SlideShare a Scribd company logo
1 of 42
Download to read offline
The State of Data Privacy:
Why It’s Becoming More Urgent for IT
May 7th, 2015
2Data Protection and Governance at the Edge
Today’s Presenters
Dave Packer
Vice President, Product Marketing
Druva, Inc.
Diane Hagglund
Principal Analyst
Dimensional Research
3
Agenda
•  What’s Driving Global Data Privacy Awareness
•  Survey Results, Assessment & Conclusions
•  Considerations for Assessing Privacy-Ready SaaS Vendors
•  Summary and Q&A
4Data Protection and Governance at the Edge
Trends Pushing Privacy to the Forefront
•  PRISM and the Patriot Act
o  Microsoft vs United States
•  Evolving Global Privacy Regulations
o  EU, Germany, France, Russia, …
•  Sectoral Regulations
o  HIPAA, SOX, FINRA, GLBA, COPPA, …
•  BYOD, blurring lines between personal and
business data
•  Confidence in controls for safeguarding PII &
PHI
5Data Protection and Governance at the Edge
Breaches Are Elevating Awareness Exponentially
•  Almost all major breaches in 2014 were
against on-premise systems
•  Significant fines & reputation exposure
•  Breaching the firewall can mean extensive
systems access (Sony)
•  Internal challenges are becoming
pervasive
o  Malicious outsider: 50%
o  Accidental loss / misplace: 25%
o  Malicious Insider: 15%
6
2015: The Top Security Challenges
Source: 451 Group – Wave 8 Report 2015 (preliminary note)
Sponsored	
  by:	
  
The	
  State	
  of	
  Data	
  Privacy	
  in	
  2015	
  
A	
  Survey	
  of	
  IT	
  Professionals	
  
	
  
	
  	
  
	
  	
  
	
  
8
Research	
  Goal	
   Understand	
  recent	
  experiences	
  and	
  trends	
  with	
  data	
  
privacy	
  in	
  modern	
  IT	
  organiza>ons.	
  
Goals and Methodology
Methodology	
   An	
  online	
  survey	
  was	
  fielded	
  to	
  IT	
  professionals	
  
responsible	
  for	
  corporate	
  data.	
  	
  A	
  total	
  of	
  214	
  individuals	
  
par>cipated	
  in	
  the	
  survey.	
  Par>cipants	
  represented	
  a	
  
wide	
  range	
  of	
  company	
  sizes,	
  industries,	
  regions	
  and	
  
responsibility	
  for	
  data.	
  
	
  	
  
Defini>ons	
   Data	
  security	
  -­‐	
  Ensuring	
  data	
  is	
  protected	
  from	
  
unauthorized	
  access	
  or	
  intercep>on	
  
Data	
  privacy	
  -­‐	
  Ensuring	
  that	
  sensi>ve	
  data	
  isn’t	
  misused,	
  
misappropriated	
  or	
  publicly	
  exposed	
  by	
  those	
  who	
  have	
  
authorized	
  access	
  to	
  it	
  
	
  
9
Key Findings
Cloud	
  data	
  is	
  growing,	
  but	
  privacy	
  concerns	
  persist	
  
• 	
  88%	
  expect	
  their	
  cloud	
  data	
  volume	
  to	
  increase	
  in	
  2015	
  
• 	
  87%	
  are	
  concerned	
  about	
  privacy	
  of	
  data	
  in	
  the	
  cloud	
  
Data	
  privacy	
  is	
  important	
  –	
  but	
  don’t	
  depend	
  on	
  employees	
  
• 	
  	
  84%	
  report	
  data	
  privacy	
  importance	
  is	
  increasing	
  in	
  2015	
  
• 	
  	
  82%	
  have	
  employees	
  who	
  don’t	
  follow	
  data	
  privacy	
  policies	
  
Data	
  privacy	
  is	
  challenging	
  for	
  IT	
  
• 	
  	
  93%	
  report	
  challenges	
  with	
  data	
  privacy	
  
• 	
  	
  91%	
  have	
  data	
  privacy	
  controls,	
  but	
  they	
  are	
  incomplete	
  
• 	
  	
  77%	
  struggle	
  to	
  keep	
  up	
  with	
  regional	
  requirements	
  for	
  data	
  privacy	
  
10
Participants Represented
LocaFon	
  
EMEA	
  
17%	
  
APAC	
  
23%	
  
AMER	
  
60%	
  Job	
  FuncFon	
  
IT	
  execu>ve	
  
23%	
  
IT	
  	
  team	
  manager	
  
39%	
  
Individual	
  contributor	
  
in	
  IT	
  
19%	
  
Business	
  stakeholder	
  	
  	
  
10%	
  
Service	
  provider	
  
9%	
  
Company	
  Size	
  
Fewer	
  than	
  100	
  
24%	
  
100	
  –	
  1,000	
  
38%	
  
1,000	
  –	
  5,000	
  
17%	
  
More	
  than	
  5,000	
  
21%	
  
DETAILED FINDINGS
12Data Protection and Governance at the Edge
What	
  type	
  of	
  data	
  is	
  the	
  most	
  sensi>ve	
  to	
  your	
  business?	
  	
  
Choose	
  up	
  to	
  3	
  of	
  the	
  following.	
  
Businesses depend on sensitive data
1%	
  
18%	
  
19%	
  
22%	
  
33%	
  
37%	
  
41%	
  
46%	
  
52%	
  
0%	
   10%	
   20%	
   30%	
   40%	
   50%	
   60%	
  
We	
  do	
  not	
  have	
  sensi>ve	
  business	
  data	
  
Planning	
  and	
  strategy	
  documents	
  
Payroll	
  
Unregulated	
  customer	
  data	
  (emails,	
  order	
  history,	
  etc.)	
  
Accoun>ng	
  and	
  financial	
  
Intellectual	
  property	
  
Personal	
  employee	
  informa>on	
  (SSNs,	
  phone	
  numbers,	
  etc.)	
  
