SlideShare a Scribd company logo
1 of 11
© 2016 HyTrust, Inc. 1
GDPR & NIS
Taking the pain out of government mandated security response
© 2016 HyTrust, Inc. 2
HyTrust Workload Security Use Cases
Previously discussed specific use cases – how are they related to GDPR/NIS?
Critical areas affected by
GDPR and NIS – increased risk
with public or hybrid cloud
environments:
Eliminate privileged
user misuse
Halt data breaches on
all clouds
End audit and
compliance suffering
Remove costly
infrastructure air gaps
Avoid data sovereignty
landmines
Stop stupid and the
accidental downtime
1. Privileged account misuse
2. Data breach protection
3. Data sovereignty compliance
© 2016 HyTrust, Inc. 3
GDPR Executive Summary
 New standard for data
protection and privacy for the
EU member state – replacing
the previous Safe Harbor
agreement (between the US
and EU). Covers any
company doing business in
the EU or with an EU citizen.
What When Impact
 Goes into “full” force on May
25, 2018. Different member
states may add some
variations or additional
requirements.
 Enforcement is backed by substantial fines, some based on 2%-4% of
corporate revenue in EU.
 Allows EU citizens to challenge companies and shift burden onto the
service providing company for proof/response to privacy and security.
 Affects a range of technology systems including data storage and
collection, data encryption, and frameworks for privacy processes
(through policy and privacy specialists).
 Still unclear with Britain leaving the EU – but most likely following GDPR
will still be more stringent than any local guidelines.
© 2016 HyTrust, Inc. 4NDA Material, Confidential and Proprietary
Challenges
Migration to Public Cloud Increases Risk
Transparency
GDPR Requirement Summary Description
Consent/Data Quality
Security enforcement of Privacy
Data breach readiness and response
Right to be Forgotten (Art 17)
Privacy policy and DPO
Opt-in by consumer; ability to get rid of data if
consent is withdrawn
Protecting data via encryption, secure data
destruction, etc..
72 hours for breach notification; incident response
plan
Right to be Forgotten - Erasure (Art 17)
Policy guarantees harder with 3rd party (ie cloud
provider)
Tracking data across many workloads and
geographies with instant ability to “kill” data
Proof of actions (of encryption and destruction)
are required if challenged
Multi-cloud deployment for large enterprises
creates challenges to collect incident data and
take action very quickly
All data must deleted – retroactively and for all
records
Note there are numerous other areas of challenges – but these are most technically challenging for cloud enabled organizations.
© 2016 HyTrust, Inc. 5NDA Material, Confidential and Proprietary
Technology Best Practices Response to GDPR
(and applicable HyTrust Use Cases)
Shift from alert and
SIEM analysis to
proactive, automatic
security for both
breach protection and
privacy protection
[Data Sov.]
Automatic
1 2 3 4 5
Insiders Self-Regulating Platform Agnostic Instant Proof
Ensure admins on access
data on any cloud can be
monitored and proof of
compliance can be shown
instantly (or instantly flag
violations for prompt
remediation)
[PIM, Data Sov.]
Workload needs
portable policy to
protect and enforce
compliance itself
[Data Sov.]
Implement a platform
agnostic solution –
which will work across
any provider or
workload type (virtual
machine, SDDC,
containers, etc..)
[All use cases]
Ensure proof of
compliance is fast,
easy, and multi-cloud
ready
[All use cases]
© 2016 HyTrust, Inc. 6NDA Material, Confidential and Proprietary
My Cloud Provider Says I Am Protected…
Microsoft, Amazon, and others have issued statements that their customers are protected
and compliant already via their use of “model” contracts and other legal mechanisms.
Bottom line: Regardless of who is hosting your data, YOU are responsible for it. Be proactive and not
rely on the provider or specific technology to protect your data.
However….
1 2 3 4
And if provider fails – YOU are still
responsible for data breach
disclosure and remediation impact
for your customers.
ONLY workloads and data
that resides on that provider
can be considered as
“provider” scope (private
data centers, backup/DR
sites, QA copies, etc.. are
still your issue).
YOU are still responsible for
the administrative actions of
systems on that network.
YOU are still responsible for
the data, even if the provider
is compliant.
© 2016 HyTrust, Inc. 7NDA Material, Confidential and Proprietary
Use Case and Advisory Notes
HyTrust Makes the GDPR pain go away…
GDPR Scope HyTrust Capability
