SlideShare a Scribd company logo
1 of 11
Download to read offline
Pradeep Vasudevan
Country Leader, Security Software,
IBM India-South Asia
Simplifying data
privacy and protection
Data and apps
Data is a shared
resource for users
and apps
Infrastructure
Servers and networks
disturbed across hybrid
cloud environments
Users and endpoints
Accessing from
anywhere using
any device
Business
priorities are
driving digital
transformation
IBM Security / © 2023 IBM Corporation
Data is a by-product of digital transformation
Explosive Data
Growth
2.5 Billion GB
data created every
single day
Rapidly Increasing
Data Breaches
150%+
growth in data theft
Time to identify and
contain a breach
Days to identify and
contain a data
breach
3
IBM Security / © 2023 IBM Corporation
A data breach is
inevitable…
Its not a matter of IF you will
be breached…
Its a matter of WHEN you
will be breached.
4
Evolving Compliance
Requirements
125+
countries globally have
put in place legislation to
secure the protection of
data
At the same time, compliance laws are getting stringent
*Representative view – actual numbers may vary significantly
5
IBM Security / © 2023 IBM Corporation
India is bringing Digital Personal Data Protection (DPDP) Act
2023
6
An Act to provide for the processing of digital personal data in a manner that recognises both
the right of individuals to protect their personal data and the need to process such personal
data for lawful purposes and for matters connected therewith or incidental thereto.
Applies to:
- personal data collected in digital form
- collected in non-digital form then digitized
Does not apply to:
- Personal and domestic purpose
- Made publicly available
Penalties: 500 Crores
*The India map is used purely for representative purposes only. Any mis-representation is inadvertent and regretted.
IBM Security / © 2023 IBM Corporation
Data journey and DPDP processes and controls
7
•Notice
•Consent/ Guardian
Consent with purpose
Data
Collection
▪Self Service
▪Data protection
– data in rest
– data in motion
▪3rd
parties/ processors
▪ PII discovery and
classification
Data
Processing • Data protection from
unauthorize access
• Data encryption
• Data minimization
• Retention and
erasure
Data Storage
•Compliance with
DPDP
•Special obligation
•Data audits
•Data breach
notification
Compliance
Breach of obligation of Data
Fiduciary to security safeguard
to prevent a breach
Breach of the obligation to
notify the Board or the data
principle of a breach
Breach of additional obligations
related to children
Breach of additional obligations
of Significant Data Fiduciary
Other breach of obligations of
the DPDP
Breach of duties of Data
Principle
Up to Rs. 250 crore Up to Rs. 200 crore Up to Rs. 200 crore Up to Rs. 150 crore Up to Rs. 50 – 100 crore Up to Rs. 10000/-
IBM Security / © 2023 IBM Corporation
1. How do you minimize the impact of
data breach?
2. How do you address the local
compliance requirements?
3. How do you protect your
crown jewels?
8
IBM Security Guardium helps customers simplify data privacy and
protection
Discover and classify
your sensitive data
across on-premise
and cloud data stores
Analyze and
assess risk with
contextual insights and
advanced analytics
Simplify data privacy
and security
compliance, auditing,
and reporting
Discover Respond Simplify
Analyze
Respond to threats in
real-time and send
actionable alerts to
security operations
systems
IBM Security Guardium
Protect sensitive data
through encryption,
access policies, and
data activity
monitoring
Protect
9
50%
increase in data
classification
accuracy
42%
decreased time
remediating data
security issues
89%
reduced time
spent preparing
for an audit
67%
increase in discovering data
source vulnerabilities and
misconfigurations
43%
increase in data
threat detection
accuracy
Clients see results with
Guardium Data Protection
IBM Security Guardium by the numbers
Reduced probability of a breach by 40%
Increased automation saves 79 hours
during database analysis
Effort required to complete an audit
decreased by 75%
Voice of the customer
“When we use IBM Security Guardium in our database
analysis we are able to create reports and custom
tables in a matter of minutes.”
“I was able to short cut all the manual work we used
to have to do for an audit. The compliance templates
provided by IBM Security Guardium saved me a lot of
time and kept the auditors happy.”
IT security engineer,
Energy and Utilities
Simplifying data privacy and protection.pdf

More Related Content

Similar to Simplifying data privacy and protection.pdf

The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docx
arnoldmeredith47041
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
 
C7 defending the cloud with monitoring and auditing
C7   defending the cloud with monitoring and auditingC7   defending the cloud with monitoring and auditing
C7 defending the cloud with monitoring and auditing
Dr. Wilfred Lin (Ph.D.)
 

Similar to Simplifying data privacy and protection.pdf (20)

IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big data
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docx
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...
 
