SlideShare a Scribd company logo
1 of 9
Download to read offline
Six Key Components
to Achieving GDPR
Cyber Security
Requirements
The General Data Protection
Regulation (GDPR) is hitting
the world by storm.
With a deadline of May 25, 2018, organizations are
searching for an all-encompassing solution for
GDPR readiness and compliance.
Optiv is strategically positioned to assist
organizations with the cyber security components
of the GDPR regulation. Our goal is to help clients
reduce noise around point solutions, understand
the requirements as they relate to the organization,
develop a strategic and tailored GDPR roadmap and
execute across the six pillars of GDPR compliance.
Optiv is here to help you not only weather the
GPDR storm, but conquer it.
1Six Key Components to Achieving GDPR Cyber Security Requirements
In a perfect world – to avoid GDPR
retribution – don’t get breached.
Sounds easy, but unfortunately it’s
not that simple. The key is to prove
due diligence.
With the May 2018 deadline
approaching, how is your
organization preparing for GDPR?
GDPR is a sweeping
privacy law with strict
fines and penalties
should a breach occur.
WHAT IS GENERAL DATA PROTECTION REGULATION?
2Six Key Components to Achieving GDPR Cyber Security Requirements
The General Data
Protection Regulation –
At 10,000 Feet
• Applies to all organizations processing
personal data of EU citizens
• Organizations in breach will be fined up to
4 percent of annual global turnover or $20
Million (Euro) (whichever is greater).
• Defines lawfulness of processing to include
consent by data subjects, “Privacy by Design”,
the “Right to Be Forgotten” and data portability
requirements
• Outlines responsibilities of controllers and
processors
• Requires Privacy Impact Assessments
• Breach notification requirements
• Appointment of a Data Protection Officer
• Deadline for compliance – May 25, 2018
3Six Key Components to Achieving GDPR Cyber Security Requirements
Can you interpret how GDPR
effects your organization?
Quick hit questions to consider:
√ Do you know what data is relevant to
GDPR?
√ Do you know where that data is?
√ Do you know who has access to this data?
√ Do you have the right controls in place to
protect that data?
√ Can you show your work to prove GDPR
due diligence?
√ How can you prioritize GDPR against
your other threats?
GDPR is a complex challenge that affects multiple
areas of your organization:
4Six Key Components to Achieving GDPR Cyber Security Requirements
Cyber Security IT Legal
Achieve and maintain
compliance across the Six
Cyber Security Pillars of GDPR
5Six Key Components to Achieving GDPR Cyber Security Requirements
Data Governance
Data
Classification
Data
Discovery
Data Access
Data
Handling
Data
Protection
Data Governance
6Six Key Components to Achieving GDPR Cyber Security Requirements
Understand your GDPR obligations as
they relate to your business and activate
your program to meet these obligations.
Data Classification
Analyze what data within your environment
is relevant to GDPR and develop a proper
classification scheme for ongoing data
management.
SIX PILLARS OF GDPR COMPLIANCE
Data Discovery
Discover where sensitive data lives within
your environment and setup structures
for ongoing management of such data.
8Six Key Components to Achieving GDPR Cyber Security Requirements
Data Access
Determine who has access to the data
and setup rules for ongoing access
management.
SIX PILLARS OF GDPR COMPLIANCE
Data Handling
Prepare for the chance of an incident and
ensure that plans are in place to meet
GDPR obligations regarding the handling
of sensitive information.
Data Protection
Plan, build and run an appropriate
security program to protect sensitive
information.
START HERE:
Begin with a plan.
Understand your gaps.
Build a roadmap for execution.
Align your security and privacy
programs to reach GDPR compliance..
At times, the road to GDPR compliance may
seem to be an overwhelming journey with
unsurmountable obstacles.
Optiv can help organizations across
the six pillars of GDPR compliance.
Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security
programs that achieve business objectives through our depth and breadth of cyber security offerings, extensive capabilities and proven
expertise in cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and
support, integration and architecture services, and security technology. Optiv maintains premium partnerships with more than 350
of the leading security technology manufacturers. For more information, visit www.optiv.com or follow us at www.twitter.com/optiv,
www.facebook.com/optivinc and www.linkedin.com/company/optiv-inc.
© 207 Optiv All Rights Reserved. Optiv” is a registered trademark of Optiv Security Inc.
1125 17th Street, Suite 1700
Denver, CO 80202
800.574.0896 | www.optiv.com
Get in Touch
10.17 | F1

