crucial data privacy and protection insights for 2019
play

Crucial data privacy and protection insights for 2019 Richard - PowerPoint PPT Presentation

Crucial data privacy and protection insights for 2019 Richard Macaskill and Kendra Little 20 years Oracle and SQL Server experience Product Manager at Redgate Data Governance Richard Macaskill bolshevik! Richard.Macaskill@Red-Gate.com


  1. Crucial data privacy and protection insights for 2019 Richard Macaskill and Kendra Little

  2. 20 years Oracle and SQL Server experience Product Manager at Redgate Data Governance Richard Macaskill bolshevik! Richard.Macaskill@Red-Gate.com

  3. Founder of SQL Workbooks Evangelist at Redgate Microsoft MVP & Microsoft Certified @Kendra_Little Master Kendra.Little@Red- Gate.com

  4. Agenda

  5. Compliance is shifting left

  6. What do we mean by ‘Shift Left’?

  7. Employers are responsible for employees’ actions

  8. Organizations as a whole are responsible “If a business can’t show that good data protection is a cornerstone of their practices, they’re leaving themselves open to a fine or other enforcement action that could damage bank balance or business reputation.” Elizabeth Denham, UK Information Commissioner

  9. https ps://a ://asset ssets.r s.red-gat gate.com e.com/pr /produc oducts ts/db dba/sq a/sql-clone/s clone/sql ql-ser erver-da datab tabase se-provi visioning sioning-repor eport. t.pdf pdf Microsoft Confidential

  10. A few words on Static Data Masking Realistic Values – how useful are they? ➢ 1. Applications actually work for debug/test ➢ 2. Correlating & syncing values across columns Data rarely exists in isolation ➢ 3. Retaining table integrity post-masking Are there keys that should be masked? ‘Systems’ use multiple data sources ➢ 4. Cross-database & cross-server masking ➢ We can’t block our day’s work 5. Performance when masking large sets of data

  11. Perimeter protection is no longer sufficient

  12. • 53,000 incidents • 2,216 confirmed data breaches • 43,000 successful accesses involving botnets 2018 Data Breach Investigations Report · Verizon · https://enterprise.verizon.com/resources/reports/dbir/

  13. 2018 Data Breach Investigations Report · Verizon · https://enterprise.verizon.com/resources/reports/dbir/

  14. 2018 Data Breach Investigations Report · Verizon · https://enterprise.verizon.com/resources/reports/dbir/

  15. 2018 Data Breach Investigations Report · Verizon · https://enterprise.verizon.com/resources/reports/dbir/

  16. DBAs are famous for having “zero trust” for developers

  17. 2018 Data Breach Investigations Report · Verizon · https://enterprise.verizon.com/resources/reports/dbir/

  18. We need proactive, general “zero trust”

  19. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal network where data is safe” The Future of Data Security: A Zero Trust Approach · John Kindervag, Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc.

  20. Key takeaways Security must become data-centric A security and control framework should define, analyze, and protect the data Data breaches dangerously erode consumer trust The Future of Data Security: A Zero Trust Approach · John Kindervag, Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc.

  21. Limit access Classify data Devalue or “kill” data using Dispose of data when no longer needed abstraction techniques The Future of Data Security: A Zero Trust Approach · John Kindervag, Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc.

  22. “SQL Provision has given us the ability to mask data and push it out to multiple locations almost instantly. That saves hours compared to the way we used to refresh.” KEPRO: Ensuring HIPAA compliance with SQL Provision · Redgate · http://bit.ly/2RtUCoB

  23. You risk overspending when you implement security controls

  24. Executives have traditionally under -estimated risk relative to tech professionals

  25. But that’s changing Source: Redgate-commissioned survey, 378 respondents in mid-large enterprises, senior roles

  26. But that’s changing Source: https://uk.pcmag.com/feature/118088/gartners-cio-agenda-and-ceo-perspective-for-2019

  27. Or misconstrued its nature

  28. 2018 Data Breach Investigations Report · Verizon · https://enterprise.verizon.com/resources/reports/dbir/

  29. Alignment protects against over-spend

  30. Discussion: chat on YouTube, Slack, or Twitter #sqlinthecity

  31. Crucial DPP insights for 2019 1. Compliance is shifting left 2. Perimeter protection is no longer sufficient, adopt a “Zero Trust” mindset for your data 3. Alignment of developers, ops, and IT Managers protects against over spending when implementing security controls

  32. Next steps Download the Data Contact Privacy Influencer PDF sales@red-gate.com red-gate.com/sitc

  33. References & Resources 2018 Data Breach Investigations Report · Verizon · https://enterprise.verizon.com/resources/reports/dbir/ KEPRO: Ensuring HIPAA compliance with SQL Provision · Redgate · http://bit.ly/2RtUCoB SQL Provision adds fully integrated data masking · Redgate · https://www.red- gate.com/hub/product-learning/sql-provision/sql-provision-adds-fully-integrated- data-masking The Future of Data Security: A Zero Trust Approach · John Kindervag, Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. Zero Trust: Your Knight In Cyber Armor · Forrester Research, Inc. · https://go.forrester.com/what-it-means/ep93-zero-trust-cyber-armor/

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend