SlideShare a Scribd company logo
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Michael Wons
CTO & Global Product Officer
SAI Global
Proactive Risk
Management and
Compliance in a World of
Digital Disruption
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Presenter
Mike Wons joined the SAI Global, Inc. senior leadership team at the beginning
of 2018 as the CTO and Global Product Officer for the leading provider of
Integrated Risk Management (IRM) solutions. In this role, Mike leads all
aspects of strategic technological execution including: product management,
platform strategy, content management strategy, software development,
delivery and dev ops in the visioning, creation, development and deployment of
a global integrated risk management and compliance platform for the industry.
Most recently prior to joining SAI Global, Mike served as an appointed member
of Illinois Governor Rauner’s senior staff as the first State-wide Chief
Technology Officer (CTO). There Mike was focused on establishing and
implementing the Illinois “FIRST” strategy for shaping the future of Technology
and Innovation across Illinois.
Mike is a noted industry expert on Technology, Security and Industry Platforms.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Connecting the World of Risk
Connecting Two Worlds of Risk: Business Operations and IT
Business Operations
Risk Acceptance
Driven By
Business Need
IT
Standard Delivery
Influenced By
Technology Driven Business
Need
Operations-Centric
Risk Analysis
Connecting
Both Needs
*Source Gartner
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Strategic Risk Solutions
Market Snapshot from the CISO, CCO, CRO, GC and Finance
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
In an Age of Customer Risk Issues are Amplified
TRUST MEANS TREATING
CUSTOMERSFAIRLY AND
BEHAVING ETHICALLY.
83%
HOW CAN ACOMPANY WIN BACKTRUST? PUBLICLY
ACKNOWLEDGE RESPONSIBILITY FOR PROBLEMS AND
ADEQUATELY CORRECTTHEM. 47%
IMAGINE LOSING 2OUT OF EVERY 5 CUSTOMERS
BECAUSEYOU WERE ASLOPPY RECORD KEEPER!
43%
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Risk Needs to move from Conformance to Performance
RESULT:
Better visibility
for strategic
risk objectives
Leadership
determines
appetite for
risk
Connect risk
appetite to
behavior and
process
Embed into
business
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Current Methods do not keep up
Unclear roles
and
responsibilities
Decisions
made in
silos
Ad-hoc tools,
processes,
spreadsheets
& office based
products
Risk managed
at the
business unit
level
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Corporate Failures elevate the need to take an integrated
approach to risk management
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Connecting the World of Risk
*Source Gartner
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
But Wait…
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
State of Technology – Digital Transformation
Digital Disruption at a Rapid Pace
Internet of Things
Mobility, Virtual Reality,
Wearables
Blockchain,
Distributed Ledger
Bots, Virtual
Assistants
Enterprise Cybersecure Environment Data Facilities Devices People
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
State of Technology – Digital Transformation
Digital Disruption at a Rapid Pace - IoT
PC
BYOD
IoT
1990 2015 2020
0
5 Billion
30 BillionThe Internet of Things is the
network of dedicated physical
objects (things) that contain
embedded technology to sense
or interact with their internal
state or external environment.
* Forescout 2018 – The World of Connected Things Presentation
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
State of Technology – Digital Transformation
Digital Disruption at a Rapid Pace – Mobility, Wearables
Piwek L, Ellis DA, Andrews S, Joinson A (2016) The Rise of Consumer Health Wearables:
Promises and Barriers. PLoS Med 13(2): e1001953. doi:10.1371/journal.pmed.1001953
http://journals.plos.org/plosmedicine/article?id=info:doi/10.1371/journal.pmed.1001
953
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
State of Technology – Digital Transformation
Digital Disruption at a Rapid Pace – Bots and Virtual Assistants
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
State of Technology – Digital Transformation
Digital Disruption at a Rapid Pace – Blockchain/Distributed Ledger Technology
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
This is a challenge that can be solved…
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Establish an Integrated Risk Management approach
Platform
Characteristics IRM Platform Industry Leaders
Architecture Open, Integrated • Containerized development and deployment
• Micro-services Based Open Architecture
• REST Based API’s
Content Risk-focused • Integrated pre-bundled standards, policies and
learning content
Design Business workflow oriented • Integrated workflow engine for policies, incidents,
vendors and supply-chains, people
Features / Functions Flexible • Configurable to customers needs
Use Ecosystem—driven, cross
business unit,
partners/suppliers
• Open industry platform
• Pre-integrated partner solutions
• Works with your internal systems
Differentiators Platform, Implementation
Methodology, Industry Experts
• Global footprint
• Best Practices Based Implementation Methodology
• Suitable for any sized organization
Above adopted from GRC vs. IRM Solutions – What’s the Difference
by John A. Wheeler of Gartner | February 13, 2018
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Proactive Risk Management Begins with Enterprise Visibility
ASSESS
DISCOVER
CLASSIFY
Continuous, Real-
Time Visibility,
Discovery
Classification and
Assessment
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Proactive Risk Management Begins with Enterprise Visibility
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Cybersecure is the Key
• Information Security
– Protect information from
unauthorized disclosure
– Ensure information is trustworthy
– Guarantee reliable access to
mission critical information
• Cyber-Resiliency
– Ability to anticipate,
withstand and recover from
adverse cyber-events
– Evolve and improve in pace
with the ever-changing cyber
landscape
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Proactive Risk Management and Compliance in a World of
Digital Disruption
Think…
• Proactive = Visibility
• Cybersecure at the Core
• Is the CISO the next CEO
• SOC is a must
...to accelerate the
transformation journey to
Proactive Risk Management
in a Digital World!
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Proactive Risk Management and Compliance in a World of
Digital Disruption
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Questions?
Michael.Wons@saiglobal.com
Come visit us at the show

