Protecting Your Integrity and Getting Value from GDPR 2 June 2017 - - PowerPoint PPT Presentation

protecting your integrity and getting value from gdpr
SMART_READER_LITE
LIVE PREVIEW

Protecting Your Integrity and Getting Value from GDPR 2 June 2017 - - PowerPoint PPT Presentation

Protecting Your Integrity and Getting Value from GDPR 2 June 2017 AGENDA 9.30am Arrival 10.00am Karen Patterson, BBC Journalist, Host Introduction 10.05am Shauna Dunlop, Regional Manager Northern Ireland, Information Commissioners Office


slide-1
SLIDE 1

2 June 2017

Protecting Your Integrity and Getting Value from GDPR

slide-2
SLIDE 2

AGENDA

9.30am Arrival 10.00am Karen Patterson, BBC Journalist, Host Introduction 10.05am Shauna Dunlop, Regional Manager Northern Ireland, Information Commissioner’s Office GDPR Accountability – Privacy and Innovation 10.25am David Kemp, GDPR Business Consultant, HPE Exposing the technology challenges of GDPR for defence as well as business advancement 11.00am Coffee Break 11.20am Bill McCluggage, Digital Leader and CIO/CTO Using GDPR as a platform for change 11.45am Judith Millar, Business Development Manager, CSIT The evolving cyber threat landscape 12.10pm Panel Session 12.45pm Q & As 13.00pm Karen Patterson, BBC Journalist Close 13.05pm Lunch

slide-3
SLIDE 3

Karen Patterson Journalist, BBC

Introduction

slide-4
SLIDE 4

Shauna Dunlop, Regional Manager Northern Ireland, Information Commissioners Office

GDPR Accountability – Privacy and Innovation

slide-5
SLIDE 5

GDPR Accountability: Privacy and Innovation

Shauna Dunlop Information Commissioner’s Office

slide-6
SLIDE 6

Privacy and Innovation

slide-7
SLIDE 7

The protection of natural persons in relation to the processing of personal data is a fundamental right

slide-8
SLIDE 8
slide-9
SLIDE 9

Accountability

slide-10
SLIDE 10
slide-11
SLIDE 11

Fair, Lawful and Transparent Processing . . .

slide-12
SLIDE 12

Individuals' rights : The right to be informed The right of access The right to rectification The right to erasure The right to restrict processing The right to data portability The right to object Rights related to automated decision- making and profiling

slide-13
SLIDE 13
slide-14
SLIDE 14

GDPR Consent at a glance

Higher standard Genuine choice & control Positive opt-in Clear and specific Easy to withdraw Evidence of consent

slide-15
SLIDE 15
slide-16
SLIDE 16

Right to be

  • forgotten. . .
slide-17
SLIDE 17
slide-18
SLIDE 18
slide-19
SLIDE 19
slide-20
SLIDE 20

Breach notification in a digital world

slide-21
SLIDE 21

Children’s Privacy

slide-22
SLIDE 22

Accountability

slide-23
SLIDE 23
slide-24
SLIDE 24

Privacy and Innovation

slide-25
SLIDE 25

ico.org.uk

https://ico.org.uk/for-

  • rganisations/data-

protection-reform/

slide-26
SLIDE 26

David Kemp, GDPR Business Consultant, HPE

Exposing the technology challenges

  • f GDPR for defence as well as

business advancement

slide-27
SLIDE 27

Exposing the real technology challenges of GDPR for defence as well as business advancement

David Kemp EMEA Specialist Business Consultant

June 2017

slide-28
SLIDE 28

Why does GDPR matter to Business?

28

slide-29
SLIDE 29

What is GDPR?

“General Data Protection Regulation”

  • GDPR replaces previous Data Protection Directive
  • Data Protection Directive created to regulate

control of Personally Identifiable Information (PII)

  • GDPR will harmonize data protection laws across

27 EU member states

  • Clearer rules for data transfer across borders
  • Better control over individual’s data
slide-30
SLIDE 30

GDPR enacted to help protect EU citizen data from risk

30

New pan European Regulation designed to protect the privacy

  • f EU citizens

Reduces complexity for

  • rganizations dealing

with Personally Identifiable Information (PII) Applies also to companies

  • utside the EU

that deal with EU citizens’ data Introduces requirements of privacy by design and the ‘right to be forgotten’ Enterprises must start preparing for the enforcement data of May 2018 The risk of non-compliance

− Fines of up to 4% of parent company annual revenue (max. 20 million Euros) − Mandatory breach notification within 72 hours unless the PII was encrypted

Some exceptions for enterprise with less than 250 employees

slide-31
SLIDE 31

EU General Data Protection Regulation (GDPR)

Key Changes

  • Data Protection Officer (DPO)
  • Increased responsibility around security breach notification
  • Heavy non-compliance sanctions – 2- 4% of Global Sales
  • Privacy by design and privacy by default
  • Right to erasure and data portability
  • A single set of rules and a single data protection authority
  • EU Regulation will apply across borders
  • Greater compliance requirements
slide-32
SLIDE 32
  • Corporate Governance monitoring and enforcement
  • Social media monitoring - internal & external where permitted
  • Ability to freeze data across a complex IT legacy architecture
  • Cross-media visibility and comprehension
  • De-duplication, clustering and synthesis of mass data
  • Necessity to respect national and international data privacy

standards

  • Fast and effective response to the Business

What technical delivery does GDPR compliance require for effectiveness?

slide-33
SLIDE 33

How does one get the Senior Management “on board” for GDPR compliance – and in which verticals?

