SlideShare a Scribd company logo
1 of 42
Download to read offline
The growing mandatory
requirements to protect data
Rajni Baliyan
0
Agenda
 About the speaker
 Fujitsu at a glance
 Product and services
 Core competencies and involvement in PostgreSQL community
 What is confidential data ?
 What is data breach?
 How data can be compromised?
 Breach Types
 Phases of attack
 List of some Recent Breaches
 Impact of breaches on Organisations
 Records Compromised
 Flaws in current regulations
 Government intervention and amendments
 Some recent amendments around the world
 Australia – Requirements , Europe – Safeguards , Europe – Compliance ,UK , Australia – Requirements
,Japan , Japan and Europe, China, USA – Data Protection, USA – Privacy, India , Latin America
 Possible ways to minimize this breach
 Take away
1 Copyright 2015 FUJITSU LIMITED
About speaker
Rajni Baliyan
Database Expert
Fujitsu Enterprise Postgres / PostgreSQL
+61 410472086
rajnib@fast.au.fujitsu.com
postgesql.fastware.com
twitter.com/fujitsupostgres
linkedin.com/showcase/fujitsu-enterprtise-postgres
Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Fujitsu at a glance
Fujitsu is a Japan-based global ICT vendor, seeking affluent society
with customer by leveraging ICT technologies and our experiences.
<Fujitsu’s technology and services for achieving digital innovation.>
3 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Our products and services
FUJITSU Supercomputer
PRIMEHPC FX10
FUJITSU Server
PRIMERGY
FUJITSU Storage
ETERNUS
Our datacenters in the world
Technology Solutions
Ubiquitous Product Solutions
Services Systems platform
Device solutions
MB85RS1MT
1Mbit FRAM in
very small
package for
wearable devices
Relay lineupHigh speed
printing thermal
printer
FTP-62HMCL153
FUJITSU PC
LIFEBOOK
FUJITSU Tablet
arrows
FUJITSU
UBIQUITOUSWARE
vital sign sensing
bands
4 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Fujitsu Limited
 Core competencies :
 FUJITSU Enterprise Postgres - development, consulting, support and services
 Enterprise software development using Java and .NET technologies.
 Development of mobile solutions using iOS, Android and Windows mobile
platforms.
 Information Management Solutions for Data Warehousing and Business Intelligence
 Enterprise middleware
 Enviable track record providing end-to-end services for IT projects, including
requirements analysis, software design and development, project management,
integration, and testing.
 PostgreSQL Community Involvement
 Developers working on community code in Japan and Australia
 Focus on increasing contributions and contributors
 Support team that provides global support for PostgreSQL
 Platinum sponsor for events (PGConf, PgDay Oz)
5 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
What is confidential data?
 Personally identifiable information(PII):
 Social Security Numbers
 Tax file number
 Credit card numbers
 Health records
 Person’s personal information like- address, phone number, email etc.
 Person’s employment details like salary, work phone number etc.
 Network information such as IP addresses and server names
 Some other examples of confidential data:
 Financial Data
 Corporate Data
 Intellectual Property
 Military Data
 Government Data
6 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
What is a data breach?
 Unauthorised access, loss or disclosure of personal information that could
cause serious harm to the individual whose information has been
compromised.
 Serious Harm includes-
 physical
 psychological
 emotional
 financial
 reputational harm
7 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
How data can be compromised?
 Data breach could be a result of the following:
 A device containing a customer’s personal information is stolen or lost
 A database containing personal data is hacked.
 Personal data is provided to the wrong person or shared with business
partner or market research organisations (Data Monetization).
 An employee browsing sensitive data without a legitimate reason.
 Duplication of production data into development and test environments
without considering security in mind.
8 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Breach Types
9
25.52
22.96
18.58
11.42
11.24
5.22
3.26 2.25
Breach Type by Percentage
Hacking or Malware Portable Device Loss
Unintended Disclosure Physical Loss
Insider Leak Stationary Device Loss
Unknown Payment Card Fraud
Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
 Source: Average figures from Trend Micro
https://www.trendmicro.com/vinfo/us/security/definition/data-breach
Phases of Attack
 There are usually three phases of an attack.
 Research – The target is selected  studied for weaknesses to exploit,
with a focus on employees, systems and networks.
 Attack – Once the weaknesses are determined, contact is made through a
network based or a social attack.
A network attack utilises weaknesses in the infrastructure and may use SQL
injection, vulnerability exploitation and session hijacking amongst other
techniques.
A social attack utilises social engineering such as phishing emails or emails
attached to malware.
 Exfiltrate – Once inside the network, the data can be extracted.
10 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
List of some Recent Breaches
Year Organization Industry Records stolen
2016 Myspace web 164000000
2016 VK web 100544934
2016 Turkish citizenship database government 49611709
2016 Tumblr web 65,000,000
2016 LinkedIn web 117000000
2015 Voter Database web 191000000
2015 Anthem healthcare 80000000
2015 Securus Technologies web 70000000
2015 AshleyMadison.com web 37000000
2014 Ebay web 145000000
2014 JP Morgan Chase financial 76000000
2014 Home Depot retail 56000000
2013 Target retail 70000000
2013 UbiSoft gaming 58000000
2013 Evernote web 50000000
2013 Living Social web 50000000
2013 Adobe tech 36000000
2013 Court Ventures financial 200000000
2013 Massive American business hack financial 160000000
11 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
 Source: Record Data Breaches
https://www.trendmicro.com/vinfo/us/security/definition/data-breach
Impact of breaches on Organisations
 Impact on breached organisation includes but not restricted to fines but
also
 loss of reputation
 financial losses
 loss of competitive edge
 inability to trade because of bankruptcy
 Penalties due to failure to comply with Legal obligations
 Government imposed Fines
12 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Impact of breaches on Organisations
 Harm to Customers which includes physical, psychological, emotional,
financial or reputational harm.
 As per US National Cyber Security Alliance:
 60% of small businesses are stop operating for more than six months after a cyber
attack.
 According to the Ponemon Institute:
 the average cost for a small business to recover after their business had been
hacked is $690k.
 the average price for a middle market company is over $1 million.
13 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Records Compromised
 According to Breach Level Index:
 Currently Over 5 million data records are currently or stolen every day.
 Since 2013 Over 9,740million data records have been lost or stolen.
 4% of these breaches accessed encrypted data where the stolen data was useless.
14 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Flaws in current regulations
 Organizations have to notify customers, each of the people impacted, those
who might potentially be at risk of serious harm.
 Publish a statement on their website and publicise it through
advertisements in newspapers, on websites and social media platforms.
 There were no strict laws to confirm and tackle such breaches.
 In past Organisations have concealed that they have been breached and
confidential customer information had been stolen.
• Example – Car pooling company ‘GoGet’ took 7months to inform the customers
about the data breach.