Password	
  or	
  authen>ca>on	
  creden>als	
  
Regulated	
  customer	
  data	
  (credit	
  cards,	
  health	
  records,	
  etc.)	
  
13Data Protection and Governance at the Edge
Does	
  your	
  business	
  have	
  data	
  privacy	
  requirements	
  to	
  meet	
  	
  
compliance	
  and	
  governance	
  regula>ons?	
  
Businesses must protect data privacy
to meet regulations
Yes	
  
81%	
  
No	
  
19%	
  
14Data Protection and Governance at the Edge
How	
  are	
  your	
  company’s	
  efforts	
  on	
  protec>ng	
  the	
  privacy	
  of	
  	
  
sensi>ve	
  data	
  changing	
  for	
  2015?	
  
Focus on data privacy escalates in 2015
Increasing	
  
84%	
  
Decreasing	
  
1%	
  
No	
  change	
  
15%	
  
15Data Protection and Governance at the Edge
Giving employees data privacy
policies isn’t enough
All	
  employees	
  follow	
  
data	
  privacy	
  policies	
  
18%	
  
Have	
  employees	
  
who	
  do	
  not	
  follow	
  
data	
  privacy	
  policies	
  
82%	
  
16Data Protection and Governance at the Edge
Which	
  employees	
  are	
  MOST	
  likely	
  to	
  ignore	
  data	
  privacy	
  policies?	
  	
  	
  
Choose	
  up	
  to	
  3	
  of	
  the	
  following.	
  
All types of employees ignore data
privacy policies
6%	
  
16%	
  
17%	
  
20%	
  
24%	
  
29%	
  
31%	
  
35%	
  
48%	
  
0%	
   10%	
   20%	
   30%	
   40%	
   50%	
   60%	
  
Legal	
  
Engineering	
  
Manufacturing	
  
Finance	
  and	
  accoun>ng	
  
IT	
  
Opera>ons	
  
Owner/Partner	
  
Marke>ng	
  
Sales	
  
17Data Protection and Governance at the Edge
	
  What	
  level	
  of	
  employee	
  is	
  most	
  likely	
  to	
  ignore	
  data	
  privacy	
  policies?	
  	
  	
  
All types of employees ignore data
privacy policies (con’t)
Execu>ves	
  
33%	
  
Team	
  managers	
  
14%	
  
Individual	
  
contributors	
  or	
  
front-­‐line	
  staff	
  
39%	
  
Contractors	
  
14%	
  
18Data Protection and Governance at the Edge
How	
  do	
  you	
  expect	
  the	
  volume	
  of	
  data	
  in	
  the	
  cloud	
  change	
  in	
  2015?	
  
Significant momentum in cloud
data growth
n	
  =	
  have	
  data	
  in	
  the	
  cloud	
  
Increase	
  
88%	
  
Decrease	
  
5%	
  
Stay	
  the	
  same	
  
7%	
  
19Data Protection and Governance at the Edge
How	
  concerned	
  are	
  you	
  about	
  the	
  privacy	
  of	
  sensi>ve	
  business	
  	
  
data	
  in	
  the	
  cloud?	
  
IT is concerned about data privacy
in the cloud
n	
  =	
  have	
  data	
  in	
  the	
  cloud	
  
32%	
   55%	
   13%	
  
0%	
   20%	
   40%	
   60%	
   80%	
   100%	
  
Very	
  concerned	
  
Concerned	
  
Not	
  concerned	
  
20Data Protection and Governance at the Edge
Which	
  of	
  these	
  challenges	
  ensuring	
  privacy	
  of	
  sensi>ve	
  data	
  does	
  your	
  IT	
  
team	
  face?	
  	
  	
  	
  
93% face challenges ensuring with
data privacy
7%	
  
5%	
  
24%	
  
27%	
  
34%	
  
36%	
  
45%	
  
56%	
  
0%	
   10%	
   20%	
   30%	
   40%	
   50%	
   60%	
  
We	
  have	
  no	
  challenges	
  
Other	
  
Lack	
  of	
  data	
  privacy	
  policies	
  
IT	
  team	
  doesn’t	
  have	
  knowledge	
  of	
  laws	
  and	
  requirements	
  
Lack	
  of	
  execu>ve	
  visibility	
  or	
  priority	
  into	
  the	
  problem	
  
No	
  processes	
  in	
  place	
  to	
  train	
  or	
  audit	
  employee	
  behavior	
  
Lack	
  budget	
  to	
  purchase	
  and	
  implement	
  technology	
  solu>ons	
  
Insufficient	
  employee	
  awareness	
  and	
  understanding	
  of	
  data	
  privacy	
  policies	
  
21Data Protection and Governance at the Edge
Do	
  you	
  face	
  any	
  challenges	
  mee>ng	
  regional	
  requirements	
  	
  
for	
  data	
  privacy?	
  
Companies with operations in multiple countries
find data privacy regulations challenging
n	
  =	
  have	
  opera8ons	
  in	
  mul8ple	
  countries	
  
This	
  is	
  not	
  
challenging	
  
23%	
  
We	
  don't	
  try	
  to	
  
keep	
  up	
  with	
  
differences	
  
10%	
  This	
  is	
  challenging	
  
67%	
  
22Data Protection and Governance at the Edge
Wide range of data privacy challenges for
companies that operate globally
n	
  =	
  have	
  opera8ons	
  in	
  mul8ple	
  countries	
  
