SlideShare a Scribd company logo
1 of 59
Data Protection Rules are Changing: What Can You Do
to Prepare?
Moderator:
Stephen Pritchard, Infosecurity magazine
Sponsored by: Lumension
The European Union’s proposed new data protection regulation aims to update Europe’s
data protection laws and to provide a more consistent data protection framework across
the Continent.
But the new regulation, which replaces the EU’s existing data protection directive and
member states’ data protection laws, will put some new demands on organisations holding
personal data. Breach disclosure and “the right to be forgotten” will force businesses to
update their data protection and retention policies.
This webinar will:
- Review the current EU laws, and contrast them with laws in other parts of the world;
- Examine the arguments for strengthening data protection in Europe, and the likely
outcomes;
- Look at what security teams should already be doing to put themselves ahead of
legislative changes;
- Outline strategies and technologies organisations need to meet current and future data
protection requirements
Help infosecurity teams to explain the changes – and their consequences – to their boards
Speakers:
Bob Tarzey
Analyst and Director, Quocirca
Dr. Alea Fairchild
Director, The Constantia Institute
Sibylle Gierschmann
Partner, Taylor Wessing
Chris Merritt
Director, Solution Marketing, Lumension
Poll: Is your organisation compliant with the following
regulations, or do you plan to be compliant within the next
24 months?
1. UK Data Protection Act
2. Financial Services Authority (FSA)
3. EU Privacy Directives
4. PCI DSS
5. Data Privacy Laws
Bob Tarzey
Analyst and Director,
Quocirca
Clive Longbottom,
Service Director, Quocirca Ltd
EU Data Protection
Don’t wait for the Eurocrats
Bob Tarzey,
Analyst and Director, Quocirca Ltd
August 8th 2013
© Quocirca 2012
EU Data Protection Regulation
• Jan 2012 proposed regulation will
eventually replace 1995 directive
• When? 2014 to 2016 – depending
on when EU gets its act together
• In the mean time other rules still
apply and will do so in the future
• This include local in country law
such as UK DPA
NEW EU Data Protection Regulation
EU DPR will trump UK DPA
versus
OLD EU Data Protection Directive
UK DPA trumps EU DPD
Example – breach disclosure
UK DPA guidance says:
“There is no legal obligation in the DPA for data
controllers to report breaches of security which
result in loss, release or corruption of personal data,
the information Commissioner believes serious
breaches should be brought to the attention of his
Office. The nature of the breach or loss can then be
considered together with whether the data controller
is properly meeting his responsibilities under the
DPA.”
Draft “European General Data
Protection Regulation” - Jan 2012
Article 31: “In the case of a personal data
breach, the controller shall without undue
delay and, where feasible, not later than 24
hours after having become aware of it, notify
the personal data breach to the supervisory
authority”
Beyond DP law
• Other laws may require disclosure indirectly
• E.g. European Human Rights Act, article 8 (provides a
right to respect for one's "private and family life”
• Some businesses are governed by specific disclosure
requirements
• E.g. Financial Services Authority (FSA) arguably obliges
firms it regulates to notify data breaches as part of their
general reporting duties
• Other regulations and standards already require it; one
area effecting many is PCI-DSS
PCI-DSS - is disclosure required?
• Disclosure for the purpose of PCI DSS is a
contractual matter
• Actions following compromise (VISA)
– Contact law enforcement
– Contact bank
– Contact VISA fraud control
– Preserve logs
– Make note of all these actions
VISA “Make sure you have a written
policy with an incident response plan and
make sure all employees are aware of it”
Taken from:
Why SHOULD we disclose?
• The VISA advice makes sense
• Early disclosure will mean you have control of issues
faster
• It may be needed to satisfy insurers
• Should we inform the police?
– A crime may need investigating
– Insurers may require it
• Should we tell the media?
– Perhaps better to be pro-active than on the back-
foot
– Media may be the best way to quickly inform
“data subjects”
– Keep media on side
Source: LogRhythm, survey 2011 of 2,000 UK consumers
If in doubt here is what consumers think…..
So, why wait for the EU?
• Many of the rules make sense or are
required for other reasons
• Most business recognise many of the
dangers
– Through hearing of the travails of others
– Through bitter experience
• Only with good DP in place can businesses
be confident to benefit from:
– Cloud based services
– Mobility, consumerisation and social media
16
We should be protecting data regardless of what the
EU say and does!
Concern about the impacts of cyber-attacks
Source – Quocirca 2013 – The trouble heading for you business
http://www.quocirca.com/reports/797/the-trouble-heading-for-your-business
Actual impacts your as a results of the attacks?
(of the 30% who reported a “significant impact”)
17
Source – Quocirca 2013 – The trouble heading for you business
http://www.quocirca.com/reports/797/the-trouble-heading-for-your-business
Top five barriers to cloud adoption
Source – Quocirca 2013 – The adoption of cloud-based services
https://www.ca.com/us/register/forms/collateral/the-adoption-of-cloud-based-services-increasing-
confidence-through-effective-security.aspx
Biggest barriers to adoption?
By industry
Source – Quocirca 2013 – The adoption of cloud-based services
https://www.ca.com/us/register/forms/collateral/the-adoption-of-cloud-based-services-increasing-
confidence-through-effective-security.aspx
How important are the following security technologies
for providing secure access to cloud-based services?
Europe Overall – enthusiasts versus avoiders