33

slide-34
SLIDE 34

How ready is the World for GDPR?

Globally – Gartner - January 61% of corporates have no strategy 51% think Security is Compliance Italy – Osservatore Polytechnica di Milano – from 136 CISOs and DPOs - February 23% Don’t know of GDPR 22% Know but no action 55% Understand the requirements 9% Have started a project UK – Financial Times - February 55% of corporates will wait till May 2018 Norway – Top Management Survey - March 33% Don’t know of GDPR 50% Know but unaware how to start an effectiveness programme 17% Addressing the issue with planning

slide-35
SLIDE 35

Compelling Business Logic for GDPR Compliance

35

GDPR

Revenue Generation

  • Fine
  • Reputation hit
  • Government contract

pre-requisite

  • Enforcement action
  • Client Audit
  • Strategic records

management

  • Cloud accelerator
  • M & A accelerator
  • Due diligence

Brand Loyalty & Data Mining & Data Exploitation

slide-36
SLIDE 36

Which “Entities” should be most engaged in GDPR preparation?

B2C corporates Those acquiring personally identifiable information from private citizens in the normal course of business e.g.

a. Retailers - supermarkets b. Gaming, Tourism & hotels

  • c. FSI: Personal insurance & retail banks
  • d. Mass Transport & logistics – rail / air / ferry
  • e. Healthcare / Pharma / Hospitals
  • f. Telcos

B2B corporates

a. Those with a large workforce where the PII is employee data b. Those which have agents who are B2C

Government agencies Those who acquire PII due to their engagement with the public e.g.

a. National Hospitals b. Municipal Authorities

AND OUTSOURCEES!

slide-37
SLIDE 37

Engaging Personas

37

Persona Key Challenges CISO

  • Internal surveillance and monitoring to avoid employee negative impact on PII
  • Automate application of policy to security

VP/Director of Security Operations

  • Comprehensive view of all existing data and applications
  • Monitoring and insight into enterprise-wide threat landscape

CIO/IT

  • Determine what information is subject to GDPR requirements
  • Ensure backup and recovery is aligned to GDPR requirements

CDO/CIGO

  • Defensibly delete information that has no value to the organization – aligns to “right to be forgotten”
  • Manage information based on policy throughout its lifecycle

Legal & Compliance

  • Determine what information is subject to GDPR requirements
  • Proactively prepare for litigation and investigations by consolidating information in a centralized

repository

Risk Management

  • Comply with policy-based management requirements of in-scope information throughout the

information lifecycle

  • Supervise employee communication

Data Protection Officer

  • Alerting facility to enable early breach identification
  • Synchronization with legal / compliance / risk / business / security to enable compliance

+ HR, Communications, Audit, Finance?

slide-38
SLIDE 38

HPE GDPR Programme

38

slide-39
SLIDE 39

What challenges / business outcomes does GDPR create?

RECORDS MANAGEMENT

  • What PII do I have, what format and where in my IT real estate?
  • How do I isolate and classify it?
  • How do I manage it in a form which enables me to execute PII tasks?

SECURITY

  • Externally: How effective is my outer cyber defence shield?
  • Internally: How can I prevent accidental or deliberate misuse of PII?
slide-40
SLIDE 40
  • 1. Identification of Key GDPR Programme steps
  • AWARENESS: Brief the board so they are aware of the risks to the business and what

needs to happen over the next 16 months to get GDPR effective.

  • STAFFING: Appoint / train a Data Protection Officer – 28,000 still to be appointed in EU.

