SlideShare a Scribd company logo
SECURITY, GDPR,
AND IT OUTSOURCING:
HOW TO GET
IT RIGHT
THE WORLDWIDE SPENDING ON
INFORMATION SECURITY TO
TOP $113 BILLION BY 2020 WITH
(A CAGR OF 7.6%)
Data security continues to be a serious concern for
most companies, as the demand for advanced security
automation, threat intelligence, and security analytics
is constantly rising.
As security risks amplify, IT outsourcing companies
put a lot more emphasis on complying with industry
regulations, policies, methodologies, and technologies
used in data protection.
How do reliable outsourcing providers tackle these
security challenges?
WORLDWIDE IT SECURITY PRODUCTS MARKET
REVENUEFROM 2013 TO 2018
(in billion U.S. dollars)
Perimeter-based approaches to security
have become outdated. Security and
privacypros must take a data-centric
approach to make certain that security
travels with the data itself — not only to
protect it from cybercriminals but also
to ensure that privacy policies remain in
effect.”
— Forrester
Cloud data protection (CDP)
Protects from unwelcomed government surveillance
and helps remove some of the biggest impediments
to cloud adoption (security, compliance, and privacy
concerns).
Data privacy management solutions
Platforms which help operationalize privacy processes
and practices, supporting privacy by design and
meeting compliance requirements and initiating
auditable workflows.
TOP TECHNOLOGIES FOR
DATA SECURITY AND PRIVACY
Big data encryption
Helps obscure data in relational databases and in
the distributed computing architectures of big data
platforms, to protect personal privacy, reduce the
impact of cyber attacks, and achieve compliance.
Artificial Intelligence
Smart systems that detect and act on security threats,
either before or right after the information has been
compromised.
SECURITY CONCERNS WEIGH ON
THE MINDS OF EXECUTIVES
48% 41% 92%
of executives are very
concerned about security
are much more concerned
that 3 years ago
agreed more information
will be expected
WHY COOPERATE WITH
ISO-CERTIFIED VENDORS?
When choosing an outsourcing provider, consider companies that are compliant
with ISO standards and requirements.
IT vendors must have:
An effectively implemented documentation and records management system.
Established security policy.
Efficient process control.
Apart from ISO certification, the General Data Protection
Regulation (GDPR) will have a far-reaching impact
on global organizations as it will replace the primary law
regulating personal data protection — Data Protection
Directive 95/46/ec.
provide information security guarantees to their
customers, investors, and other stakeholders;
reduce the number of incidents and the costs
associated with unauthorized access and potential
information loss;
Cooperation with ISO-certified IT vendors
allows companies to:
ensure safe management of information resources;
raise the company’s profile and facilitate interaction
with customers;
increase the overall efficiency of doing business.
The General Data Protection Regulation is a directive established
by the European Union to protect individuals’ personal information.
The new GDPR is applicable to all organizations that collect or
process
the personal data of EU citizens or residents.
Under its regulations, companies are required to implement a number
of initiatives for safeguarding data, as well as technical  organizational
measures to protect data and the individuals’ privacy rights.
Companies are also required to ensure systems and procedures
are able to properly test, monitor and measure data security.
Any failure may cause financial penalties up to $22 million or up to 4%
of annual revenues.
GDPR IN A NUTSHELL
May 25,
2018the regulation will go into force
and replace the EU’s 1995 Data
Protection Directive.
GDPR — GUIDING PRINCIPLES FOR
DATA PROTECTION
Raise GDPR Awareness
Any trusted outsourcing vendor
must develop a full understanding
of what GDPR entails, given the
specifics of the organization’s
business practices.
KEY STEPS OUTSOURCING VENDORS MUST MAKE
TOWARDS SUCCESSFUL GDPR COMPLIANCE
Perform a gap analysis
Auditing existing processes to
perform a gap analysis will help
companies to further define where
new procedures, technologies and
specialists are needed to fill any
gaps regarding data security, data
auditing, data privacy needs and
achieve GDPR compliance.
Create a data register
As soon as you potential business
partner has a clear vision about its
readiness to meet the regulatory
requirements, he needs to keep
a record of the process. This should
be done through creating a Data
Register.
Evaluateexistingtechnology
Examining organization’s technology
requirementsisvitalforunderstanding
which of the current solutions need
to be upgraded or replaced.
KEY STEPS OUTSOURCING VENDORS MUST MAKE
TOWARDS SUCCESSFUL GDPR COMPLIANCE
Analyze potential risks
Keeping a roadmap document is
essential to ensure the security
level is appropriate to the risk.
This also includes encryption and
pseudonymisation of personal
data as well as integrity and
confidentiality of data processing
systems and services.
Continuous testing
Any reliable business partner must
receive continual insights on process
improvements to ensure that best
practices are still actual and the
system data is well-protected.
Security, GDRP, and IT outsourcing: How to get it right