More Related Content

What's hot

What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]TrustArc
 
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...DATUM LLC
 
The Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditThe Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditSBWebinars
 
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]TrustArc
 
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...TrustArc
 
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]TrustArc
 
Satori GDPR Overview 2018
Satori GDPR Overview 2018Satori GDPR Overview 2018
Satori GDPR Overview 2018Dean Evans
 
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?DATUM LLC
 
FinTech Belgium GDPR MeetUp - deJurists - 14/09/17
FinTech Belgium GDPR MeetUp - deJurists - 14/09/17FinTech Belgium GDPR MeetUp - deJurists - 14/09/17
FinTech Belgium GDPR MeetUp - deJurists - 14/09/17Alessandra Gambrill - Guion
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
GDPR Learning Lab: Gartner Data & Analytics 2018 Slides
GDPR Learning Lab: Gartner Data & Analytics 2018 Slides GDPR Learning Lab: Gartner Data & Analytics 2018 Slides
GDPR Learning Lab: Gartner Data & Analytics 2018 Slides DATUM LLC
 
Convince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List XConvince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List XDave James
 
GDPR in the Digital World
GDPR in the Digital WorldGDPR in the Digital World
GDPR in the Digital WorldeZ Systems
 
Tech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reilly
Tech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reillyTech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reilly
Tech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reillyEvents2018
 
SourceCloud GDPR statement march 2018
SourceCloud GDPR statement march 2018 SourceCloud GDPR statement march 2018
SourceCloud GDPR statement march 2018 Craig Burns
 
General Data Protection Regulation: Where are we now?
General Data Protection Regulation: Where are we now?General Data Protection Regulation: Where are we now?
General Data Protection Regulation: Where are we now?Leigh Hill
 

What's hot (20)

What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
 
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
 
The Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditThe Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance Audit
 
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
 
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
 
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]
 
FinTech Belgium GDPR MeetUp - PwC - 14/09/17
FinTech Belgium GDPR MeetUp - PwC - 14/09/17FinTech Belgium GDPR MeetUp - PwC - 14/09/17
FinTech Belgium GDPR MeetUp - PwC - 14/09/17
 
Satori GDPR Overview 2018
Satori GDPR Overview 2018Satori GDPR Overview 2018
Satori GDPR Overview 2018
 
FinTech Belgium GDPR MeetUp - Laga - 14/09/17
FinTech Belgium GDPR MeetUp - Laga - 14/09/17FinTech Belgium GDPR MeetUp - Laga - 14/09/17
FinTech Belgium GDPR MeetUp - Laga - 14/09/17
 
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
 
FinTech Belgium GDPR MeetUp - deJurists - 14/09/17
FinTech Belgium GDPR MeetUp - deJurists - 14/09/17FinTech Belgium GDPR MeetUp - deJurists - 14/09/17
FinTech Belgium GDPR MeetUp - deJurists - 14/09/17
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
GDPR Learning Lab: Gartner Data & Analytics 2018 Slides
GDPR Learning Lab: Gartner Data & Analytics 2018 Slides GDPR Learning Lab: Gartner Data & Analytics 2018 Slides
GDPR Learning Lab: Gartner Data & Analytics 2018 Slides
 
Convince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List XConvince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List X
 
GDPR in the Digital World
GDPR in the Digital WorldGDPR in the Digital World
GDPR in the Digital World
 
Tech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reilly
Tech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reillyTech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reilly
Tech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reilly
 
SourceCloud GDPR statement march 2018
SourceCloud GDPR statement march 2018 SourceCloud GDPR statement march 2018
SourceCloud GDPR statement march 2018
 
General Data Protection Regulation: Where are we now?
General Data Protection Regulation: Where are we now?General Data Protection Regulation: Where are we now?
General Data Protection Regulation: Where are we now?
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
 
c~Sharpe Security Services
c~Sharpe Security Servicesc~Sharpe Security Services
c~Sharpe Security Services
 

Similar to Six Key Components to Achieving GDPR Security Requirements

GDPR Compliance with Microsoft 365
GDPR Compliance with Microsoft 365 GDPR Compliance with Microsoft 365
GDPR Compliance with Microsoft 365 ayeshaurooj104
 
Is your business GDPR ready?
Is your business GDPR ready?Is your business GDPR ready?
Is your business GDPR ready?Gareth Miller
 
Convince your board - Ten steps to GDPR compliance
Convince your board  - Ten steps to GDPR complianceConvince your board  - Ten steps to GDPR compliance
Convince your board - Ten steps to GDPR complianceDave James
 
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living ComplianceGDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living ComplianceCloudera, Inc.
 
