SlideShare a Scribd company logo
© 2019 TrustArc Inc Proprietary and Confidential Information
PRIVACY INSIGHT SERIES
Winter / Spring 2019 Webinar Program
Managing Risk & Easing the Pain of
Vendor Management
February 20, 2019
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Thank you for joining the webinar “Managing
Risk & Easing the Pain of Vendor Management”
• We will be starting a couple minutes after the hour
• This webinar will be recorded and the recording
and slides sent out later today
• Please use the GotoWebinar control panel on the
right hand side to submit any questions for the
speakers
1
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Today’s Speakers
Shankar Chebrolu
Enterprise Security Architect
Red Hat
Paul Iagnocco
Director Consulting, East
TrustArc
2
2
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Today’s Agenda
• Regulatory Context
• Processes & Tools
• Managing Third- Party Risk at Red Hat
• Privacy & Security Vendor Management Best
Practices
• Demonstrating Your Own Compliance
• Key Take-Aways
• Questions
3
PRIVACY INSIGHT SERIES
Winter / Spring 2019 Webinar Program
© 2019 TrustArc Inc Proprietary and Confidential Information
Regulatory Context
EU GDPR and CCPA
2
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Regulations and Vendor Management
• Requires that organizations pass on the same privacy and
security responsibilities to their vendors and sub-processors.
• Relationship between controller and processor and sub-
processors governed by written agreement.
EU GDPR
• Limited in application of same privacy and security
responsibilities to their vendors (e.g., security, retention,
disclosure, use).
• Relationship between business entity and service provider
governed by written agreement.
CCPA
• Accountability for Onward Transfer: Organizations must enter
into a contract with the third-party controller that provides that
such data may only be processed for limited and specified
purposes …provide the same level of protection as the
Principles and will notify the organization if it makes a
determination that it can no longer meet this obligation.
Privacy
Shield
• Organization should process its protected health information
(PHI) to vendors who demonstrate willingness and/or ability to
apply appropriate safeguards as called for in the Security Rule
and the applicable portions of the Privacy Rule.
HIPAA
4
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Common Vendor Management Provisions
Provisions Description
Definitions Section to include personal data, consent, sensitive data (if appropriate),
data owner, data processor/service provider
Documented Instructions:
purpose, duration, parties
Clarity around what the work is and NOT. Only execute what is
documented.
Processor Tech &
Organizational Measures
Implement technical and organizational measures appropriate to the risk;
includes privacy program management
Confidentiality Processor agrees to terms of limited accessibility
Disclosure Disclose personal data ONLY for the specific purpose of performing the
services specified in the contract.
Right to Audit Right of data owner to conduct reasonable audits, systems, protocols,
etc.
Processor Assistance to
Data Owner
Processor will provide assistance for individual rights, breach, etc.
Data Retention & Disposal Processor will return or delate data based of terms of agreement
5
PRIVACY INSIGHT SERIES
Winter / Spring 2019 Webinar Program
© 2019 TrustArc Inc Proprietary and Confidential Information
Processes & Tools
2
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Identify Key Players in VM
Common Players
• IT
• Finance
• Legal
• Procurement
• Business Owner
• Corp Risk
Management
• Information Security
Priority 1:
Build a relationship with
Information Security team
Priority 2:
With all players:
• Educate – develop a common
language to act
• Common Interest – save them
time or money
• Evangelists – cultivate support
6
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Identify Existing VM Approach
Identification
Screening
Risk
Analysis
Risk
Mitigation
Continuous
Monitoring
Storage
Repository
Identification: Find vendor that
meets our needs
Screening: Review references,
conduct business review, deliver
on requirements
Risk Analysis: Viability and
capability of vendor, review
operations
Risk Mitigation: Reduce
exposure, guarantees if things
go wrong
Continuous Monitoring:
Delivering according to agreement
Storage Repository: Maintain
common place for access and
review
7
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Expand VM When Necessary to Include Privacy & Security
Identification
Screening
Risk
Analysis
Risk
Mitigation
Continuous
Monitoring
Storage
Repository
Process Step Common VM Plus Privacy &
Security VM
Identification Find vendor that meets our
needs…
…AND demonstrates
privacy and data protection
awareness
Screening Review references, conduct