* LEGAL OPINION: Translating the GDPR into deliverables & functionalities + local law

  • DATA DISCOVERY: Conduct a PII location / format / security assessment vs. Opinion
  • PROGRAMME PREPAREDNESS: Assessment of exposure & potential mitigants
  • POLICY GAP ANALYSIS: Review and update existing data protection policies, training,

privacy notices etc

  • TECHNICAL GAP ANALYSIS: Where can IT solutions accelerate GDPR “effectiveness”?
  • IMPLEMENTATION: Acquiring & installing IT solutions and services
  • PRIORITISED SEQUENTIAL SOLUTIONING: Or “Farming”
slide-41
SLIDE 41
  • 1. Functionality-Legal Map

We have reviewed the core functionality of a range of the selected products, to understand how they operate and what they do. Having gained this knowledge, we have “mapped” the functionality to the GDPR’s articles and recitals, to identify the extent to which it can be argued as a matter of law that they provide compliance solutions (the “functionality-legal map’’). The GDPR can be broken down into two key building blocks: Privacy Architecture and Privacy Principles: 1. Privacy architecture – the structures that are in place across the organisation to facilitate compliance, including Governance, Roles and Responsibilities, Registers, Policies, or Procedures. 2. Privacy principles – the fundamental principles that serve as the foundation for an organisation’s proper system of behaviour with regards to personal data. The Functionality-Legal Map has been structured by reference to Privacy Architecture and Privacy Principles. Business issue Legal GDPR Article GDPR Recital Business Solution Products Product redesign /remediation Governance The need for data protection programme workflow management, including management information and reporting. Article 5.2 requires an entity to be able to proactively demonstrate compliance with the principles set

  • ut in Article 5.1. This will require

entities to be able to demonstrate all programme components and related progress and outcomes. 5 Implement a programme management tool. This review has not included a system that supports programme workflow management The ability to comply with conflicting global legislation Article 5.2 requires an entity to be able to proactively demonstrate compliance with the principles set

  • ut in Article 5.1. This will require

entities to be able to demonstrate that they have taken steps to implement relative provisions and minimise reliance on manual processes and the impact of human error. 5 Define data actions according to policy and automate implementation Policy Centre Data feeds from Iron Mountain Policy Centre do not currently support modelling policies and rules against GDPR compliance.

  • 2. Obtain Essential Authority for the HPE Programme:

The Functionality Legal Map

Consisting of a mapping of the GDPR articles & recitals to deliverables Then identification of the functionalities required Then matching HPE Security and Information Management & Governance solution delivery for GDPR execution

slide-42
SLIDE 42

Product mapping: solutions vs GDPR use cases (IM&G)

Use Case Pain Points HPE Solutions

Personal Data Assessment

  • What and where is the information that

will fall under these regulations?

  • HPE ControlPoint
  • HPE Structured Data Manager

Defensible Disposition

  • How do I identify information for

disposition, in accordance with “the right to be forgotten”

  • HPE ControlPoint
  • HPE Structured Data Manager
  • HPE / IM Policy Centre

Secure Content Management

  • How do I best apply and enforce

policies to manage information through its lifecycle?

  • HPE ControlPoint
  • HPE Structured Data Manager
  • HPE Content Manager
  • HPE Policy Center
  • HPE Archiving

Litigation Readiness and Response

  • How can I quickly and cost-effectively

respond to legal matters requiring information under my management?

  • HPE ECA
  • HPE eDiscovery
  • HPE Legal Hold

Backup and Recovery

  • How do I best ensure sensitive data is

protected, stored and backed up securely?

  • HPE Data Protector
  • HPE Storage Optimizer
  • Backup Navigator
  • HPE Connected Backup/CMX
slide-43
SLIDE 43

Product mapping: solutions vs GDPR use cases (ESP)

Use Case Pain Points HPE Solutions

Encryption & Pseudonymisation

  • How can I grow my business while

ensuring sensitive data is protected?

  • How can I protect my brand and

business reputation by neutralizing damaging data breaches?

  • How do I manage the volumes of

sensitive data-at-rest?

  • ESKM (Enterprise)
  • SecureData ( Voltage )
  • SecureMail

Breach Response & Reporting

  • How do I know if I have already been

breached?

  • How to quickly know that a breach has

taken place and enable the security team to take steps to contain it, recover and find the root cause.

  • ArcSight, UBA & DMA
  • SecureData
  • SecureMail
  • ESKM

Breach Prevention & Neutralization

  • How can I neutralize the impact of a

data breach?

  • How is it possible to protect my data

and neutralize the impact of data breach, including the need for breach notification?

  • ArcSight
  • Fortify on Demand
  • Fortify Application Defender
  • SecureData
  • SecureMail
  • ESKM
slide-44
SLIDE 44
slide-45
SLIDE 45
  • 3. GDPR Programme Assessment = HPE Journey to Value

Opportunity Discovery / Creation Mapping GDPR Compliance Requirements to Technology by; –Understand as-is capabilities –GAP Analysis vs. HPE GDPR Framework –Discuss & Guide to get there “to-be”