17%	
  
25%	
  
29%	
  
29%	
  
41%	
  
0%	
   5%	
   10%	
  15%	
  20%	
  25%	
  30%	
  35%	
  40%	
  45%	
  
IT	
  team	
  lacks	
  compliance	
  knowledge	
  to	
  
understand	
  requirements	
  
Legal	
  or	
  compliance	
  team	
  does	
  not	
  
communicate	
  requirements	
  to	
  IT	
  
Technology	
  vendors	
  not	
  offering	
  solu>ons	
  
or	
  guidance	
  in	
  addressing	
  regula>ons	
  
Requirements	
  are	
  ambiguous	
  making	
  it	
  
difficult	
  to	
  determine	
  the	
  correct	
  course	
  
Emerging	
  rules	
  and	
  regula>ons	
  difficult	
  to	
  
track	
  and	
  interpret	
  
23Data Protection and Governance at the Edge
Companies are trying, but data privacy
controls are incomplete
Have	
  data	
  
privacy	
  
controls	
  
91%	
  
No	
  data	
  
privacy	
  
controls	
  
9%	
  
38%	
  
54%	
  
61%	
  
63%	
  
0%	
   20%	
   40%	
   60%	
   80%	
  
We	
  conduct	
  ad	
  hoc	
  
employee	
  educa>on	
  
programs	
  
We	
  regularly	
  train	
  
employees	
  on	
  data	
  
privacy	
  
We	
  ask	
  employees	
  to	
  
sign	
  a	
  data	
  privacy	
  
agreement	
  
We	
  enforce	
  data	
  
privacy	
  controls	
  with	
  
technology	
  
24Data Protection and Governance at the Edge
What	
  technological	
  controls	
  does	
  your	
  organiza>on	
  have	
  in	
  place	
  to	
  limit	
  or	
  
audit	
  access	
  to	
  sensi>ve	
  data	
  by	
  authorized	
  or	
  unauthorized	
  par>es?	
  	
  	
  
Even those with technology controls
could do more
37%	
  
21%	
  
36%	
  
37%	
  
41%	
  
58%	
  
0%	
  10%	
  20%	
  30%	
  40%	
  50%	
  60%	
  70%	
  80%	
  90%	
  100%	
  
No	
  technological	
  controls	
  for	
  data	
  privacy	
  
Encrypt	
  data	
  on	
  tablets	
  and	
  smartphones	
  
Encrypt	
  data	
  on	
  laptops	
  
Mul>-­‐factor	
  authen>ca>on	
  
Log	
  all	
  data	
  access	
  
Access	
  control	
  
25
Key Findings
Cloud	
  data	
  is	
  growing,	
  but	
  privacy	
  concerns	
  persist	
  
• 	
  88%	
  expect	
  their	
  cloud	
  data	
  volume	
  to	
  increase	
  in	
  2015	
  
• 	
  87%	
  are	
  concerned	
  about	
  privacy	
  of	
  data	
  in	
  the	
  cloud	
  
Data	
  privacy	
  is	
  important	
  –	
  but	
  don’t	
  depend	
  on	
  employees	
  
• 	
  	
  84%	
  report	
  data	
  privacy	
  importance	
  is	
  increasing	
  in	
  2015	
  
• 	
  	
  82%	
  have	
  employees	
  who	
  don’t	
  follow	
  data	
  privacy	
  policies	
  
Data	
  privacy	
  is	
  challenging	
  for	
  IT	
  
• 	
  	
  93%	
  report	
  challenges	
  with	
  data	
  privacy	
  
• 	
  	
  91%	
  have	
  data	
  privacy	
  controls,	
  but	
  they	
  are	
  incomplete	
  
• 	
  	
  77%	
  struggle	
  to	
  keep	
  up	
  with	
  regional	
  requirements	
  for	
  data	
  privacy	
  
What You Need to Know About
SaaS and Data Privacy
27Data Protection and Governance at the Edge
“Druva has been a
phenomenal answer to Dell
for protecting our data”
About Druva
Company
•  Fastest growing data protection and
governance company
•  Over 3,000 customers
•  Protecting 3.0m+ endpoints globally
Ranked #1 by Gartner two years running
Brad Hammack
IT Emerging Technologies
Data	
  Protec>on	
  2014	
  
28Data Protection and Governance at the Edge
inSync
Efficient Cloud-based Endpoint Data Protection
29Data Protection and Governance at the Edge
Dramatic Shift in Cloud Adoption
2013
75%	
  
25%	
  
2014
20%	
  
80%	
  
30
Common Privacy Inquiries / Use Cases
Regional	
   Employee	
  
Corporate	
   Scenario	
  
31Data Protection and Governance at the Edge
Delivering Privacy on a Foundation of Security
•  Infrastructure Security & Operations: Where is the
infrastructure? How is it controlled and to what extent
certified?
•  SaaS Operations: What certifications and security controls
does the SaaS provider have in place?
•  Data Residency: What are the regional, cross-geography
data controls?
•  Data Security: How is the data encrypted in transit and
stored at-rest? What is the durability of the data?
•  Data Privacy: What controls are in place to provide ethical
walls? What data can my SaaS provider access?
IaaS
Infrastructure: Compute + Storage
PaaS
Distributed Database Services
SaaS
Application Services
32Data Protection and Governance at the Edge
As a Cloud Provider, Security = Survival
•  SOC 1, SOC 2 & SOC 3
ISO 27001
•  PCI Level 1
•  FedRAMP
•  AWS GovCloud (US)
•  MPAA best practices alignment
Customer are running SOX, HIPAA, FISMA,
DIACAP MAC III sensitive ATO, ITAR, …
Facilities
Physical security
Physical infrastructure
Network infrastructure
Virtualization infrastructure
IaaS	
  