business review, deliver on
requirements…
…AND completes
appropriate assessments
to either comply with
external regulatory and/or
internal privacy and security
governance
Risk Analysis Viability and capability of
vendor, review operations…
…AND scores favorable
compliance with external
regulatory and/or internal
privacy and security
governance
Risk
Mitigation
Reduce exposure,
guarantees
if things go wrong…
…AND implements Data
Processing Agreement
(DPA) and specifics around
security
Continuous
Monitoring
Delivering according to
agreement…
…AND maintaining terms
of DPA
Storage
Repository
Maintain common place for
access and review…
…AND is classified as a
low, moderate or high risk
which requires specific
rigors for each
Existing
VM
Approach
8
PRIVACY INSIGHT SERIES
Winter / Spring 2019 Webinar Program
© 2019 TrustArc Inc Proprietary and Confidential Information
Tools to Manage Vendor
Management
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
What tools to consider?
Low-Tech or High-Tech Tools to
Manage Vendor Management
Regulations
Volume
Support
Objective:
What type of tools should I consider
to manage my Vendor Management
function in a sustainable way?
What support do we have?
• Appropriate head-count
• Limited head-count
What’s the volume activity
(e.g., assessments, contract changes)
through our function?
• High and growing
• Low and infrequent
Is my business heavily regulated?
Is there constant change to manage
and implement throughout business?
Can you draw conclusions from your
activities to invest in head-count and/or
technology?
9
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Low-Tech Tools
If you answered that:
– Vendor management is manageable
– Limited regulations
– Appropriate processes in place
10
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
High-Tech Tools
If you answered that:
– Growing regulations
– Too much to track
– Vendor management is
constantly in flux
11
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Additional Tool Considerations
Process Step Common Instruments Tool Considerations
Screening Privacy: Privacy Threshold Analysis (PTA);
Privacy Impact Assessment (PIA); (GDPR
only) Data Protection Impact Assessment
(DPIA); Security: Security Assessments on
security procedures and practices;
Automated or spreadsheet assessments
• Ease of distribution
• Ease of collection
• Consistency of content
• Ease for vendor completion
Risk Analysis Privacy & Security: Leverage same tools
above with mapping to regulations of
desired outcomes.
• Ease of review
• Ease of scoring of risks
• Updating to reflect changing regulations
Risk Mitigation Privacy & Security: Written contract (DPA)
that outlines specifics of services, and
mitigates vendor shortfalls
• Ability to demonstrate risk conclusions
v. standard
• Ease ability to draft specific mitigations in
DPA
Continuous
Monitoring
Privacy & Security: Automated contract
databases or spreadsheets with reminders
• Ease of re-evaluation when vendor
changes or terms of services change
Storage Repository Privacy & Security: Shared storage
repository for artifacts (e.g., completed
assessments, GDPR reports, etc.)
• Efficiently find vendor assessment upon
request
• Maintain and demonstrate audit trail
• Simple re-send for contract renewals
12
PRIVACY INSIGHT SERIES
Winter / Spring 2019 Webinar Program
© 2019 TrustArc Inc Proprietary and Confidential Information
Managing Third-Party Risk
at Red Hat
2
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Background
▪ Disparate systems for vendor risk assessments until
2016
– Documents and information collected via email, google forms &
ticketing system
– Home grown survey questions
▪ Vendor risk assessments 2.0 - Feb 2017
– No change in assessment initiation step
– Documents and information collected via TrustArc’s Assessment
Manager (AM) SaaS tool
– Out of box assessment / communication templates with little
customization
13
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Vendor Risk Assessment 2.0 in a Nutshell
14
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Vendor Risk Assessment 2.0 - Detailed
15
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Other Use Cases of TrustArc AM in Red Hat
▪ Self-assessments by IT / business teams
– Security: Custom template from scratch using AM against
Enterprise Security Standard
– Privacy: Out-of-box Privacy Impact Assessments (PIA) with little
customization
▪ Privacy Shield: Annual self-assessments by
Legal department
16
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries17
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries18
PRIVACY INSIGHT SERIES
Winter / Spring 2019 Webinar Program
© 2019 TrustArc Inc Proprietary and Confidential Information
Privacy & Security Vendor
Management Best Practices
2
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Best Practices to Address Vendors “Processing” Personal Data