45

Assessments Tools, Processes & Organization Roadmap & Recommendations

slide-46
SLIDE 46

46

Domain Function Capability Applicable no coverage partial coverage full coverage Assurance (Personal Data Records
  • Mgmt. and Security)
No defined process for assurance control and reviews for Personal Data Records Mgmt. and Security. Ad-hoc and manual reviews for assurance of Personal Data Records
  • Mgmt. and Security of Personal Data.
A process if defined for regular reviews for assurance of Personal Data Records Mgmt. and Security of Personal Data, but execution issues due to limited capacity / technology support. A dedicated Team and regular reviews for assurance of both Personal Data Records Mgmt. and Security of Personal Data. Organization is able to proactively demonstrate compliance with GDPR principles both Personal Data Records Management and Security. Respond to Data Subjects No mechanism or process defined to handle Data Subject inquires about Personal data processing / usage Data Subjects' requests handled in ad-hoc way. Process defined but execution is not stable. Organization is able to respond Data Subject requests partially. A clear process is defined to handle data subject requests Handling Data Subject Requests is defined, integrated as a std process of Help Desk and Customer Care. Respond & Report to Litigation / Regulatory Investigation Lack of building legal base for personal data processing activities. Lack
  • f capability for mapping the Personal Data and processing activities to
Legal Hold processes. (High risk for responding to litigation, regulatory investigation). Personal Data processing policies and processes are defined / limitedly enforced by the organization, with manual records mgmt., data security and data protection capabilities. Limited capability to build legal basis for data processing activities. Organization is capable of responding & reporting to Litigation / Regulatory Investigation for major applications and system that are processing personal data with manual efforts. Legal base constructed for the applications and systems processing Personal
  • Data. Solutions implemented identify and protect personal data subject to legal
hold, either in place, or migrate data to a secure repository for storage for the lifetime of the hold. Centralized & Automated records management processes and system constructed the legal base for applications and systems processing Personal Data across the Enterprise, that enables the organization's Compliance with GDPR Requirements. Data Processing Models Organization is not aware what type of Personal Data is being collected, stored & processed. Data & processing types includes High Risk for compliance:
  • Large-scale processing of Sensitive Personal Data
  • Automated Profiling
  • Systematic Monitoring
  • CCTV monitoring of public spaces
(Ref: Definitions of Data Types) Organization is partially aware and controlling the Personal Data is being collected, stored & processed. Data & processing types includes Medium to High Risk for compliance: Processing Sensitive Personal Data
  • Processing Personal Data of Vulnerable Individuals Automated Profiling
  • Systematic Monitoring
Organization is governing and controlling the Personal Data and processing activities at departmental level. Data & processing types includes Medium Risk for compliance:
  • Processing Sensitive Personal Data
  • Processing Personal Data of Vulnerable Individuals
  • Large Scale Processing of Personal Data
Organization is governing and controlling the Personal Data and processing activities for all major applications in semi-automated way with support of relevant technology. Data & processing types includes Medium to Low Risk for compliance:
  • Large Scale Processing of Personal Data
  • Anonymized Data
  • Pseudonymised data
Personal Data and processing activities are governed and protected across the enterprise. Organization adopts below processing models to lower the risk for non-compliance for Personal Data Protection.
  • Anonymized Data
  • Pseudonymised data
  • Secure-small scale processing
Personal Data Inventory No inventory / visibility of Personal Data, which applications & systems are processing PII not known. Limited knowledge of Personal Data stored and/or processed by applications and systems. (Mainly major apps and systems) App / System based inventory of Personal Data stored and/or processed by applications and systems. (Manual governance & control processes exist) BU level visibility of Personal Data stored and/or processed by applications and systems. (Governance & control by processes & policies) Visibility of personal data & its lifecycle across enterprise systems and
  • applications. Governance & automated control by processes & policies.
Applications, Systems & Storage Inventory No inventory of Applications, Systems & Storage processing Personal Data. Limited knowledge about inventory of Applications, Systems processing, and Storage maintaining Personal Data. (Mainly major apps and systems) Inventory of Applications, Systems & Storage exists for most and major applications and Systems processing f Personal Data. (ad-hoc governance & control processes via Privacy by Design) BU level visibility of Applications, Systems & Storage processing and storing Personal Data. (Governance and control by Privacy by Design policies) Enterprise level visibility of Applications, Systems & Storage processing and storing Personal Data. (Governance and control by Privacy by Design policies) Access Control Management No clear strategy and/or plan in place for Access Control Management for Personal Data and its processing activities (securing and managing access to Personal Data and associated processing activities). Access Control Management policy for Personal Data processing has been defined but not reviewed / and being enforced by the organization. Access Control Management policy for Personal Data processing has been defined and reviewed / and being enforced at departmental level. Access Control Management policy for Personal Data processing has been defined and reviewed / and being enforced by the organization - manual / semi-automated implementation.(via data security, access control, Identity & Access Mgmt. tools). Access Control Management policy for Personal Data processing has been defined and reviewed / and being enforced across the organization - with fully automated implementation.(via data security, access control, Identity & Access Mgmt. tools). Data Protection No clear or limited policy definition for Data protection for Personal Data (backup, archival and retention policies). Data Protection policies are defined but not reviewed or enforced by the