Source – Quocirca 2013 – The adoption of cloud-based services
https://www.ca.com/us/register/forms/collateral/the-adoption-of-cloud-based-services-increasing-
confidence-through-effective-security.aspx
Conclusion
• Make sure you have in place a compliance
oriented architecture today
• It is the only way to ensure your
organisation is well positioned to:
– Meet all the relevant regulatory requirements
– Mitigate real business risk
• Make sure the architecture adapts to:
– Changing patterns of IT use
– The changing threat landscape
– ….and the new EU regulations when ever they
become a reality
Thank you
bobtarzey@quocirca.com
This presentation will be available on
www.quocirca.com
Dr. Alea Fairchild
Director,
The Constantia Institute
Roll the dice: Risk and EU Data
Protection
Dr. Alea Fairchild
The Constantia Institute bvba
EU Data Protection - 2013
• EU has designed their proposal to generate
growth by harmonising the EU’s “patchwork”
of national rules, generate trust through up-
to-date legislation and address the data
privacy concerns of citizens.
• Number of issues (such as hiring a data
protection officer (DPO) have financial impact.
DP Policy: What is this going to cost
you?
Three sides of the same situation
The “security” angle
The “Customer is king” angle
The “What Marketing
wants” angle
Customer is King
• Transparency and notification
• Right to be forgotten
• Rights and obligations
• Trust and relationship management
What Marketing Wants
• Access and analysis, big data and mining
• Granular data for prolonged periods of time
• Control of communication to prospects
Security -
Acting as a Responsible Business
• Consolidate your role in the value chain
– First face to customer, they do not care who did it, you did it
• Compliance and notification of breaches
– To consumers, partners and suppliers
• Consumer protection and corporate liability
DP Recommendations for the CISO and
the Security team
1. Define your DP privacy policies and
document them.
2. Structure your DP governance group, appoint
a DPO.
3. Design and develop your data breach
notification process.
DP Recommendations for the CISO and
the Security team (2)
4. Prepare your organisation to fulfil the
"rights” of the consumer.
5. Understand how you communicate these
“rights” to the customers.
6. Focus on privacy by design, and what is
appropriate for your organisation and
industry.
33
Thank you
Dr. Alea Fairchild
Twitter: @AFairch
Skype: alea.fairchild
Website: www.constantiainstitute.org
Sibylle Gierschmann
Partner,
Taylor Wessing
EU General Data Protection Regulation (GDPR)
Sibylle Gierschmann
August 8, 2013
Bild einfügen
(Cover Small)
zur Image Library
Data Protection Rules are Changing:
What can you do to prepare?
36
Agenda
01 > Why should it interest me?
02 > What‘s new? - „Highlights“
03 > What can I do to prepare?
Bild einfügen
(Right Hand Banner Small)
Why should it interest me?
> Regulation -> directly enforceable (vs. Data Protection Directive
1995/56/EC)
> Applies
– to processing of „personal data“
– of data subjects residing in the EU, i.e. company seat NOT relevant;
> Applies NOT to
– Electronic communications (Directive 2002/58/EC – e.g. Cookies)
– Employee data -> As mostly national rules are relevant
> Timeline: May enter into force in 2014; applied beginning 2016
– Draft January 25th, 2012; still debated in parliament (over 3,000
change requests)
– „triologue“, i.e. negotiations between EU parliamant, council and
commission may start in autumn 2013
37
What‘s new? - „Highlights“
> For your company in general
– Data breach notification
– Sanctions of up to 2% of annual world-wide turnover
– Binding corporate rules facilitated
– Written processor agreements
> For your organization
– Data protection officer/representative
– Documention all processing operations
> For your IT processing
– Right to be forgotten
– Right to data portability
– Privacy by design and default
– Data protection impact assessment
38
Changes for the company in general
> Data breach notification, Artt. 31, 32 – under discussion
– Any personal data breach
– Notice to DPA within 24hrs
– Communication to data subjects „without undue delay“ (responsible
disclosure?)
> Transfer of personal data to third countries, Artt. 40 et. al.
– Stays as is: EU Commission adequacy decision/Standard data
protection clauses/Ad hoc agreements (require approval)
– Binding corporate rules – quicker approval b/c of rules on co-operation
and consistency
> Written processor agreements, Art. 26.2 – under discussion
– E.g. Document instructions/approval of sub-processors/technical and
organizational requirements
39
Changes for your organization
> Data protection officer (DPO), Art. 35 – under discussion
– Mandatory if more than 250 employees; or if core activity concerns
regular monitoring of data subjects
– Group DPO possible; external or internal person; must have expert
knowledge; appointed for at least 2 years
– Acts independantly and reports directly to management
> If no establishment in the EU exists: Designate representative, Art.
25
– Duty to co-operate with DPA -> enforceability?
> Documentation of all processing operations, Art. 28 – under
discussion
– No notification of DPA necessary
– Content similar to exisiting Art. 19 EU Directive 1995/46/EC
40
Changes for your IT processing (1/2)
> Right to be forgotten, Art. 17 – under discussion
– Data needs to be deleted if
 No longer necessary in relation to the purpose
 Consent withdrawn
 Data subject legitimately objects to the processing
 Processing does not comply with regulation
– Data made public: take all reasonable steps to inform third parties of
erasure
– Unless: Retention periods apply -> Work on data retention policies!
> Right to data portability, Art. 18 – under discussion
– Right to obtain copy of data in a commonly used format
> Privacy by design and default, Art. 23
41
Changes for your IT processing (2/2)