Codify the privacy policy through data and admin policy engine and enforce
through workload policy. Monitor and execute immediate policy change
propagation across all workloads/clouds.
Secure decommission of workloads required to ensure fast and efficient data
destruction on demand. Creates chain of evidence of data destruction.
Encryption that be used to secure the privacy (via access and propagation of the
protected data).
Instant audit trail and correlation of activity, policy, and intentional/accidental
attempts of breach. Ability to provide RBAC’s for instant access across auditors or
other regulators.
Encryption key revocation means ALL data is immediately rendered useless.
Data Protection. Policy actions and workload response can all be monitored and
provide instant response to an audit.
Data Protection. Through hyper efficient key management technology, data can
be instantly destroyed.
Data Protection, Data Sov. Proof of actions (of encryption and destruction) are
required if challenged. Encryption, policy controls, etc.. Can be detailed for audit,
compliance proof, or forensics.
PIM, Data Sov. Multi-cloud deployment for large enterprises creates challenges to
collect incident data and take action very quickly
Data Protection, Data Sov. Do not need to track where data exists, only use key
management.
Transparency
Consent/Data Quality
Security enforcement of
Privacy
Data breach readiness and
response
Right to Erasure (to be
Forgotten)
© 2016 HyTrust, Inc. 8NDA Material, Confidential and Proprietary
HyTrust / Customer Options
Detailed GDPR Mapping to HyTrust
GDPR Source Text Requirement Summary
Appropriate level of security based on state of art.
Including: encryption, regular tests of security
effectiveness, ensure confidentiality, integrity of data.
Requires data controller to implement appropriate
technical … measures to ensure and …demonstrate
compliance.
Data controllers must also implement data protection
by default…implement appropriate technical
…measures to [protect/address] the amount of data
collected, extent of processing, and retention and
accessibility of data.
Implement policy based encryption for data protection
(and evidence). Show compliance of human assets.
Forensic level logs that track workloads, administrative
activities, and policy changes at the object level.
Through HyTrust BoundaryControl policies, the system
is (by default) set to adhere to data boundaries and
usage. Furthermore encryption can be used to enforce
this across any cloud provider.
Article 32 – Security of processing
Article 24 – Responsibility of the
controller
Article 25 – data protection by design
and default
© 2016 HyTrust, Inc. 9
NIS Executive Summary
 EU network and information
security (NIS) directive sets
common cyber-security
standards and aims to step up
cooperation among EU
countries and service
providers.
What When Impact
 EU member states have 21
months comply and then 6
months to identify critical
infrastructure operators (May
2018)
 Lays out specific technical guidance on “critical” infrastructure entities
including energy, banking, healthcare, transport sector organizations
that are vital to the EU member state government
 Increased transparency and information sharing – requiring faster
analysis and reporting by affected organizations
 “Critical infrastructure” identified operators will have a higher cyber
security standard and be specifically responsible for prevention of risks
and incident response
© 2016 HyTrust, Inc. 10NDA Material, Confidential and Proprietary
HyTrust Use Cases
HyTrust Reduces Risk with NIS - Examples
NIS Directive Reference Directive Summary
Measures to identify any risks of incidents, to prevent,
detect and handle incidents and to mitigate their
impact. The security of network and information
systems comprises the security of stored, transmitted
and processed data.
Security of systems and compliance with international
standards (among other requirements)
Many points in the directive refer to sharing of data
among various government agencies.
Data Protection. Proactive controls via HyTrust services
and forensic level logging for compliance verification.
Security of data can be enforced via HyTrust
DataControl.
PIM, Data Protection. Security from insider threats and
compliance templates/analysis can be done HyTrust
CloudControl
PIM, Data Sov. HyTrust CloudControl provides RBAC’s
to allow third parties customer defined access to object
level functions to share only the information being
required.
(46) Risk-management measures
(16) Security requirements and
notification
(11), (14), (16)
© 2016 HyTrust, Inc. 11
Thank You

