SlideShare a Scribd company logo
1 of 28
Download to read offline
The General Data Protection Regulation:
What North American Companies Need to Know
Ken Durbin, CISSP
Sr. Strategist of Government Affairs
and Cyber Security, Symantec
Legal Disclaimer
The materials contained in this presentation are not intended to provide, and
do not constitute or comprise, legal advice on any particular matter and are
provided for general information purposes only.
You should not act or refrain from acting on the basis of any material
contained in this presentation, without seeking appropriate legal or other
professional advice.
Agenda
GDPR Overview + North America Impact
Who’s Who in the Protection of Personal Data
Technology Considerations for GDPR
Risk Scenarios
1
2
3
4
How to Get Started5
GDPR Overview +
North America Impact
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
EU General Data Protection Regulation (GDPR)
5
28 Interpretations of the Data Protection
Directive
One Data Protection Regulation
Harmonized across all EU member states
TODAY: 2018:
Right to be forgotten Parental Consent Data Protection Officer
Extra-territoriality of GDPR
Fines and penalties
Joint Liability of Controllers and Processors
Mandatory Breach Notification
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Managing and Demonstration Compliance
6
EU General Data Protection Regulation (GDPR)
Provision / Requirement
General principle of accountability of data controllers
Article 32(1d): Customer needs a process for regularly testing, assessing and
evaluating the effectiveness of technical and organizational measures for
ensuring the security of the processing.
GDPR
What Does That Mean?
Controllers must take every technical and organizational measure appropriate
to ensuring and demonstrating compliance.
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
North America Impact – Why Should I Care?
EU General Data Protection Regulation (GDPR)
7
Does any of your revenue come from the EU? Yes No
Do you have any EU based subsidiaries, remote offices / employees? Yes No
Do you offer any goods/services to the EU? Yes No
Do you collect EU Data User information such as: IP’s, Geo Location, online history,
social media posts, POC info, etc. Yes No
If you answered YES to any of these you need to prepare for the GDPR
Who’s Who in the Protection
of Personal Data
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Who’s Who in the Protection of Personal Data
9
DATA CONTROLLER DATA SUBJECTDATA PROCESSOR
DATA PROTECTION OFFICER
Data Protection Officers are designated persons responsible for making sure the
organization follows the new regulations.
DATA PROTECTION AUTHORITY
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
What is Personal Data Under the GDPR?
Who’s Who in the Protection of Personal Data
10
EU User data belongs to the EU User, not the person who collected it.
You MUST think beyond the US definition of PII
GDPR Examples:
• Every manner of HR data / consumer data
• Business contact information (including email addresses)
• Behavioral information including website visitors’ data (logged in house or stored remotely, e.g. cookies)
• IT network traffic and communication logs
• Any potentially identifiable information even collected from publicly available sources IS personal data.
REMEMBER: You don’t decide what’s personal data is, the GDPR decides
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
GDPR Impacted Organizations
Who’s Who in the Protection of Personal Data
11
Companies who need to care about GDPR:
• Large multi-national companies (Symantec, Financials, Aerospace)
• Companies with EU Based Locations, remote employees
• US based companies that do EU Market Research (Brexit surveys)
• US based companies who subcontract to EU Firms (Process Data)
• Any US based company that markets products/services to the EU
Example:
• Pub owner creates a funny Brexit T-shirt. EU users hears about it and buys one off website.
• No, this will not trigger the GDPR
• Pub owner wants to increase sales and Markets T-Shirt in the EU, maybe sets up a mirror site.
• Yes, this does trigger the GDPR