PaaS	
  
33Data Protection and Governance at the Edge
Most IaaS/PaaS Certifications Don’t Pass to the SaaS Level
IaaS
Infrastructure: Compute + Storage
PaaS
Distributed Database Services
SaaS
Application Services
•  Druva Certifications & Audits
o  ISAE-3000
o  TRUSTe certified privacy
o  EU Safe Harbor
o  HIPAA Audited
•  Regular VAPT Testing (White Hat)
•  SkyHigh CloudTrust program partner
•  Audits renewed annually
ISAE 3000
TRUSTe EU Safe Harbor
HIPAA BAA
Skyhigh
Enterprise-Ready
34Data Protection and Governance at the Edge
AWS Global Footprint
•  >1 million active customers across
190 countries
•  900+ government agencies
•  3,400+ educational institutions
•  11 regions, including ITAR-compliant
GovCloud and the new region in
Germany
•  28 availability zones
•  53 edge locations
35Data Protection and Governance at the Edge
Authentication Controls (AD, SSO)
Configurable Group Policies (Data Access, Sharing, Visibility)
Full Admin and End-User Audit Trails
SaaS Layer
Application
Addressing Enterprise Data Protection RequirementsSaaS Provider Security Approach
Global Deduplication (unique blocks) &
Metadata Separation (data is dereferenced)
PaaS Layer
(DynamoDB)
S3 Buckets, Data Scrambling via Envelope Encryption
Block-Only Object Storage
IaaS / Storage Layer
(EC2, S3, Glacier)
36Data Protection and Governance at the Edge
Envelope Key Management & Encryption
•  Works like a bank safety-deposit box
o  Unique encryption key generated per customer
o  Key itself is encrypted with customer credentials and
stored as a token
•  They key itself is inaccessible by anyone
o  Only exists during the client session
o  Never leaves the system
o  Removes the need for key management
•  Druva cannot access/decrypt customer data
with stored token
37Data Protection and Governance at the Edge
Internal Privacy Controls
•  End-user privacy controls either by policy or opt-out feature
(no admin data visibility)
•  Containerization on mobile devices, extendable via MDM
(MobileIron)
•  Exclusionary settings for backup and collection process
•  Full data auditing for compliance response for PHI & PII
•  Admin visibility to audit trails restricted via policy
Employee Privacy
•  Privacy controls
•  Data segregation
•  Corporate visibility
Corporate Privacy
Material Data
•  Officer data shielding
•  Compliance auditing
•  Tracking + monitoring
38Data Protection and Governance at the Edge
Scenario-based Privacy
•  Delegated roles for compliance and legal
counsel
•  Full data and audit trail access for compliance,
investigation and litigation requirements
Scenario / Exceptions
•  Compliance audits
•  Investigations
•  eDiscovery collection
39
Addressing Key Privacy Use Cases
Regional	
   Employee	
  
Corporate	
   Scenario	
  
•  Compliance audits
•  Investigations
•  eDiscovery collection
•  Privacy controls
•  Data segregation
•  Restricted visibility
•  Officer data shielding
•  Compliance auditing
•  Tracking + monitoring
•  Data residency
•  Local administration
•  Data Storage Privacy
40Data Protection and Governance at the Edge
Key Takeaways
•  Be sure to check the certifications and how they apply to the overall stack, just because the
IaaS/PaaS is certified it doesn’t mean the SaaS layer is.
•  For data residency ensure your cloud data isn’t moving around to non-compliant locations,
have the vendor sign an agreement and show documented ability to comply
•  Encryption models continue to evolve, make sure your provider can’t divulge your data
without you knowing
•  Data privacy laws are still emerging and tend to be ambiguous, best place to get the
answers to stay compliant is working with your legal team, don’t guess
41
Next Steps:
Experience the Druva Advantage
Try Druva for yourself at druva.com/trial
druva.com
dave.packer@druva.com
42Data Protection and Governance at the Edge
Delivering Privacy on a Foundation of Security
•  ✔ Infrastructure Security & Operations: Where is the
infrastructure? How is it controlled and to what extent
certified?
•  ✔ SaaS Operations: What certifications and security
controls does the SaaS provider have in place?
•  ✔ Data Residency: What are the regional, cross-geography
data controls?
•  ✔ Data Security: How is the data encrypted in transit and
stored at-rest? What is the durability of the data?
•  ✔ Data Privacy: What controls are in place to provide
ethical walls? What data can my SaaS provider access?
IaaS
Infrastructure: Compute + Storage
PaaS
Distributed Database Services
SaaS
Application Services

More Related Content

What's hot

4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druvaDruva
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance? Blancco
 
Innovation_chrishenry_FIC_October2015-lowres
Innovation_chrishenry_FIC_October2015-lowresInnovation_chrishenry_FIC_October2015-lowres
Innovation_chrishenry_FIC_October2015-lowres- Chris - Henry -
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]TrustArc
 
Delivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data LakeDelivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data LakeJean-Michel Franco
 
Data Governance Overview - Doreen Christian
Data Governance Overview - Doreen ChristianData Governance Overview - Doreen Christian
Data Governance Overview - Doreen ChristianDoreen Christian
 
Information Governance – What Does a Modern Program Look Like?
Information Governance – What Does a Modern Program Look Like?Information Governance – What Does a Modern Program Look Like?
Information Governance – What Does a Modern Program Look Like?Winston & Strawn LLP
 
Why You Need to Govern Big Data
Why You Need to Govern Big DataWhy You Need to Govern Big Data
Why You Need to Govern Big DataIBM Analytics
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)OnRamp
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
 
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...TrustArc
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uaeRishalHalid1
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016SteveAtHPE
 
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...TrustArc
 
Planning Information Governance and Litigation Readiness
Planning Information Governance and Litigation ReadinessPlanning Information Governance and Litigation Readiness
Planning Information Governance and Litigation ReadinessRich Medina
 

What's hot (20)

4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
 
Innovation_chrishenry_FIC_October2015-lowres
Innovation_chrishenry_FIC_October2015-lowresInnovation_chrishenry_FIC_October2015-lowres
Innovation_chrishenry_FIC_October2015-lowres
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]
 
Delivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data LakeDelivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data Lake
 
Data Governance Overview - Doreen Christian
Data Governance Overview - Doreen ChristianData Governance Overview - Doreen Christian
Data Governance Overview - Doreen Christian
 
Information Governance – What Does a Modern Program Look Like?
Information Governance – What Does a Modern Program Look Like?Information Governance – What Does a Modern Program Look Like?
Information Governance – What Does a Modern Program Look Like?
 
Information Governance
Information GovernanceInformation Governance
Information Governance
 
Why You Need to Govern Big Data
Why You Need to Govern Big DataWhy You Need to Govern Big Data
Why You Need to Govern Big Data
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
 
Planning Information Governance and Litigation Readiness
Planning Information Governance and Litigation ReadinessPlanning Information Governance and Litigation Readiness
Planning Information Governance and Litigation Readiness
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 

Similar to Data Privacy Concerns Rise in 2015

2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...TrustArc
 
State of Data Governance in 2021
State of Data Governance in 2021State of Data Governance in 2021
State of Data Governance in 2021DATAVERSITY
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryCompTIA
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryCompTIA
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io
 
Better leverage your data: Overcome common data quality challenges
Better leverage your data: Overcome common data quality challengesBetter leverage your data: Overcome common data quality challenges
Better leverage your data: Overcome common data quality challengesExperian Data Quality
 
Slides: Bridging the Data Disconnect – Trends in Global Data Management
Slides: Bridging the Data Disconnect – Trends in Global Data ManagementSlides: Bridging the Data Disconnect – Trends in Global Data Management
Slides: Bridging the Data Disconnect – Trends in Global Data ManagementDATAVERSITY
 
Big data governance as a corporate governance imperative
Big data governance as a corporate governance imperativeBig data governance as a corporate governance imperative
Big data governance as a corporate governance imperativeGuy Pearce
 
SolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds
 
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryInternational Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryCompTIA
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumCastlebridge Associates
 
Is Bad Data Killing Your Customer Engagement Strategy?
Is Bad Data Killing Your Customer Engagement Strategy? Is Bad Data Killing Your Customer Engagement Strategy?
Is Bad Data Killing Your Customer Engagement Strategy? Marketo
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Precisely
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionPrecisely
 
Enterprise Data Management Enables Unique Device Identification (UDI)
Enterprise Data Management Enables Unique Device Identification (UDI)Enterprise Data Management Enables Unique Device Identification (UDI)
Enterprise Data Management Enables Unique Device Identification (UDI)First San Francisco Partners
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
value and implications of master data management.pptx
value and implications of master data management.pptxvalue and implications of master data management.pptx
value and implications of master data management.pptxMuhammad Khalid
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldNetskope
 

Similar to Data Privacy Concerns Rise in 2015 (20)

2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
 
State of Data Governance in 2021
State of Data Governance in 2021State of Data Governance in 2021
State of Data Governance in 2021
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian Summary
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK Summary
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
 
Better leverage your data: Overcome common data quality challenges
Better leverage your data: Overcome common data quality challengesBetter leverage your data: Overcome common data quality challenges
Better leverage your data: Overcome common data quality challenges
 
Slides: Bridging the Data Disconnect – Trends in Global Data Management
Slides: Bridging the Data Disconnect – Trends in Global Data ManagementSlides: Bridging the Data Disconnect – Trends in Global Data Management
Slides: Bridging the Data Disconnect – Trends in Global Data Management
 
Big data governance as a corporate governance imperative
Big data governance as a corporate governance imperativeBig data governance as a corporate governance imperative
Big data governance as a corporate governance imperative
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
SolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring Survey
 
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryInternational Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East Summary
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data Forum
 
Is Bad Data Killing Your Customer Engagement Strategy?
Is Bad Data Killing Your Customer Engagement Strategy? Is Bad Data Killing Your Customer Engagement Strategy?
Is Bad Data Killing Your Customer Engagement Strategy?
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
Enterprise Data Management Enables Unique Device Identification (UDI)
Enterprise Data Management Enables Unique Device Identification (UDI)Enterprise Data Management Enables Unique Device Identification (UDI)
Enterprise Data Management Enables Unique Device Identification (UDI)
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
value and implications of master data management.pptx
value and implications of master data management.pptxvalue and implications of master data management.pptx
value and implications of master data management.pptx
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 

More from Druva

Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva
 
Rethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlRethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlDruva
 
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Druva
 
20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druvaDruva
 
Black Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlBlack Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlDruva
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
Soundbytes from the Frontlines
Soundbytes from the FrontlinesSoundbytes from the Frontlines
Soundbytes from the FrontlinesDruva
 
AWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSAWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSDruva
 
Why You Need Enterprise Backup
Why You Need Enterprise BackupWhy You Need Enterprise Backup
Why You Need Enterprise BackupDruva
 
CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security ChecklistDruva
 
Data in the Wild: Survival Guide
Data in the Wild: Survival GuideData in the Wild: Survival Guide
Data in the Wild: Survival GuideDruva
 
40 scary stats about data at risk
40 scary stats about data at risk40 scary stats about data at risk
40 scary stats about data at riskDruva
 
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva
 
inSync Cloud FAQ
inSync Cloud FAQinSync Cloud FAQ
inSync Cloud FAQDruva
 
inSync FAQ
inSync FAQinSync FAQ
inSync FAQDruva
 
The Challenges of Windows XP Migration (infographic)
The Challenges of Windows XP Migration (infographic)The Challenges of Windows XP Migration (infographic)
The Challenges of Windows XP Migration (infographic)Druva
 
How Endpoint Mobility Kills Bare Metal Restore (infographic)
How Endpoint Mobility Kills Bare Metal Restore (infographic)How Endpoint Mobility Kills Bare Metal Restore (infographic)
How Endpoint Mobility Kills Bare Metal Restore (infographic)Druva
 
The Growth of Corporate Data (infographic)
The Growth of Corporate Data (infographic)The Growth of Corporate Data (infographic)
The Growth of Corporate Data (infographic)Druva
 
Series C: The growth, innovation, and leadership of Druva
Series C: The growth, innovation, and leadership of DruvaSeries C: The growth, innovation, and leadership of Druva
Series C: The growth, innovation, and leadership of DruvaDruva
 

More from Druva (19)

Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey
 
Rethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlRethink Server Backup and Regain Control
Rethink Server Backup and Regain Control
 