Ibm q radar_blind_references
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_references
 
Why You Need to Govern Big Data
Why You Need to Govern Big DataWhy You Need to Govern Big Data
Why You Need to Govern Big Data
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 
C7 defending the cloud with monitoring and auditing
C7   defending the cloud with monitoring and auditingC7   defending the cloud with monitoring and auditing
C7 defending the cloud with monitoring and auditing
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive data
 
Top 8 Cloud Computing Security Challenges.pptx
Top 8 Cloud Computing Security Challenges.pptxTop 8 Cloud Computing Security Challenges.pptx
Top 8 Cloud Computing Security Challenges.pptx
 
1.0 introduction v2
1.0 introduction v21.0 introduction v2
1.0 introduction v2
 
Dstca
DstcaDstca
Dstca
 
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
 

More from Priyanka Aash

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 

Simplifying data privacy and protection.pdf

  • 1. Pradeep Vasudevan Country Leader, Security Software, IBM India-South Asia Simplifying data privacy and protection
  • 2. Data and apps Data is a shared resource for users and apps Infrastructure Servers and networks disturbed across hybrid cloud environments Users and endpoints Accessing from anywhere using any device Business priorities are driving digital transformation IBM Security / © 2023 IBM Corporation
  • 3. Data is a by-product of digital transformation Explosive Data Growth 2.5 Billion GB data created every single day Rapidly Increasing Data Breaches 150%+ growth in data theft Time to identify and contain a breach Days to identify and contain a data breach 3 IBM Security / © 2023 IBM Corporation
  • 4. A data breach is inevitable… Its not a matter of IF you will be breached… Its a matter of WHEN you will be breached. 4
  • 5. Evolving Compliance Requirements 125+ countries globally have put in place legislation to secure the protection of data At the same time, compliance laws are getting stringent *Representative view – actual numbers may vary significantly 5 IBM Security / © 2023 IBM Corporation
  • 6. India is bringing Digital Personal Data Protection (DPDP) Act 2023 6 An Act to provide for the processing of digital personal data in a manner that recognises both the right of individuals to protect their personal data and the need to process such personal data for lawful purposes and for matters connected therewith or incidental thereto. Applies to: - personal data collected in digital form - collected in non-digital form then digitized Does not apply to: - Personal and domestic purpose - Made publicly available Penalties: 500 Crores *The India map is used purely for representative purposes only. Any mis-representation is inadvertent and regretted. IBM Security / © 2023 IBM Corporation
  • 7. Data journey and DPDP processes and controls 7 •Notice •Consent/ Guardian Consent with purpose Data Collection ▪Self Service ▪Data protection – data in rest – data in motion ▪3rd parties/ processors ▪ PII discovery and classification Data Processing • Data protection from unauthorize access • Data encryption • Data minimization • Retention and erasure Data Storage •Compliance with DPDP •Special obligation •Data audits •Data breach notification Compliance Breach of obligation of Data Fiduciary to security safeguard to prevent a breach Breach of the obligation to notify the Board or the data principle of a breach Breach of additional obligations related to children Breach of additional obligations of Significant Data Fiduciary Other breach of obligations of the DPDP Breach of duties of Data Principle Up to Rs. 250 crore Up to Rs. 200 crore Up to Rs. 200 crore Up to Rs. 150 crore Up to Rs. 50 – 100 crore Up to Rs. 10000/- IBM Security / © 2023 IBM Corporation
  • 8. 1. How do you minimize the impact of data breach? 2. How do you address the local compliance requirements? 3. How do you protect your crown jewels? 8
  • 9. IBM Security Guardium helps customers simplify data privacy and protection Discover and classify your sensitive data across on-premise and cloud data stores Analyze and assess risk with contextual insights and advanced analytics Simplify data privacy and security compliance, auditing, and reporting Discover Respond Simplify Analyze Respond to threats in real-time and send actionable alerts to security operations systems IBM Security Guardium Protect sensitive data through encryption, access policies, and data activity monitoring Protect 9 50% increase in data classification accuracy 42% decreased time remediating data security issues 89% reduced time spent preparing for an audit 67% increase in discovering data source vulnerabilities and misconfigurations 43% increase in data threat detection accuracy
  • 10. Clients see results with Guardium Data Protection IBM Security Guardium by the numbers Reduced probability of a breach by 40% Increased automation saves 79 hours during database analysis Effort required to complete an audit decreased by 75% Voice of the customer “When we use IBM Security Guardium in our database analysis we are able to create reports and custom tables in a matter of minutes.” “I was able to short cut all the manual work we used to have to do for an audit. The compliance templates provided by IBM Security Guardium saved me a lot of time and kept the auditors happy.” IT security engineer, Energy and Utilities