More Related Content

What's hot

{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...Taiye Lambo
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Fujitsu Middle East
 
Protecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the BeefeatersProtecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the Beefeaters
Jack Nichelson
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
InfinIT - Innovationsnetværket for it
 
Automated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages ItselfAutomated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages ItselfJim Merrifield, IGP, CIP
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
Precisely
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
Booz Allen Hamilton
 
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
Dr. Ahmed Al Zaidy
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
IBM Security
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
Marko Suswanto
 
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisCyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its Analysis
Rahul Neel Mani
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
IBM Security
 
Leveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachLeveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future Breach
Kevin Murphy
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Accenture Technology
 
SolarWinds Presents Compliance with Log and Event Manager
SolarWinds Presents Compliance with Log and Event ManagerSolarWinds Presents Compliance with Log and Event Manager
SolarWinds Presents Compliance with Log and Event Manager
SolarWinds
 
Security Leaders: Manage the Forest, Not the Trees
Security Leaders: Manage the Forest, Not the TreesSecurity Leaders: Manage the Forest, Not the Trees
Security Leaders: Manage the Forest, Not the Trees
Adam Stone
 
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...
PECB
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
Joseph Wynn
 
Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019
Dawn Yankeelov
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
Druva
 

What's hot (20)

{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
 
Protecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the BeefeatersProtecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the Beefeaters
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
 
Automated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages ItselfAutomated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages Itself
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
 
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisCyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its Analysis
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
 
Leveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachLeveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future Breach
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
SolarWinds Presents Compliance with Log and Event Manager
SolarWinds Presents Compliance with Log and Event ManagerSolarWinds Presents Compliance with Log and Event Manager
SolarWinds Presents Compliance with Log and Event Manager
 
Security Leaders: Manage the Forest, Not the Trees
Security Leaders: Manage the Forest, Not the TreesSecurity Leaders: Manage the Forest, Not the Trees
Security Leaders: Manage the Forest, Not the Trees
 
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
 
Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
 

Similar to Proactive Risk Management and Compliance in a World of Digital Disruption