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Who’s Who in the Protection of Personal Data
The Regulatory Terms of Reference
Article 4 paragraph 12: THE BREACH
What can happen to data?
“… a breach of security leading to the
accidental or unlawful destruction,
loss, alteration, unauthorized
disclosure of, or access to, personal
data transmitted, stored or otherwise
processed”
Recital 75: THE IMPACT
What can happen to the data subject?
“The risk to the rights and freedoms of
natural persons, of varying likelihood
and severity, may result from personal
data processing which could lead to
physical, material or non-material
damage”
GDPR / DPA REQUIREMENT:
Prevent, Detect, Log, Report, Remedy
GDPR / DPA EXPECTATION:
Anticipate, Avoid, Mitigate, Compensate
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
RISK SURFACE
Enforcement by national
Data Protection Authorities
72 hours to notify of a breach once aware
2% or
$10 mil
4% or
$20mil
GDPR Risks to US Companies
What triggers
investigation?
•Complaint by consumer, employee, competitor
•Own initiative
•Security incident
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Typical Customer Timeline for the GDPR
14
25th May 2018
GDPR comes into force
across all EU states
(including the UK)
Awareness Phase
What is it and does it really impact me?
25th May 2016
Formal EU Approval of
GDPR
2H 2016 2017 2018
Discovery & Planning
What do I need to do and when by?
• Thought Leadership
• Awareness
• Education
• Risk Assessments / Gap Analysis
• Advisory Services
• Information Governance Plans
• Budgeting / Hiring Key Staff
Implementation
Making Changes to Prepare
• Policy and Organisational Updates
• Addressing Technology Gaps
• Purchasing of Software and
Technology
Have concerns about ability to
become compliant
9 in 10
Do not fully understand GDPR
96%
Consider compliance at top priority
in the next two years
22%
April 2017
Technology Considerations
for the GDPR
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 16
Know your
Personal data
Process Data
Lawfully
Embed
privacy
Protect
Personal Data
PROTECT PERSONAL INFORMATION THROUGH ITS LIFECYCLE
Technology Considerations for the GDPR
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Define and Locate
Personal Data
Secure Technology
that Collects
Personal Data
Record Consent
from Data
Subjects
Detect and Block
Threats to Data in
Use
Privacy Impact
Assessments
Validate Data
Processors
Restrict Processing
of Data YOU have
to Retain
Prevent Data Loss,
Report Breaches
Control Access to
Data
Protect Data at
Rest
Secure Transfer
and Storage of
Collected Data
Risk Management
of Info Lifecycle
Validate Data
Subjects Invoking
Rights
Educate DPOs on
Cyber Risk
Pseudonymisation
and obfuscation
of personal data
Minimise,
Anonymize, Erase
Data
17
Collect Process Retain & Secure Manage
Security
Privacy
Technology Considerations for the GDPR
Data Governance Framework to Manage Privacy
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
How do I manage and report on my information risk management practices?
Who can access personal data and who has accessed it?
Can we control what personal data is accessible and who can access it?
Can we encrypt / obfuscate personal data at rest and in motion?
What personal data is out there, where is it, and where is it going?
Can we control where data resides?
Can we detect unauthorised access or breaches of personal data?
Can we quickly and thoroughly notify in the event of a breach?
Can we respond quickly and investigate thoroughly following a breach?
Risk Management
Control Compliance Suite (CCS)
Endpoint Mgmt. (EPM)
Information Centric Security
Data Loss Prevention (DLP)
Cloud Access Security Broker
(CASB)
VIP (2-factor)
Encryption (PGP)
Cloud Data Protection (data
tokenisation)
Breach Response
Monitoring Security Service
(MSS)
Incident Response Service
Security Analytics
How Symantec can Assist with the GDPR?
16
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Advanced Breach Detection, Remediation, & Notification
ATP
Analytics
Endpoint
Email
Server
Web /
CASB Cyber Security
Services
DLP
CASB
Web
CDPEncryption
Personal Data Protection Everywhere
PROTECTDETECT