MMV Webinar 1. GDPR Perspectives. November 2017
MMV Webinar 1. GDPR Perspectives. November 2017MMV Webinar 1. GDPR Perspectives. November 2017
MMV Webinar 1. GDPR Perspectives. November 2017Match-Maker Ventures
 
Solution Brief: Helping prepare for risk & compliance challenges for GDPR
Solution Brief: Helping prepare for risk & compliance challenges for GDPRSolution Brief: Helping prepare for risk & compliance challenges for GDPR
Solution Brief: Helping prepare for risk & compliance challenges for GDPRIceberg Networks Corporation
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...Symantec
 
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-smIBM Sverige
 
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...ARMA International
 
2 -2-6 kista watson summit-gdpr how ibm preparing hogg-sm
2 -2-6 kista watson summit-gdpr how ibm preparing hogg-sm2 -2-6 kista watson summit-gdpr how ibm preparing hogg-sm
2 -2-6 kista watson summit-gdpr how ibm preparing hogg-smIBM Sverige
 
Security, GDRP, and IT outsourcing: How to get it right
Security, GDRP, and IT outsourcing: How to get it rightSecurity, GDRP, and IT outsourcing: How to get it right
Security, GDRP, and IT outsourcing: How to get it rightN-iX
 
Using GDPR to Transform Customer Experience
Using GDPR to Transform Customer ExperienceUsing GDPR to Transform Customer Experience
Using GDPR to Transform Customer ExperienceMongoDB
 
General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Complianceaccenture
 
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...DATUM LLC
 
GDPR & Demand Generation: What Your Team Needs To Know
GDPR & Demand Generation: What Your Team Needs To KnowGDPR & Demand Generation: What Your Team Needs To Know
GDPR & Demand Generation: What Your Team Needs To KnowHannah Flynn
 

Similar to Six Key Components to Achieving GDPR Security Requirements (20)

GDPR Compliance with Microsoft 365
GDPR Compliance with Microsoft 365 GDPR Compliance with Microsoft 365
GDPR Compliance with Microsoft 365
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
 
Is your business GDPR ready?
Is your business GDPR ready?Is your business GDPR ready?
Is your business GDPR ready?
 
Convince your board - Ten steps to GDPR compliance
Convince your board  - Ten steps to GDPR complianceConvince your board  - Ten steps to GDPR compliance
Convince your board - Ten steps to GDPR compliance
 
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living ComplianceGDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
 
MMV Webinar 1. GDPR Perspectives. November 2017
MMV Webinar 1. GDPR Perspectives. November 2017MMV Webinar 1. GDPR Perspectives. November 2017
MMV Webinar 1. GDPR Perspectives. November 2017
 
Solution Brief: Helping prepare for risk & compliance challenges for GDPR
Solution Brief: Helping prepare for risk & compliance challenges for GDPRSolution Brief: Helping prepare for risk & compliance challenges for GDPR
Solution Brief: Helping prepare for risk & compliance challenges for GDPR
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
 
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
 
GDPR - what you need to know
GDPR -  what you need to know GDPR -  what you need to know
GDPR - what you need to know
 
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
 
2 -2-6 kista watson summit-gdpr how ibm preparing hogg-sm
2 -2-6 kista watson summit-gdpr how ibm preparing hogg-sm2 -2-6 kista watson summit-gdpr how ibm preparing hogg-sm
2 -2-6 kista watson summit-gdpr how ibm preparing hogg-sm
 
Security, GDRP, and IT outsourcing: How to get it right
Security, GDRP, and IT outsourcing: How to get it rightSecurity, GDRP, and IT outsourcing: How to get it right
Security, GDRP, and IT outsourcing: How to get it right
 
Using GDPR to Transform Customer Experience
Using GDPR to Transform Customer ExperienceUsing GDPR to Transform Customer Experience
Using GDPR to Transform Customer Experience
 
General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Compliance
 
20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here
 
GDPR for dummies
GDPR for dummies  GDPR for dummies
GDPR for dummies
 
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
 
Ritz 4th-july-gdpr
Ritz 4th-july-gdprRitz 4th-july-gdpr
Ritz 4th-july-gdpr
 
GDPR & Demand Generation: What Your Team Needs To Know
GDPR & Demand Generation: What Your Team Needs To KnowGDPR & Demand Generation: What Your Team Needs To Know
GDPR & Demand Generation: What Your Team Needs To Know
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 