> Data protection impact assessment, Art. 33 – under discussion
– Specific risks to the rights and freedoms of data subject, in particular
 Analyzing or predicting behaviour
 Sensitive data
 Video surveillance
 Data on children, genetic data or biometric data
 DPA deems it necessary to carry out a prior consultation b/c of specific risks
of processing operation (list of processing operations)
– In this case:
 Prior consultation of DPA if „high degree“ of specific risk
 Authorization required
 Might require consistency procedure if more than one member state is
involved (involvement of the European Data Protection Board and
Commission)
42
What can I do to prepare?
> Ensure reporting mechanisms for data breaches
– Internally
– Externally, e.g. in your service/processor agreements
> Consider binding corporate rules now (if you are a large organization)
> Is your data protection organization up to speed?
– Do you have internal data protection know how?
– Are your processing operations documented?
 IT landscape
 Access rights
 Per Application: What kind of data /for what purposes/legal grounds
– Do you have a data retention policy?
– Keep in mind when setting up new processing operations: Privacy by
design/default
43
44
Foto einfügen
Presenter
Dr. Sibylle Gierschmann
Partner, Munich
> Technology, Media & Telecoms
> Litigation & Dispute Resolution
Sibylle is a German and U.S. qualified lawyer and partner at Taylor
Wessing law firm. She is a trusted advisor in the fields of IT, media and
data protection law and heads Taylor Wessing’s industry group
“Technology, Communication & Media”.
Her clients often are IT, Telco and media companies, but also
companies from other industries who seek her advice on technology-
related issues. Part of her technology focus is a long-standing data
protection expertise. The German Lawyer's Guide "JUVE" lists Sibylle
as a “leading name” in data protection law. Sibylle is member of the data
protection works council at the German Association for Information
Technology, Telecommunications and New Media (Bitkom e.V.) which is
an important stakeholder and standard setter in Germany. She also is
an accredited data protection auditor (TÜV).
Sibylle studied law at the University of Hamburg where she earned a
Doctor of Jurisprudence (Dr. jur.). She also studied in the U.S., where
she earned a Master of Law (LL.M.) degree at Duke University, North
Carolina (USA). In 2001 Sibylle passed the New York State bar exam. In
Germany, she practices since 1999 and is an accredited specialist
lawyer in the field of copyright and media law (“Fachanwalt für Urheber-
und Medienrecht”).
Sibylle is a frequent writer, speaker and commentator on legal issues
from her practice. She teaches “media law” at Ludwig-Maximilian
University in Munich and regularly trains data protection officers. She
was the founding president of the Duke Club of Germany e.V. and now
acts as vice president for this non-profit organization.
She is fluent in German (native speaker) and English.
.
Contact details
T: +49 (0)89 21038 - 138 E: s.gierschmann@taylorwessing.com
Chris Merritt
Director, Solution Marketing,
Lumension
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Data Protection:
Getting Ahead of
Regulations
Data Breach Causes
47
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Source:
2013 Cost of Data Breach Study: Global Analysis (May 2013)
Conducted by Ponemon Institute
Data Breach Costs
48
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Source:
2013 Cost of Data Breach Study: Global Analysis (May 2013)
Conducted by Ponemon Institute
Data Loss / Theft
49
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Hacking Attacks Malicious Insider Negligent Insider
Endpoint Attack Vectors
The Endpoint is the
New Attack Vector
50
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Browser, Apps and OS all have
known vulnerabilities
• 2/3 of all apps have known
vulnerabilities
• Time-to-Patch with change control is
long, resulting in a lack of security
and visibility
Rogue USB
• Transport method for injecting
malware (e.g., Conficker, Stuxnet)
• Easiest and most common means
of data loss / theft
Virus / Malware
• Best capture rate for day one
with AV is 33%. After 30 days
it is 93%
• 70,000 pieces of malware a
month remain undetected
Defense-in-Depth Strategy
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Successful risk mitigation requires a layered
defensive strategy which includes:
» Patch Management
» Configuration Control
» Application Whitelisting
» Memory Protection
» Data Encryption
» Port / Device Control
» Antivirus
Patch and Configuration Management
Application Control
Memory Protection
Device
Control
AV
Hard Drive and
Media Encryption
51
A Model for Data Protection Maturity
52
Rising to the Challenge
53
Creating Policies
• Ad Hoc: Minimal or No Security Policies
• Optimal: Comprehensive & Exhaustive
Educating Staff
• Ad Hoc: One-Time or No Training
• Optimal: On-Going, Formal Training
Enforcing Policies
• Ad Hoc: Limited Technical Controls
• Optimal: Robust Technical Controls
More Resources
• Free Security Scanner Tools
» Vulnerability Scanner – discover all OS and
application vulnerabilities on your network
» Application Scanner – discover all the apps
being used in your network
» Device Scanner – discover all the devices
being used in your network
http://www.lumension.com/Resources/
Security-Tools.aspx
• Java Resource Center
http://www.lumension.com/Resources/
Resource-Center/Java-Resource-Center.aspx
54
Global Headquarters
8660 East Hartford Drive
Suite 300
Scottsdale, AZ 85255
1.888.725.7828
info@lumension.com
http://blog.lumension.com
Poll: Which of these proposed changes are the biggest
issue for your organisation ?
• The right to be forgotten
• Compulsory breach notification
• Mandatory appointment of a DPO
• The right to data portability
Panel discussion
Audience Questions
Thank you for attending