• Build internal relationships with key
players
• Augment existing internal vendor
process; use PTA to determine need to
be involved
• Establish minimum data protection
qualifications
• Privacy and security qualifications
should at a minimum reflect the internal
company
• Conduct privacy assessments (e.g.,
PTA, PIA and if necessary, DPIA) that
addresses vendor’s overall privacy
program appropriate to the nature of the
information
• Conduct security assessments that
address vendor’s overall security
procedures and practices appropriate to
the nature of the information
• Maintain evidence of the due diligence
• Define “personal Information”
• Limit access to sensitive data
• Require vendor to implement
appropriate administrative, technical
and physical safeguards to protect data
and comply with all applicable laws
• Require vendor to enforce appropriate
privacy and security provisions to entire
workforce
• Require vendor to notify internal
company of suspected or actual
incident involving internal company data
• Require vendor to stipulate data
retention, destruction or return of
company personal data at end of
engagement
• Outline expectation of vendor to
address regulatory requests or data
subject requests
Risk
Mitigation
Screening
Risk
Analysis
19
© 2019 TrustArc Inc Proprietary and Confidential Information
PRIVACY INSIGHT SERIES
Winter / Spring 2019 Webinar Program
Demonstrating Your
Own Compliance
2
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Demonstrating Compliance to Your Customers
GDPR
Many customers are asking their vendors if they are “GDPR Compliant.”
In the absence of authorized GDPR codes of conduct and certifications, some have
suggested that companies pursue alternative codes of conduct and certifications to fill the
GDPR gap:
• ISO/IEC 27001 certification
• EU-US Privacy Shield Verification
• APEC Cross-Border Privacy Rules (CBPR)
While these accreditations can move a company closer to being able to demonstrate
GDPR compliance, they do not represent complete solutions (falling nearly 50% short
of GDPR expectations.)
20
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
TrustArc’s GDPR Validation and Benefits
The Program:
• GDPR Validation is not a certification (since the official certification standards and
program have not been issued yet)
• Company completes GDPR Validation Assessment
• TrustArc provides GDPR Validation Findings Letter and GDPR Validation Report,
summarizing compliance status
The Benefits:
• Provides companies with an independent confirmation of their GDPR compliance
efforts and status that can be shared with both internal and external stakeholders
• Use Letter and Validation Report as supplemental information for your responses to
vendor assessment forms
• Post the GDPR Validation Summary on your website as evidence of your good
faith efforts to become GDPR-compliant
• GDPR Validation in 2 scopes:
– Program Validation (for a company-wide program)
– Practices Validations (for specific processes or products)
21
© 2019 TrustArc Inc Proprietary and Confidential Information
PRIVACY INSIGHT SERIES
Winter / Spring 2019 Webinar Program
Key Take-Aways
2
© 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries
Recommendations and Next Steps
• Identify key players and build relationships – especially with Legal and Information
Security
• Educate key players – recruit evangelists about data protection
• Augment existing vendor management process with privacy and security due diligence
– implement hooks and separate workflow
• Identify tools to manage vendor due diligence
• manual, low-tech
• technology platform approach
• long-term v. short-term sustainability
• Be prepared to demonstrate due diligence – reporting and individual rights
management
• Determine appropriate times to revaluate vendor relationship – changes in terms,
regulations, contract renewal
• Common repository for all vendor management and data protection initiatives
• What opportunities exist to demonstrate to your customers your commitment to
compliance? How can you leverage this as a positive point of differentiation?
22
PRIVACY INSIGHT SERIES
Winter / Spring 2019 Webinar Program
© 2019 TrustArc Inc Proprietary and Confidential Information
Questions?
2
PRIVACY INSIGHT SERIES
Winter / Spring 2019 Webinar Program
© 2019 TrustArc Inc Proprietary and Confidential Information
Contacts
Shankar Chebrolu schebrol@redhat.com
Paul Iagnocco piagnocco@trustarc.com
Eleanor Treharne-Jones eleanor@trustarc.com
2
PRIVACY INSIGHT SERIES
Winter / Spring 2019 Webinar Program
© 2019 TrustArc Inc Proprietary and Confidential Information
Thank You!
Register now for the next webinar in our 2019 Winter / Spring
Webinar Series “Solutions for Universal Consent Management”
on March 20, 2019.
See http://www.trustarc.com/insightseries for the 2019
Privacy Insight Series and past webinar recordings.
2