More Related Content

What's hot

The Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationThe Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationJake DiMare
 
Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Stephanie Vasey
 
Modelling the General Data Protection Regulation
Modelling the General Data Protection RegulationModelling the General Data Protection Regulation
Modelling the General Data Protection RegulationSabrina Kirrane
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationIBM Security
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?VYTIS MALECKAS
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slidesNaomi Holmes
 
12 steps to gdpr compliance unleashed
12 steps to gdpr compliance   unleashed12 steps to gdpr compliance   unleashed
12 steps to gdpr compliance unleashedChris Gilmour
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017isc2-hellenic
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for developmentTomppa Järvinen
 
Convince your board - Ten steps to GDPR compliance
Convince your board  - Ten steps to GDPR complianceConvince your board  - Ten steps to GDPR compliance
Convince your board - Ten steps to GDPR complianceDave James
 
Sophie's Privacy - a story about GDPR
Sophie's Privacy - a story about GDPRSophie's Privacy - a story about GDPR
Sophie's Privacy - a story about GDPRHans Demeyer
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPRTim Hyman LLB
 
GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!Fintan Swanton
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessOlivier BARROT
 
GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality Susan Moran
 
Findability Day 2016 - What is GDPR?
Findability Day 2016 - What is GDPR?Findability Day 2016 - What is GDPR?
Findability Day 2016 - What is GDPR?Findwise
 

What's hot (19)

General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
The Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationThe Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection Regulation
 
Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...
 
Modelling the General Data Protection Regulation
Modelling the General Data Protection RegulationModelling the General Data Protection Regulation
Modelling the General Data Protection Regulation
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
 
20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
12 steps to gdpr compliance unleashed
12 steps to gdpr compliance   unleashed12 steps to gdpr compliance   unleashed
12 steps to gdpr compliance unleashed
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for development
 
Convince your board - Ten steps to GDPR compliance
Convince your board  - Ten steps to GDPR complianceConvince your board  - Ten steps to GDPR compliance
Convince your board - Ten steps to GDPR compliance
 
Sophie's Privacy - a story about GDPR
Sophie's Privacy - a story about GDPRSophie's Privacy - a story about GDPR
Sophie's Privacy - a story about GDPR
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your business
 
GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality GDPR – The Practicalities of a New Reality
GDPR – The Practicalities of a New Reality
 
Findability Day 2016 - What is GDPR?
Findability Day 2016 - What is GDPR?Findability Day 2016 - What is GDPR?
Findability Day 2016 - What is GDPR?
 

Viewers also liked

Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber securityIT Governance Ltd
 
SC7 Workshop 2: Big Data, Societal Challenges and the Policy Context
SC7 Workshop 2: Big Data, Societal Challenges and the Policy ContextSC7 Workshop 2: Big Data, Societal Challenges and the Policy Context
SC7 Workshop 2: Big Data, Societal Challenges and the Policy ContextBigData_Europe
 
SC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in CybersecuritySC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in CybersecurityBigData_Europe
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapterisc2-hellenic
 
Trademob - Business Insider MadConf
Trademob - Business Insider MadConfTrademob - Business Insider MadConf
Trademob - Business Insider MadConfJulie Hansen
 
Marquette Social Listening presentation
Marquette Social Listening presentationMarquette Social Listening presentation
Marquette Social Listening presentation7Summits
 
4º básico a semana 03 de junio al 10 de junio
4º básico a  semana  03 de junio al 10 de junio4º básico a  semana  03 de junio al 10 de junio
4º básico a semana 03 de junio al 10 de junioColegio Camilo Henríquez
 
อุปกรณ์เครือข่ายงคอมพิวเตอร์
อุปกรณ์เครือข่ายงคอมพิวเตอร์อุปกรณ์เครือข่ายงคอมพิวเตอร์
อุปกรณ์เครือข่ายงคอมพิวเตอร์ooh Pongtorn
 
Postavte zeď mezi svoje vývojáře
Postavte zeď mezi svoje vývojářePostavte zeď mezi svoje vývojáře
Postavte zeď mezi svoje vývojářeLadislav Prskavec
 
