Crucial data privacy and protection insights for 2019 Richard - - PowerPoint PPT Presentation

crucial data privacy and protection insights for 2019
SMART_READER_LITE
LIVE PREVIEW

Crucial data privacy and protection insights for 2019 Richard - - PowerPoint PPT Presentation

Crucial data privacy and protection insights for 2019 Richard Macaskill and Kendra Little 20 years Oracle and SQL Server experience Product Manager at Redgate Data Governance Richard Macaskill bolshevik! Richard.Macaskill@Red-Gate.com


slide-1
SLIDE 1
slide-2
SLIDE 2

Crucial data privacy and protection insights for 2019

Richard Macaskill and Kendra Little

slide-3
SLIDE 3

Richard Macaskill

Richard.Macaskill@Red-Gate.com

20 years Oracle and SQL Server experience Product Manager at Redgate Data Governance bolshevik!

slide-4
SLIDE 4

@Kendra_Little

Kendra.Little@Red- Gate.com

Founder of SQL Workbooks Evangelist at Redgate Microsoft MVP & Microsoft Certified Master

slide-5
SLIDE 5

Agenda

slide-6
SLIDE 6

Compliance is shifting left

slide-7
SLIDE 7

What do we mean by ‘Shift Left’?

slide-8
SLIDE 8

Employers are responsible for employees’ actions

slide-9
SLIDE 9

Organizations as a whole are responsible

“If a business can’t show that good data protection is a cornerstone of their practices, they’re leaving themselves open to a fine or other enforcement action that could damage bank balance or business reputation.”

Elizabeth Denham, UK Information Commissioner

slide-10
SLIDE 10

Microsoft Confidential

https ps://a ://asset ssets.r s.red-gat gate.com e.com/pr /produc

  • ducts

ts/db dba/sq a/sql-clone/s clone/sql ql-ser erver-da datab tabase se-provi visioning sioning-repor eport. t.pdf pdf

slide-11
SLIDE 11
slide-12
SLIDE 12
slide-13
SLIDE 13
slide-14
SLIDE 14
slide-15
SLIDE 15
slide-16
SLIDE 16

A few words on Static Data Masking

1. Realistic Values – how useful are they? 2. Correlating & syncing values across columns 3. Retaining table integrity post-masking 4. Cross-database & cross-server masking 5. Performance when masking large sets of data ➢ Applications actually work for debug/test ➢ Data rarely exists in isolation ➢ Are there keys that should be masked? ➢ ‘Systems’ use multiple data sources ➢ We can’t block our day’s work

slide-17
SLIDE 17
slide-18
SLIDE 18
slide-19
SLIDE 19
slide-20
SLIDE 20
slide-21
SLIDE 21
slide-22
SLIDE 22
slide-23
SLIDE 23
slide-24
SLIDE 24

Perimeter protection is no longer sufficient

slide-25
SLIDE 25

2018 Data Breach Investigations Report · Verizon · https://enterprise.verizon.com/resources/reports/dbir/

  • 53,000 incidents
  • 2,216 confirmed data breaches
  • 43,000 successful accesses involving botnets
slide-26
SLIDE 26

2018 Data Breach Investigations Report · Verizon · https://enterprise.verizon.com/resources/reports/dbir/

slide-27
SLIDE 27

2018 Data Breach Investigations Report · Verizon · https://enterprise.verizon.com/resources/reports/dbir/

slide-28
SLIDE 28

2018 Data Breach Investigations Report · Verizon · https://enterprise.verizon.com/resources/reports/dbir/

slide-29
SLIDE 29

DBAs are famous for having “zero trust” for developers

slide-30
SLIDE 30

2018 Data Breach Investigations Report · Verizon · https://enterprise.verizon.com/resources/reports/dbir/

slide-31
SLIDE 31

We need proactive, general “zero trust”

slide-32
SLIDE 32

The Future of Data Security: A Zero Trust Approach · John Kindervag, Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc.

“There is a fatal flaw in the assumption… that there is a ‘trusted’ internal network where data is safe”

slide-33
SLIDE 33

Key takeaways

Security must become data-centric A security and control framework should define, analyze, and protect the data Data breaches dangerously erode consumer trust

The Future of Data Security: A Zero Trust Approach · John Kindervag, Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc.

slide-34
SLIDE 34

Limit access Classify data

Dispose of data when no longer needed Devalue or “kill” data using abstraction techniques

The Future of Data Security: A Zero Trust Approach · John Kindervag, Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc.

slide-35
SLIDE 35

KEPRO: Ensuring HIPAA compliance with SQL Provision · Redgate · http://bit.ly/2RtUCoB

“SQL Provision has given us the ability to mask data and push it out to multiple locations almost instantly. That saves hours compared to the way we used to refresh.”

slide-36
SLIDE 36

You risk overspending when you implement security controls

slide-37
SLIDE 37

Executives have

traditionally under-estimated risk relative to tech professionals

slide-38
SLIDE 38

But that’s changing

Source: Redgate-commissioned survey, 378 respondents in mid-large enterprises, senior roles

slide-39
SLIDE 39

But that’s changing

Source: https://uk.pcmag.com/feature/118088/gartners-cio-agenda-and-ceo-perspective-for-2019

slide-40
SLIDE 40

Or misconstrued its nature

slide-41
SLIDE 41

2018 Data Breach Investigations Report · Verizon · https://enterprise.verizon.com/resources/reports/dbir/

slide-42
SLIDE 42

Alignment protects against over-spend

slide-43
SLIDE 43
slide-44
SLIDE 44
slide-45
SLIDE 45
slide-46
SLIDE 46
slide-47
SLIDE 47

Discussion: chat on YouTube, Slack, or Twitter #sqlinthecity

slide-48
SLIDE 48

Crucial DPP insights for 2019

  • 1. Compliance is shifting left
  • 2. Perimeter protection is no longer sufficient, adopt a

“Zero Trust” mindset for your data

  • 3. Alignment of developers, ops, and IT Managers

protects against over spending when implementing security controls

slide-49
SLIDE 49

Next steps

Download the Data Privacy Influencer PDF red-gate.com/sitc Contact sales@red-gate.com

slide-50
SLIDE 50

References & Resources

2018 Data Breach Investigations Report · Verizon · https://enterprise.verizon.com/resources/reports/dbir/ KEPRO: Ensuring HIPAA compliance with SQL Provision · Redgate · http://bit.ly/2RtUCoB SQL Provision adds fully integrated data masking · Redgate · https://www.red- gate.com/hub/product-learning/sql-provision/sql-provision-adds-fully-integrated- data-masking The Future of Data Security: A Zero Trust Approach · John Kindervag, Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. Zero Trust: Your Knight In Cyber Armor · Forrester Research, Inc. · https://go.forrester.com/what-it-means/ep93-zero-trust-cyber-armor/