 According to Steven Norton, The Wall Street Journal, all of the data
breaches investigated by Verizon over last 10years,not a single company
that handle payment card data found to be compliant with all 12 PCI
requirement.
15 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Government intervention and amendments
 Because of the impact of breaches governments around the world are
intervening
 Existing regulations are not enough to tackle data breach problem seriously
and effectively to bringing amendments in their data protection policies.
 All the countries are amending their regulations by imposing fines and tight
regulations.
 Countries like Europe, Australia, China, Japan etc are tightening their
regulations using GDPR, APPI, CS Law, HIPA etc.
16 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Some recent amendments around the world
 GDPR Europe:2018
 General Data Protection Regulation (GDPR)
 Compliance with GDPR is not optional.
 According to the GDPR a “data breach” includes accidental or unlawful
destruction, loss, alteration, unauthorized disclosure of, or access to,
personal data transmitted, stored or otherwise processed”.
 It applies to any organization that controls or processes personal data of
people living in the European Union – even if your organization is not
located in the EU – it applies.
 Sky-high regulatory fines for non-compliance are imposed.
 Forces organizations to know and understand their data from a 360-degree
perspective where it is being processed, who is processing and storing it.
17 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Some recent amendments around the world
 Immediate information to the personal whose data has been compromised
and media release of the breach.
 Two tiers of regulatory fines, the more expensive of which is a fine of up to
€20 million or four percent of the annual worldwide turnover for the
organization, whichever is higher.
 APPI, Japan:2017
 Called “Act on the Protection of Personal Information”
 Came into force on 30 May 2017
 CS Law, China
 Called “Cyber Security Law”
 Came into effect on 1 June 2017.
 This includes for the first time a comprehensive set of data protection
provisions in the form of national-level legislation.
18 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Australia - Requirements
 Prior to February of 2017, Australian businesses were only encouraged to
report data breaches to the Office of the Australian Information
Commissioner (OAIC).
 They were not legally bound to report breaches. Recent changes to the Privacy Act
requires action when handling personal data.
 As of February 23, 2018 all data breaches which relate to personal data
must.
 Be reported to the Office of the Australian Information Commissioner and people
affected.
 All impacted customers informed about the incident and advised on how they
should respond.
 Failure to act will result in facing penalties that include fines of $360,000 for
individuals and $1.8 million for organisations.
19 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Europe - Compliance
 According to the GDPR a “data breach” includes accidental or unlawful
destruction, loss, alteration, unauthorized disclosure of, or access to,
personal data transmitted, stored or otherwise processed”.
 Preventing unauthorized use or access must be considered as a key
element of GDPR compliance.
 Failure to comply with GDPR will be very expensive. In addition to other
financial consequences, there are two tiers of regulatory fines, the more
expensive of which is a fine of up to €20 million or four percent of the
annual worldwide turnover for the organization, whichever is higher.
 There is a need for continual compliance with the GDPR, as a failed audit
may have damaging financial consequences.
20 Copyright 2015 FUJITSU LIMITED
Europe - Safeguards
 GDPR introduces data controllers and processors to ensure that both
organizational and technical safeguards have been implemented to ensure
that the rights and freedoms of data subjects are not compromised.
 The Organisational safeguards include:
 data protection impact assessments
 data protection by design for both structured and unstructured data
 the appointment of a data protection officer who reports to the highest level of the
organization.
 Technical safeguards include:
 pseudonymization
 encryption
 various capabilities for identifying and blocking data breaches
 ensuring data security
 automatically identifying and classifying personal data
21 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
UK
 The UK's vote in 2016 to leave the European Union has an impact on the
applicability of GDPR:
 The Data Protection Act is the UK law for data protection. The GDPR will
not apply to data subjects and personal data within the UK if the UK does
leave the European Union.
 The GDPR applies to Europe, and any UK firm that wants to trade in the
EU Market must comply with GDPR requirements.
 Individual firms can ensure that their data protection complies with the
GDPR mandates, in addition to complying with the UK
22 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Australia - Requirements
 Prior to February of 2017, Australian businesses were only encouraged to
report data breaches to the Office of the Australian Information
Commissioner (OAIC). They were not legally bound to report breaches.
Recent changes to the Privacy Act requires action when handling personal
data.
 As of February 23, 2018 all data breaches which relate to personal data
must.
 Be reported to the Office of the Australian Information Commissioner and people
affected.
 All impacted customers informed about the incident and advised on how they
should respond.
 Failure to act will result in facing penalties that include fines of $360,000 for
individuals and $1.8 million for organisations.
23 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Japan
 The Act on the Protection of Personal Information ("APPI") regulates
privacy protection issues in Japan and the Personal Information Protection
Commission (the "PPC"), a central agency acts as a supervisory
governmental organization on issues of privacy protection.
 Japan’s APPI dates back to 2003 and stands as one of Asia’s oldest data
protection laws. The National Diet passed extensive reforms to the APPI in
September 2015 following a series of high profile data security breaches
and revelations of unlawful sales of personal data in Japan.
 The APPI was recently amended and the amendments came into force on
30 May 2017.
 The amended APPI took partial effect on 1 January 2016, establishing the
PPC, a central, dedicated regulatory authority with enforcement powers
backed by penal sanctions.
24 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Japan and Europe
 The European Commission and the Japanese government published a
joint statement on the international transfer of personal data. The EU and
Japan will continue their cooperation with the intention of recognizing each
other as having adequate levels of personal data protection.
 The EU Commission has an existing "white list" of countries it has
recognized in the past as having an adequate level of personal data
protection to the EU. However, Japan was not one of those recognized
countries.
 Japan's reformed privacy law came into full force May 30, 2017. Along with
a significant number of changes, the new law also introduced a similar
white-list concept. The mutual recognition will add Japan to EU's white list
and make the EU Japan's first "white listed" jurisdiction.
25 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
China
 Until recently, China’s data privacy framework has consisted of fragmented
rules found in various laws, measures and sector-specific regulations.
 However, the Cyber Security Law (the CS Law), which came into effect on
1 June 2017, includes for the first time a comprehensive set of data
protection provisions in the form of national-level legislation. These
provisions are of general application to personal information collected over
information networks.
 The CS Law at least partially supersedes previously key data privacy
related provisions in other regulations, while other provisions will continue
to have an effect in parallel.
26 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
USA – Data Protection
 The United States does not currently have federal legislation regarding
Data Protection.
 However privacy is insured through the following
 United States Privacy Act
 Safe Harbor Act
 Health Insurance Portability and Accountability Act
 The United States utilises a 'sectoral' approach to data protection. Data
protection laws and privacy rely on a combination of legislation, regulation,
and self-regulation rather than governmental interference alone.
27 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
USA - Privacy
 Subject to the Sectoral approach, US privacy privacy
legislation tends to be sparse and is adopted on an ad hoc
basis.
 Legislation arises when circumstances require.
 Such laws only apply to situations where individuals are not
able to control the use of their data through self-regulation.
28 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
India
 There is no specific legislation on privacy and data protection in India.
Although, the Information Technology Act, 2000 contains provisions to
protect electronic data.
 India’s IT Ministry adopted the Information Technology Rules, which took
effect in 2011.
 These require corporate entities collecting, processing and storing personal
data, including sensitive personal information to comply with certain
procedures.
 It distinguishes between ‘personal information’ and ‘sensitive personal
information’.
29 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Latin America
 Latin American countries tend to follow the European model of having
comprehensive data protection regimes, based on principles and rules
applicable to all personal data and some special rules for specific types of
data, but they fall behind the European standards.
 Countries like Brazil, don’t have a comprehensive data protection law.
 Other countries, like Argentina or Chile, have laws that address data
security only in a generic manner and without specific rules prescribing the
notification of security incidents.
 However, Brazil, Argentina or Chile are in the process of updating their
legislative frameworks to address these issues.
 Colombia, Mexico, Peru and Uruguay are more advanced in this area, but
in some cases the only required notification is to the users and not the
authority.
30 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
INTERNAL USE ONLYINTERNAL USE ONLY
Possible ways to minimize this breach
31 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Various level to avoid breaches
 Operating system level security:
 In order to have secure database, Operating system should be secure, as
this is the gate to enter into database.
 Apply critical security patches and updates on time to avoid malware
attack.
 Network level security:
 Always ensure firewall is not enabled unless required.
 Network pass-through
 Other external attack :
 Access methods like trust, md5, scram-sha-256 etc, should be used with
care.
 Password, Server and backup theft should also be taken very seriously.
 Administrator access
32 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Database level security
 The server / database security aspects can be summed up as
Authentication, Authorization and Auditing (AAA), which is common to
computer and network security.
 These security considerations in general are specific to the community
version of Postgres.
 There are a number of precautions that can be taken to secure a database
once an attacker has access to the Network.
33 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Database
 Port
 Default port 5432
 Default ports are easy way to get into your system and try to crack the login and
password.
 By allowing and encouraging a different Port to be used the risk is reduced
significantly as there are 65535 possible ports that can be allocated.
 Access
 Restrict access to configuration files like postgresql.conf, pg_hba.conf and log
file(pg_log) to administrator only.
 Managing roles with care.
 There are several levels at which access is granted within PostgreSQL.
 Internal access like- superuser, nosuperuser, created etc.
 Grant these roles very carefully as needed only.
34 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Database Security
 SQL Injection Attacks are an exposure where faults in the Application allow
Malicious SQL to be executed via an Application interface.
 The implementation of PostgreSQL allows access to a range of features to
assist in reducing the risk of data stored in Postgres being exposed to
unauthorised access.
 The PostgreSQL security features include supporting a range of
Authentication methods that reduce the risk of exposure to unauthorised
access.
 PostgreSQL also has features to monitor the inappropriate use of
Authorised access.
35 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Privileges
 There are several levels at which privileges are granted within PostgreSQL.
 Database level privileges.
 Object level privileges- granted to individual objects within the Database
like table, column, view, sequence, database, foreign-data wrapper, foreign
server, function, procedural language, schema, or tablespace.
 The Privileges that can be granted within PostgreSQL on objects are-
select, insert, update , delete, truncate, all privileges etc.
 Grant these privileges with extra care only if required.
36 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Encryption
 Security safeguards may not stop hackers getting the data
 Data Encryption will stop them from being able to see the content.
 Various Encryption options in PostgreSQL:
 Password Encryption
 Encryption For Specific Columns
 Data Partition Encryption
 Encrypting Data Across A Network- SSL connections encrypt
 SSL Host Authentication
 Client-Side Encryption
 Fujitsu has developed a unique security feature for data at rest and it is
called-Transparent Data Encryption (TDE)
37 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Masking
 Masking policies obscure the data returned by queries allowing the use of
queries for reference purposes without exposing raw data.
 This allows the use of production data in a non production environment
without exposing the data.
 Various terms being used for masking of data:
 Data masking
 Data redact
 Data pseudonymmization
 data obfuscation
 Fujitsu Enterprise Postgres provide unique security feature called Data
masking to address this data breach issue.
38 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Auditing
 The PostgreSQL audit extension allows detailed session and object audit
logging.
 Auditing allows the logging of database activities such as database access
and usage as well as data creation, change or deletion.
 Audit reports can then be generated and analysed for any possible attack.
39 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
Take away
 Ensure current plans and processes are compliant.
 What is currently being done to prevent cybercrime?
 Are improvements required?
 Precautions are better then the sorry.
 Ensure all team members understand their role in protecting against cyber
attacks.
 Explain the legislation.
 Detail steps to manage internal compliance.
 Understand the Terminology (Jargon).
 The legal phrasing for a breach is ‘unauthorised disclosure’
 Be aware of risk and act.
 Serious harm includes physical, psychological, emotional, economic and financial
harm.
 Raise awareness among both businesses and consumers.
40 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
PGConf APAC 2018: Sponsored Talk by Fujitsu - The growing mandatory requirements to protect data