Scala play-framework
Scala play-frameworkScala play-framework
Scala play-frameworkAbdhesh Kumar
 
807 103康八上 my comic book
807 103康八上 my comic book807 103康八上 my comic book
807 103康八上 my comic bookAlly Lin
 
Recruit, Retain, Realize - How Third Party Transactional Data Can Power Your ...
Recruit, Retain, Realize - How Third Party Transactional Data Can Power Your ...Recruit, Retain, Realize - How Third Party Transactional Data Can Power Your ...
Recruit, Retain, Realize - How Third Party Transactional Data Can Power Your ...Doug Oldfield
 
Reclaiming the idea of the University
Reclaiming the idea of the UniversityReclaiming the idea of the University
Reclaiming the idea of the UniversityRichard Hall
 

Viewers also liked (18)

Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
 
SC7 Workshop 2: Big Data, Societal Challenges and the Policy Context
SC7 Workshop 2: Big Data, Societal Challenges and the Policy ContextSC7 Workshop 2: Big Data, Societal Challenges and the Policy Context
SC7 Workshop 2: Big Data, Societal Challenges and the Policy Context
 
SC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in CybersecuritySC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in Cybersecurity
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter
 
Trademob - Business Insider MadConf
Trademob - Business Insider MadConfTrademob - Business Insider MadConf
Trademob - Business Insider MadConf
 
Frede space up paris 2013
Frede space up paris 2013Frede space up paris 2013
Frede space up paris 2013
 
6º básico a semana 09 al 13 de mayo (1)
6º básico a semana 09  al 13 de  mayo (1)6º básico a semana 09  al 13 de  mayo (1)
6º básico a semana 09 al 13 de mayo (1)
 
Marquette Social Listening presentation
Marquette Social Listening presentationMarquette Social Listening presentation
Marquette Social Listening presentation
 
4º básico a semana 03 de junio al 10 de junio
4º básico a  semana  03 de junio al 10 de junio4º básico a  semana  03 de junio al 10 de junio
4º básico a semana 03 de junio al 10 de junio
 
อุปกรณ์เครือข่ายงคอมพิวเตอร์
อุปกรณ์เครือข่ายงคอมพิวเตอร์อุปกรณ์เครือข่ายงคอมพิวเตอร์
อุปกรณ์เครือข่ายงคอมพิวเตอร์
 
User experience eBay
User experience eBayUser experience eBay
User experience eBay
 
Postavte zeď mezi svoje vývojáře
Postavte zeď mezi svoje vývojářePostavte zeď mezi svoje vývojáře
Postavte zeď mezi svoje vývojáře
 
Giveandget.com
Giveandget.comGiveandget.com
Giveandget.com
 
Scala play-framework
Scala play-frameworkScala play-framework
Scala play-framework
 
807 103康八上 my comic book
807 103康八上 my comic book807 103康八上 my comic book
807 103康八上 my comic book
 
Gamification review 1
Gamification review 1Gamification review 1
Gamification review 1
 
Recruit, Retain, Realize - How Third Party Transactional Data Can Power Your ...
Recruit, Retain, Realize - How Third Party Transactional Data Can Power Your ...Recruit, Retain, Realize - How Third Party Transactional Data Can Power Your ...
Recruit, Retain, Realize - How Third Party Transactional Data Can Power Your ...
 
Reclaiming the idea of the University
Reclaiming the idea of the UniversityReclaiming the idea of the University
Reclaiming the idea of the University
 

Similar to Taking the Pain out of GDPR and NIS Compliance

Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfCiente
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdprUlf Mattsson
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
Michael Josephs
Michael JosephsMichael Josephs
Michael JosephsdaveGBE
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standardsautomatskicorporation
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016SteveAtHPE
 
Sookman law society_6_min_business_law
Sookman law society_6_min_business_lawSookman law society_6_min_business_law
Sookman law society_6_min_business_lawbsookman
 
GDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation ChecklistGDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation ChecklistNetworkIQ
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR ComplianceGabor Farkas
 
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...Codemotion
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCapgemini
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsCloudMask inc.
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020Ulf Mattsson
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET Journal
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingIT Governance Ltd
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityEQS Group
 