More Related Content

What's hot

Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
TrustArc
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]
TrustArc
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
RishalHalid1
 
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
TrustArc
 
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
TrustArc
 
Establishing sustainable GDPR compliance
Establishing sustainable GDPR complianceEstablishing sustainable GDPR compliance
Establishing sustainable GDPR compliance
Cloudera, Inc.
 
General Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian FirmsGeneral Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian Firms
accenture
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
Capgemini
 
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
TrustArc
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & Analytics
Eryk Budi Pratama
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal Audit
Omo Osagiede
 
Finding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA ComplianceFinding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA Compliance
Precisely
 
5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You
TrustArc
 
HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUST
Kimberly Simon MBA
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Kimberly Simon MBA
 
An Essential Guide to EU GDPR
An Essential Guide to EU GDPRAn Essential Guide to EU GDPR
An Essential Guide to EU GDPR
Tripwire
 
TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...
TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...
TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...
Omo Osagiede
 
CCPA for CISOs: What You Need to Know
CCPA for CISOs: What You Need to KnowCCPA for CISOs: What You Need to Know
CCPA for CISOs: What You Need to Know
TrustArc
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...Taiye Lambo
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance
DATUM LLC
 

What's hot (20)

Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
 
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
 
Establishing sustainable GDPR compliance
Establishing sustainable GDPR complianceEstablishing sustainable GDPR compliance
Establishing sustainable GDPR compliance
 
General Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian FirmsGeneral Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian Firms
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & Analytics
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal Audit
 
Finding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA ComplianceFinding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA Compliance
 
5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You
 
HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUST
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
An Essential Guide to EU GDPR
An Essential Guide to EU GDPRAn Essential Guide to EU GDPR
An Essential Guide to EU GDPR
 
TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...
TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...
TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...
 
CCPA for CISOs: What You Need to Know
CCPA for CISOs: What You Need to KnowCCPA for CISOs: What You Need to Know
CCPA for CISOs: What You Need to Know
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance
 

Similar to Feb20 Webinar - Managing Risk and Pain of Vendor Management

2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
TrustArc
 
Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19
DVV Solutions Third Party Risk Management
 
2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management
TrustArc
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1
ControlCase
 
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
DVV Solutions Third Party Risk Management
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businesses
basilmph
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
ControlCase
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Dreamforce
 
Fleet Optimization Buyer's Guide
Fleet Optimization Buyer's GuideFleet Optimization Buyer's Guide
Fleet Optimization Buyer's Guide
Curtis Serna
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19
Emma Kelly
 
2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant
TrustArc
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
Ray Bugg
 
Key Mainframe Trends for 2018
Key Mainframe Trends for 2018Key Mainframe Trends for 2018
Key Mainframe Trends for 2018
Precisely
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Enterprise Management Associates
 
How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud
SureCloud
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
PECB
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & Acquisitions
TrustArc
 
Cloud data security and GDPR compliance
Cloud data security and GDPR complianceCloud data security and GDPR compliance
Cloud data security and GDPR compliance
Salim Benadel
 
[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know
TrustArc
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
AIIM International
 

Similar to Feb20 Webinar - Managing Risk and Pain of Vendor Management (20)

2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 
Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19
 
2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1
 
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businesses
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and Security
 
Fleet Optimization Buyer's Guide
Fleet Optimization Buyer's GuideFleet Optimization Buyer's Guide
Fleet Optimization Buyer's Guide
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19
 
2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Key Mainframe Trends for 2018
Key Mainframe Trends for 2018Key Mainframe Trends for 2018
Key Mainframe Trends for 2018
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & Acquisitions
 
Cloud data security and GDPR compliance
Cloud data security and GDPR complianceCloud data security and GDPR compliance
Cloud data security and GDPR compliance
 
[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 

More from TrustArc

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
TrustArc
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
TrustArc
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
TrustArc
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
TrustArc
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
TrustArc
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
TrustArc
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
TrustArc
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
TrustArc
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
TrustArc
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
TrustArc
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
TrustArc
 