How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
OSIsoft, LLC
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
Christian F. Nissen
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Enterprise Management Associates
 
Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7
Dr. Ahmed Al Zaidy
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilience
accenture
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
japijapi
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilience
accenture
 
Funsec3e ppt ch07
Funsec3e ppt ch07Funsec3e ppt ch07
Funsec3e ppt ch07
Skillspire LLC
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
Accenture Australia
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
Accenture Operations
 
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsUsing Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Enterprise Management Associates
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
accenture
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
accenture
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
Judith Beckhard Cardoso
 
2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management
TrustArc
 
Concept of Governance - Management of Operational Risk for IT Officers/Execut...
Concept of Governance - Management of Operational Risk for IT Officers/Execut...Concept of Governance - Management of Operational Risk for IT Officers/Execut...
Concept of Governance - Management of Operational Risk for IT Officers/Execut...
Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU
 

Similar to Proactive Risk Management and Compliance in a World of Digital Disruption (20)

How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilience
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilience
 
Funsec3e ppt ch07
Funsec3e ppt ch07Funsec3e ppt ch07
Funsec3e ppt ch07
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsUsing Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
S Rod Simpson Resume
S Rod Simpson ResumeS Rod Simpson Resume
S Rod Simpson Resume
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management
 
Concept of Governance - Management of Operational Risk for IT Officers/Execut...
Concept of Governance - Management of Operational Risk for IT Officers/Execut...Concept of Governance - Management of Operational Risk for IT Officers/Execut...
Concept of Governance - Management of Operational Risk for IT Officers/Execut...
 
Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1
 

More from Mike Wons

Five Big Bets in a Blockchain World (June 2018)
Five Big Bets in a Blockchain World (June 2018)Five Big Bets in a Blockchain World (June 2018)
Five Big Bets in a Blockchain World (June 2018)
Mike Wons
 
ITs Role in Accelerating Innovation
ITs Role in Accelerating InnovationITs Role in Accelerating Innovation
ITs Role in Accelerating Innovation
Mike Wons
 
mHealth presentation at Wireless Life Sciences Convergence Conference May 201...
mHealth presentation at Wireless Life Sciences Convergence Conference May 201...mHealth presentation at Wireless Life Sciences Convergence Conference May 201...
mHealth presentation at Wireless Life Sciences Convergence Conference May 201...
Mike Wons
 
Managing Fraud and Compliance in Healthcare
Managing Fraud and Compliance in HealthcareManaging Fraud and Compliance in Healthcare
Managing Fraud and Compliance in Healthcare
Mike Wons
 
Managing Compliance in Healthcare
Managing Compliance in HealthcareManaging Compliance in Healthcare
Managing Compliance in Healthcare
Mike Wons
 
Future Of Healthcare It August 2010
Future Of Healthcare It   August 2010Future Of Healthcare It   August 2010
Future Of Healthcare It August 2010
Mike Wons
 
Intelligent Community Network Services May 2009
Intelligent Community Network Services   May 2009Intelligent Community Network Services   May 2009
Intelligent Community Network Services May 2009
Mike Wons
 
SOA - Enabling Interoperability And Business Agility March 2009
SOA - Enabling Interoperability And Business Agility   March 2009SOA - Enabling Interoperability And Business Agility   March 2009
SOA - Enabling Interoperability And Business Agility March 2009
Mike Wons
 

More from Mike Wons (8)

Five Big Bets in a Blockchain World (June 2018)
Five Big Bets in a Blockchain World (June 2018)Five Big Bets in a Blockchain World (June 2018)
Five Big Bets in a Blockchain World (June 2018)
 
ITs Role in Accelerating Innovation
ITs Role in Accelerating InnovationITs Role in Accelerating Innovation
ITs Role in Accelerating Innovation
 
mHealth presentation at Wireless Life Sciences Convergence Conference May 201...
mHealth presentation at Wireless Life Sciences Convergence Conference May 201...mHealth presentation at Wireless Life Sciences Convergence Conference May 201...
mHealth presentation at Wireless Life Sciences Convergence Conference May 201...
 