More Related Content

What's hot

Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...John Nas
 
New General Data Protection Regulation (Agnes Andersson Hammarstrand)
New General Data Protection Regulation (Agnes Andersson Hammarstrand)New General Data Protection Regulation (Agnes Andersson Hammarstrand)
New General Data Protection Regulation (Agnes Andersson Hammarstrand)Nordic APIs
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...IISPEastMids
 
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...TrustArc
 
EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance Tom Haynes
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsUlf Mattsson
 
DMA Legal update winter 2013 - 17 december
DMA Legal update winter 2013 - 17 decemberDMA Legal update winter 2013 - 17 december
DMA Legal update winter 2013 - 17 decemberRachel Aldighieri
 
GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands legalandgeneral
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowSophos Benelux
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationVicky Dallas
 
ESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET
 
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readinessGeneral Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readinessOmo Osagiede
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?Frederick Penaud
 
Convince your board - Ten steps to GDPR compliance
Convince your board  - Ten steps to GDPR complianceConvince your board  - Ten steps to GDPR compliance
Convince your board - Ten steps to GDPR complianceDave James
 
GDPR - a view for the non experts
GDPR - a view for the non expertsGDPR - a view for the non experts
GDPR - a view for the non expertsClaudio Bolla, CISM
 
Rollits Education Focus Summer 2017
Rollits Education Focus Summer 2017Rollits Education Focus Summer 2017
Rollits Education Focus Summer 2017Pat Coyle
 
Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013
Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013
Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013Blake Morgan
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?Faidepro
 

What's hot (20)

Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
 
New General Data Protection Regulation (Agnes Andersson Hammarstrand)
New General Data Protection Regulation (Agnes Andersson Hammarstrand)New General Data Protection Regulation (Agnes Andersson Hammarstrand)
New General Data Protection Regulation (Agnes Andersson Hammarstrand)
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
 
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
 
EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance
 
GDPR-Overview
GDPR-OverviewGDPR-Overview
GDPR-Overview
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 
DMA Legal update winter 2013 - 17 december
DMA Legal update winter 2013 - 17 decemberDMA Legal update winter 2013 - 17 december
DMA Legal update winter 2013 - 17 december
 
GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to know
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
ESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection Regulation
 
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readinessGeneral Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?
 
Convince your board - Ten steps to GDPR compliance
Convince your board  - Ten steps to GDPR complianceConvince your board  - Ten steps to GDPR compliance
Convince your board - Ten steps to GDPR compliance
 
GDPR - a view for the non experts
GDPR - a view for the non expertsGDPR - a view for the non experts
GDPR - a view for the non experts
 
Rollits Education Focus Summer 2017
Rollits Education Focus Summer 2017Rollits Education Focus Summer 2017
Rollits Education Focus Summer 2017
 
Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013
Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013
Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?
 

Viewers also liked

EU Data Protection, Legislation and Certification
EU Data Protection, Legislation and Certification EU Data Protection, Legislation and Certification
EU Data Protection, Legislation and Certification CRISP Project
 
What is GDPR and why does it matter to me?
What is GDPR and why does it matter to me? What is GDPR and why does it matter to me?
What is GDPR and why does it matter to me? Desynit
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Andrew Sharpe
 
eHealth and mhealth presentation
eHealth and mhealth presentationeHealth and mhealth presentation
eHealth and mhealth presentationErik Vollebregt
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 

Viewers also liked (13)

EU Data Protection, Legislation and Certification
EU Data Protection, Legislation and Certification EU Data Protection, Legislation and Certification
EU Data Protection, Legislation and Certification
 
What is GDPR and why does it matter to me?
What is GDPR and why does it matter to me? What is GDPR and why does it matter to me?
What is GDPR and why does it matter to me?
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
 
e-health
e-healthe-health
e-health
 
eHealth and mhealth presentation
eHealth and mhealth presentationeHealth and mhealth presentation
eHealth and mhealth presentation
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Data protection act
Data protection act Data protection act
Data protection act
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Banking in India
Banking in IndiaBanking in India
Banking in India
 

Similar to Data Protection Rules are Changing: What Can You Do to Prepare?