  • rganization.
Data protection policy for Personal Data processing has been defined, reviewed / and being enforced at departmental level. Data protection policy for Personal Data processing has been defined, reviewed / and being enforced at enterprise level with Disaster Recovery implementations. Enterprise Level Data Protection policies defined and enforced including Disaster Recovery and backups of personal devices (desktops, laptops, mobile devices, etc.) Records Management No clear or limited policy definition for Records Management for Personal Data protection. Limited policy definition for records Management for Personal Data protection for selected applications, ad-hoc / non-stable implementation and enforcement. Records Management policies defined with manual or ad-hoc level implementation for selected applications and systems processing Personal Data. Records Management policies in place and implemented at BU and/or Applications and Systems level processing Personal Data. Enterprise level Records management policies implementation for protecting Personal Data as well as regular gap assessments against GDPR, continuous remediation program in place. Privacy by Design / Privacy by Default Personal Data Protection principles are not considered during the design and development stage of applications and services processing personal data. Personal Data Protection principles are implemented / integrated during the design and development stage of apps, only for selected ones in ad- hoc manner. Personal Data Protection principles are defined as part of Application Design and Development policies, but enforced and implemented, or selectively implemented for some apps / systems. Personal Data Protection principles are defined and enforced for new applications and systems processing personal data. Limited capability for to migrate / adapt existing applications. Personal Data protection compliance is "baked in" to the data processing activities across enterprise. Apps / systems are required, by default, to process only the minimum amount of personal data. Accountability No or limited accountability principles defined, no or limited involvement of senior mgmt. for the Data Protection principles. Data Protection principles designed and implemented at Application / System level in ad-hoc way. Limited involvement of senior management. Data Protection principles and procedures are designed and implemented at BU level. Senior management informed but limited accountability. Data Protection Principles are approved and endorsed by senior management, and senior management is informed for implementation and enforcement of policies. Organizations' approved procedures are compliant with the Data Protection principles and appropriate review and audit processes are in place, enforced & implemented across the enterprise. Organization assigned a DPO (Data Protection Officer) as the requirements met with GDPR directives. (Ref: Appointment of a DPO) Data Protection Impact Assessments Organization does not have a defined policy or plan to assess the potential risks arising out of any new processing activity, as GDPR requires organizations to conduct regular Impact Assessments. Organization is conducting limited / ad-hoc based Impact Assessments to assess the potential risks arising out of any new processing activity for Personal Data. Organization has a strategy and relevant policies for conducting Impact Assessments for selected applications to assess the potential risks arising out of any new processing activity for Personal Data. Organization has a strategy and relevant policies for conducting Impact Assessments for all major applications processing personal data to assess the potential risks arising out of any new processing activity. Organization has assigned a dedicated Team, DPO and relevant roles for to conduct regular Impact Assessments for all data processing applications and systems to assess the potential risks arising out of any new processing activity. Program GAP Analysis & Remediation No regular Impact Assessments, and GAP Analysis Strategy defined and implemented by the organizations. Reactive remediation strategy after incidents. As a follow-up of Impact Assessments, GAP Analysis is being performed, improvement areas for Data Protection are identified with limited follow- up due to limited commitment by higher management or other reasons like budget, resources, etc. As a follow-up of conducted Impact Assessments, GAP Analysis is made and identified improvement areas for Data Protection as added as projects in annual planning. Limited follow-up / prioritization (only for selected / major applications). Organization has a clear strategy and policies implemented for conducting regular Impact Assessments and GAP Analysis to identify improvement areas for Data Protection which are added as projects in annual planning. close follow-up / prioritization accordingly with risk evaluations. Organization has clearly defined GAP Analysis assigned a dedicated Team, DPO and relevant roles for to conduct regular Impact Assessments for all data processing applications and systems to assess the potential risks arising out
  • f any new processing activity. Implementation and progress is closely follow-
end up by highest mgmt. Assess / Remediation Governance Assurance / Respond / Report Inventory Policies Design / Accountability