RESPOND
RECOVER
Technology Risk Management
DLP
Data Insight
CASB
Audit
CCS
EPM
Understand
Data Risk
Understand,
Report, and
Remediate
Compliance
Unparalleled Threat
Intelligence
Endpoint
175M
endpoints
protected
Email
2Bm emails
scanned/day
Web
1.2Bn web
requests
secured/day
Physical &
Virtual
Workloads
64K Datacenters
protected
Cloud
Security
12,000 cloud
applications
secured
IDENTIFY
VIP / MPKI
Technology Considerations for the GDPR
Symantec Supports Across Data Privacy and Security
Risk Scenarios
Examples of risks/events in GDPR that Controllers
and Processors need to prepare/plan for
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Practical Scenario 1
• Data In Motion:
• Data leaving your organization: Is it encrypted?
• Transfer via email: Is the email encrypted?
• Transfer via a platform: Is the platform secure?
• Data At Rest:
• Storage on servers: Is the data center secured?
• Storage at end-points: Are the devices protected?
• Data In Use:
• In house: Is access control in place?
• Outsourced: Are cloud and shadow IT addressed?
• In management: Is data loss prevention in place?
21
DLP
Email Encryption
DCS, DLP, Data
Analytics
PGP, SEP, ATP
VIP, mPKI
DLP
CASB / CDP
FileShare Encryption
How could I protect against personal data loss?
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
• General Risk Assessment
• Do I track threats affecting my line of business?
• Do I track the risk to the kind of data I handle?
• Do I track the risk posture of the vendors I use?
• Risk Of Breach Of Sensitive Data, Of Professional Secrecy
• Do I classify information based on sensitiveness?
• Do I apply specific policies to specific categories?
• Risk Of Identity Theft Or Fraud:
• Do I segregate directly identifiable information?
• Do I restrict access to re-identification keys?
• Is my certificate and key management robust?
22
DLP
CDP
mPKI
VIP
CSS
Threat Intelligence
CASB
How do I mitigate the risk to data subjects?
Practical Scenario 2
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Practical Scenario 3
• Pseudonymisation (article 32 paragraph 1(a)):
• Have I pseudonymised the data?
• Can I prevent reversal of pseudonymisation?
• Encryption (article 33 paragraph 3(a)):
• Can I prove that the breached data is encrypted?
• Can I prove that the encryption is strong enough?
• Ongoing Testing and Evaluation (Article 32 1(d))
• a process for regularly testing, assessing and evaluating the
effectiveness of technical and organizational measures for ensuring the
security of the processing
23
PGP
CDP
IT Management
Suite, Control
Compliance Suite
Minimising Risk In Case Of A Breach
How to Get Started
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
 “Lock down” risks for space to plan
 Ensure security and data basics are right
 Encryption and Endpoint bare minimum
 Review GDPR risks
 Mitigate Shadow IT risk
 Focus on Incident Response capability
(technology / services)
 State of the Art data protection
• Where is all my data?
• Is it covered by GDPR?
• Protection (who has access, encryption etc)
• Breach detection
 As implement better data protection
systems, review whether ‘lock down’
measures can be relaxed
25
How to Get Started
Don’t Panic! Start with a Focus on Data
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Located in the Attachments Section of this Presentation
GDPR Resources
IDC GDPR Readiness Assessment
Benchmark your progress to GDPR
compliance
Privacy by Design
Uncover how to adopt this approach to
personal data security
Solving the Security Challenge
A technical review of GDPR and the
recommended solutions
Symantec GDPR Website
Visit our website for a complete list of
resources, tools, and onDemand videos
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Why Symantec
27
World Class
Information protection
Global Leader in
Cyber Security
Leading Breach
detection and
response
Unbiased and
lower operating
costs
Compliance
monitoring &
reporting
State of the Art
Technology
The General Data Protection Regulation:
What North American Companies Need to Know
Ken Durbin, CISSP
Sr. Strategist of Government Affairs
and Cyber Security, Symantec
Thank you!!