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
 
20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva
 
Black Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlBlack Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data Sprawl
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
Soundbytes from the Frontlines
Soundbytes from the FrontlinesSoundbytes from the Frontlines
Soundbytes from the Frontlines
 
AWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSAWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWS
 
Why You Need Enterprise Backup
Why You Need Enterprise BackupWhy You Need Enterprise Backup
Why You Need Enterprise Backup
 
CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security Checklist
 
Data in the Wild: Survival Guide
Data in the Wild: Survival GuideData in the Wild: Survival Guide
Data in the Wild: Survival Guide
 
40 scary stats about data at risk
40 scary stats about data at risk40 scary stats about data at risk
40 scary stats about data at risk
 
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
 
inSync Cloud FAQ
inSync Cloud FAQinSync Cloud FAQ
inSync Cloud FAQ
 
inSync FAQ
inSync FAQinSync FAQ
inSync FAQ
 
The Challenges of Windows XP Migration (infographic)
The Challenges of Windows XP Migration (infographic)The Challenges of Windows XP Migration (infographic)
The Challenges of Windows XP Migration (infographic)
 
How Endpoint Mobility Kills Bare Metal Restore (infographic)
How Endpoint Mobility Kills Bare Metal Restore (infographic)How Endpoint Mobility Kills Bare Metal Restore (infographic)
How Endpoint Mobility Kills Bare Metal Restore (infographic)
 
The Growth of Corporate Data (infographic)
The Growth of Corporate Data (infographic)The Growth of Corporate Data (infographic)
The Growth of Corporate Data (infographic)
 
Series C: The growth, innovation, and leadership of Druva
Series C: The growth, innovation, and leadership of DruvaSeries C: The growth, innovation, and leadership of Druva
Series C: The growth, innovation, and leadership of Druva
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 