More Related Content

What's hot

Compliance: The Digital Imperative in Financial Services
Compliance: The Digital Imperative in Financial ServicesCompliance: The Digital Imperative in Financial Services
Compliance: The Digital Imperative in Financial Services
Appian
 
A Focus on Data, Best's Review, September 2018
A Focus on Data, Best's Review, September 2018A Focus on Data, Best's Review, September 2018
A Focus on Data, Best's Review, September 2018
Gates Ouimette
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
Ashish Jain
 
U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...
U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...
U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...
Ebiquity
 
Privacy in an interconnected world
Privacy in an interconnected worldPrivacy in an interconnected world
Privacy in an interconnected world
Bianca Mueller, LL.M.
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
Rahul Neel Mani
 
TrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working TogetherTrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc
 
SEC Updates its Electronic Recordkeeping Rule for the First Time in 25 Years
SEC Updates its Electronic Recordkeeping Rule for the First Time in 25 YearsSEC Updates its Electronic Recordkeeping Rule for the First Time in 25 Years
SEC Updates its Electronic Recordkeeping Rule for the First Time in 25 Years
Shield
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
Happiest Minds Technologies
 
apidays LIVE Paris 2021 - Privacy in SDKs by Romain Robert, NOYB
apidays LIVE Paris 2021 - Privacy in SDKs by Romain Robert, NOYBapidays LIVE Paris 2021 - Privacy in SDKs by Romain Robert, NOYB
apidays LIVE Paris 2021 - Privacy in SDKs by Romain Robert, NOYB
apidays
 
BigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and TaggingBigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and Tagging
BigID Inc
 
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
Jessica Pattison
 
Embracing Digital Convergence amid Regulatory-Driven Overhauls
Embracing Digital Convergence amid Regulatory-Driven OverhaulsEmbracing Digital Convergence amid Regulatory-Driven Overhauls
Embracing Digital Convergence amid Regulatory-Driven Overhauls
Cognizant
 
Are You Keeping Up With FinTech in 2021?
Are You Keeping Up With FinTech in 2021?Are You Keeping Up With FinTech in 2021?
Are You Keeping Up With FinTech in 2021?
Insight
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
shekharkanodia
 
GDPR Readiness
GDPR ReadinessGDPR Readiness
GDPR Readiness
NGA Human Resources
 
General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Compliance
accenture
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
Symantec
 
GDPR FAQ'S
GDPR FAQ'SGDPR FAQ'S
GDPR FAQ'S
Morgan McKinley
 
2019 10-23 ccpa survival guide
2019 10-23 ccpa survival guide2019 10-23 ccpa survival guide
2019 10-23 ccpa survival guide
TrustArc
 

What's hot (20)

Compliance: The Digital Imperative in Financial Services
Compliance: The Digital Imperative in Financial ServicesCompliance: The Digital Imperative in Financial Services
Compliance: The Digital Imperative in Financial Services
 
A Focus on Data, Best's Review, September 2018
A Focus on Data, Best's Review, September 2018A Focus on Data, Best's Review, September 2018
A Focus on Data, Best's Review, September 2018
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...
U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...
U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...
 
Privacy in an interconnected world
Privacy in an interconnected worldPrivacy in an interconnected world
Privacy in an interconnected world
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
 
TrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working TogetherTrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working Together
 
SEC Updates its Electronic Recordkeeping Rule for the First Time in 25 Years
SEC Updates its Electronic Recordkeeping Rule for the First Time in 25 YearsSEC Updates its Electronic Recordkeeping Rule for the First Time in 25 Years
SEC Updates its Electronic Recordkeeping Rule for the First Time in 25 Years
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
apidays LIVE Paris 2021 - Privacy in SDKs by Romain Robert, NOYB
apidays LIVE Paris 2021 - Privacy in SDKs by Romain Robert, NOYBapidays LIVE Paris 2021 - Privacy in SDKs by Romain Robert, NOYB
apidays LIVE Paris 2021 - Privacy in SDKs by Romain Robert, NOYB
 
BigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and TaggingBigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and Tagging
 
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
 
Embracing Digital Convergence amid Regulatory-Driven Overhauls
Embracing Digital Convergence amid Regulatory-Driven OverhaulsEmbracing Digital Convergence amid Regulatory-Driven Overhauls
Embracing Digital Convergence amid Regulatory-Driven Overhauls
 