Managing Fraud and Compliance in Healthcare
Managing Fraud and Compliance in HealthcareManaging Fraud and Compliance in Healthcare
Managing Fraud and Compliance in Healthcare
 
Managing Compliance in Healthcare
Managing Compliance in HealthcareManaging Compliance in Healthcare
Managing Compliance in Healthcare
 
Future Of Healthcare It August 2010
Future Of Healthcare It   August 2010Future Of Healthcare It   August 2010
Future Of Healthcare It August 2010
 
Intelligent Community Network Services May 2009
Intelligent Community Network Services   May 2009Intelligent Community Network Services   May 2009
Intelligent Community Network Services May 2009
 
SOA - Enabling Interoperability And Business Agility March 2009
SOA - Enabling Interoperability And Business Agility   March 2009SOA - Enabling Interoperability And Business Agility   March 2009
SOA - Enabling Interoperability And Business Agility March 2009
 

Recently uploaded

Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AwangAniqkmals
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 

Recently uploaded (20)

Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 

Proactive Risk Management and Compliance in a World of Digital Disruption

  • 1. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Michael Wons CTO & Global Product Officer SAI Global Proactive Risk Management and Compliance in a World of Digital Disruption
  • 2. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Presenter Mike Wons joined the SAI Global, Inc. senior leadership team at the beginning of 2018 as the CTO and Global Product Officer for the leading provider of Integrated Risk Management (IRM) solutions. In this role, Mike leads all aspects of strategic technological execution including: product management, platform strategy, content management strategy, software development, delivery and dev ops in the visioning, creation, development and deployment of a global integrated risk management and compliance platform for the industry. Most recently prior to joining SAI Global, Mike served as an appointed member of Illinois Governor Rauner’s senior staff as the first State-wide Chief Technology Officer (CTO). There Mike was focused on establishing and implementing the Illinois “FIRST” strategy for shaping the future of Technology and Innovation across Illinois. Mike is a noted industry expert on Technology, Security and Industry Platforms.
  • 3. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Connecting the World of Risk Connecting Two Worlds of Risk: Business Operations and IT Business Operations Risk Acceptance Driven By Business Need IT Standard Delivery Influenced By Technology Driven Business Need Operations-Centric Risk Analysis Connecting Both Needs *Source Gartner
  • 4. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Strategic Risk Solutions Market Snapshot from the CISO, CCO, CRO, GC and Finance
  • 5. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. In an Age of Customer Risk Issues are Amplified TRUST MEANS TREATING CUSTOMERSFAIRLY AND BEHAVING ETHICALLY. 83% HOW CAN ACOMPANY WIN BACKTRUST? PUBLICLY ACKNOWLEDGE RESPONSIBILITY FOR PROBLEMS AND ADEQUATELY CORRECTTHEM. 47% IMAGINE LOSING 2OUT OF EVERY 5 CUSTOMERS BECAUSEYOU WERE ASLOPPY RECORD KEEPER! 43%
  • 6. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Risk Needs to move from Conformance to Performance RESULT: Better visibility for strategic risk objectives Leadership determines appetite for risk Connect risk appetite to behavior and process Embed into business
  • 7. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Current Methods do not keep up Unclear roles and responsibilities Decisions made in silos Ad-hoc tools, processes, spreadsheets & office based products Risk managed at the business unit level
  • 8. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Corporate Failures elevate the need to take an integrated approach to risk management
  • 9. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Connecting the World of Risk *Source Gartner
  • 10. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. But Wait…
  • 11. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. State of Technology – Digital Transformation Digital Disruption at a Rapid Pace Internet of Things Mobility, Virtual Reality, Wearables Blockchain, Distributed Ledger Bots, Virtual Assistants Enterprise Cybersecure Environment Data Facilities Devices People
  • 12. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. State of Technology – Digital Transformation Digital Disruption at a Rapid Pace - IoT PC BYOD IoT 1990 2015 2020 0 5 Billion 30 BillionThe Internet of Things is the network of dedicated physical objects (things) that contain embedded technology to sense or interact with their internal state or external environment. * Forescout 2018 – The World of Connected Things Presentation