More from TrustArc (20)

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 

Recently uploaded

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Feb20 Webinar - Managing Risk and Pain of Vendor Management

  • 1. © 2019 TrustArc Inc Proprietary and Confidential Information PRIVACY INSIGHT SERIES Winter / Spring 2019 Webinar Program Managing Risk & Easing the Pain of Vendor Management February 20, 2019
  • 2. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Thank you for joining the webinar “Managing Risk & Easing the Pain of Vendor Management” • We will be starting a couple minutes after the hour • This webinar will be recorded and the recording and slides sent out later today • Please use the GotoWebinar control panel on the right hand side to submit any questions for the speakers 1
  • 3. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Today’s Speakers Shankar Chebrolu Enterprise Security Architect Red Hat Paul Iagnocco Director Consulting, East TrustArc 2 2
  • 4. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Today’s Agenda • Regulatory Context • Processes & Tools • Managing Third- Party Risk at Red Hat • Privacy & Security Vendor Management Best Practices • Demonstrating Your Own Compliance • Key Take-Aways • Questions 3
  • 5. PRIVACY INSIGHT SERIES Winter / Spring 2019 Webinar Program © 2019 TrustArc Inc Proprietary and Confidential Information Regulatory Context EU GDPR and CCPA 2
  • 6. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Regulations and Vendor Management • Requires that organizations pass on the same privacy and security responsibilities to their vendors and sub-processors. • Relationship between controller and processor and sub- processors governed by written agreement. EU GDPR • Limited in application of same privacy and security responsibilities to their vendors (e.g., security, retention, disclosure, use). • Relationship between business entity and service provider governed by written agreement. CCPA • Accountability for Onward Transfer: Organizations must enter into a contract with the third-party controller that provides that such data may only be processed for limited and specified purposes …provide the same level of protection as the Principles and will notify the organization if it makes a determination that it can no longer meet this obligation. Privacy Shield • Organization should process its protected health information (PHI) to vendors who demonstrate willingness and/or ability to apply appropriate safeguards as called for in the Security Rule and the applicable portions of the Privacy Rule. HIPAA 4
  • 7. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Common Vendor Management Provisions Provisions Description Definitions Section to include personal data, consent, sensitive data (if appropriate), data owner, data processor/service provider Documented Instructions: purpose, duration, parties Clarity around what the work is and NOT. Only execute what is documented. Processor Tech & Organizational Measures Implement technical and organizational measures appropriate to the risk; includes privacy program management Confidentiality Processor agrees to terms of limited accessibility Disclosure Disclose personal data ONLY for the specific purpose of performing the services specified in the contract. Right to Audit Right of data owner to conduct reasonable audits, systems, protocols, etc. Processor Assistance to Data Owner Processor will provide assistance for individual rights, breach, etc. Data Retention & Disposal Processor will return or delate data based of terms of agreement 5
  • 8. PRIVACY INSIGHT SERIES Winter / Spring 2019 Webinar Program © 2019 TrustArc Inc Proprietary and Confidential Information Processes & Tools 2
  • 9. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Identify Key Players in VM Common Players • IT • Finance • Legal • Procurement • Business Owner • Corp Risk Management • Information Security Priority 1: Build a relationship with Information Security team Priority 2: With all players: • Educate – develop a common language to act • Common Interest – save them time or money • Evangelists – cultivate support 6
  • 10. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Identify Existing VM Approach Identification Screening Risk Analysis Risk Mitigation Continuous Monitoring Storage Repository Identification: Find vendor that meets our needs Screening: Review references, conduct business review, deliver on requirements Risk Analysis: Viability and capability of vendor, review operations Risk Mitigation: Reduce exposure, guarantees if things go wrong Continuous Monitoring: Delivering according to agreement Storage Repository: Maintain common place for access and review 7