Are You Keeping Up With FinTech in 2021?
Are You Keeping Up With FinTech in 2021?Are You Keeping Up With FinTech in 2021?
Are You Keeping Up With FinTech in 2021?
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
GDPR Readiness
GDPR ReadinessGDPR Readiness
GDPR Readiness
 
General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Compliance
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
GDPR FAQ'S
GDPR FAQ'SGDPR FAQ'S
GDPR FAQ'S
 
2019 10-23 ccpa survival guide
2019 10-23 ccpa survival guide2019 10-23 ccpa survival guide
2019 10-23 ccpa survival guide
 

Similar to Security, GDRP, and IT outsourcing: How to get it right

General Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian FirmsGeneral Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian Firms
accenture
 
GDPR: Data Privacy in the New
GDPR: Data Privacy in the NewGDPR: Data Privacy in the New
GDPR: Data Privacy in the New
accenture
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
Capgemini
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
ekyklos Κύκλος Ιδεών για τη Εθνική Ανασυγκρότηση
 
EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know
Sarah Crabb
 
How GDPR Guidelines Regulate Marketing Automation and Customer Engagement
How GDPR Guidelines Regulate Marketing Automation and Customer EngagementHow GDPR Guidelines Regulate Marketing Automation and Customer Engagement
How GDPR Guidelines Regulate Marketing Automation and Customer Engagement
Ray Business Technologies
 
GDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessGDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessMark Baker
 
GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaperJim Wilson
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
RishalHalid1
 
Janrain Identity Cloud GDPR Assessment Kit
Janrain Identity Cloud GDPR Assessment Kit Janrain Identity Cloud GDPR Assessment Kit
Janrain Identity Cloud GDPR Assessment Kit
Sean Bailey
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
Sirius
 
Data Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxData Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptx
Adarsh748147
 
3GRC approach to GDPR V 0.1 www.3grc.co.uk
3GRC  approach to GDPR V 0.1 www.3grc.co.uk3GRC  approach to GDPR V 0.1 www.3grc.co.uk
3GRC approach to GDPR V 0.1 www.3grc.co.uk
►David Clarke FBCS CITP
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
Peter Goldbrunner
 
GDPR & Data Privacy Guide - Free Download
GDPR & Data Privacy Guide - Free DownloadGDPR & Data Privacy Guide - Free Download
GDPR & Data Privacy Guide - Free Download
Visitor Analytics
 
Solution Brief: Helping prepare for risk & compliance challenges for GDPR
Solution Brief: Helping prepare for risk & compliance challenges for GDPRSolution Brief: Helping prepare for risk & compliance challenges for GDPR
Solution Brief: Helping prepare for risk & compliance challenges for GDPR
Iceberg Networks Corporation
 
Looking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance DeadlineLooking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance Deadline
accenture
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
Symantec
 
GDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation ChecklistGDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation Checklist
NetworkIQ
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
ObservePoint
 

Similar to Security, GDRP, and IT outsourcing: How to get it right (20)

General Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian FirmsGeneral Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian Firms
 
GDPR: Data Privacy in the New
GDPR: Data Privacy in the NewGDPR: Data Privacy in the New
GDPR: Data Privacy in the New
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
 
EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know
 
How GDPR Guidelines Regulate Marketing Automation and Customer Engagement
How GDPR Guidelines Regulate Marketing Automation and Customer EngagementHow GDPR Guidelines Regulate Marketing Automation and Customer Engagement
How GDPR Guidelines Regulate Marketing Automation and Customer Engagement
 
GDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessGDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your business
 
GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaper
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
Janrain Identity Cloud GDPR Assessment Kit
Janrain Identity Cloud GDPR Assessment Kit Janrain Identity Cloud GDPR Assessment Kit
Janrain Identity Cloud GDPR Assessment Kit
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
Data Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxData Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptx
 
3GRC approach to GDPR V 0.1 www.3grc.co.uk
3GRC  approach to GDPR V 0.1 www.3grc.co.uk3GRC  approach to GDPR V 0.1 www.3grc.co.uk
3GRC approach to GDPR V 0.1 www.3grc.co.uk
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
 
GDPR & Data Privacy Guide - Free Download
GDPR & Data Privacy Guide - Free DownloadGDPR & Data Privacy Guide - Free Download
GDPR & Data Privacy Guide - Free Download
 
Solution Brief: Helping prepare for risk & compliance challenges for GDPR
Solution Brief: Helping prepare for risk & compliance challenges for GDPRSolution Brief: Helping prepare for risk & compliance challenges for GDPR
Solution Brief: Helping prepare for risk & compliance challenges for GDPR
 
Looking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance DeadlineLooking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance Deadline
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
GDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation ChecklistGDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation Checklist
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
 

Recently uploaded

Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
YourLegal Accounting
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
HajeJanKamps
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop.com LTD
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 