Six Key Components to Achieving GDPR Security Requirements

  • 1. Six Key Components to Achieving GDPR Cyber Security Requirements
  • 2. The General Data Protection Regulation (GDPR) is hitting the world by storm. With a deadline of May 25, 2018, organizations are searching for an all-encompassing solution for GDPR readiness and compliance. Optiv is strategically positioned to assist organizations with the cyber security components of the GDPR regulation. Our goal is to help clients reduce noise around point solutions, understand the requirements as they relate to the organization, develop a strategic and tailored GDPR roadmap and execute across the six pillars of GDPR compliance. Optiv is here to help you not only weather the GPDR storm, but conquer it. 1Six Key Components to Achieving GDPR Cyber Security Requirements
  • 3. In a perfect world – to avoid GDPR retribution – don’t get breached. Sounds easy, but unfortunately it’s not that simple. The key is to prove due diligence. With the May 2018 deadline approaching, how is your organization preparing for GDPR? GDPR is a sweeping privacy law with strict fines and penalties should a breach occur. WHAT IS GENERAL DATA PROTECTION REGULATION? 2Six Key Components to Achieving GDPR Cyber Security Requirements
  • 4. The General Data Protection Regulation – At 10,000 Feet • Applies to all organizations processing personal data of EU citizens • Organizations in breach will be fined up to 4 percent of annual global turnover or $20 Million (Euro) (whichever is greater). • Defines lawfulness of processing to include consent by data subjects, “Privacy by Design”, the “Right to Be Forgotten” and data portability requirements • Outlines responsibilities of controllers and processors • Requires Privacy Impact Assessments • Breach notification requirements • Appointment of a Data Protection Officer • Deadline for compliance – May 25, 2018 3Six Key Components to Achieving GDPR Cyber Security Requirements
  • 5. Can you interpret how GDPR effects your organization? Quick hit questions to consider: √ Do you know what data is relevant to GDPR? √ Do you know where that data is? √ Do you know who has access to this data? √ Do you have the right controls in place to protect that data? √ Can you show your work to prove GDPR due diligence? √ How can you prioritize GDPR against your other threats? GDPR is a complex challenge that affects multiple areas of your organization: 4Six Key Components to Achieving GDPR Cyber Security Requirements Cyber Security IT Legal
  • 6. Achieve and maintain compliance across the Six Cyber Security Pillars of GDPR 5Six Key Components to Achieving GDPR Cyber Security Requirements Data Governance Data Classification Data Discovery Data Access Data Handling Data Protection
  • 7. Data Governance 6Six Key Components to Achieving GDPR Cyber Security Requirements Understand your GDPR obligations as they relate to your business and activate your program to meet these obligations. Data Classification Analyze what data within your environment is relevant to GDPR and develop a proper classification scheme for ongoing data management. SIX PILLARS OF GDPR COMPLIANCE Data Discovery Discover where sensitive data lives within your environment and setup structures for ongoing management of such data.
  • 8. 8Six Key Components to Achieving GDPR Cyber Security Requirements Data Access Determine who has access to the data and setup rules for ongoing access management. SIX PILLARS OF GDPR COMPLIANCE Data Handling Prepare for the chance of an incident and ensure that plans are in place to meet GDPR obligations regarding the handling of sensitive information. Data Protection Plan, build and run an appropriate security program to protect sensitive information.
  • 9. START HERE: Begin with a plan. Understand your gaps. Build a roadmap for execution. Align your security and privacy programs to reach GDPR compliance.. At times, the road to GDPR compliance may seem to be an overwhelming journey with unsurmountable obstacles. Optiv can help organizations across the six pillars of GDPR compliance. Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives through our depth and breadth of cyber security offerings, extensive capabilities and proven expertise in cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology. Optiv maintains premium partnerships with more than 350 of the leading security technology manufacturers. For more information, visit www.optiv.com or follow us at www.twitter.com/optiv, www.facebook.com/optivinc and www.linkedin.com/company/optiv-inc. © 207 Optiv All Rights Reserved. Optiv” is a registered trademark of Optiv Security Inc. 1125 17th Street, Suite 1700 Denver, CO 80202 800.574.0896 | www.optiv.com Get in Touch 10.17 | F1