GDPR PREPAREDNESS ANALYSIS

slide-47
SLIDE 47

Data Processing & Lifecycle Mgmt. Programme status

47

0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 Consent Structure and Management Obtaining Methodology and Coverage Registry and Mapping Accuracy Purpose Limitation Data Minimisation Pseudonymisation / Anonymisation Storage Limitation Transfer Controls Lawful & Transparent Processing Legal base for Data Processing Contractual Necessity Data Retention Management Archival Management Right to be Forgotten Records Mgmt. for Personal Data Data Flow Mapping Records Mgmt. for Personal Data processing

Data Processing / Lifecycle Mgmt.

Data Porcessing / Lifecycle Mgmt. Sub-Capability Risk Score Consent Structure and Management 5 Obtaining Methodology and Coverage 5 Legal base for Data Processing 5 Data Flow Mapping 5 Records Mgmt. for Personal Data processing 5 Registry and Mapping 4 Purpose Limitation 4 Data Minimisation 4 Storage Limitation 4 Right to be Forgotten 4 Pseudonymisation / Anonymisation 3 Transfer Controls 3 Data Retention Management 3 Records Mgmt. for Personal Data 3 Accuracy 2 Lawful & Transparent Processing 2 Contractual Necessity 2 Archival Management 2

Data Processing / Lifecycle Mgmt. Sub-Capability Risk Score

slide-48
SLIDE 48

Data Processing & Lifecycle Mgmt. Risk Map

48

0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 Consent Structure and Management Obtaining Methodology and Coverage Registry and Mapping Accuracy Purpose Limitation Data Minimisation Pseudonymisation / Anonymisation Storage Limitation Transfer Controls Lawful & Transparent Processing Legal base for Data Processing Contractual Necessity Data Retention Management Archival Management Right to be Forgotten Records Mgmt. for Personal Data Data Flow Mapping Records Mgmt. for Personal Data processing

Data Processing / Lifecycle Mgmt.

Data Porcessing / Lifecycle Mgmt. Sub-Capability Risk Score Consent Structure and Management 5 Obtaining Methodology and Coverage 5 Legal base for Data Processing 5 Data Flow Mapping 5 Records Mgmt. for Personal Data processing 5 Registry and Mapping 4 Purpose Limitation 4 Data Minimisation 4 Storage Limitation 4 Right to be Forgotten 4 Pseudonymisation / Anonymisation 3 Transfer Controls 3 Data Retention Management 3 Records Mgmt. for Personal Data 3 Accuracy 2 Lawful & Transparent Processing 2 Contractual Necessity 2 Archival Management 2

slide-49
SLIDE 49

How to Use Output?

49

Use Cases – As Best Practices High Risk Areas Roadmap Follow-on Projects GAP Analysis

Follow-on Projects

  • Domain based JTVs
  • IM&G
  • Security
  • Demo
  • Pilot & PoC

GAP Analysis

  • Use Cases as Best Practices
  • Dependencies between High

Risk Areas

  • Impact & Prioritization
slide-50
SLIDE 50

2017 2018 2019 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Extended Value Long Term Short Term Quick Wins Outcomes and plan based on Detailed Privacy Focused Assessment (privacy > security controls)

High Level Roadmap for Recommendations

50

Personal Data Inventory – structured, unstructured information / PII Continous Privacy by Design Data Minimization (Data Collection Limitation – legal check for minimum required data for customers) Data Consolidation E-mail Security, BYOD Security Incident & Event Management Extended encryption and data masking

Unlock value of current investment Sustained returns Strategic Outcomes High Impact ROI, Rapid Time to Value

Securing the most important information – structured, unstructured PII Start of Privacy by Design – short review of security parameters of new / existing services

Strategic Tactical

Naming DPO ( if not yet announced) Preparation for possible data breach – be able to detect and report Detailed Privacy Focused Assessment (to fugre out detailed long-term plan even after May 2018) Justify client facing areas (consent, front-end service, portals, etc.) Identity management deployment Application Security (portals, web security) Policies justifications, policy management Other extended-value controls Information Governance strategy

slide-51
SLIDE 51

2017 2018 2019 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Extended Value Long Term Short Term Quick Wins Outcomes and plan based on Detailed Privacy Focused Assessment (privacy > security controls)

High Level Roadmap for Recommendations

51

Personal Data Inventory – structured, unstructured information / PII Continous Privacy by Design Data Minimization (Data Collection Limitation – legal check for minimum required data for customers) Data Consolidation E-mail Security, BYOD Security Incident & Event Management Extended encryption and data masking

Unlock value of current investment Sustained returns Strategic Outcomes High Impact ROI, Rapid TTV

Securing the most important information – structured, unstructured PII Start of Privacy by Design – short review of security parameters of new/old services

Strategic Tactical

Naming DPO (just in case it is not named yet) Preparation for possible data breach – be able to detect and report Detailed Privacy Focused Assessment (to fugre out detailed long-term plan even after May 2018) Justify client‘s facing areas (consent, front-end service, portals, etc.) Identity management deployment Application Security (portals, web security) Policies justifications, policy management Other extended-value controls Information Governance strategy

Executing what is urgent and should be a priority: Mapping the inventories, minimizing the data stored, securing main PII, starting Privacy by Design strategy Short-term activities which need to be done first: Activities needed to be executed by May 2018 to be ready and possibly safe from major breaches, fines, etc. Execution of a sensibly planned implementation programme: Further privacy and other security steps on a long-term journey towards safe and trusted IT environment. Enhancing the environment: Other controls such as securing email, BYOD and continuous Privacy by design are also very important.