  • 13. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. State of Technology – Digital Transformation Digital Disruption at a Rapid Pace – Mobility, Wearables Piwek L, Ellis DA, Andrews S, Joinson A (2016) The Rise of Consumer Health Wearables: Promises and Barriers. PLoS Med 13(2): e1001953. doi:10.1371/journal.pmed.1001953 http://journals.plos.org/plosmedicine/article?id=info:doi/10.1371/journal.pmed.1001 953
  • 14. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. State of Technology – Digital Transformation Digital Disruption at a Rapid Pace – Bots and Virtual Assistants
  • 15. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. State of Technology – Digital Transformation Digital Disruption at a Rapid Pace – Blockchain/Distributed Ledger Technology
  • 16. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. This is a challenge that can be solved…
  • 17. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Establish an Integrated Risk Management approach Platform Characteristics IRM Platform Industry Leaders Architecture Open, Integrated • Containerized development and deployment • Micro-services Based Open Architecture • REST Based API’s Content Risk-focused • Integrated pre-bundled standards, policies and learning content Design Business workflow oriented • Integrated workflow engine for policies, incidents, vendors and supply-chains, people Features / Functions Flexible • Configurable to customers needs Use Ecosystem—driven, cross business unit, partners/suppliers • Open industry platform • Pre-integrated partner solutions • Works with your internal systems Differentiators Platform, Implementation Methodology, Industry Experts • Global footprint • Best Practices Based Implementation Methodology • Suitable for any sized organization Above adopted from GRC vs. IRM Solutions – What’s the Difference by John A. Wheeler of Gartner | February 13, 2018
  • 18. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Proactive Risk Management Begins with Enterprise Visibility ASSESS DISCOVER CLASSIFY Continuous, Real- Time Visibility, Discovery Classification and Assessment
  • 19. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Proactive Risk Management Begins with Enterprise Visibility
  • 20. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Cybersecure is the Key • Information Security – Protect information from unauthorized disclosure – Ensure information is trustworthy – Guarantee reliable access to mission critical information • Cyber-Resiliency – Ability to anticipate, withstand and recover from adverse cyber-events – Evolve and improve in pace with the ever-changing cyber landscape
  • 21. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Proactive Risk Management and Compliance in a World of Digital Disruption Think… • Proactive = Visibility • Cybersecure at the Core • Is the CISO the next CEO • SOC is a must ...to accelerate the transformation journey to Proactive Risk Management in a Digital World!
  • 22. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Proactive Risk Management and Compliance in a World of Digital Disruption
  • 23. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Questions? Michael.Wons@saiglobal.com Come visit us at the show

Editor's Notes

  1. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  2. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  3. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  4. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  5. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  6. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  7. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  8. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  9. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  10. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  11. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  12. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  13. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  14. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  15. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  16. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  17. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  18. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  19. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.
  20. Replaces Data Protection Directive 95/46/EC Harmonize Data Privacy Laws across Europe Protect and Empower all EU citizens data privacy Approved by the EU Parliament on April 14th, 2016 Enforcement date: May 25th, 2018 How it affects organizations in America If their organization has any employees, contractors, customers, or third-party partners in the EU then they need to understand their GDPR risk exposure. Any company GLOBALLY that does business with companies in the EU or that holds EU citizen data is required to comply or they will incur significant fines. It’s retroactive to find and identify the types of data, where it is, where it isn’t and it’s a big task that involves a lot of people in various roles Companies have to prove, demonstrate and attest to compliance to supervising authorities.