More Related Content

What's hot

Data breach presentation
Data breach presentationData breach presentation
Data breach presentationBradford Bach
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breachBaltimax
 
Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12Dr. Ahmed Al Zaidy
 
Enterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEnterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEchoworx
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10Dr. Ahmed Al Zaidy
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudSymantec
 
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Dr. Ahmed Al Zaidy
 
Aligning Today's IT with the Future of Government - Peter Pin
Aligning Today's IT with the Future of Government - Peter PinAligning Today's IT with the Future of Government - Peter Pin
Aligning Today's IT with the Future of Government - Peter Pinscoopnewsgroup
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowSymantec
 

What's hot (20)

Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15
 
Hacking3e ppt ch02
Hacking3e ppt ch02Hacking3e ppt ch02
Hacking3e ppt ch02
 
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13
 
Funsec3e ppt ch10
Funsec3e ppt ch10Funsec3e ppt ch10
Funsec3e ppt ch10
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
 
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
 
Funsec3e ppt ch03
Funsec3e ppt ch03Funsec3e ppt ch03
Funsec3e ppt ch03
 
Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12
 
Forensic3e ppt ch03
Forensic3e ppt ch03Forensic3e ppt ch03
Forensic3e ppt ch03
 
Enterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEnterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey Report
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14
 
Funsec3e ppt ch06
Funsec3e ppt ch06Funsec3e ppt ch06
Funsec3e ppt ch06
 
Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
 
Aligning Today's IT with the Future of Government - Peter Pin
Aligning Today's IT with the Future of Government - Peter PinAligning Today's IT with the Future of Government - Peter Pin
Aligning Today's IT with the Future of Government - Peter Pin
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 

Similar to PGConf APAC 2018: Sponsored Talk by Fujitsu - The growing mandatory requirements to protect data

What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
DATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERDATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERYashiVaidya
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threatillustro
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsHappiest Minds Technologies
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.James Seville
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessSirius
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internetsuperintendingengine17
 
DATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali RangoliyaDATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali RangoliyaNSConclave
 
GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.Steven Salter
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Adriana Sanford
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
What is data protection and why it is important for business
What is data protection and why it is important for businessWhat is data protection and why it is important for business
What is data protection and why it is important for businessSameerShaik43
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementVelrada
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
 

Similar to PGConf APAC 2018: Sponsored Talk by Fujitsu - The growing mandatory requirements to protect data (20)

What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
DATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERDATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPER
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
DATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali RangoliyaDATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali Rangoliya
 
GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
 
Cyber security
Cyber securityCyber security
Cyber security
 
Global Threats| Cybersecurity|
Global Threats| Cybersecurity| Global Threats| Cybersecurity|
Global Threats| Cybersecurity|
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
What is data protection and why it is important for business
What is data protection and why it is important for businessWhat is data protection and why it is important for business
What is data protection and why it is important for business
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 

More from PGConf APAC

PGConf APAC 2018: PostgreSQL 10 - Replication goes Logical
PGConf APAC 2018: PostgreSQL 10 - Replication goes LogicalPGConf APAC 2018: PostgreSQL 10 - Replication goes Logical
PGConf APAC 2018: PostgreSQL 10 - Replication goes LogicalPGConf APAC
 
PGConf APAC 2018 - Lightening Talk #3: How To Contribute to PostgreSQL
PGConf APAC 2018 - Lightening Talk #3: How To Contribute to PostgreSQLPGConf APAC 2018 - Lightening Talk #3: How To Contribute to PostgreSQL
PGConf APAC 2018 - Lightening Talk #3: How To Contribute to PostgreSQLPGConf APAC
 
PGConf APAC 2018 - Lightening Talk #2 - Centralizing Authorization in PostgreSQL
PGConf APAC 2018 - Lightening Talk #2 - Centralizing Authorization in PostgreSQLPGConf APAC 2018 - Lightening Talk #2 - Centralizing Authorization in PostgreSQL
PGConf APAC 2018 - Lightening Talk #2 - Centralizing Authorization in PostgreSQLPGConf APAC
 
Sponsored Talk @ PGConf APAC 2018 - Choosing the right partner in your Postgr...
Sponsored Talk @ PGConf APAC 2018 - Choosing the right partner in your Postgr...Sponsored Talk @ PGConf APAC 2018 - Choosing the right partner in your Postgr...
Sponsored Talk @ PGConf APAC 2018 - Choosing the right partner in your Postgr...PGConf APAC
 
PGConf APAC 2018 - A PostgreSQL DBAs Toolbelt for 2018
PGConf APAC 2018 - A PostgreSQL DBAs Toolbelt for 2018PGConf APAC 2018 - A PostgreSQL DBAs Toolbelt for 2018
PGConf APAC 2018 - A PostgreSQL DBAs Toolbelt for 2018PGConf APAC
 
PGConf APAC 2018 - Patroni: Kubernetes-native PostgreSQL companion
PGConf APAC 2018 - Patroni: Kubernetes-native PostgreSQL companionPGConf APAC 2018 - Patroni: Kubernetes-native PostgreSQL companion
PGConf APAC 2018 - Patroni: Kubernetes-native PostgreSQL companionPGConf APAC
 
PGConf APAC 2018 - High performance json postgre-sql vs. mongodb
PGConf APAC 2018 - High performance json  postgre-sql vs. mongodbPGConf APAC 2018 - High performance json  postgre-sql vs. mongodb
PGConf APAC 2018 - High performance json postgre-sql vs. mongodbPGConf APAC
 
PGConf APAC 2018 - Monitoring PostgreSQL at Scale
PGConf APAC 2018 - Monitoring PostgreSQL at ScalePGConf APAC 2018 - Monitoring PostgreSQL at Scale
PGConf APAC 2018 - Monitoring PostgreSQL at ScalePGConf APAC
 
PGConf APAC 2018 - Where's Waldo - Text Search and Pattern in PostgreSQL
PGConf APAC 2018 - Where's Waldo - Text Search and Pattern in PostgreSQLPGConf APAC 2018 - Where's Waldo - Text Search and Pattern in PostgreSQL
PGConf APAC 2018 - Where's Waldo - Text Search and Pattern in PostgreSQLPGConf APAC
 
PGConf APAC 2018 - Managing replication clusters with repmgr, Barman and PgBo...
PGConf APAC 2018 - Managing replication clusters with repmgr, Barman and PgBo...PGConf APAC 2018 - Managing replication clusters with repmgr, Barman and PgBo...
PGConf APAC 2018 - Managing replication clusters with repmgr, Barman and PgBo...PGConf APAC
 
PGConf APAC 2018 - PostgreSQL HA with Pgpool-II and whats been happening in P...
PGConf APAC 2018 - PostgreSQL HA with Pgpool-II and whats been happening in P...PGConf APAC 2018 - PostgreSQL HA with Pgpool-II and whats been happening in P...
PGConf APAC 2018 - PostgreSQL HA with Pgpool-II and whats been happening in P...PGConf APAC
 