Recently uploaded (20)

Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 

Security, GDRP, and IT outsourcing: How to get it right

  • 1. SECURITY, GDPR, AND IT OUTSOURCING: HOW TO GET IT RIGHT
  • 2. THE WORLDWIDE SPENDING ON INFORMATION SECURITY TO TOP $113 BILLION BY 2020 WITH (A CAGR OF 7.6%) Data security continues to be a serious concern for most companies, as the demand for advanced security automation, threat intelligence, and security analytics is constantly rising. As security risks amplify, IT outsourcing companies put a lot more emphasis on complying with industry regulations, policies, methodologies, and technologies used in data protection. How do reliable outsourcing providers tackle these security challenges?
  • 3. WORLDWIDE IT SECURITY PRODUCTS MARKET REVENUEFROM 2013 TO 2018 (in billion U.S. dollars)
  • 4. Perimeter-based approaches to security have become outdated. Security and privacypros must take a data-centric approach to make certain that security travels with the data itself — not only to protect it from cybercriminals but also to ensure that privacy policies remain in effect.” — Forrester
  • 5. Cloud data protection (CDP) Protects from unwelcomed government surveillance and helps remove some of the biggest impediments to cloud adoption (security, compliance, and privacy concerns). Data privacy management solutions Platforms which help operationalize privacy processes and practices, supporting privacy by design and meeting compliance requirements and initiating auditable workflows. TOP TECHNOLOGIES FOR DATA SECURITY AND PRIVACY Big data encryption Helps obscure data in relational databases and in the distributed computing architectures of big data platforms, to protect personal privacy, reduce the impact of cyber attacks, and achieve compliance. Artificial Intelligence Smart systems that detect and act on security threats, either before or right after the information has been compromised.
  • 6. SECURITY CONCERNS WEIGH ON THE MINDS OF EXECUTIVES 48% 41% 92% of executives are very concerned about security are much more concerned that 3 years ago agreed more information will be expected
  • 7. WHY COOPERATE WITH ISO-CERTIFIED VENDORS? When choosing an outsourcing provider, consider companies that are compliant with ISO standards and requirements. IT vendors must have: An effectively implemented documentation and records management system. Established security policy. Efficient process control.
  • 8. Apart from ISO certification, the General Data Protection Regulation (GDPR) will have a far-reaching impact on global organizations as it will replace the primary law regulating personal data protection — Data Protection Directive 95/46/ec. provide information security guarantees to their customers, investors, and other stakeholders; reduce the number of incidents and the costs associated with unauthorized access and potential information loss; Cooperation with ISO-certified IT vendors allows companies to: ensure safe management of information resources; raise the company’s profile and facilitate interaction with customers; increase the overall efficiency of doing business.
  • 9. The General Data Protection Regulation is a directive established by the European Union to protect individuals’ personal information. The new GDPR is applicable to all organizations that collect or process the personal data of EU citizens or residents. Under its regulations, companies are required to implement a number of initiatives for safeguarding data, as well as technical organizational measures to protect data and the individuals’ privacy rights. Companies are also required to ensure systems and procedures are able to properly test, monitor and measure data security. Any failure may cause financial penalties up to $22 million or up to 4% of annual revenues. GDPR IN A NUTSHELL May 25, 2018the regulation will go into force and replace the EU’s 1995 Data Protection Directive.
  • 10. GDPR — GUIDING PRINCIPLES FOR DATA PROTECTION
  • 11. Raise GDPR Awareness Any trusted outsourcing vendor must develop a full understanding of what GDPR entails, given the specifics of the organization’s business practices. KEY STEPS OUTSOURCING VENDORS MUST MAKE TOWARDS SUCCESSFUL GDPR COMPLIANCE Perform a gap analysis Auditing existing processes to perform a gap analysis will help companies to further define where new procedures, technologies and specialists are needed to fill any gaps regarding data security, data auditing, data privacy needs and achieve GDPR compliance. Create a data register As soon as you potential business partner has a clear vision about its readiness to meet the regulatory requirements, he needs to keep a record of the process. This should be done through creating a Data Register.
  • 12. Evaluateexistingtechnology Examining organization’s technology requirementsisvitalforunderstanding which of the current solutions need to be upgraded or replaced. KEY STEPS OUTSOURCING VENDORS MUST MAKE TOWARDS SUCCESSFUL GDPR COMPLIANCE Analyze potential risks Keeping a roadmap document is essential to ensure the security level is appropriate to the risk. This also includes encryption and pseudonymisation of personal data as well as integrity and confidentiality of data processing systems and services. Continuous testing Any reliable business partner must receive continual insights on process improvements to ensure that best practices are still actual and the system data is well-protected.