Similar to Taking the Pain out of GDPR and NIS Compliance (20)

Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdf
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
 
Sookman law society_6_min_business_law
Sookman law society_6_min_business_lawSookman law society_6_min_business_law
Sookman law society_6_min_business_law
 
GDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation ChecklistGDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation Checklist
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
 
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A Security
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Taking the Pain out of GDPR and NIS Compliance

  • 1. © 2016 HyTrust, Inc. 1 GDPR & NIS Taking the pain out of government mandated security response
  • 2. © 2016 HyTrust, Inc. 2 HyTrust Workload Security Use Cases Previously discussed specific use cases – how are they related to GDPR/NIS? Critical areas affected by GDPR and NIS – increased risk with public or hybrid cloud environments: Eliminate privileged user misuse Halt data breaches on all clouds End audit and compliance suffering Remove costly infrastructure air gaps Avoid data sovereignty landmines Stop stupid and the accidental downtime 1. Privileged account misuse 2. Data breach protection 3. Data sovereignty compliance
  • 3. © 2016 HyTrust, Inc. 3 GDPR Executive Summary  New standard for data protection and privacy for the EU member state – replacing the previous Safe Harbor agreement (between the US and EU). Covers any company doing business in the EU or with an EU citizen. What When Impact  Goes into “full” force on May 25, 2018. Different member states may add some variations or additional requirements.  Enforcement is backed by substantial fines, some based on 2%-4% of corporate revenue in EU.  Allows EU citizens to challenge companies and shift burden onto the service providing company for proof/response to privacy and security.  Affects a range of technology systems including data storage and collection, data encryption, and frameworks for privacy processes (through policy and privacy specialists).  Still unclear with Britain leaving the EU – but most likely following GDPR will still be more stringent than any local guidelines.
  • 4. © 2016 HyTrust, Inc. 4NDA Material, Confidential and Proprietary Challenges Migration to Public Cloud Increases Risk Transparency GDPR Requirement Summary Description Consent/Data Quality Security enforcement of Privacy Data breach readiness and response Right to be Forgotten (Art 17) Privacy policy and DPO Opt-in by consumer; ability to get rid of data if consent is withdrawn Protecting data via encryption, secure data destruction, etc.. 72 hours for breach notification; incident response plan Right to be Forgotten - Erasure (Art 17) Policy guarantees harder with 3rd party (ie cloud provider) Tracking data across many workloads and geographies with instant ability to “kill” data Proof of actions (of encryption and destruction) are required if challenged Multi-cloud deployment for large enterprises creates challenges to collect incident data and take action very quickly All data must deleted – retroactively and for all records Note there are numerous other areas of challenges – but these are most technically challenging for cloud enabled organizations.
  • 5. © 2016 HyTrust, Inc. 5NDA Material, Confidential and Proprietary Technology Best Practices Response to GDPR (and applicable HyTrust Use Cases) Shift from alert and SIEM analysis to proactive, automatic security for both breach protection and privacy protection [Data Sov.] Automatic 1 2 3 4 5 Insiders Self-Regulating Platform Agnostic Instant Proof Ensure admins on access data on any cloud can be monitored and proof of compliance can be shown instantly (or instantly flag violations for prompt remediation) [PIM, Data Sov.] Workload needs portable policy to protect and enforce compliance itself [Data Sov.] Implement a platform agnostic solution – which will work across any provider or workload type (virtual machine, SDDC, containers, etc..) [All use cases] Ensure proof of compliance is fast, easy, and multi-cloud ready [All use cases]
  • 6. © 2016 HyTrust, Inc. 6NDA Material, Confidential and Proprietary My Cloud Provider Says I Am Protected… Microsoft, Amazon, and others have issued statements that their customers are protected and compliant already via their use of “model” contracts and other legal mechanisms. Bottom line: Regardless of who is hosting your data, YOU are responsible for it. Be proactive and not rely on the provider or specific technology to protect your data. However…. 1 2 3 4 And if provider fails – YOU are still responsible for data breach disclosure and remediation impact for your customers. ONLY workloads and data that resides on that provider can be considered as “provider” scope (private data centers, backup/DR sites, QA copies, etc.. are still your issue). YOU are still responsible for the administrative actions of systems on that network. YOU are still responsible for the data, even if the provider is compliant.
