SlideShare a Scribd company logo
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
GDPR and Remote
Access Security: What
Your Need to Know
Karl Lankford l 30 January 2018
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
Agenda
1. Current information landscape
2. Who is required to comply with
GDPR and how
3. Importance of secure access to
data privacy
4. How Bomgar’s solutions help meet
GDPR initiatives
5. Q&A
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
• Growth of ‘always on culture’
• Traditional storage and processing of personal data has changed
• Personal data has increased in value
The Information Landscape has Changed…
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
Who Is Required To Comply With GDPR?
• EU-based organisations
• Companies that process data of EU citizens
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
What do organisations have to do? Part One
• Implement “Privacy by Default” and “Privacy by Design”
• Maintain appropriate data security
• Notify data protection agencies and consumers of data breaches
• Get appropriate consent for most personal data collection and
provide notification of personal data processing activities
• Get a parent’s consent to collect data for children under 16
• Keep records of all processing of personal information
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
What do organisations have to do? Part Two
• Appoint a Data Protection Officer
• Take responsibility for the security and processing activities of
third-party vendors
• Conduct Data Protection Impact Assessments on new processing
activities
• Institute safeguards for cross-border data transfers
• Be able to demonstrate compliance on demand
• Provide appropriate data protection training to personnel having
permanent or regular access to personal data
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
How Can You Comply With GDPR?
• Identify What Data You Hold
• Where does the data reside?
• Who has access to the data?
• How is the data processed and
transmitted?
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
How Can You Comply With GDPR?
• Review Employee Training
• Where does the data reside?
• Who has access to the data?
• How is the data processed and transmitted?
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
How Can You Comply With GDPR?
• Consider your supply chain
• Who else has access to your data in
addition to your employees?
• Ensure that they have the necessary
policies and security measures in place to
be compliant if data is stored or processed
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
How Can You Comply With GDPR?
• Control and monitor access to your
data
• Ensure that by default personal data is
not made accessible to those who
don’t need it
• Give privileged users just the access
they need, enforcing least privilege
• Capture an audit trail and log all
session activity
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
Secure Access is Important
• Remote access solutions
continue to be leading
attack pathways used in
security breaches
• Credentials and
passwords are the ‘keys to
the kingdom’ that cyber
criminals target
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
Driving Factors for Implementing a
Privileged Access Solution
Already
suffered a
breach / breach
response
Easing the
burden of
Vendor Access
Risk/Mitigation
against cyber
breach
Adopting an
“assume they
are already in”
security posture
Update or
enforcement of
Corporate
Password
Policy
Compliance
requirement
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
Driving Factors for Implementing a
Privileged Access Solution
Already
suffered a
breach / breach
response
Easing the
burden of
Vendor Access
Risk/Mitigation
against cyber
breach
Adopting an
“assume they
are already in”
security posture
Update or
enforcement of
Corporate
Password
Policy
Compliance
requirement
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
• Eliminate a cybersecurity threat
vector
• Meet privileged access
compliance requirements
• Give them a privileged access
solution they’ll love
• Secure the access, defend the
credential
Bomgar Privileged Access Management
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
Summary
• Identify what data you hold
• Review employee training
• Consider your supply chain
• Control and monitor all
access to your data
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
Questions?
Karl Lankford | Bomgar
Questions?
Karl Lankford
www.bomgar.com

More Related Content

What's hot

14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
ekyklos Κύκλος Ιδεών για τη Εθνική Ανασυγκρότηση
 

What's hot (20)

GDPR Webinar - feb
GDPR Webinar - febGDPR Webinar - feb
GDPR Webinar - feb
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming Webinar
 
Seattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and PrivacySeattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and Privacy
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR Success
 
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
Marketing under the GDPR: What You Can and Cannot Do [Webinar Slides]
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
 
Comply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed AuditsComply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed Audits
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
 
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
 
Five Big Bets in a Blockchain World (June 2018)
Five Big Bets in a Blockchain World (June 2018)Five Big Bets in a Blockchain World (June 2018)
Five Big Bets in a Blockchain World (June 2018)
 
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018
 
The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today
 
Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 

Similar to GDPR and Remote Access Security: What You Need To Know

General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
GrittyCC
 
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Kehinde Tolude
 
Cybertopicsecurity_3
Cybertopicsecurity_3Cybertopicsecurity_3
Cybertopicsecurity_3
Anne Starr
 
gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3
Anne Starr
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
Spain-Holiday.com
 

Similar to GDPR and Remote Access Security: What You Need To Know (20)

#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
 
Presentation -- GDPR Compliance: What Marketing Operations Need to Know (pptx)
Presentation -- GDPR Compliance: What Marketing Operations Need to Know (pptx)Presentation -- GDPR Compliance: What Marketing Operations Need to Know (pptx)
Presentation -- GDPR Compliance: What Marketing Operations Need to Know (pptx)
 
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
 
Establishing sustainable GDPR compliance
Establishing sustainable GDPR complianceEstablishing sustainable GDPR compliance
Establishing sustainable GDPR compliance
 
Understanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of ComplianceUnderstanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of Compliance
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A Security
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
13687562.ppt
13687562.ppt13687562.ppt
13687562.ppt
 
Creating a GDPR Action Plan; Not a Freakout Plan
Creating a GDPR Action Plan; Not a Freakout PlanCreating a GDPR Action Plan; Not a Freakout Plan
Creating a GDPR Action Plan; Not a Freakout Plan
 
Why We Require GDPR?
Why We Require GDPR?Why We Require GDPR?
Why We Require GDPR?
 