The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowSymantec
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To ConsiderSymantec
 
Your Big Data Opportunity
Your Big Data OpportunityYour Big Data Opportunity
Your Big Data OpportunityiCrossing
 
GDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessGDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessMark Baker
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestLilian Edwards
 
EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)Napier University
 
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
Ipswitch and cordery on the road  " All you need to know about GDPR but are t...Ipswitch and cordery on the road  " All you need to know about GDPR but are t...
Ipswitch and cordery on the road " All you need to know about GDPR but are t...Sébastien Roques
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...Cédric Laurant
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRCase IQ
 
Aon GDPR white paper
Aon GDPR white paperAon GDPR white paper
Aon GDPR white paperGraeme Cross
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
 
Everything you need to know about the GDPR
Everything you need to know about the GDPREverything you need to know about the GDPR
Everything you need to know about the GDPRSpoon London
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRShadi A. Razak
 
Quick Guide: EU General Data Protection Regulation and Smart Metering
Quick Guide: EU General Data Protection Regulation and Smart MeteringQuick Guide: EU General Data Protection Regulation and Smart Metering
Quick Guide: EU General Data Protection Regulation and Smart Meteringnuances
 

Similar to Data Protection Rules are Changing: What Can You Do to Prepare? (20)

The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
Your Big Data Opportunity
Your Big Data OpportunityYour Big Data Opportunity
Your Big Data Opportunity
 
GDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessGDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your business
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and West
 
EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)EU Data Protection Legislation, Peter Ridley (HPE)
EU Data Protection Legislation, Peter Ridley (HPE)
 
How to Protect Your Data
How to Protect Your DataHow to Protect Your Data
How to Protect Your Data
 
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
Ipswitch and cordery on the road  " All you need to know about GDPR but are t...Ipswitch and cordery on the road  " All you need to know about GDPR but are t...
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
Aon GDPR white paper
Aon GDPR white paperAon GDPR white paper
Aon GDPR white paper
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
Everything you need to know about the GDPR
Everything you need to know about the GDPREverything you need to know about the GDPR
Everything you need to know about the GDPR
 
Data protection
Data protectionData protection
Data protection
 
[REPORT PREVIEW] GDPR Beyond May 25, 2018
[REPORT PREVIEW] GDPR Beyond May 25, 2018[REPORT PREVIEW] GDPR Beyond May 25, 2018
[REPORT PREVIEW] GDPR Beyond May 25, 2018
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
Quick Guide: EU General Data Protection Regulation and Smart Metering
Quick Guide: EU General Data Protection Regulation and Smart MeteringQuick Guide: EU General Data Protection Regulation and Smart Metering
Quick Guide: EU General Data Protection Regulation and Smart Metering
 
GPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-RightGPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-Right
 

More from Lumension

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftLumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and AnalysisLumension
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskLumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateLumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskLumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security SolutionsLumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksLumension
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT RiskLumension
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusDefending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusLumension
 

More from Lumension (20)

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusDefending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 

Data Protection Rules are Changing: What Can You Do to Prepare?