slide-52
SLIDE 52
  • 4. HPE Security & IM&G Product mapping

Report Compliance Get Consent

Find Govern Classify

Manage Data In Scope (Personal Data) Secure Personal Data

Security

Records Repository

Information Management & Governance

Data Repositories

  • Data Security
  • Application Security
  • Security Intelligence

(Breach Detection)

slide-53
SLIDE 53

Complete HPE GDPR Platform

Analyse Record Repository

Classify

Data Repositories

Messaging Email Files Read SharePoint

Action

Applications Data Warehouses Document Management

Data Archive

Social Media Web Content Apply Store Eligible Records Declare

Data Encryp tion

Find Govern

SecureData ESKM Content Manager SDM

Control Point UD: (HPE ITOM) Universal Discovery SDM: (HPE IM&G) Structured Data Manager ESKM: (HPE Data Security - Atalla) Enterprise Secure Key Manager

UD Content Manager

Apply Retention rules Compliance, Legal Hold & Audit

SDM

Control Point Policy Center

Third Party Database

slide-54
SLIDE 54

Example of a Defensible Treatment Solution

54

App1 App2 App3 App4 App n

SDM SDM SDM SDM SDM

Delete

RM

“Proxy” Records Approve Deletion Get eligible deletion list Metadata Feed Redact Delete Redact Delete

….

JDBC API Script Retention Policy

slide-55
SLIDE 55

Security Intelligence

Breach Detection

Application Security

Breach Prevention

Data Security

Encryption / Pseudonymization

Application-, Data- and Information- Security

SAST: (HPE Security - Fortify) Static Application Security Testing DAST: (HPE Security - Fortify) Dynamic Application Security Testing RASP: (HPE Security - Fortify) Runtime Application Self-Protection

Data Repositories Records Repository Find Classify Govern

SecureData ESKM ArcSight ADP/ESM Fortify SAST / DAST / RASP SecureMail

slide-56
SLIDE 56

Assessment of the Business Case

  • SIZE: In terms of volume of retail customers and / or employees, do they pose a significant GDPR

exposure?

  • TIMING: Is there already Main Board buy-in and Steering Committee appointment?
  • EXISTING MITIGANTS: Is the corporate business one which is already used to data privacy /

protection standard maintenance e.g. Pharma clinical trials?

  • PARALLEL PROJECTS: Are there other Information Life Cycle Management projects either planned
  • r in execution which could be accelerated by GDPR effectiveness?
  • IMPACT UNDERSTANDING: Does the Business see the value of the 3 drivers of Compliance,

Operational Efficiency and Revenue?

  • RISK EXPOSURE: To what extent are there both financial and medical records involved e.g.

Insurance / Hospitals / Employee HR data / Pharma / Municipalities?

  • DECISION-MAKING: In country or overseas?
  • BUDGET & TIMING: To what extent are CIOs / CISOs already funded / authorised to achieve

“policy enforcement” and by when?

slide-57
SLIDE 57

In summary, HPE is strongly positioned to address GDPR

– Broad technology set covering all phases of protection – Robust, cross-silo data classification – Deep information insight for automated policy setting – Advanced analytics for value creation – Partnership strategy to deliver maximum value – Solutions mapped to GDPR-specific use cases for simplicity

57

slide-58
SLIDE 58

GDPR collateral

58

slide-59
SLIDE 59

Solutions mentioned

Links

  • A. SECURITY

– Check Point Capsule Docs: https://www.checkpoint.com/downloads/product-related/datasheets/ds-capsule-docs.pdf – HPE SecureData Enterprise – https://www.voltage.com/resource/hpe-securedata-enterprise/ – HPE ArcSight - https://saas.hpe.com/en-us/software/siem-security-information-event-management – Securing SaaS (incl. Salesforce) – Symantec CASB and Cloud Data Protection Gateway – https://www.symantec.com/products/web-and-cloud-security/cloud-application-security-cloudsoc – https://www.symantec.com/content/dam/symantec/docs/solution-briefs/cloud-data-protection-security-tokenization-en.pdf

  • B. INFORMATION MANAGEMENT & GOVERNANCE
  • HPE Control Point: https://saas.hpe.com/en-us/software/file-analysis-dark-data-cleanup
  • HPE Structured Data Manager: https://saas.hpe.com/en-us/software/application-database-archiving
  • HPE Content Manager: https://saas.hpe.com/en-us/software/enterprise-content-management
  • C. GENERAL HEWLETT PACKARD ENTERPRISE GDPR PROGRAMME
  • Main internet site: https://www.hpe.com/us/en/campaigns/gdpr-compliance.html

59

slide-60
SLIDE 60

Thank you

David Kemp kemp@hpe.com Tel: +44 (0) 7867 558680

60

slide-61
SLIDE 61

Coffee Break

slide-62
SLIDE 62

Bill McCluggage, Digital Leader and CIO/CTO

Using GDPR as a platform for change

slide-63
SLIDE 63
slide-64
SLIDE 64
slide-65
SLIDE 65

The government has promised sweeping changes to the way data is secured across Whitehall in the wake of the missing discs review.