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
GDPR 101
GDPR 101GDPR 101
GDPR 101
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
 
Cybertopicsecurity_3
Cybertopicsecurity_3Cybertopicsecurity_3
Cybertopicsecurity_3
 
gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 

More from Bomgar

More from Bomgar (7)

The 6 Best Practices for Privileged Identity Management
The 6 Best Practices for Privileged Identity Management The 6 Best Practices for Privileged Identity Management
The 6 Best Practices for Privileged Identity Management
 
Post GDPR: The Critical Importance of Securing Remote Access
Post GDPR: The Critical Importance of Securing Remote AccessPost GDPR: The Critical Importance of Securing Remote Access
Post GDPR: The Critical Importance of Securing Remote Access
 
10 Tips to Increase Your Service Desk Value
10 Tips to Increase Your Service Desk Value10 Tips to Increase Your Service Desk Value
10 Tips to Increase Your Service Desk Value
 
Privileged Access in Healthcare
Privileged Access in HealthcarePrivileged Access in Healthcare
Privileged Access in Healthcare
 
Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”
 
The Threat is Real: Protect Valuable Systems and Data from the Inside and Out
The Threat is Real: Protect Valuable Systems and Data from the Inside and OutThe Threat is Real: Protect Valuable Systems and Data from the Inside and Out
The Threat is Real: Protect Valuable Systems and Data from the Inside and Out
 
Your Service Desk is Privileged, Too
Your Service Desk is Privileged, TooYour Service Desk is Privileged, Too
Your Service Desk is Privileged, Too
 

Recently uploaded

一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
ukgaet
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
enxupq
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
ewymefz
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
ewymefz
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
axoqas
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
vcaxypu
 
Introduction-to-Cybersecurit57hhfcbbcxxx
Introduction-to-Cybersecurit57hhfcbbcxxxIntroduction-to-Cybersecurit57hhfcbbcxxx
Introduction-to-Cybersecurit57hhfcbbcxxx
zahraomer517
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
StarCompliance.io
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
ewymefz
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
Opendatabay
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
ewymefz
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
ArpitMalhotra16
 

Recently uploaded (20)

一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
 
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
 
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
 
Using PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBUsing PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDB
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
tapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive datatapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive data
 
Introduction-to-Cybersecurit57hhfcbbcxxx
Introduction-to-Cybersecurit57hhfcbbcxxxIntroduction-to-Cybersecurit57hhfcbbcxxx
Introduction-to-Cybersecurit57hhfcbbcxxx
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
 

GDPR and Remote Access Security: What You Need To Know

  • 1. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE GDPR and Remote Access Security: What Your Need to Know Karl Lankford l 30 January 2018
  • 2. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE Agenda 1. Current information landscape 2. Who is required to comply with GDPR and how 3. Importance of secure access to data privacy 4. How Bomgar’s solutions help meet GDPR initiatives 5. Q&A
  • 3. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE • Growth of ‘always on culture’ • Traditional storage and processing of personal data has changed • Personal data has increased in value The Information Landscape has Changed…
  • 4. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE Who Is Required To Comply With GDPR? • EU-based organisations • Companies that process data of EU citizens
  • 5. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE What do organisations have to do? Part One • Implement “Privacy by Default” and “Privacy by Design” • Maintain appropriate data security • Notify data protection agencies and consumers of data breaches • Get appropriate consent for most personal data collection and provide notification of personal data processing activities • Get a parent’s consent to collect data for children under 16 • Keep records of all processing of personal information
  • 6. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE What do organisations have to do? Part Two • Appoint a Data Protection Officer • Take responsibility for the security and processing activities of third-party vendors • Conduct Data Protection Impact Assessments on new processing activities • Institute safeguards for cross-border data transfers • Be able to demonstrate compliance on demand • Provide appropriate data protection training to personnel having permanent or regular access to personal data
  • 7. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE How Can You Comply With GDPR? • Identify What Data You Hold • Where does the data reside? • Who has access to the data? • How is the data processed and transmitted?
  • 8. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE How Can You Comply With GDPR? • Review Employee Training • Where does the data reside? • Who has access to the data? • How is the data processed and transmitted?
  • 9. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE How Can You Comply With GDPR? • Consider your supply chain • Who else has access to your data in addition to your employees? • Ensure that they have the necessary policies and security measures in place to be compliant if data is stored or processed
  • 10. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE How Can You Comply With GDPR? • Control and monitor access to your data • Ensure that by default personal data is not made accessible to those who don’t need it • Give privileged users just the access they need, enforcing least privilege • Capture an audit trail and log all session activity
  • 11. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE Secure Access is Important • Remote access solutions continue to be leading attack pathways used in security breaches • Credentials and passwords are the ‘keys to the kingdom’ that cyber criminals target
  • 12. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE Driving Factors for Implementing a Privileged Access Solution Already suffered a breach / breach response Easing the burden of Vendor Access Risk/Mitigation against cyber breach Adopting an “assume they are already in” security posture Update or enforcement of Corporate Password Policy Compliance requirement
  • 13. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE Driving Factors for Implementing a Privileged Access Solution Already suffered a breach / breach response Easing the burden of Vendor Access Risk/Mitigation against cyber breach Adopting an “assume they are already in” security posture Update or enforcement of Corporate Password Policy Compliance requirement
  • 14. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE • Eliminate a cybersecurity threat vector • Meet privileged access compliance requirements • Give them a privileged access solution they’ll love • Secure the access, defend the credential Bomgar Privileged Access Management
  • 15. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE Summary • Identify what data you hold • Review employee training • Consider your supply chain • Control and monitor all access to your data
  • 16. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE Questions? Karl Lankford | Bomgar Questions? Karl Lankford www.bomgar.com