  • 1. Data Protection Rules are Changing: What Can You Do to Prepare? Moderator: Stephen Pritchard, Infosecurity magazine Sponsored by: Lumension
  • 2. The European Union’s proposed new data protection regulation aims to update Europe’s data protection laws and to provide a more consistent data protection framework across the Continent. But the new regulation, which replaces the EU’s existing data protection directive and member states’ data protection laws, will put some new demands on organisations holding personal data. Breach disclosure and “the right to be forgotten” will force businesses to update their data protection and retention policies. This webinar will: - Review the current EU laws, and contrast them with laws in other parts of the world; - Examine the arguments for strengthening data protection in Europe, and the likely outcomes; - Look at what security teams should already be doing to put themselves ahead of legislative changes; - Outline strategies and technologies organisations need to meet current and future data protection requirements Help infosecurity teams to explain the changes – and their consequences – to their boards
  • 3. Speakers: Bob Tarzey Analyst and Director, Quocirca Dr. Alea Fairchild Director, The Constantia Institute Sibylle Gierschmann Partner, Taylor Wessing Chris Merritt Director, Solution Marketing, Lumension
  • 4. Poll: Is your organisation compliant with the following regulations, or do you plan to be compliant within the next 24 months? 1. UK Data Protection Act 2. Financial Services Authority (FSA) 3. EU Privacy Directives 4. PCI DSS 5. Data Privacy Laws
  • 5. Bob Tarzey Analyst and Director, Quocirca
  • 6. Clive Longbottom, Service Director, Quocirca Ltd EU Data Protection Don’t wait for the Eurocrats Bob Tarzey, Analyst and Director, Quocirca Ltd August 8th 2013 © Quocirca 2012
  • 7. EU Data Protection Regulation • Jan 2012 proposed regulation will eventually replace 1995 directive • When? 2014 to 2016 – depending on when EU gets its act together • In the mean time other rules still apply and will do so in the future • This include local in country law such as UK DPA
  • 8. NEW EU Data Protection Regulation EU DPR will trump UK DPA versus OLD EU Data Protection Directive UK DPA trumps EU DPD
  • 9. Example – breach disclosure UK DPA guidance says: “There is no legal obligation in the DPA for data controllers to report breaches of security which result in loss, release or corruption of personal data, the information Commissioner believes serious breaches should be brought to the attention of his Office. The nature of the breach or loss can then be considered together with whether the data controller is properly meeting his responsibilities under the DPA.”
  • 10. Draft “European General Data Protection Regulation” - Jan 2012 Article 31: “In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 24 hours after having become aware of it, notify the personal data breach to the supervisory authority”
  • 11. Beyond DP law • Other laws may require disclosure indirectly • E.g. European Human Rights Act, article 8 (provides a right to respect for one's "private and family life” • Some businesses are governed by specific disclosure requirements • E.g. Financial Services Authority (FSA) arguably obliges firms it regulates to notify data breaches as part of their general reporting duties • Other regulations and standards already require it; one area effecting many is PCI-DSS
  • 12. PCI-DSS - is disclosure required? • Disclosure for the purpose of PCI DSS is a contractual matter • Actions following compromise (VISA) – Contact law enforcement – Contact bank – Contact VISA fraud control – Preserve logs – Make note of all these actions VISA “Make sure you have a written policy with an incident response plan and make sure all employees are aware of it” Taken from:
  • 13. Why SHOULD we disclose? • The VISA advice makes sense • Early disclosure will mean you have control of issues faster • It may be needed to satisfy insurers • Should we inform the police? – A crime may need investigating – Insurers may require it • Should we tell the media? – Perhaps better to be pro-active than on the back- foot – Media may be the best way to quickly inform “data subjects” – Keep media on side
  • 14. Source: LogRhythm, survey 2011 of 2,000 UK consumers If in doubt here is what consumers think…..
  • 15. So, why wait for the EU? • Many of the rules make sense or are required for other reasons • Most business recognise many of the dangers – Through hearing of the travails of others – Through bitter experience • Only with good DP in place can businesses be confident to benefit from: – Cloud based services – Mobility, consumerisation and social media
  • 16. 16 We should be protecting data regardless of what the EU say and does! Concern about the impacts of cyber-attacks Source – Quocirca 2013 – The trouble heading for you business http://www.quocirca.com/reports/797/the-trouble-heading-for-your-business
  • 17. Actual impacts your as a results of the attacks? (of the 30% who reported a “significant impact”) 17 Source – Quocirca 2013 – The trouble heading for you business http://www.quocirca.com/reports/797/the-trouble-heading-for-your-business
  • 18. Top five barriers to cloud adoption Source – Quocirca 2013 – The adoption of cloud-based services https://www.ca.com/us/register/forms/collateral/the-adoption-of-cloud-based-services-increasing- confidence-through-effective-security.aspx
  • 19. Biggest barriers to adoption? By industry Source – Quocirca 2013 – The adoption of cloud-based services https://www.ca.com/us/register/forms/collateral/the-adoption-of-cloud-based-services-increasing- confidence-through-effective-security.aspx
  • 20. How important are the following security technologies for providing secure access to cloud-based services? Europe Overall – enthusiasts versus avoiders Source – Quocirca 2013 – The adoption of cloud-based services https://www.ca.com/us/register/forms/collateral/the-adoption-of-cloud-based-services-increasing- confidence-through-effective-security.aspx