slide-66
SLIDE 66
slide-67
SLIDE 67
slide-68
SLIDE 68
slide-69
SLIDE 69
slide-70
SLIDE 70
slide-71
SLIDE 71
slide-72
SLIDE 72
slide-73
SLIDE 73
slide-74
SLIDE 74
slide-75
SLIDE 75

Judith Millar, Business Development Manager, CSIT

The Evolving Cyber Threat Landscape

slide-76
SLIDE 76

Judith Millar

Business Development Manager

2nd June 2017

A Global Innovation Hub for Cyber Security

‘The Evolving Cyber Threat Landscape’

slide-77
SLIDE 77

CSIT – Nationally recognised

UK’s National Innovation and Knowledge Centre (IKC) for cyber security

GCHQ certified “Academic Centre of Excellence in Cyber Security Research Queen’s Anniversary Prize for “strengthening global cyber security” UK Cyber Growth Partnership - sole academic partner NI Organised Crime Task Force (OCTF)

Securing our Digital Tomorrow

slide-78
SLIDE 78

CSIT’s Industry Membership Programme

Securing our Digital Tomorrow

slide-79
SLIDE 79

Securing our Digital Tomorrow

‘Innovation is key’

UK Government Strategy

slide-80
SLIDE 80

A Global Innovation Hub for Cyber Security

Increasing threats

slide-81
SLIDE 81

Protection rackets = DDOS Blackmail = Ransomware Con artist = Spear Phishing Bank job = APT malware

Old crimes, new technologies

slide-82
SLIDE 82

UK company management perception of cybersecurity threats

Nation state actors Inside attackers - suppliers Terrorist organisations Competitors Activists Inside attackers - employees Hobbyist hackers Professionals - organised crime or fraud groups ITDM – IT Decision Makers

Source: The Intelligence Disconnect, The 2017 Cyber Defence Monitor: A Global Perspective, BAE Systems

Securing our Digital Tomorrow

slide-83
SLIDE 83

Cost of cyber crime

Up to £35 Million in

  • ne off costs

£240 Million wiped of shareholder value

slide-84
SLIDE 84
  • Financial

Highly profitable Reduced barriers and costs of attacks – ‘malware for sale’

  • Political

Information warfare; state sponsored attacks Hacktivism

  • Social

Insider threat Bring Your Own Device (BYOD) Kudos of hackers Social media – ‘leaking data’

  • Technical

Increasing connectivity - IoT Robust authentication required

Why are cyber threats increasing?

Securing our Digital Tomorrow

slide-85
SLIDE 85

“In 10-20 years we will look back and say that THIS was the real revolution. The first was merely a prelude!”, Philip Moynagh Director IoT, Intel the internet of screens

Securing our Digital Tomorrow

slide-86
SLIDE 86

Securing our Digital Tomorrow

Technologies for a Future Digital Society

slide-87
SLIDE 87

And…

Securing our Digital Tomorrow

slide-88
SLIDE 88

Quantum computing

Securing our Digital Tomorrow

slide-89
SLIDE 89

The world’s first quantum computer?

Bought by Lockheed Martin & Google/NASA Difficult to verify if performing quantum

  • perations or not!

Has helped to advance research in Quantum Computing Exponential leap in processing power will crack some cryptography

Securing our Digital Tomorrow

slide-90
SLIDE 90

August 2015

Update: Jan 2017 - NIST issued a Call for Quantum-Resistant Cryptographic Algorithms for new public-key cryptography standards. Draft standards expected in 5 years.

Quantum-Safe Cryptography

slide-91
SLIDE 91

CSIT is leading SAFEcrypto - Horizon 2020 project, developing practical, robust and secure post-quantum cryptographic solutions. CSIT is at forefront of standardisation work:

  • ISO/IEC SC27 WG2 – Quantum-resistant Cryptography
  • ETSI TC CYBER QSC – Quantum Safe Cryptography

CSIT leading development of quantum-safe cryptography

Securing our Digital Tomorrow

slide-92
SLIDE 92

Consider:

  • Data could be captured today for later decryption
  • Systems with long operational lifetimes are already vulnerable
  • What algorithms and third party libraries are in place today?
  • Opensource stack
  • Key material
  • Key sizes
  • Migration plan – implementation, testing

Securing our Digital Tomorrow

slide-93
SLIDE 93

Intelligence led investment in security

  • What data is critical to your business - and who has access to it?
  • Factor cyber security into all planning, procurement and projects
  • Investments in Smart [Anything] should factor in 15% for security and resilience
  • Understanding the specific risks
  • Understanding the specific vulnerabilities

The way ahead for your business

Securing our Digital Tomorrow

slide-94
SLIDE 94

Panel Session

Shauna Dunlop, Bill McCluggage, David Kemp, Judith Millar and Jeff Peel

slide-95
SLIDE 95

Karen Patterson Journalist, BBC

Close

slide-96
SLIDE 96

Lunch