  • 11. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Expand VM When Necessary to Include Privacy & Security Identification Screening Risk Analysis Risk Mitigation Continuous Monitoring Storage Repository Process Step Common VM Plus Privacy & Security VM Identification Find vendor that meets our needs… …AND demonstrates privacy and data protection awareness Screening Review references, conduct business review, deliver on requirements… …AND completes appropriate assessments to either comply with external regulatory and/or internal privacy and security governance Risk Analysis Viability and capability of vendor, review operations… …AND scores favorable compliance with external regulatory and/or internal privacy and security governance Risk Mitigation Reduce exposure, guarantees if things go wrong… …AND implements Data Processing Agreement (DPA) and specifics around security Continuous Monitoring Delivering according to agreement… …AND maintaining terms of DPA Storage Repository Maintain common place for access and review… …AND is classified as a low, moderate or high risk which requires specific rigors for each Existing VM Approach 8
  • 12. PRIVACY INSIGHT SERIES Winter / Spring 2019 Webinar Program © 2019 TrustArc Inc Proprietary and Confidential Information Tools to Manage Vendor Management
  • 13. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries What tools to consider? Low-Tech or High-Tech Tools to Manage Vendor Management Regulations Volume Support Objective: What type of tools should I consider to manage my Vendor Management function in a sustainable way? What support do we have? • Appropriate head-count • Limited head-count What’s the volume activity (e.g., assessments, contract changes) through our function? • High and growing • Low and infrequent Is my business heavily regulated? Is there constant change to manage and implement throughout business? Can you draw conclusions from your activities to invest in head-count and/or technology? 9
  • 14. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Low-Tech Tools If you answered that: – Vendor management is manageable – Limited regulations – Appropriate processes in place 10
  • 15. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries High-Tech Tools If you answered that: – Growing regulations – Too much to track – Vendor management is constantly in flux 11
  • 16. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Additional Tool Considerations Process Step Common Instruments Tool Considerations Screening Privacy: Privacy Threshold Analysis (PTA); Privacy Impact Assessment (PIA); (GDPR only) Data Protection Impact Assessment (DPIA); Security: Security Assessments on security procedures and practices; Automated or spreadsheet assessments • Ease of distribution • Ease of collection • Consistency of content • Ease for vendor completion Risk Analysis Privacy & Security: Leverage same tools above with mapping to regulations of desired outcomes. • Ease of review • Ease of scoring of risks • Updating to reflect changing regulations Risk Mitigation Privacy & Security: Written contract (DPA) that outlines specifics of services, and mitigates vendor shortfalls • Ability to demonstrate risk conclusions v. standard • Ease ability to draft specific mitigations in DPA Continuous Monitoring Privacy & Security: Automated contract databases or spreadsheets with reminders • Ease of re-evaluation when vendor changes or terms of services change Storage Repository Privacy & Security: Shared storage repository for artifacts (e.g., completed assessments, GDPR reports, etc.) • Efficiently find vendor assessment upon request • Maintain and demonstrate audit trail • Simple re-send for contract renewals 12
  • 17. PRIVACY INSIGHT SERIES Winter / Spring 2019 Webinar Program © 2019 TrustArc Inc Proprietary and Confidential Information Managing Third-Party Risk at Red Hat 2
  • 18. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Background ▪ Disparate systems for vendor risk assessments until 2016 – Documents and information collected via email, google forms & ticketing system – Home grown survey questions ▪ Vendor risk assessments 2.0 - Feb 2017 – No change in assessment initiation step – Documents and information collected via TrustArc’s Assessment Manager (AM) SaaS tool – Out of box assessment / communication templates with little customization 13
  • 19. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Vendor Risk Assessment 2.0 in a Nutshell 14
  • 20. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Vendor Risk Assessment 2.0 - Detailed 15
  • 21. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Other Use Cases of TrustArc AM in Red Hat ▪ Self-assessments by IT / business teams – Security: Custom template from scratch using AM against Enterprise Security Standard – Privacy: Out-of-box Privacy Impact Assessments (PIA) with little customization ▪ Privacy Shield: Annual self-assessments by Legal department 16
  • 22. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries17
  • 23. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries18
  • 24. PRIVACY INSIGHT SERIES Winter / Spring 2019 Webinar Program © 2019 TrustArc Inc Proprietary and Confidential Information Privacy & Security Vendor Management Best Practices 2