PGConf APAC 2018 - PostgreSQL performance comparison in various clouds
PGConf APAC 2018 - PostgreSQL performance comparison in various cloudsPGConf APAC 2018 - PostgreSQL performance comparison in various clouds
PGConf APAC 2018 - PostgreSQL performance comparison in various cloudsPGConf APAC
 
Sponsored Talk @ PGConf APAC 2018 - Migrating Oracle to EDB Postgres Approach...
Sponsored Talk @ PGConf APAC 2018 - Migrating Oracle to EDB Postgres Approach...Sponsored Talk @ PGConf APAC 2018 - Migrating Oracle to EDB Postgres Approach...
Sponsored Talk @ PGConf APAC 2018 - Migrating Oracle to EDB Postgres Approach...PGConf APAC
 
PGConf APAC 2018 - Tale from Trenches
PGConf APAC 2018 - Tale from TrenchesPGConf APAC 2018 - Tale from Trenches
PGConf APAC 2018 - Tale from TrenchesPGConf APAC
 
PGConf APAC 2018 Keynote: PostgreSQL goes eleven
PGConf APAC 2018 Keynote: PostgreSQL goes elevenPGConf APAC 2018 Keynote: PostgreSQL goes eleven
PGConf APAC 2018 Keynote: PostgreSQL goes elevenPGConf APAC
 
Amazon (AWS) Aurora
Amazon (AWS) AuroraAmazon (AWS) Aurora
Amazon (AWS) AuroraPGConf APAC
 
Use Case: PostGIS and Agribotics
Use Case: PostGIS and AgriboticsUse Case: PostGIS and Agribotics
Use Case: PostGIS and AgriboticsPGConf APAC
 
How to teach an elephant to rock'n'roll
How to teach an elephant to rock'n'rollHow to teach an elephant to rock'n'roll
How to teach an elephant to rock'n'rollPGConf APAC
 
PostgreSQL on Amazon RDS
PostgreSQL on Amazon RDSPostgreSQL on Amazon RDS
PostgreSQL on Amazon RDSPGConf APAC
 
PostgreSQL WAL for DBAs
PostgreSQL WAL for DBAs PostgreSQL WAL for DBAs
PostgreSQL WAL for DBAs PGConf APAC
 

More from PGConf APAC (20)

PGConf APAC 2018: PostgreSQL 10 - Replication goes Logical
PGConf APAC 2018: PostgreSQL 10 - Replication goes LogicalPGConf APAC 2018: PostgreSQL 10 - Replication goes Logical
PGConf APAC 2018: PostgreSQL 10 - Replication goes Logical
 
PGConf APAC 2018 - Lightening Talk #3: How To Contribute to PostgreSQL
PGConf APAC 2018 - Lightening Talk #3: How To Contribute to PostgreSQLPGConf APAC 2018 - Lightening Talk #3: How To Contribute to PostgreSQL
PGConf APAC 2018 - Lightening Talk #3: How To Contribute to PostgreSQL
 
PGConf APAC 2018 - Lightening Talk #2 - Centralizing Authorization in PostgreSQL
PGConf APAC 2018 - Lightening Talk #2 - Centralizing Authorization in PostgreSQLPGConf APAC 2018 - Lightening Talk #2 - Centralizing Authorization in PostgreSQL
PGConf APAC 2018 - Lightening Talk #2 - Centralizing Authorization in PostgreSQL
 
Sponsored Talk @ PGConf APAC 2018 - Choosing the right partner in your Postgr...
Sponsored Talk @ PGConf APAC 2018 - Choosing the right partner in your Postgr...Sponsored Talk @ PGConf APAC 2018 - Choosing the right partner in your Postgr...
Sponsored Talk @ PGConf APAC 2018 - Choosing the right partner in your Postgr...
 
PGConf APAC 2018 - A PostgreSQL DBAs Toolbelt for 2018
PGConf APAC 2018 - A PostgreSQL DBAs Toolbelt for 2018PGConf APAC 2018 - A PostgreSQL DBAs Toolbelt for 2018
PGConf APAC 2018 - A PostgreSQL DBAs Toolbelt for 2018
 
PGConf APAC 2018 - Patroni: Kubernetes-native PostgreSQL companion
PGConf APAC 2018 - Patroni: Kubernetes-native PostgreSQL companionPGConf APAC 2018 - Patroni: Kubernetes-native PostgreSQL companion
PGConf APAC 2018 - Patroni: Kubernetes-native PostgreSQL companion
 
PGConf APAC 2018 - High performance json postgre-sql vs. mongodb
PGConf APAC 2018 - High performance json  postgre-sql vs. mongodbPGConf APAC 2018 - High performance json  postgre-sql vs. mongodb
PGConf APAC 2018 - High performance json postgre-sql vs. mongodb
 
PGConf APAC 2018 - Monitoring PostgreSQL at Scale
PGConf APAC 2018 - Monitoring PostgreSQL at ScalePGConf APAC 2018 - Monitoring PostgreSQL at Scale
PGConf APAC 2018 - Monitoring PostgreSQL at Scale
 
PGConf APAC 2018 - Where's Waldo - Text Search and Pattern in PostgreSQL
PGConf APAC 2018 - Where's Waldo - Text Search and Pattern in PostgreSQLPGConf APAC 2018 - Where's Waldo - Text Search and Pattern in PostgreSQL
PGConf APAC 2018 - Where's Waldo - Text Search and Pattern in PostgreSQL
 
PGConf APAC 2018 - Managing replication clusters with repmgr, Barman and PgBo...
PGConf APAC 2018 - Managing replication clusters with repmgr, Barman and PgBo...PGConf APAC 2018 - Managing replication clusters with repmgr, Barman and PgBo...
PGConf APAC 2018 - Managing replication clusters with repmgr, Barman and PgBo...
 
PGConf APAC 2018 - PostgreSQL HA with Pgpool-II and whats been happening in P...
PGConf APAC 2018 - PostgreSQL HA with Pgpool-II and whats been happening in P...PGConf APAC 2018 - PostgreSQL HA with Pgpool-II and whats been happening in P...
PGConf APAC 2018 - PostgreSQL HA with Pgpool-II and whats been happening in P...
 
PGConf APAC 2018 - PostgreSQL performance comparison in various clouds
PGConf APAC 2018 - PostgreSQL performance comparison in various cloudsPGConf APAC 2018 - PostgreSQL performance comparison in various clouds
PGConf APAC 2018 - PostgreSQL performance comparison in various clouds
 
Sponsored Talk @ PGConf APAC 2018 - Migrating Oracle to EDB Postgres Approach...
Sponsored Talk @ PGConf APAC 2018 - Migrating Oracle to EDB Postgres Approach...Sponsored Talk @ PGConf APAC 2018 - Migrating Oracle to EDB Postgres Approach...
Sponsored Talk @ PGConf APAC 2018 - Migrating Oracle to EDB Postgres Approach...
 