Data Privacy Concerns Rise in 2015

  • 1. The State of Data Privacy: Why It’s Becoming More Urgent for IT May 7th, 2015
  • 2. 2Data Protection and Governance at the Edge Today’s Presenters Dave Packer Vice President, Product Marketing Druva, Inc. Diane Hagglund Principal Analyst Dimensional Research
  • 3. 3 Agenda •  What’s Driving Global Data Privacy Awareness •  Survey Results, Assessment & Conclusions •  Considerations for Assessing Privacy-Ready SaaS Vendors •  Summary and Q&A
  • 4. 4Data Protection and Governance at the Edge Trends Pushing Privacy to the Forefront •  PRISM and the Patriot Act o  Microsoft vs United States •  Evolving Global Privacy Regulations o  EU, Germany, France, Russia, … •  Sectoral Regulations o  HIPAA, SOX, FINRA, GLBA, COPPA, … •  BYOD, blurring lines between personal and business data •  Confidence in controls for safeguarding PII & PHI
  • 5. 5Data Protection and Governance at the Edge Breaches Are Elevating Awareness Exponentially •  Almost all major breaches in 2014 were against on-premise systems •  Significant fines & reputation exposure •  Breaching the firewall can mean extensive systems access (Sony) •  Internal challenges are becoming pervasive o  Malicious outsider: 50% o  Accidental loss / misplace: 25% o  Malicious Insider: 15%
  • 6. 6 2015: The Top Security Challenges Source: 451 Group – Wave 8 Report 2015 (preliminary note)
  • 7. Sponsored  by:   The  State  of  Data  Privacy  in  2015   A  Survey  of  IT  Professionals              
  • 8. 8 Research  Goal   Understand  recent  experiences  and  trends  with  data   privacy  in  modern  IT  organiza>ons.   Goals and Methodology Methodology   An  online  survey  was  fielded  to  IT  professionals   responsible  for  corporate  data.    A  total  of  214  individuals   par>cipated  in  the  survey.  Par>cipants  represented  a   wide  range  of  company  sizes,  industries,  regions  and   responsibility  for  data.       Defini>ons   Data  security  -­‐  Ensuring  data  is  protected  from   unauthorized  access  or  intercep>on   Data  privacy  -­‐  Ensuring  that  sensi>ve  data  isn’t  misused,   misappropriated  or  publicly  exposed  by  those  who  have   authorized  access  to  it    
  • 9. 9 Key Findings Cloud  data  is  growing,  but  privacy  concerns  persist   •   88%  expect  their  cloud  data  volume  to  increase  in  2015   •   87%  are  concerned  about  privacy  of  data  in  the  cloud   Data  privacy  is  important  –  but  don’t  depend  on  employees   •     84%  report  data  privacy  importance  is  increasing  in  2015   •     82%  have  employees  who  don’t  follow  data  privacy  policies   Data  privacy  is  challenging  for  IT   •     93%  report  challenges  with  data  privacy   •     91%  have  data  privacy  controls,  but  they  are  incomplete   •     77%  struggle  to  keep  up  with  regional  requirements  for  data  privacy  
  • 10. 10 Participants Represented LocaFon   EMEA   17%   APAC   23%   AMER   60%  Job  FuncFon   IT  execu>ve   23%   IT    team  manager   39%   Individual  contributor   in  IT   19%   Business  stakeholder       10%   Service  provider   9%   Company  Size   Fewer  than  100   24%   100  –  1,000   38%   1,000  –  5,000   17%   More  than  5,000   21%  
  • 12. 12Data Protection and Governance at the Edge What  type  of  data  is  the  most  sensi>ve  to  your  business?     Choose  up  to  3  of  the  following.   Businesses depend on sensitive data 1%   18%   19%   22%   33%   37%   41%   46%   52%   0%   10%   20%   30%   40%   50%   60%   We  do  not  have  sensi>ve  business  data   Planning  and  strategy  documents   Payroll   Unregulated  customer  data  (emails,  order  history,  etc.)   Accoun>ng  and  financial   Intellectual  property   Personal  employee  informa>on  (SSNs,  phone  numbers,  etc.)   Password  or  authen>ca>on  creden>als   Regulated  customer  data  (credit  cards,  health  records,  etc.)  
  • 13. 13Data Protection and Governance at the Edge Does  your  business  have  data  privacy  requirements  to  meet     compliance  and  governance  regula>ons?   Businesses must protect data privacy to meet regulations Yes   81%   No   19%  
  • 14. 14Data Protection and Governance at the Edge How  are  your  company’s  efforts  on  protec>ng  the  privacy  of     sensi>ve  data  changing  for  2015?   Focus on data privacy escalates in 2015 Increasing   84%   Decreasing   1%   No  change   15%  
  • 15. 15Data Protection and Governance at the Edge Giving employees data privacy policies isn’t enough All  employees  follow   data  privacy  policies   18%   Have  employees   who  do  not  follow   data  privacy  policies   82%  
  • 16. 16Data Protection and Governance at the Edge Which  employees  are  MOST  likely  to  ignore  data  privacy  policies?       Choose  up  to  3  of  the  following.   All types of employees ignore data privacy policies 6%   16%   17%   20%   24%   29%   31%   35%   48%   0%   10%   20%   30%   40%   50%   60%   Legal   Engineering   Manufacturing   Finance  and  accoun>ng   IT   Opera>ons   Owner/Partner   Marke>ng   Sales  
  • 17. 17Data Protection and Governance at the Edge  What  level  of  employee  is  most  likely  to  ignore  data  privacy  policies?       All types of employees ignore data privacy policies (con’t) Execu>ves   33%   Team  managers   14%   Individual   contributors  or   front-­‐line  staff   39%   Contractors   14%  
  • 18. 18Data Protection and Governance at the Edge How  do  you  expect  the  volume  of  data  in  the  cloud  change  in  2015?   Significant momentum in cloud data growth n  =  have  data  in  the  cloud   Increase   88%   Decrease   5%   Stay  the  same   7%  
  • 19. 19Data Protection and Governance at the Edge How  concerned  are  you  about  the  privacy  of  sensi>ve  business     data  in  the  cloud?   IT is concerned about data privacy in the cloud n  =  have  data  in  the  cloud   32%   55%   13%   0%   20%   40%   60%   80%   100%   Very  concerned   Concerned   Not  concerned  
  • 20. 20Data Protection and Governance at the Edge Which  of  these  challenges  ensuring  privacy  of  sensi>ve  data  does  your  IT   team  face?         93% face challenges ensuring with data privacy 7%   5%   24%   27%   34%   36%   45%   56%   0%   10%   20%   30%   40%   50%   60%   We  have  no  challenges   Other   Lack  of  data  privacy  policies   IT  team  doesn’t  have  knowledge  of  laws  and  requirements   Lack  of  execu>ve  visibility  or  priority  into  the  problem   No  processes  in  place  to  train  or  audit  employee  behavior   Lack  budget  to  purchase  and  implement  technology  solu>ons   Insufficient  employee  awareness  and  understanding  of  data  privacy  policies  
  • 21. 21Data Protection and Governance at the Edge Do  you  face  any  challenges  mee>ng  regional  requirements     for  data  privacy?   Companies with operations in multiple countries find data privacy regulations challenging n  =  have  opera8ons  in  mul8ple  countries   This  is  not   challenging   23%   We  don't  try  to   keep  up  with   differences   10%  This  is  challenging   67%  
  • 22. 22Data Protection and Governance at the Edge Wide range of data privacy challenges for companies that operate globally n  =  have  opera8ons  in  mul8ple  countries   17%   25%   29%   29%   41%   0%   5%   10%  15%  20%  25%  30%  35%  40%  45%   IT  team  lacks  compliance  knowledge  to   understand  requirements   Legal  or  compliance  team  does  not   communicate  requirements  to  IT   Technology  vendors  not  offering  solu>ons   or  guidance  in  addressing  regula>ons   Requirements  are  ambiguous  making  it   difficult  to  determine  the  correct  course   Emerging  rules  and  regula>ons  difficult  to   track  and  interpret  
  • 23. 23Data Protection and Governance at the Edge Companies are trying, but data privacy controls are incomplete Have  data   privacy   controls   91%   No  data   privacy   controls   9%   38%   54%   61%   63%   0%   20%   40%   60%   80%   We  conduct  ad  hoc   employee  educa>on   programs   We  regularly  train   employees  on  data   privacy   We  ask  employees  to   sign  a  data  privacy   agreement   We  enforce  data   privacy  controls  with   technology  
  • 24. 24Data Protection and Governance at the Edge What  technological  controls  does  your  organiza>on  have  in  place  to  limit  or   audit  access  to  sensi>ve  data  by  authorized  or  unauthorized  par>es?       Even those with technology controls could do more 37%   21%   36%   37%   41%   58%   0%  10%  20%  30%  40%  50%  60%  70%  80%  90%  100%   No  technological  controls  for  data  privacy   Encrypt  data  on  tablets  and  smartphones   Encrypt  data  on  laptops   Mul>-­‐factor  authen>ca>on   Log  all  data  access   Access  control  
  • 25. 25 Key Findings Cloud  data  is  growing,  but  privacy  concerns  persist   •   88%  expect  their  cloud  data  volume  to  increase  in  2015   •   87%  are  concerned  about  privacy  of  data  in  the  cloud   Data  privacy  is  important  –  but  don’t  depend  on  employees   •     84%  report  data  privacy  importance  is  increasing  in  2015   •     82%  have  employees  who  don’t  follow  data  privacy  policies   Data  privacy  is  challenging  for  IT   •     93%  report  challenges  with  data  privacy   •     91%  have  data  privacy  controls,  but  they  are  incomplete   •     77%  struggle  to  keep  up  with  regional  requirements  for  data  privacy  
  • 26. What You Need to Know About SaaS and Data Privacy
  • 27. 27Data Protection and Governance at the Edge “Druva has been a phenomenal answer to Dell for protecting our data” About Druva Company •  Fastest growing data protection and governance company •  Over 3,000 customers •  Protecting 3.0m+ endpoints globally Ranked #1 by Gartner two years running Brad Hammack IT Emerging Technologies Data  Protec>on  2014  
  • 28. 28Data Protection and Governance at the Edge inSync Efficient Cloud-based Endpoint Data Protection
  • 29. 29Data Protection and Governance at the Edge Dramatic Shift in Cloud Adoption 2013 75%   25%   2014 20%   80%  
  • 30. 30 Common Privacy Inquiries / Use Cases Regional   Employee   Corporate   Scenario  
  • 31. 31Data Protection and Governance at the Edge Delivering Privacy on a Foundation of Security •  Infrastructure Security & Operations: Where is the infrastructure? How is it controlled and to what extent certified? •  SaaS Operations: What certifications and security controls does the SaaS provider have in place? •  Data Residency: What are the regional, cross-geography data controls? •  Data Security: How is the data encrypted in transit and stored at-rest? What is the durability of the data? •  Data Privacy: What controls are in place to provide ethical walls? What data can my SaaS provider access? IaaS Infrastructure: Compute + Storage PaaS Distributed Database Services SaaS Application Services
  • 32. 32Data Protection and Governance at the Edge As a Cloud Provider, Security = Survival •  SOC 1, SOC 2 & SOC 3 ISO 27001 •  PCI Level 1 •  FedRAMP •  AWS GovCloud (US) •  MPAA best practices alignment Customer are running SOX, HIPAA, FISMA, DIACAP MAC III sensitive ATO, ITAR, … Facilities Physical security Physical infrastructure Network infrastructure Virtualization infrastructure IaaS   PaaS  
  • 33. 33Data Protection and Governance at the Edge Most IaaS/PaaS Certifications Don’t Pass to the SaaS Level IaaS Infrastructure: Compute + Storage PaaS Distributed Database Services SaaS Application Services •  Druva Certifications & Audits o  ISAE-3000 o  TRUSTe certified privacy o  EU Safe Harbor o  HIPAA Audited •  Regular VAPT Testing (White Hat) •  SkyHigh CloudTrust program partner •  Audits renewed annually ISAE 3000 TRUSTe EU Safe Harbor HIPAA BAA Skyhigh Enterprise-Ready
  • 34. 34Data Protection and Governance at the Edge AWS Global Footprint •  >1 million active customers across 190 countries •  900+ government agencies •  3,400+ educational institutions •  11 regions, including ITAR-compliant GovCloud and the new region in Germany •  28 availability zones •  53 edge locations
  • 35. 35Data Protection and Governance at the Edge Authentication Controls (AD, SSO) Configurable Group Policies (Data Access, Sharing, Visibility) Full Admin and End-User Audit Trails SaaS Layer Application Addressing Enterprise Data Protection RequirementsSaaS Provider Security Approach Global Deduplication (unique blocks) & Metadata Separation (data is dereferenced) PaaS Layer (DynamoDB) S3 Buckets, Data Scrambling via Envelope Encryption Block-Only Object Storage IaaS / Storage Layer (EC2, S3, Glacier)
  • 36. 36Data Protection and Governance at the Edge Envelope Key Management & Encryption •  Works like a bank safety-deposit box o  Unique encryption key generated per customer o  Key itself is encrypted with customer credentials and stored as a token •  They key itself is inaccessible by anyone o  Only exists during the client session o  Never leaves the system o  Removes the need for key management •  Druva cannot access/decrypt customer data with stored token
  • 37. 37Data Protection and Governance at the Edge Internal Privacy Controls •  End-user privacy controls either by policy or opt-out feature (no admin data visibility) •  Containerization on mobile devices, extendable via MDM (MobileIron) •  Exclusionary settings for backup and collection process •  Full data auditing for compliance response for PHI & PII •  Admin visibility to audit trails restricted via policy Employee Privacy •  Privacy controls •  Data segregation •  Corporate visibility Corporate Privacy Material Data •  Officer data shielding •  Compliance auditing •  Tracking + monitoring
  • 38. 38Data Protection and Governance at the Edge Scenario-based Privacy •  Delegated roles for compliance and legal counsel •  Full data and audit trail access for compliance, investigation and litigation requirements Scenario / Exceptions •  Compliance audits •  Investigations •  eDiscovery collection
  • 39. 39 Addressing Key Privacy Use Cases Regional   Employee   Corporate   Scenario   •  Compliance audits •  Investigations •  eDiscovery collection •  Privacy controls •  Data segregation •  Restricted visibility •  Officer data shielding •  Compliance auditing •  Tracking + monitoring •  Data residency •  Local administration •  Data Storage Privacy
  • 40. 40Data Protection and Governance at the Edge Key Takeaways •  Be sure to check the certifications and how they apply to the overall stack, just because the IaaS/PaaS is certified it doesn’t mean the SaaS layer is. •  For data residency ensure your cloud data isn’t moving around to non-compliant locations, have the vendor sign an agreement and show documented ability to comply •  Encryption models continue to evolve, make sure your provider can’t divulge your data without you knowing •  Data privacy laws are still emerging and tend to be ambiguous, best place to get the answers to stay compliant is working with your legal team, don’t guess
  • 41. 41 Next Steps: Experience the Druva Advantage Try Druva for yourself at druva.com/trial druva.com dave.packer@druva.com
  • 42. 42Data Protection and Governance at the Edge Delivering Privacy on a Foundation of Security •  ✔ Infrastructure Security & Operations: Where is the infrastructure? How is it controlled and to what extent certified? •  ✔ SaaS Operations: What certifications and security controls does the SaaS provider have in place? •  ✔ Data Residency: What are the regional, cross-geography data controls? •  ✔ Data Security: How is the data encrypted in transit and stored at-rest? What is the durability of the data? •  ✔ Data Privacy: What controls are in place to provide ethical walls? What data can my SaaS provider access? IaaS Infrastructure: Compute + Storage PaaS Distributed Database Services SaaS Application Services