  • 7. © 2016 HyTrust, Inc. 7NDA Material, Confidential and Proprietary Use Case and Advisory Notes HyTrust Makes the GDPR pain go away… GDPR Scope HyTrust Capability Codify the privacy policy through data and admin policy engine and enforce through workload policy. Monitor and execute immediate policy change propagation across all workloads/clouds. Secure decommission of workloads required to ensure fast and efficient data destruction on demand. Creates chain of evidence of data destruction. Encryption that be used to secure the privacy (via access and propagation of the protected data). Instant audit trail and correlation of activity, policy, and intentional/accidental attempts of breach. Ability to provide RBAC’s for instant access across auditors or other regulators. Encryption key revocation means ALL data is immediately rendered useless. Data Protection. Policy actions and workload response can all be monitored and provide instant response to an audit. Data Protection. Through hyper efficient key management technology, data can be instantly destroyed. Data Protection, Data Sov. Proof of actions (of encryption and destruction) are required if challenged. Encryption, policy controls, etc.. Can be detailed for audit, compliance proof, or forensics. PIM, Data Sov. Multi-cloud deployment for large enterprises creates challenges to collect incident data and take action very quickly Data Protection, Data Sov. Do not need to track where data exists, only use key management. Transparency Consent/Data Quality Security enforcement of Privacy Data breach readiness and response Right to Erasure (to be Forgotten)
  • 8. © 2016 HyTrust, Inc. 8NDA Material, Confidential and Proprietary HyTrust / Customer Options Detailed GDPR Mapping to HyTrust GDPR Source Text Requirement Summary Appropriate level of security based on state of art. Including: encryption, regular tests of security effectiveness, ensure confidentiality, integrity of data. Requires data controller to implement appropriate technical … measures to ensure and …demonstrate compliance. Data controllers must also implement data protection by default…implement appropriate technical …measures to [protect/address] the amount of data collected, extent of processing, and retention and accessibility of data. Implement policy based encryption for data protection (and evidence). Show compliance of human assets. Forensic level logs that track workloads, administrative activities, and policy changes at the object level. Through HyTrust BoundaryControl policies, the system is (by default) set to adhere to data boundaries and usage. Furthermore encryption can be used to enforce this across any cloud provider. Article 32 – Security of processing Article 24 – Responsibility of the controller Article 25 – data protection by design and default
  • 9. © 2016 HyTrust, Inc. 9 NIS Executive Summary  EU network and information security (NIS) directive sets common cyber-security standards and aims to step up cooperation among EU countries and service providers. What When Impact  EU member states have 21 months comply and then 6 months to identify critical infrastructure operators (May 2018)  Lays out specific technical guidance on “critical” infrastructure entities including energy, banking, healthcare, transport sector organizations that are vital to the EU member state government  Increased transparency and information sharing – requiring faster analysis and reporting by affected organizations  “Critical infrastructure” identified operators will have a higher cyber security standard and be specifically responsible for prevention of risks and incident response
  • 10. © 2016 HyTrust, Inc. 10NDA Material, Confidential and Proprietary HyTrust Use Cases HyTrust Reduces Risk with NIS - Examples NIS Directive Reference Directive Summary Measures to identify any risks of incidents, to prevent, detect and handle incidents and to mitigate their impact. The security of network and information systems comprises the security of stored, transmitted and processed data. Security of systems and compliance with international standards (among other requirements) Many points in the directive refer to sharing of data among various government agencies. Data Protection. Proactive controls via HyTrust services and forensic level logging for compliance verification. Security of data can be enforced via HyTrust DataControl. PIM, Data Protection. Security from insider threats and compliance templates/analysis can be done HyTrust CloudControl PIM, Data Sov. HyTrust CloudControl provides RBAC’s to allow third parties customer defined access to object level functions to share only the information being required. (46) Risk-management measures (16) Security requirements and notification (11), (14), (16)
  • 11. © 2016 HyTrust, Inc. 11 Thank You

Editor's Notes

  1. General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679)