PGConf APAC 2018 - Tale from Trenches
PGConf APAC 2018 - Tale from TrenchesPGConf APAC 2018 - Tale from Trenches
PGConf APAC 2018 - Tale from Trenches
 
PGConf APAC 2018 Keynote: PostgreSQL goes eleven
PGConf APAC 2018 Keynote: PostgreSQL goes elevenPGConf APAC 2018 Keynote: PostgreSQL goes eleven
PGConf APAC 2018 Keynote: PostgreSQL goes eleven
 
Amazon (AWS) Aurora
Amazon (AWS) AuroraAmazon (AWS) Aurora
Amazon (AWS) Aurora
 
Use Case: PostGIS and Agribotics
Use Case: PostGIS and AgriboticsUse Case: PostGIS and Agribotics
Use Case: PostGIS and Agribotics
 
How to teach an elephant to rock'n'roll
How to teach an elephant to rock'n'rollHow to teach an elephant to rock'n'roll
How to teach an elephant to rock'n'roll
 
PostgreSQL on Amazon RDS
PostgreSQL on Amazon RDSPostgreSQL on Amazon RDS
PostgreSQL on Amazon RDS
 
PostgreSQL WAL for DBAs
PostgreSQL WAL for DBAs PostgreSQL WAL for DBAs
PostgreSQL WAL for DBAs
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

PGConf APAC 2018: Sponsored Talk by Fujitsu - The growing mandatory requirements to protect data