More Related Content

What's hot

How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
PECB
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
Shadi A. Razak
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
padler01
 

What's hot (20)

Approche intégrée de la gestion des risques, de la sécurité de l’information,...
Approche intégrée de la gestion des risques, de la sécurité de l’information,...Approche intégrée de la gestion des risques, de la sécurité de l’information,...
Approche intégrée de la gestion des risques, de la sécurité de l’information,...
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cure
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
 
Combatting Insider Threats Presentation
Combatting Insider Threats PresentationCombatting Insider Threats Presentation
Combatting Insider Threats Presentation
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6
 
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
 
Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-
 
Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9
 
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
 
Why GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkWhy GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC Framework
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...
 

Similar to Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to Know

14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
ekyklos Κύκλος Ιδεών για τη Εθνική Ανασυγκρότηση
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
Spain-Holiday.com
 

Similar to Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to Know (20)

BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your Downfall
 
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
 
GDPR Webinar - feb
GDPR Webinar - febGDPR Webinar - feb
GDPR Webinar - feb
 
Ritz 4th-july-gdpr
Ritz 4th-july-gdprRitz 4th-july-gdpr
Ritz 4th-july-gdpr
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSA
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
eu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associateseu-market-access-gdpr-fundamentals-by-risk-associates
eu-market-access-gdpr-fundamentals-by-risk-associates
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?
 

More from Symantec

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to Know

  • 1. The General Data Protection Regulation: What North American Companies Need to Know Ken Durbin, CISSP Sr. Strategist of Government Affairs and Cyber Security, Symantec
  • 2. Legal Disclaimer The materials contained in this presentation are not intended to provide, and do not constitute or comprise, legal advice on any particular matter and are provided for general information purposes only. You should not act or refrain from acting on the basis of any material contained in this presentation, without seeking appropriate legal or other professional advice.
  • 3. Agenda GDPR Overview + North America Impact Who’s Who in the Protection of Personal Data Technology Considerations for GDPR Risk Scenarios 1 2 3 4 How to Get Started5
  • 4. GDPR Overview + North America Impact
  • 5. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY EU General Data Protection Regulation (GDPR) 5 28 Interpretations of the Data Protection Directive One Data Protection Regulation Harmonized across all EU member states TODAY: 2018: Right to be forgotten Parental Consent Data Protection Officer Extra-territoriality of GDPR Fines and penalties Joint Liability of Controllers and Processors Mandatory Breach Notification
  • 6. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Managing and Demonstration Compliance 6 EU General Data Protection Regulation (GDPR) Provision / Requirement General principle of accountability of data controllers Article 32(1d): Customer needs a process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing. GDPR What Does That Mean? Controllers must take every technical and organizational measure appropriate to ensuring and demonstrating compliance.
  • 7. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY North America Impact – Why Should I Care? EU General Data Protection Regulation (GDPR) 7 Does any of your revenue come from the EU? Yes No Do you have any EU based subsidiaries, remote offices / employees? Yes No Do you offer any goods/services to the EU? Yes No Do you collect EU Data User information such as: IP’s, Geo Location, online history, social media posts, POC info, etc. Yes No If you answered YES to any of these you need to prepare for the GDPR
  • 8. Who’s Who in the Protection of Personal Data
  • 9. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Who’s Who in the Protection of Personal Data 9 DATA CONTROLLER DATA SUBJECTDATA PROCESSOR DATA PROTECTION OFFICER Data Protection Officers are designated persons responsible for making sure the organization follows the new regulations. DATA PROTECTION AUTHORITY
  • 10. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY What is Personal Data Under the GDPR? Who’s Who in the Protection of Personal Data 10 EU User data belongs to the EU User, not the person who collected it. You MUST think beyond the US definition of PII GDPR Examples: • Every manner of HR data / consumer data • Business contact information (including email addresses) • Behavioral information including website visitors’ data (logged in house or stored remotely, e.g. cookies) • IT network traffic and communication logs • Any potentially identifiable information even collected from publicly available sources IS personal data. REMEMBER: You don’t decide what’s personal data is, the GDPR decides
  • 11. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY GDPR Impacted Organizations Who’s Who in the Protection of Personal Data 11 Companies who need to care about GDPR: • Large multi-national companies (Symantec, Financials, Aerospace) • Companies with EU Based Locations, remote employees • US based companies that do EU Market Research (Brexit surveys) • US based companies who subcontract to EU Firms (Process Data) • Any US based company that markets products/services to the EU Example: • Pub owner creates a funny Brexit T-shirt. EU users hears about it and buys one off website. • No, this will not trigger the GDPR • Pub owner wants to increase sales and Markets T-Shirt in the EU, maybe sets up a mirror site. • Yes, this does trigger the GDPR
  • 12. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Who’s Who in the Protection of Personal Data The Regulatory Terms of Reference Article 4 paragraph 12: THE BREACH What can happen to data? “… a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed” Recital 75: THE IMPACT What can happen to the data subject? “The risk to the rights and freedoms of natural persons, of varying likelihood and severity, may result from personal data processing which could lead to physical, material or non-material damage” GDPR / DPA REQUIREMENT: Prevent, Detect, Log, Report, Remedy GDPR / DPA EXPECTATION: Anticipate, Avoid, Mitigate, Compensate
  • 13. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY RISK SURFACE Enforcement by national Data Protection Authorities 72 hours to notify of a breach once aware 2% or $10 mil 4% or $20mil GDPR Risks to US Companies What triggers investigation? •Complaint by consumer, employee, competitor •Own initiative •Security incident
  • 14. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Typical Customer Timeline for the GDPR 14 25th May 2018 GDPR comes into force across all EU states (including the UK) Awareness Phase What is it and does it really impact me? 25th May 2016 Formal EU Approval of GDPR 2H 2016 2017 2018 Discovery & Planning What do I need to do and when by? • Thought Leadership • Awareness • Education • Risk Assessments / Gap Analysis • Advisory Services • Information Governance Plans • Budgeting / Hiring Key Staff Implementation Making Changes to Prepare • Policy and Organisational Updates • Addressing Technology Gaps • Purchasing of Software and Technology Have concerns about ability to become compliant 9 in 10 Do not fully understand GDPR 96% Consider compliance at top priority in the next two years 22% April 2017
  • 16. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 16 Know your Personal data Process Data Lawfully Embed privacy Protect Personal Data PROTECT PERSONAL INFORMATION THROUGH ITS LIFECYCLE Technology Considerations for the GDPR
