microfocuscybersummit
play

#MicroFocusCyberSummit Regulatory Change in GDPR and the U.S. - PowerPoint PPT Presentation

#MicroFocusCyberSummit Regulatory Change in GDPR and the U.S. Moderated session with product leaders Nathan Turajski - Moderator Joe Garber Luther Martin Rob Roy #MicroFocusCyberSummit Max Averbukh Moderated Session with Product Leaders


  1. #MicroFocusCyberSummit

  2. Regulatory Change in GDPR and the U.S. Moderated session with product leaders Nathan Turajski - Moderator Joe Garber Luther Martin Rob Roy #MicroFocusCyberSummit Max Averbukh

  3. Moderated Session with Product Leaders Discussing Regulatory Change in GDPR and the U.S. Privacy strikes back-- make sure it’s not at you . It has been said that 2018 is the year we lost our privacy. But regulators are enacting new legislation--or enforcing existing legislation--to ensure that we gain our privacy back in 2019 and beyond. This raises the stakes for enterprises around the world to improve data governance and protection throughout its lifecycle. Strategies for risk mitigation include an interlock of tools and techniques to improve governance, manage identity and protect data. But hidden in the process of identification, classification and protection are major opportunities to create value for the enterprise and dramatically change the ROI calculation of compliance. Join us for a discussion with product leaders across security and information governance teams to gain insight, guidance and predictions. Your Moderator: Nathan Turajski Panelists: Joe Garber, Luther Martin, Rob Roy, Max Averbukh 3

  4. Panel: Regulatory Change in GDPR and the U.S. Luther Martin Rob Roy Chief Technology Officer Distinguished Technologist U.S. Public Sector, Data Security – Voltage Micro Focus Government Solutions Micro Focus Joe Garber Max Averbukh Global Head of Product Marketing Vice President Information Management & Governance, and Enterprise Security Architect Application Modernization & Connectivity Security Technology Operations and Architecture Micro Focus Northern Trust 4

  5. Data Drives the Modern Enterprise Enterprises rely on real-time analysis of massive amounts of data for every major initiative, including  Competitive Advantage  Customer Loyalty  Operational Efficiency  Customer Service  Finding Defects  Fraud Detection 1: “Gartner Says 8.4 Billion Connected "Things" Will Be in Use in 2017, Up 31 Percent From 2016”, Gartner, Feb. 2017 2: The Digital Universe of Opportunities: Rich Data and the Increasing Value of the Internet of Things, IDC 5

  6. Sensitive Data Explosion – Type and Scale 5200GB of data for every person by 2020! PERSONAL DATA HEALTH IDENTITY HEALTH ASSET GOVERNMENT COMM ACTIVITY CONTENT CONTEXT IDENTITY RELATIONSHIP ePORTFOLIO DATA DATA DATA RECORDS Contacts Academic Citizenship Insurance Presence Browser Private Documents Location Demographic Virtual Goods Address Book Exams Corporate Board of Claims Availability Clicks Word Processing Current Age Identifiers Payments Spreadsheets Communications Student Projects Directors Channels Keystrokes Planned Future Sex Domain Names Coverage Project Plans Call Logs Transcripts Law Enforcement Records Sites Visited Past Address Handles (twitter etc) Queries Presentations Messaging Logs Degrees Public Records Text Profession Objects Insurance Demographic Personal Bookmarks Legal Name SMS People Gifts Claims Tracking Devices Consumer Media Social Networks Employment Births IM/Chat Copresent Identifiers Currencies Age Activity Records Client Apps Books Reviews Deaths Email Physical World Name Payments Genetic Code Photos Digital World Sex Family Geneology Actions Marriages Attachment User-names Financial Data Physical World Videos Interlaced With Promotions Divorces Body e-Mail Addresses Income Coverage Address Patient Eating Podcasts Continuing Education Property Ownership Status Updates Phone Numbers Expenses Prescriptions Drinking Music Events Nick Names Transactions Profession Diagnosis Social Media Driving Audio Books Calendar Data Persons Accounts Personal Device Logs Videos Shopping Games Event Data from Device IDs Tax Info Measurement Podcasts Sleeping Software/Apps Web Services IP addresses Assets Tracking Devices Identifiers Photis Bluetooth IDs Liabilities Activity Records Shared Operating System Objects SSID Insurance Name Produced Music Copresent IMEI Credit Rating Genetic Code Links Physical World SIM User-names Bookmarks Digital World Physical Goods Digital Records e-Mail Interlaced With Interests Real Estate Speech Declared Vehicles Patient Addresses Voice Calls Llikes Personal Effects Prescriptions Voice Mails Favorites Art Phone Numbers Preferences Appliances Diagnosis Nick Names Device Logs Persons Measurement Device IDs Computerworld, 12/2012 IP addresses Bluetooth IDs

  7. Privacy Strikes Back – and It Is Not Only GDPR!  EU: General Data Protection Regulation ( GDPR )  California Consumer Privacy Act ( CCPA )  Australia: PrivacyAct of 1988 ( Privacy Act )  New York State Department of Financial Services ( NYDFS )  Japan: Act on the Protection of Personal Information ( APPI )  Health Insurance Portability and Accountability Act of 1996 ( HIPAA )  Gramm-Leach-Bliley Act ( GLBA )  China: 2017 Cyber Security Law  Canada: Personal Information Protection and Electronic  Children’s Online Privacy Protection Act of 1998 ( COPPA ) Documents Act ( PIPEDA )  Defense Federal Acquisition Regulation Supplement, Controlled  South Korea: Personal Information Protection Act ( PIPA ) Unclassified Information ( DFARS-CUI )  Hundreds more across the world…  Hundreds more among 50 states and territories… 7 * Source: Data Protection and Privacy in 26 Jurisdictions Worldwide, Law Business Research Ltd.

  8. Panel: Regulatory Change in GDPR and the U.S. Luther Martin Rob Roy Chief Technology Officer Distinguished Technologist U.S. Public Sector, Data Security – Voltage Micro Focus Government Solutions Micro Focus Joe Garber Max Averbukh Global Head of Product Marketing Vice President Information Management & Governance, and Enterprise Security Architect Application Modernization & Connectivity Security Technology Operations and Architecture Micro Focus Northern Trust 8

  9. #MicroFocusCyberSummit Thank You.

  10. #MicroFocusCyberSummit

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend