurityLeveraging Federal Procurement to Improve Cyber Security
Leveraging Federal Procurement to Improve Cyber Security
 
BSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity ModelBSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity Model
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
What is a cybersecurity assessment 20210813
What is a cybersecurity assessment  20210813What is a cybersecurity assessment  20210813
What is a cybersecurity assessment 20210813
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 

Similar to New Security Legislation & It's Implications for OSS Management

New Security Legislation & Its Implications for OSS Management
New Security Legislation & Its Implications for OSS Management New Security Legislation & Its Implications for OSS Management
New Security Legislation & Its Implications for OSS Management Jerika Phelps
 
New Security Legislation and its Implications for OSS Management
New Security Legislation and its Implications for OSS ManagementNew Security Legislation and its Implications for OSS Management
New Security Legislation and its Implications for OSS ManagementBlack Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
EU cybersecurity requirements under current and future medical devices regula...
EU cybersecurity requirements under current and future medical devices regula...EU cybersecurity requirements under current and future medical devices regula...
EU cybersecurity requirements under current and future medical devices regula...Erik Vollebregt
 
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...PECB
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceIT Governance Ltd
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...ARMA International
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?IT Governance Ltd
 
State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...Vsevolod Shabad
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
Cyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarlandCyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarlandHighervista
 
General Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
General Data Protection Regulation and Compliance - GDPR: Sharique M RizviGeneral Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
General Data Protection Regulation and Compliance - GDPR: Sharique M RizviSharique Rizvi
 
GDPR: The Application Security Twist
GDPR: The Application Security TwistGDPR: The Application Security Twist
GDPR: The Application Security TwistSecurity Innovation
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for developmentTomppa Järvinen
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRCase IQ
 

Similar to New Security Legislation & It's Implications for OSS Management (20)

New Security Legislation & Its Implications for OSS Management
New Security Legislation & Its Implications for OSS Management New Security Legislation & Its Implications for OSS Management
New Security Legislation & Its Implications for OSS Management
 
New Security Legislation and its Implications for OSS Management
New Security Legislation and its Implications for OSS ManagementNew Security Legislation and its Implications for OSS Management
New Security Legislation and its Implications for OSS Management
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
EU cybersecurity requirements under current and future medical devices regula...
EU cybersecurity requirements under current and future medical devices regula...EU cybersecurity requirements under current and future medical devices regula...
EU cybersecurity requirements under current and future medical devices regula...
 
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR compliance
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?
 
State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...
 
Privacy by Design: legal perspective
Privacy by Design: legal perspectivePrivacy by Design: legal perspective
Privacy by Design: legal perspective
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
Cyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarlandCyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarland
 
General Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
General Data Protection Regulation and Compliance - GDPR: Sharique M RizviGeneral Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
General Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
 
GDPR: The Application Security Twist
GDPR: The Application Security TwistGDPR: The Application Security Twist
GDPR: The Application Security Twist
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for development
 
GDPR 11/1/2017
GDPR 11/1/2017GDPR 11/1/2017
GDPR 11/1/2017
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 

More from Black Duck by Synopsys

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubBlack Duck by Synopsys
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...Black Duck by Synopsys
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealBlack Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub Black Duck by Synopsys
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Black Duck by Synopsys
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Black Duck by Synopsys
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Black Duck by Synopsys
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Black Duck by Synopsys
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Black Duck by Synopsys
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Black Duck by Synopsys
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Black Duck by Synopsys
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsBlack Duck by Synopsys
 

More from Black Duck by Synopsys (20)

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
Open Source Rookies and Community
Open Source Rookies and CommunityOpen Source Rookies and Community
Open Source Rookies and Community
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 
20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security
 

Recently uploaded

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 

Recently uploaded (20)

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 

New Security Legislation & It's Implications for OSS Management

  • 1. New EU security legislation and open source management Dan Hedley, Irwin Mitchell LLP
  • 2. Some scene setting 79,000 known OSS vulnerabilities, 30,000 reported since 2000 96% of applications scanned found open source components with an average of 147 unique components per application 67% of applications scanned had known open source vulnerabilities Those vulnerabilities known on average for more than four years • e.g. almost 200,000 devices with the Heartbleed vulnerability still on the Internet (Shodan 2017) OSS vulnerabilities are attractive targets: • OSS is ubiquitous • Victim often doesn’t know OSS is there
  • 3. • For everyone: • General Data Protection Regulation • For some businesses: • NIS Directive • Electronic Identification Regulation Why this matters – some key new legislation
  • 4. • Comprehensive reform of data privacy law • In force 25 May 2018 • NEW – extra-territorial effect • NEW – direct obligations for processors • NEW –more detailed and prescriptive security requirements • NEW – obligation to document security decisions and processes • NEW – mandatory detailed breach reporting for everyone (most of the time) GDPR – what it is and what it does
  • 5. APPLIES TO: “the processing of personal data wholly or partly by automated means and to the processing other than by automated means of personal data which form part of a filing system or are intended to form part of a filing system” “processing” = “any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction” “personal data” = “any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person” GDPR – subject matter scope (art 2)
  • 6. • Applies if processing takes place in the context of the activities of an establishment in a member state (regardless of data location). • ALSO applies if NO establishment in a member state BUT: • Offering goods or services to data subjects located in member states (no payment required) • Monitoring behaviour of data subjects in member states GDPR – territorial scope (art 3)
  • 7. • Under current law, data processors (e.g. IT service providers) have no direct liability to data subjects or regulators. • Only exposure is contractual, to the controller • Failure to deal with contractually = controller’s problem • Under GDPR, processors have direct obligations and direct liability for a range of obligations, including obligations to secure data, to ensure it has a compliant contractual obligation to the controller to secure it, & to cooperate with the regulator. GDPR – application to data processors
  • 8. “Personal data shall be processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures” • Fleshed out more in art 32 (next slides) • Burden of proof of compliance on data controller GDPR – security principle - art 5(1)(f)
  • 9. 1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: (a) the pseudonymisation and encryption of personal data; (b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; (c) the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; (d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing. 2. In assessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data transmitted, stored or otherwise processed. GDPR – security (art 32)
  • 10. • Core obligation to “implement appropriate technical and organisational measures” • Requires a risk assessment • So, must know what the risks are! • Balance risk against state of the art, cost • Risks to consider include “accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data transmitted, stored or otherwise processed” Unpacking article 32 /1
  • 11. Then a list of things must consider and either implement or have a reason to reject, incl. • “the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services” • “a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing” Unpacking article 32 /2
  • 12. • Controllers and processors must comply with record keeping obligations. • INCLUDES record of security measures and decisions taken under art 32 • Make avail to regulator on request • Only exception = <250 staff AND only occasional processing, no likely risk to DSs, no “special categories” of data GDPR – obligation to document (art 30)
  • 13. • Controller – to regulator UNLESS unlikely to result in a risk to rights and freedoms • 72 hours unless not “feasible” (basically, have a v good reason) • Time runs from “awareness” • WP29 guidance that awareness of processor = awareness of controller! • Processor – to controller • Without undue delay – means “as soon as possible” • Controller – to data subjects IF high risk to rights and freedoms • Without undue delay • Information to be provided to regulator includes • Nature of the breach (i.e. how it happened, who affected etc.) • Likely consequences of the breach • Mitigation and remediation measures GDPR – mandatory breach reporting
  • 14. • Much of it devoted to establishment of agencies and a cross-border infosec cooperation framework • But ch IV & V also addnl obligations for some businesses: • “Operators of essential services” • Energy, transport, banking, financial infrastructure, healthcare, water supply, digital infrastructure • “Digital service providers” • Online marketplace, online search engine, cloud computing platforms • Transposition deadline May 2018 Network and Information Security Directive /1
  • 15. • From a security perspective, covers a lot of the same ground • Applies based on activities and characteristics of ENTITY, not characteristics of affected DATA • If GDPR-compliant, prob. most of the way there BUT devil is in the detail esp. notification requirements • Micro and small business exception for digital service providers • Additional regulators • OES – by sector NIS Directive – what does it add to GDPR?
  • 16. “Operators of essential services” •Designated by the state •“appropriate and proportionate technical and organisational measures” to “manage the risks posed” to security of networks and information systems •Mandatory breach notification “without undue delay” Network and Information Security Directive /2
  • 17. “Digital Service Providers” •“appropriate and proportionate technical and organisational measures to manage the risks posed to the security of network and information systems which they use in the context of offering …” [marketplace, search engine, cloud services etc.] •“A level of security of network and information systems appropriate to the risk posed” & taking into account a range of factors including • “the security of systems and facilities” • “monitoring, auditing and testing” • Mandatory notification without undue delay of “any incident having a substantial impact on the provision of a [digital service] that they offer in the Union” Network and Information Security Directive /3
  • 18. In the UK, govt issued draft “high level principles” and NCSC has issued initial generic guidance. Of interest: • A.2 Risk Management “There should be efforts to seek an understanding of potential system vulnerabilities that the identified threats might attempt to take advantage of. This might include technical vulnerabilities, misuse of legitimate business processes or anything else that could impact the essential service.” • B.4 System Security “Software should be supported and up to date with security patches applied. Where patching is technically problematic there are other possible mitigations but these should be viewed as sub-optimal and care must be taken to ensure that they are effective.” Network and Information Security Directive /4
  • 19. • Applies to “trust service providers” “appropriate technical and organisational measures to manage the risks posed to the security of the trust services they provide. Having regard to the latest technological developments, those measures shall ensure that the level of security is commensurate to the degree of risk. In particular, measures shall be taken to prevent and minimise the impact of security incidents and inform stakeholders of the adverse effects of any such incidents.” • Mandatory breach notification within 24 hours if “a significant impact on the trust service provided or on the personal data maintained therein” •Potentially to several bodies Electronic Identification Regulation
  • 20. • Legislation is technology neutral • Compliance is self-assessed at the time, retrospectively re- assessed by regulators post breach • Strong legal obligations to secure • Unlikely that 3P vendors will take much if any liability for OSS • It is for the breached party to show that its security was “adequate” Relevance to OSS management /1
  • 21. • From 2014 guidance published by the ICO, the UK data privacy regulator (emphasis added): “It is ... important that any software you use to process personal data is subject to an appropriate security updates policy ... you must also ensure that no relevant components are ignored. This is a common risk where responsibility for updates is split between multiple people, or where third-party libraries or frameworks are used.” • The UK ICO at least has fined people specifically for failure to do this. •E.g. Gloucester City Council •& under GDPR, fines potentially get much much bigger … • Reminder: 67% of applications scanned by Black Duck in 2016 contained unpatched OSS vulnerabilities. Relevance to OSS management /2
  • 22. How does it get into org: • From vendor, due diligence and ongoing dialog as to patch and security management • Contractual? Sometimes. Starting to see in regulated industries e.g. finance • Clarity as to who is responsible for what is key • Patching reporting and SLA? • From own code base, check-in processes and scanning tools • Other sessions covering this in some detail Relevance to OSS management /3
  • 23. • Potential for very large fines (up to EUR20mn / 4% of global turnover under GDPR) • NB turnover of “undertaking” - in EU case law tends to mean an economic unit, not legal person, so potential for measurement by reference to whole group • Reputational damage (e.g. TalkTalk, Yahoo!) • Damages claims by data subjects • Regulatory intervention • Possibility under GDPR of class actions led by charities and campaign groups Consequences of failure
  • 24.
  • 25. • Equifax happened pre-GDPR • Full facts yet to be established • Based on what we know … about 700,000 EU citizens affected • Might be investigated by one or more regulators, depending on who is affected (i.e. geography) and “context of establishment” • Regulators have power to carry out joint ops. • Issues would be: 1. Whether the fact of the breach would mean a failure to comply with article 32 2. Whether the delay in reporting would be a breach of articles 33 and/or 34 3. If so, whether that breach is symptomatic of systemic problems leading to the failure to notify which themselves amount to a breach of article 32 4. What the data of EU residents was doing on Equifax’s US servers in the first place, and whether that data export had been done lawfully How would Equifax have played out under GDPR?
  • 26. • Breach “made possible” through Apache Struts vuln notified on 8 March • Equifax had a patching policy, backed with some kind of scanning tool. • Both failed. Vuln never patched. • Parallels with Gloucester City Council: • Data controller aware of vuln • Knows it must patch • Fails to do so • Bad Things Happen • Attackers apparently had access to data from 13 May, Equifax failed to detect until 29 July • Data not encrypted at rest – but would that have helped? • Response/mitigation botched? (art 83(2)(c) GDPR explicitly makes mitigation a factor) Issue 1 – breach of article 32?
  • 27. • To authorities, 72 hours unless unlikely to result in risk to people concerned • Low threshold, clearly met in this case • Time runs from “awareness” – when was Equifax aware? • WP29 – “reasonable degree of certainty” that a breach has occurred and personal data compromised as a result • Investigation to get to that point must still be “prompt” • 15 August(ish) – so report by 18 August • Phased reporting acceptable (so incomplete investigation does not obviate need to report) • To data subjects, “without undue delay” • 7 September i.e. ~1 month • Might reas. take the view that scale, impact of going public and necessity to prepare would allow that delay? Authority would have power to instruct Issue 2 – breach of notification obligations?
  • 28. • Issue 3 don’t have enough facts to assess yet • Issue 4: • Equifax’s EU systems apparently not affected • EU citizens’ data present on US systems “because of an oversight” • Enough to catch Equifax’s Irish entity? • Suggests export was not lawful in the first place • PLUS but for the unlawful export, would they have been affected at all? Issues 3 and 4
  • 29. • General point about fines stands i.e. not going to leap to the maximum for every breach • BUT authorities (incl. ICO) lobbied for these powers for “the most serious breaches” • Articles 32, 33 and 34 are 2%/10mn infringements • BUT infringement of article 5(1)(f) basic security principle is a 4% / 20mn infringement • Fines for multiple breaches capped at the maximum for most serious breach (art 83(3) GDPR). Consequences – administrative fines
  • 30. • Mandatory arbitration clauses and adverse compulsory venue clauses are basically unenforceable against consumers in EU (cf USA) • So, prospect of action in EU courts by affected people • Consumer group class action provisions • Remains to be seen how e.g. US courts might treat judgment of an EU court on this (and I’m open to views on the subject from US lawyers!) Consequences - right of action for affected people
  • 31. • The law has caught up with infosec risks • Compliance is self-assessed at the time, but its adequacy is retrospectively considered by the authorities post breach – so you need to have a good story to tell • OSS is not a special case and is not a get-out clause • Failure to manage OSS vulnerabilities is unlikely to be accepted as an excuse by regulators • Financial and other consequences can be very serious Conclusions and takeaways
  • 32. Questions? Dan Hedley Irwin Mitchell LLP +44 (0) 1293 742 717 daniel.hedley@irwinmitchell.com @DanHedleyIM