  • 17. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Define and Locate Personal Data Secure Technology that Collects Personal Data Record Consent from Data Subjects Detect and Block Threats to Data in Use Privacy Impact Assessments Validate Data Processors Restrict Processing of Data YOU have to Retain Prevent Data Loss, Report Breaches Control Access to Data Protect Data at Rest Secure Transfer and Storage of Collected Data Risk Management of Info Lifecycle Validate Data Subjects Invoking Rights Educate DPOs on Cyber Risk Pseudonymisation and obfuscation of personal data Minimise, Anonymize, Erase Data 17 Collect Process Retain & Secure Manage Security Privacy Technology Considerations for the GDPR Data Governance Framework to Manage Privacy
  • 18. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY How do I manage and report on my information risk management practices? Who can access personal data and who has accessed it? Can we control what personal data is accessible and who can access it? Can we encrypt / obfuscate personal data at rest and in motion? What personal data is out there, where is it, and where is it going? Can we control where data resides? Can we detect unauthorised access or breaches of personal data? Can we quickly and thoroughly notify in the event of a breach? Can we respond quickly and investigate thoroughly following a breach? Risk Management Control Compliance Suite (CCS) Endpoint Mgmt. (EPM) Information Centric Security Data Loss Prevention (DLP) Cloud Access Security Broker (CASB) VIP (2-factor) Encryption (PGP) Cloud Data Protection (data tokenisation) Breach Response Monitoring Security Service (MSS) Incident Response Service Security Analytics How Symantec can Assist with the GDPR? 16
  • 19. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Advanced Breach Detection, Remediation, & Notification ATP Analytics Endpoint Email Server Web / CASB Cyber Security Services DLP CASB Web CDPEncryption Personal Data Protection Everywhere PROTECTDETECT RESPOND RECOVER Technology Risk Management DLP Data Insight CASB Audit CCS EPM Understand Data Risk Understand, Report, and Remediate Compliance Unparalleled Threat Intelligence Endpoint 175M endpoints protected Email 2Bm emails scanned/day Web 1.2Bn web requests secured/day Physical & Virtual Workloads 64K Datacenters protected Cloud Security 12,000 cloud applications secured IDENTIFY VIP / MPKI Technology Considerations for the GDPR Symantec Supports Across Data Privacy and Security
  • 20. Risk Scenarios Examples of risks/events in GDPR that Controllers and Processors need to prepare/plan for
  • 21. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Practical Scenario 1 • Data In Motion: • Data leaving your organization: Is it encrypted? • Transfer via email: Is the email encrypted? • Transfer via a platform: Is the platform secure? • Data At Rest: • Storage on servers: Is the data center secured? • Storage at end-points: Are the devices protected? • Data In Use: • In house: Is access control in place? • Outsourced: Are cloud and shadow IT addressed? • In management: Is data loss prevention in place? 21 DLP Email Encryption DCS, DLP, Data Analytics PGP, SEP, ATP VIP, mPKI DLP CASB / CDP FileShare Encryption How could I protect against personal data loss?
  • 22. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY • General Risk Assessment • Do I track threats affecting my line of business? • Do I track the risk to the kind of data I handle? • Do I track the risk posture of the vendors I use? • Risk Of Breach Of Sensitive Data, Of Professional Secrecy • Do I classify information based on sensitiveness? • Do I apply specific policies to specific categories? • Risk Of Identity Theft Or Fraud: • Do I segregate directly identifiable information? • Do I restrict access to re-identification keys? • Is my certificate and key management robust? 22 DLP CDP mPKI VIP CSS Threat Intelligence CASB How do I mitigate the risk to data subjects? Practical Scenario 2
  • 23. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Practical Scenario 3 • Pseudonymisation (article 32 paragraph 1(a)): • Have I pseudonymised the data? • Can I prevent reversal of pseudonymisation? • Encryption (article 33 paragraph 3(a)): • Can I prove that the breached data is encrypted? • Can I prove that the encryption is strong enough? • Ongoing Testing and Evaluation (Article 32 1(d)) • a process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing 23 PGP CDP IT Management Suite, Control Compliance Suite Minimising Risk In Case Of A Breach
  • 24. How to Get Started
  • 25. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY  “Lock down” risks for space to plan  Ensure security and data basics are right  Encryption and Endpoint bare minimum  Review GDPR risks  Mitigate Shadow IT risk  Focus on Incident Response capability (technology / services)  State of the Art data protection • Where is all my data? • Is it covered by GDPR? • Protection (who has access, encryption etc) • Breach detection  As implement better data protection systems, review whether ‘lock down’ measures can be relaxed 25 How to Get Started Don’t Panic! Start with a Focus on Data
  • 26. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Located in the Attachments Section of this Presentation GDPR Resources IDC GDPR Readiness Assessment Benchmark your progress to GDPR compliance Privacy by Design Uncover how to adopt this approach to personal data security Solving the Security Challenge A technical review of GDPR and the recommended solutions Symantec GDPR Website Visit our website for a complete list of resources, tools, and onDemand videos
  • 27. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Why Symantec 27 World Class Information protection Global Leader in Cyber Security Leading Breach detection and response Unbiased and lower operating costs Compliance monitoring & reporting State of the Art Technology
  • 28. The General Data Protection Regulation: What North American Companies Need to Know Ken Durbin, CISSP Sr. Strategist of Government Affairs and Cyber Security, Symantec Thank you!!