  • 25. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Best Practices to Address Vendors “Processing” Personal Data • Build internal relationships with key players • Augment existing internal vendor process; use PTA to determine need to be involved • Establish minimum data protection qualifications • Privacy and security qualifications should at a minimum reflect the internal company • Conduct privacy assessments (e.g., PTA, PIA and if necessary, DPIA) that addresses vendor’s overall privacy program appropriate to the nature of the information • Conduct security assessments that address vendor’s overall security procedures and practices appropriate to the nature of the information • Maintain evidence of the due diligence • Define “personal Information” • Limit access to sensitive data • Require vendor to implement appropriate administrative, technical and physical safeguards to protect data and comply with all applicable laws • Require vendor to enforce appropriate privacy and security provisions to entire workforce • Require vendor to notify internal company of suspected or actual incident involving internal company data • Require vendor to stipulate data retention, destruction or return of company personal data at end of engagement • Outline expectation of vendor to address regulatory requests or data subject requests Risk Mitigation Screening Risk Analysis 19
  • 26. © 2019 TrustArc Inc Proprietary and Confidential Information PRIVACY INSIGHT SERIES Winter / Spring 2019 Webinar Program Demonstrating Your Own Compliance 2
  • 27. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Demonstrating Compliance to Your Customers GDPR Many customers are asking their vendors if they are “GDPR Compliant.” In the absence of authorized GDPR codes of conduct and certifications, some have suggested that companies pursue alternative codes of conduct and certifications to fill the GDPR gap: • ISO/IEC 27001 certification • EU-US Privacy Shield Verification • APEC Cross-Border Privacy Rules (CBPR) While these accreditations can move a company closer to being able to demonstrate GDPR compliance, they do not represent complete solutions (falling nearly 50% short of GDPR expectations.) 20
  • 28. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries TrustArc’s GDPR Validation and Benefits The Program: • GDPR Validation is not a certification (since the official certification standards and program have not been issued yet) • Company completes GDPR Validation Assessment • TrustArc provides GDPR Validation Findings Letter and GDPR Validation Report, summarizing compliance status The Benefits: • Provides companies with an independent confirmation of their GDPR compliance efforts and status that can be shared with both internal and external stakeholders • Use Letter and Validation Report as supplemental information for your responses to vendor assessment forms • Post the GDPR Validation Summary on your website as evidence of your good faith efforts to become GDPR-compliant • GDPR Validation in 2 scopes: – Program Validation (for a company-wide program) – Practices Validations (for specific processes or products) 21
  • 29. © 2019 TrustArc Inc Proprietary and Confidential Information PRIVACY INSIGHT SERIES Winter / Spring 2019 Webinar Program Key Take-Aways 2
  • 30. © 2019 TrustArc IncPrivacy Insight Series - trustarc.com/insightseries Recommendations and Next Steps • Identify key players and build relationships – especially with Legal and Information Security • Educate key players – recruit evangelists about data protection • Augment existing vendor management process with privacy and security due diligence – implement hooks and separate workflow • Identify tools to manage vendor due diligence • manual, low-tech • technology platform approach • long-term v. short-term sustainability • Be prepared to demonstrate due diligence – reporting and individual rights management • Determine appropriate times to revaluate vendor relationship – changes in terms, regulations, contract renewal • Common repository for all vendor management and data protection initiatives • What opportunities exist to demonstrate to your customers your commitment to compliance? How can you leverage this as a positive point of differentiation? 22
  • 31. PRIVACY INSIGHT SERIES Winter / Spring 2019 Webinar Program © 2019 TrustArc Inc Proprietary and Confidential Information Questions? 2
  • 32. PRIVACY INSIGHT SERIES Winter / Spring 2019 Webinar Program © 2019 TrustArc Inc Proprietary and Confidential Information Contacts Shankar Chebrolu schebrol@redhat.com Paul Iagnocco piagnocco@trustarc.com Eleanor Treharne-Jones eleanor@trustarc.com 2
  • 33. PRIVACY INSIGHT SERIES Winter / Spring 2019 Webinar Program © 2019 TrustArc Inc Proprietary and Confidential Information Thank You! Register now for the next webinar in our 2019 Winter / Spring Webinar Series “Solutions for Universal Consent Management” on March 20, 2019. See http://www.trustarc.com/insightseries for the 2019 Privacy Insight Series and past webinar recordings. 2