  • 1. The growing mandatory requirements to protect data Rajni Baliyan 0
  • 2. Agenda  About the speaker  Fujitsu at a glance  Product and services  Core competencies and involvement in PostgreSQL community  What is confidential data ?  What is data breach?  How data can be compromised?  Breach Types  Phases of attack  List of some Recent Breaches  Impact of breaches on Organisations  Records Compromised  Flaws in current regulations  Government intervention and amendments  Some recent amendments around the world  Australia – Requirements , Europe – Safeguards , Europe – Compliance ,UK , Australia – Requirements ,Japan , Japan and Europe, China, USA – Data Protection, USA – Privacy, India , Latin America  Possible ways to minimize this breach  Take away 1 Copyright 2015 FUJITSU LIMITED
  • 3. About speaker Rajni Baliyan Database Expert Fujitsu Enterprise Postgres / PostgreSQL +61 410472086 rajnib@fast.au.fujitsu.com postgesql.fastware.com twitter.com/fujitsupostgres linkedin.com/showcase/fujitsu-enterprtise-postgres Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 4. Fujitsu at a glance Fujitsu is a Japan-based global ICT vendor, seeking affluent society with customer by leveraging ICT technologies and our experiences. <Fujitsu’s technology and services for achieving digital innovation.> 3 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 5. Our products and services FUJITSU Supercomputer PRIMEHPC FX10 FUJITSU Server PRIMERGY FUJITSU Storage ETERNUS Our datacenters in the world Technology Solutions Ubiquitous Product Solutions Services Systems platform Device solutions MB85RS1MT 1Mbit FRAM in very small package for wearable devices Relay lineupHigh speed printing thermal printer FTP-62HMCL153 FUJITSU PC LIFEBOOK FUJITSU Tablet arrows FUJITSU UBIQUITOUSWARE vital sign sensing bands 4 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 6. Fujitsu Limited  Core competencies :  FUJITSU Enterprise Postgres - development, consulting, support and services  Enterprise software development using Java and .NET technologies.  Development of mobile solutions using iOS, Android and Windows mobile platforms.  Information Management Solutions for Data Warehousing and Business Intelligence  Enterprise middleware  Enviable track record providing end-to-end services for IT projects, including requirements analysis, software design and development, project management, integration, and testing.  PostgreSQL Community Involvement  Developers working on community code in Japan and Australia  Focus on increasing contributions and contributors  Support team that provides global support for PostgreSQL  Platinum sponsor for events (PGConf, PgDay Oz) 5 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 7. What is confidential data?  Personally identifiable information(PII):  Social Security Numbers  Tax file number  Credit card numbers  Health records  Person’s personal information like- address, phone number, email etc.  Person’s employment details like salary, work phone number etc.  Network information such as IP addresses and server names  Some other examples of confidential data:  Financial Data  Corporate Data  Intellectual Property  Military Data  Government Data 6 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 8. What is a data breach?  Unauthorised access, loss or disclosure of personal information that could cause serious harm to the individual whose information has been compromised.  Serious Harm includes-  physical  psychological  emotional  financial  reputational harm 7 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 9. How data can be compromised?  Data breach could be a result of the following:  A device containing a customer’s personal information is stolen or lost  A database containing personal data is hacked.  Personal data is provided to the wrong person or shared with business partner or market research organisations (Data Monetization).  An employee browsing sensitive data without a legitimate reason.  Duplication of production data into development and test environments without considering security in mind. 8 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 10. Breach Types 9 25.52 22.96 18.58 11.42 11.24 5.22 3.26 2.25 Breach Type by Percentage Hacking or Malware Portable Device Loss Unintended Disclosure Physical Loss Insider Leak Stationary Device Loss Unknown Payment Card Fraud Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY  Source: Average figures from Trend Micro https://www.trendmicro.com/vinfo/us/security/definition/data-breach
  • 11. Phases of Attack  There are usually three phases of an attack.  Research – The target is selected  studied for weaknesses to exploit, with a focus on employees, systems and networks.  Attack – Once the weaknesses are determined, contact is made through a network based or a social attack. A network attack utilises weaknesses in the infrastructure and may use SQL injection, vulnerability exploitation and session hijacking amongst other techniques. A social attack utilises social engineering such as phishing emails or emails attached to malware.  Exfiltrate – Once inside the network, the data can be extracted. 10 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 12. List of some Recent Breaches Year Organization Industry Records stolen 2016 Myspace web 164000000 2016 VK web 100544934 2016 Turkish citizenship database government 49611709 2016 Tumblr web 65,000,000 2016 LinkedIn web 117000000 2015 Voter Database web 191000000 2015 Anthem healthcare 80000000 2015 Securus Technologies web 70000000 2015 AshleyMadison.com web 37000000 2014 Ebay web 145000000 2014 JP Morgan Chase financial 76000000 2014 Home Depot retail 56000000 2013 Target retail 70000000 2013 UbiSoft gaming 58000000 2013 Evernote web 50000000 2013 Living Social web 50000000 2013 Adobe tech 36000000 2013 Court Ventures financial 200000000 2013 Massive American business hack financial 160000000 11 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY  Source: Record Data Breaches https://www.trendmicro.com/vinfo/us/security/definition/data-breach
  • 13. Impact of breaches on Organisations  Impact on breached organisation includes but not restricted to fines but also  loss of reputation  financial losses  loss of competitive edge  inability to trade because of bankruptcy  Penalties due to failure to comply with Legal obligations  Government imposed Fines 12 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 14. Impact of breaches on Organisations  Harm to Customers which includes physical, psychological, emotional, financial or reputational harm.  As per US National Cyber Security Alliance:  60% of small businesses are stop operating for more than six months after a cyber attack.  According to the Ponemon Institute:  the average cost for a small business to recover after their business had been hacked is $690k.  the average price for a middle market company is over $1 million. 13 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 15. Records Compromised  According to Breach Level Index:  Currently Over 5 million data records are currently or stolen every day.  Since 2013 Over 9,740million data records have been lost or stolen.  4% of these breaches accessed encrypted data where the stolen data was useless. 14 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 16. Flaws in current regulations  Organizations have to notify customers, each of the people impacted, those who might potentially be at risk of serious harm.  Publish a statement on their website and publicise it through advertisements in newspapers, on websites and social media platforms.  There were no strict laws to confirm and tackle such breaches.  In past Organisations have concealed that they have been breached and confidential customer information had been stolen. • Example – Car pooling company ‘GoGet’ took 7months to inform the customers about the data breach.  According to Steven Norton, The Wall Street Journal, all of the data breaches investigated by Verizon over last 10years,not a single company that handle payment card data found to be compliant with all 12 PCI requirement. 15 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 17. Government intervention and amendments  Because of the impact of breaches governments around the world are intervening  Existing regulations are not enough to tackle data breach problem seriously and effectively to bringing amendments in their data protection policies.  All the countries are amending their regulations by imposing fines and tight regulations.  Countries like Europe, Australia, China, Japan etc are tightening their regulations using GDPR, APPI, CS Law, HIPA etc. 16 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 18. Some recent amendments around the world  GDPR Europe:2018  General Data Protection Regulation (GDPR)  Compliance with GDPR is not optional.  According to the GDPR a “data breach” includes accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed”.  It applies to any organization that controls or processes personal data of people living in the European Union – even if your organization is not located in the EU – it applies.  Sky-high regulatory fines for non-compliance are imposed.  Forces organizations to know and understand their data from a 360-degree perspective where it is being processed, who is processing and storing it. 17 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 19. Some recent amendments around the world  Immediate information to the personal whose data has been compromised and media release of the breach.  Two tiers of regulatory fines, the more expensive of which is a fine of up to €20 million or four percent of the annual worldwide turnover for the organization, whichever is higher.  APPI, Japan:2017  Called “Act on the Protection of Personal Information”  Came into force on 30 May 2017  CS Law, China  Called “Cyber Security Law”  Came into effect on 1 June 2017.  This includes for the first time a comprehensive set of data protection provisions in the form of national-level legislation. 18 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 20. Australia - Requirements  Prior to February of 2017, Australian businesses were only encouraged to report data breaches to the Office of the Australian Information Commissioner (OAIC).  They were not legally bound to report breaches. Recent changes to the Privacy Act requires action when handling personal data.  As of February 23, 2018 all data breaches which relate to personal data must.  Be reported to the Office of the Australian Information Commissioner and people affected.  All impacted customers informed about the incident and advised on how they should respond.  Failure to act will result in facing penalties that include fines of $360,000 for individuals and $1.8 million for organisations. 19 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 21. Europe - Compliance  According to the GDPR a “data breach” includes accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed”.  Preventing unauthorized use or access must be considered as a key element of GDPR compliance.  Failure to comply with GDPR will be very expensive. In addition to other financial consequences, there are two tiers of regulatory fines, the more expensive of which is a fine of up to €20 million or four percent of the annual worldwide turnover for the organization, whichever is higher.  There is a need for continual compliance with the GDPR, as a failed audit may have damaging financial consequences. 20 Copyright 2015 FUJITSU LIMITED