  • 21. Conclusion • Make sure you have in place a compliance oriented architecture today • It is the only way to ensure your organisation is well positioned to: – Meet all the relevant regulatory requirements – Mitigate real business risk • Make sure the architecture adapts to: – Changing patterns of IT use – The changing threat landscape – ….and the new EU regulations when ever they become a reality
  • 22. Thank you bobtarzey@quocirca.com This presentation will be available on www.quocirca.com
  • 23. Dr. Alea Fairchild Director, The Constantia Institute
  • 24. Roll the dice: Risk and EU Data Protection Dr. Alea Fairchild The Constantia Institute bvba
  • 25. EU Data Protection - 2013 • EU has designed their proposal to generate growth by harmonising the EU’s “patchwork” of national rules, generate trust through up- to-date legislation and address the data privacy concerns of citizens. • Number of issues (such as hiring a data protection officer (DPO) have financial impact.
  • 26. DP Policy: What is this going to cost you?
  • 27. Three sides of the same situation The “security” angle The “Customer is king” angle The “What Marketing wants” angle
  • 28. Customer is King • Transparency and notification • Right to be forgotten • Rights and obligations • Trust and relationship management
  • 29. What Marketing Wants • Access and analysis, big data and mining • Granular data for prolonged periods of time • Control of communication to prospects
  • 30. Security - Acting as a Responsible Business • Consolidate your role in the value chain – First face to customer, they do not care who did it, you did it • Compliance and notification of breaches – To consumers, partners and suppliers • Consumer protection and corporate liability
  • 31. DP Recommendations for the CISO and the Security team 1. Define your DP privacy policies and document them. 2. Structure your DP governance group, appoint a DPO. 3. Design and develop your data breach notification process.
  • 32. DP Recommendations for the CISO and the Security team (2) 4. Prepare your organisation to fulfil the "rights” of the consumer. 5. Understand how you communicate these “rights” to the customers. 6. Focus on privacy by design, and what is appropriate for your organisation and industry.
  • 33. 33 Thank you Dr. Alea Fairchild Twitter: @AFairch Skype: alea.fairchild Website: www.constantiainstitute.org
  • 35. EU General Data Protection Regulation (GDPR) Sibylle Gierschmann August 8, 2013 Bild einfügen (Cover Small) zur Image Library Data Protection Rules are Changing: What can you do to prepare?
  • 36. 36 Agenda 01 > Why should it interest me? 02 > What‘s new? - „Highlights“ 03 > What can I do to prepare? Bild einfügen (Right Hand Banner Small)
  • 37. Why should it interest me? > Regulation -> directly enforceable (vs. Data Protection Directive 1995/56/EC) > Applies – to processing of „personal data“ – of data subjects residing in the EU, i.e. company seat NOT relevant; > Applies NOT to – Electronic communications (Directive 2002/58/EC – e.g. Cookies) – Employee data -> As mostly national rules are relevant > Timeline: May enter into force in 2014; applied beginning 2016 – Draft January 25th, 2012; still debated in parliament (over 3,000 change requests) – „triologue“, i.e. negotiations between EU parliamant, council and commission may start in autumn 2013 37
  • 38. What‘s new? - „Highlights“ > For your company in general – Data breach notification – Sanctions of up to 2% of annual world-wide turnover – Binding corporate rules facilitated – Written processor agreements > For your organization – Data protection officer/representative – Documention all processing operations > For your IT processing – Right to be forgotten – Right to data portability – Privacy by design and default – Data protection impact assessment 38
  • 39. Changes for the company in general > Data breach notification, Artt. 31, 32 – under discussion – Any personal data breach – Notice to DPA within 24hrs – Communication to data subjects „without undue delay“ (responsible disclosure?) > Transfer of personal data to third countries, Artt. 40 et. al. – Stays as is: EU Commission adequacy decision/Standard data protection clauses/Ad hoc agreements (require approval) – Binding corporate rules – quicker approval b/c of rules on co-operation and consistency > Written processor agreements, Art. 26.2 – under discussion – E.g. Document instructions/approval of sub-processors/technical and organizational requirements 39
  • 40. Changes for your organization > Data protection officer (DPO), Art. 35 – under discussion – Mandatory if more than 250 employees; or if core activity concerns regular monitoring of data subjects – Group DPO possible; external or internal person; must have expert knowledge; appointed for at least 2 years – Acts independantly and reports directly to management > If no establishment in the EU exists: Designate representative, Art. 25 – Duty to co-operate with DPA -> enforceability? > Documentation of all processing operations, Art. 28 – under discussion – No notification of DPA necessary – Content similar to exisiting Art. 19 EU Directive 1995/46/EC 40
  • 41. Changes for your IT processing (1/2) > Right to be forgotten, Art. 17 – under discussion – Data needs to be deleted if  No longer necessary in relation to the purpose  Consent withdrawn  Data subject legitimately objects to the processing  Processing does not comply with regulation – Data made public: take all reasonable steps to inform third parties of erasure – Unless: Retention periods apply -> Work on data retention policies! > Right to data portability, Art. 18 – under discussion – Right to obtain copy of data in a commonly used format > Privacy by design and default, Art. 23 41
  • 42. Changes for your IT processing (2/2) > Data protection impact assessment, Art. 33 – under discussion – Specific risks to the rights and freedoms of data subject, in particular  Analyzing or predicting behaviour  Sensitive data  Video surveillance  Data on children, genetic data or biometric data  DPA deems it necessary to carry out a prior consultation b/c of specific risks of processing operation (list of processing operations) – In this case:  Prior consultation of DPA if „high degree“ of specific risk  Authorization required  Might require consistency procedure if more than one member state is involved (involvement of the European Data Protection Board and Commission) 42
  • 43. What can I do to prepare? > Ensure reporting mechanisms for data breaches – Internally – Externally, e.g. in your service/processor agreements > Consider binding corporate rules now (if you are a large organization) > Is your data protection organization up to speed? – Do you have internal data protection know how? – Are your processing operations documented?  IT landscape  Access rights  Per Application: What kind of data /for what purposes/legal grounds – Do you have a data retention policy? – Keep in mind when setting up new processing operations: Privacy by design/default 43
  • 44. 44 Foto einfügen Presenter Dr. Sibylle Gierschmann Partner, Munich > Technology, Media & Telecoms > Litigation & Dispute Resolution Sibylle is a German and U.S. qualified lawyer and partner at Taylor Wessing law firm. She is a trusted advisor in the fields of IT, media and data protection law and heads Taylor Wessing’s industry group “Technology, Communication & Media”. Her clients often are IT, Telco and media companies, but also companies from other industries who seek her advice on technology- related issues. Part of her technology focus is a long-standing data protection expertise. The German Lawyer's Guide "JUVE" lists Sibylle as a “leading name” in data protection law. Sibylle is member of the data protection works council at the German Association for Information Technology, Telecommunications and New Media (Bitkom e.V.) which is an important stakeholder and standard setter in Germany. She also is an accredited data protection auditor (TÜV). Sibylle studied law at the University of Hamburg where she earned a Doctor of Jurisprudence (Dr. jur.). She also studied in the U.S., where she earned a Master of Law (LL.M.) degree at Duke University, North Carolina (USA). In 2001 Sibylle passed the New York State bar exam. In Germany, she practices since 1999 and is an accredited specialist lawyer in the field of copyright and media law (“Fachanwalt für Urheber- und Medienrecht”). Sibylle is a frequent writer, speaker and commentator on legal issues from her practice. She teaches “media law” at Ludwig-Maximilian University in Munich and regularly trains data protection officers. She was the founding president of the Duke Club of Germany e.V. and now acts as vice president for this non-profit organization. She is fluent in German (native speaker) and English. . Contact details T: +49 (0)89 21038 - 138 E: s.gierschmann@taylorwessing.com
  • 45. Chris Merritt Director, Solution Marketing, Lumension
  • 46. PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION Data Protection: Getting Ahead of Regulations
  • 47. Data Breach Causes 47 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION Source: 2013 Cost of Data Breach Study: Global Analysis (May 2013) Conducted by Ponemon Institute
  • 48. Data Breach Costs 48 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION Source: 2013 Cost of Data Breach Study: Global Analysis (May 2013) Conducted by Ponemon Institute
  • 49. Data Loss / Theft 49 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION Hacking Attacks Malicious Insider Negligent Insider
  • 50. Endpoint Attack Vectors The Endpoint is the New Attack Vector 50 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION Browser, Apps and OS all have known vulnerabilities • 2/3 of all apps have known vulnerabilities • Time-to-Patch with change control is long, resulting in a lack of security and visibility Rogue USB • Transport method for injecting malware (e.g., Conficker, Stuxnet) • Easiest and most common means of data loss / theft Virus / Malware • Best capture rate for day one with AV is 33%. After 30 days it is 93% • 70,000 pieces of malware a month remain undetected
  • 51. Defense-in-Depth Strategy PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION Successful risk mitigation requires a layered defensive strategy which includes: » Patch Management » Configuration Control » Application Whitelisting » Memory Protection » Data Encryption » Port / Device Control » Antivirus Patch and Configuration Management Application Control Memory Protection Device Control AV Hard Drive and Media Encryption 51
  • 52. A Model for Data Protection Maturity 52
  • 53. Rising to the Challenge 53 Creating Policies • Ad Hoc: Minimal or No Security Policies • Optimal: Comprehensive & Exhaustive Educating Staff • Ad Hoc: One-Time or No Training • Optimal: On-Going, Formal Training Enforcing Policies • Ad Hoc: Limited Technical Controls • Optimal: Robust Technical Controls
  • 54. More Resources • Free Security Scanner Tools » Vulnerability Scanner – discover all OS and application vulnerabilities on your network » Application Scanner – discover all the apps being used in your network » Device Scanner – discover all the devices being used in your network http://www.lumension.com/Resources/ Security-Tools.aspx • Java Resource Center http://www.lumension.com/Resources/ Resource-Center/Java-Resource-Center.aspx 54
  • 55. Global Headquarters 8660 East Hartford Drive Suite 300 Scottsdale, AZ 85255 1.888.725.7828 info@lumension.com http://blog.lumension.com
  • 56. Poll: Which of these proposed changes are the biggest issue for your organisation ? • The right to be forgotten • Compulsory breach notification • Mandatory appointment of a DPO • The right to data portability
  • 59. Thank you for attending

Editor's Notes

  1. FFW> “Disclosure isn't yet found in our legislation, but it is still part of the law nonetheless. This point is generally misunderstood. Disclosure for the purpose of PCI DSS is a contractual matter.”NWA example - In February 2007 a well known UK financial institution, the Nationwide Building Society, had a laptop stolen from an employee‘s home. The incident led to a fine of £980K, which may seem excessive until you look at the underlying judgement. This focussed more on poor practice around data security at Nationwide and the delays in doing anything about the theft of the PC and the 11 million customer records stored on it. The theft was almost certainly opportunistic and there is no evidence that data was ever compromised, but for Nationwide the damage was done—the direct cost of the fine and the indirect cost of reputational damage.
  2. Talk about lost businessHacktivismSovereign state