  • 22. Europe - Safeguards  GDPR introduces data controllers and processors to ensure that both organizational and technical safeguards have been implemented to ensure that the rights and freedoms of data subjects are not compromised.  The Organisational safeguards include:  data protection impact assessments  data protection by design for both structured and unstructured data  the appointment of a data protection officer who reports to the highest level of the organization.  Technical safeguards include:  pseudonymization  encryption  various capabilities for identifying and blocking data breaches  ensuring data security  automatically identifying and classifying personal data 21 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 23. UK  The UK's vote in 2016 to leave the European Union has an impact on the applicability of GDPR:  The Data Protection Act is the UK law for data protection. The GDPR will not apply to data subjects and personal data within the UK if the UK does leave the European Union.  The GDPR applies to Europe, and any UK firm that wants to trade in the EU Market must comply with GDPR requirements.  Individual firms can ensure that their data protection complies with the GDPR mandates, in addition to complying with the UK 22 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 24. Australia - Requirements  Prior to February of 2017, Australian businesses were only encouraged to report data breaches to the Office of the Australian Information Commissioner (OAIC). They were not legally bound to report breaches. Recent changes to the Privacy Act requires action when handling personal data.  As of February 23, 2018 all data breaches which relate to personal data must.  Be reported to the Office of the Australian Information Commissioner and people affected.  All impacted customers informed about the incident and advised on how they should respond.  Failure to act will result in facing penalties that include fines of $360,000 for individuals and $1.8 million for organisations. 23 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 25. Japan  The Act on the Protection of Personal Information ("APPI") regulates privacy protection issues in Japan and the Personal Information Protection Commission (the "PPC"), a central agency acts as a supervisory governmental organization on issues of privacy protection.  Japan’s APPI dates back to 2003 and stands as one of Asia’s oldest data protection laws. The National Diet passed extensive reforms to the APPI in September 2015 following a series of high profile data security breaches and revelations of unlawful sales of personal data in Japan.  The APPI was recently amended and the amendments came into force on 30 May 2017.  The amended APPI took partial effect on 1 January 2016, establishing the PPC, a central, dedicated regulatory authority with enforcement powers backed by penal sanctions. 24 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 26. Japan and Europe  The European Commission and the Japanese government published a joint statement on the international transfer of personal data. The EU and Japan will continue their cooperation with the intention of recognizing each other as having adequate levels of personal data protection.  The EU Commission has an existing "white list" of countries it has recognized in the past as having an adequate level of personal data protection to the EU. However, Japan was not one of those recognized countries.  Japan's reformed privacy law came into full force May 30, 2017. Along with a significant number of changes, the new law also introduced a similar white-list concept. The mutual recognition will add Japan to EU's white list and make the EU Japan's first "white listed" jurisdiction. 25 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 27. China  Until recently, China’s data privacy framework has consisted of fragmented rules found in various laws, measures and sector-specific regulations.  However, the Cyber Security Law (the CS Law), which came into effect on 1 June 2017, includes for the first time a comprehensive set of data protection provisions in the form of national-level legislation. These provisions are of general application to personal information collected over information networks.  The CS Law at least partially supersedes previously key data privacy related provisions in other regulations, while other provisions will continue to have an effect in parallel. 26 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 28. USA – Data Protection  The United States does not currently have federal legislation regarding Data Protection.  However privacy is insured through the following  United States Privacy Act  Safe Harbor Act  Health Insurance Portability and Accountability Act  The United States utilises a 'sectoral' approach to data protection. Data protection laws and privacy rely on a combination of legislation, regulation, and self-regulation rather than governmental interference alone. 27 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 29. USA - Privacy  Subject to the Sectoral approach, US privacy privacy legislation tends to be sparse and is adopted on an ad hoc basis.  Legislation arises when circumstances require.  Such laws only apply to situations where individuals are not able to control the use of their data through self-regulation. 28 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 30. India  There is no specific legislation on privacy and data protection in India. Although, the Information Technology Act, 2000 contains provisions to protect electronic data.  India’s IT Ministry adopted the Information Technology Rules, which took effect in 2011.  These require corporate entities collecting, processing and storing personal data, including sensitive personal information to comply with certain procedures.  It distinguishes between ‘personal information’ and ‘sensitive personal information’. 29 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 31. Latin America  Latin American countries tend to follow the European model of having comprehensive data protection regimes, based on principles and rules applicable to all personal data and some special rules for specific types of data, but they fall behind the European standards.  Countries like Brazil, don’t have a comprehensive data protection law.  Other countries, like Argentina or Chile, have laws that address data security only in a generic manner and without specific rules prescribing the notification of security incidents.  However, Brazil, Argentina or Chile are in the process of updating their legislative frameworks to address these issues.  Colombia, Mexico, Peru and Uruguay are more advanced in this area, but in some cases the only required notification is to the users and not the authority. 30 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 32. INTERNAL USE ONLYINTERNAL USE ONLY Possible ways to minimize this breach 31 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 33. Various level to avoid breaches  Operating system level security:  In order to have secure database, Operating system should be secure, as this is the gate to enter into database.  Apply critical security patches and updates on time to avoid malware attack.  Network level security:  Always ensure firewall is not enabled unless required.  Network pass-through  Other external attack :  Access methods like trust, md5, scram-sha-256 etc, should be used with care.  Password, Server and backup theft should also be taken very seriously.  Administrator access 32 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 34. Database level security  The server / database security aspects can be summed up as Authentication, Authorization and Auditing (AAA), which is common to computer and network security.  These security considerations in general are specific to the community version of Postgres.  There are a number of precautions that can be taken to secure a database once an attacker has access to the Network. 33 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 35. Database  Port  Default port 5432  Default ports are easy way to get into your system and try to crack the login and password.  By allowing and encouraging a different Port to be used the risk is reduced significantly as there are 65535 possible ports that can be allocated.  Access  Restrict access to configuration files like postgresql.conf, pg_hba.conf and log file(pg_log) to administrator only.  Managing roles with care.  There are several levels at which access is granted within PostgreSQL.  Internal access like- superuser, nosuperuser, created etc.  Grant these roles very carefully as needed only. 34 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 36. Database Security  SQL Injection Attacks are an exposure where faults in the Application allow Malicious SQL to be executed via an Application interface.  The implementation of PostgreSQL allows access to a range of features to assist in reducing the risk of data stored in Postgres being exposed to unauthorised access.  The PostgreSQL security features include supporting a range of Authentication methods that reduce the risk of exposure to unauthorised access.  PostgreSQL also has features to monitor the inappropriate use of Authorised access. 35 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 37. Privileges  There are several levels at which privileges are granted within PostgreSQL.  Database level privileges.  Object level privileges- granted to individual objects within the Database like table, column, view, sequence, database, foreign-data wrapper, foreign server, function, procedural language, schema, or tablespace.  The Privileges that can be granted within PostgreSQL on objects are- select, insert, update , delete, truncate, all privileges etc.  Grant these privileges with extra care only if required. 36 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 38. Encryption  Security safeguards may not stop hackers getting the data  Data Encryption will stop them from being able to see the content.  Various Encryption options in PostgreSQL:  Password Encryption  Encryption For Specific Columns  Data Partition Encryption  Encrypting Data Across A Network- SSL connections encrypt  SSL Host Authentication  Client-Side Encryption  Fujitsu has developed a unique security feature for data at rest and it is called-Transparent Data Encryption (TDE) 37 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 39. Masking  Masking policies obscure the data returned by queries allowing the use of queries for reference purposes without exposing raw data.  This allows the use of production data in a non production environment without exposing the data.  Various terms being used for masking of data:  Data masking  Data redact  Data pseudonymmization  data obfuscation  Fujitsu Enterprise Postgres provide unique security feature called Data masking to address this data breach issue. 38 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 40. Auditing  The PostgreSQL audit extension allows detailed session and object audit logging.  Auditing allows the logging of database activities such as database access and usage as well as data creation, change or deletion.  Audit reports can then be generated and analysed for any possible attack. 39 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY
  • 41. Take away  Ensure current plans and processes are compliant.  What is currently being done to prevent cybercrime?  Are improvements required?  Precautions are better then the sorry.  Ensure all team members understand their role in protecting against cyber attacks.  Explain the legislation.  Detail steps to manage internal compliance.  Understand the Terminology (Jargon).  The legal phrasing for a breach is ‘unauthorised disclosure’  Be aware of risk and act.  Serious harm includes physical, psychological, emotional, economic and financial harm.  Raise awareness among both businesses and consumers. 40 Copyright 2018 FUJITSU AUSTRALIA SOFTWARE TECHNOLOGY