SlideShare a Scribd company logo
INFORMATION
SECURITY &
DATA PROTETION
DATA PROTECTION
@TommyVandepitte
BUSINESS
Price
Profit
Cost
External
Cost
Internal
Cost
(perceived)
value for
customer
Value proposition
Value creation
Value delivery
Value capture
experience
convenience
meeting the customers’ needs
product design
meeting the qualifiers
image
additional functionalities
future proofquality
people
meeting the users’ needs
culture
VALUE CAPTURE
IS HARD
Value captured = Value of the business
THE SAUCE IS
ALWAYS AT RISK
• Financial risk
• Solvability
• Liquidity
• Cash flow
• Operational risk
• Counterparty risk
• Customers
• Credit risk
• Suppliers
• Market risk
• Reputational risk
• Legal risk
• ...
THE WORLD IS “VUCA”
4 KEY CHALLENGES
“Change comes from outside. And that is what you should
use to challenge how your team has got to the end product.”
- Prof. Stijn Viaene -
Use 4 key challenges:
• Experience IS value, not just functionality. The reference
experience is NOT the sector, it is Google, Facebook, Uber, …
• Customers are moving targets.
• You can’t (and shouldn’t) have it all in-house: data, skills, …
What is core and should be owned? What can we outsource?
• You need well architected information systems.
APPLY
Whatwecomprehend
What there is to know
What we
don’t know
we know
What we
know we
know
What we
don’t know
we don’t
know
What we
know we
don’t know
Unknown
Unknown
Known
Known
MODELS &
FRAMEWORKS
• Business threats
a.o. disruption / creative destruction
RISK
MANAGEMENT
RISK
APPROACH
Impact
Likelihood
Share
Accept
Avoid
Mitigate
High
High
Low
Low
Impact
Likelihood
Mitigate
Cont. monitoring
Share
Accept
Per. monitoring
Mitigate
Cont. review
Avoid
Mitigate
Per. Review
High
High
Low
Low
THE IDEAL
FOR REAL ?!
ISDPP IS
(JUST) ANOTHER RISK
• Customers
• Who are your customers?
• What do your customers value?
• Why do your customers choose you?
• Suppliers
• Who are your customers?
• What relationship do you have with
your suppliers? (“value partition”)
• Why do you have this relationship with
your suppliers?
• Competitive edge
• Culture
• Ideas
• Operational
excellence
• Cost control
• Trade secrets
• Protectable
intellectual property
• …
Part of the secret sauce
INFORMATION MANAGEMENT
ARCHITECTURE LIFECYCLE
• Databases
• Links
• Silos v transversal
Information asset ownership
ISDPP “INTELLIGENCE”
WHAT IS OUT THERE?
• (Information) Threat Intelligence
• network
• peers
• vendor information
• threat reports
• threat intelligence services
• futurists
• sci-fi
• …
Environment
Physical
Human
Device
Application
Repository
Carrier
LAYERS & DIMENSIONS
Risk Assessment
Risk Decision
Controls
Incident
Management
Changes
• In the regulatory environment
• In processes
• In people (JLT)
• In technology
Network
Data
3rd Parties
• 1st line
• 2nd line
• 3rd line
• Impact
• Probability
• Avoid
• Mitigate
• Share
• Accept
LEGAL OVERVIEW
Control
Data
Subject
Processing personal data
Data
Controller
Data
processor
Finality Legitimacy
Transparency Organisation
proportional
End-to-end
GDPR - NEW
• Processor now also an addressee
• Organisation
• ”Accountability” (reversal of the burden of proof), concrete
• Processing register (and risk register)
• Privacy impact assessment (“PIA”)
• Privacy by Design and Privacy by Default
• Data Protection Officer
• Acknowledgement of “frame”-mechanisms: certifications,
codes of conduct, binding corporate rules,…
• Incident management and data breach notification
• Rights of individual are increased and further elaborated
• Enforcement
• Administrative fines universal and uniform
• Collective actions of individuals universal and uniform
GDPR – CHANGE - VISUAL
Control
Data
Subject
Processing personal data
Data
Controller
Data
processor
Finality Legitimacy
Transparency Organisation
proportional
End-to-end
CHANGE PROGRAM
PROJECT
• Change management
• HR review
• Roles and function review, a.o.
o DPO needed?
o Information asset owners ?
• HR processes review
• Communication & Training
• Processes review
• Processing register
• In iterations for legacy processes
• Consent of data subjects
• Incident management review
• Project management review
• PIA, PbD,
• Documentation => register
• Complaints management (rights update)
• Outsourcing partner review
• Access management
• IT review
• Archicture view
• Security measures: comfortable?
• Need to have
• Nice to have
BUSINESS AS USUAL
• Tone at the top !
• “Money where your mouth is”
• Decisions on data protection
• Sponsor
• HR
• Communication & Training
• Awareness (= top of mind)
• Processes
• Periodic review and update
• IT
• Security is moving target –
upgrade, patch, decommission
• New development - PbD
• Monitoring & Reporting
• Test
• Firs tline controls (KPI, SL, etc.)
• Board reporting to ISO and DPO
• Consolidating dashboard to top
management
In parts / iterations
CHANGE RISK
CONTROL
THE CHANGE
Change management
• Decisions
• Action plan
• Tone at the top
• Budget and skilled people
• Multinational coordination ?
GDPR project board deck (example)

More Related Content

PPTX
Privacy by Design - taking in account the state of the art
PPTX
Privacy by Design as a system design strategy - EIC 2019
PPTX
Privacy by Design: White Papaer
PPTX
Training privacy by design
PDF
Cross border - off-shoring and outsourcing privacy sensitive data
PDF
Csa privacy by design & gdpr austin chambers 11-4-17
PDF
7 Key GDPR Requirements & the Role of Data Governance
PDF
Common Practice in Data Privacy Program Management
Privacy by Design - taking in account the state of the art
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design: White Papaer
Training privacy by design
Cross border - off-shoring and outsourcing privacy sensitive data
Csa privacy by design & gdpr austin chambers 11-4-17
7 Key GDPR Requirements & the Role of Data Governance
Common Practice in Data Privacy Program Management

What's hot (19)

PPTX
Vuzion Love Cloud GDPR Event
PDF
Vulnerability management - beyond scanning
PDF
Enterprise Cybersecurity: From Strategy to Operating Model
PPTX
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
PDF
Toreon adding privacy by design in secure application development oss18 v20...
PDF
Urgensi RUU Perlindungan Data Pribadi
PDF
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
PDF
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
PDF
The Art of Cloud Auditing - ISACA ID
PDF
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
PPTX
Privacy by design for peerlyst meetup
PPT
3 oraclex evento reg puglia_v2017-09-14-2
PDF
Privacy by Design and by Default + General Data Protection Regulation with Si...
PPTX
General Data Protection Regulation (GDPR)
PPTX
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
PDF
Cybersecurity in Oil & Gas Company
PPT
Enlightened Privacy – by Design for a Smarter Grid
PPTX
Steal This Data - Email Security and DLP
PPT
2st Corporate Overview
Vuzion Love Cloud GDPR Event
Vulnerability management - beyond scanning
Enterprise Cybersecurity: From Strategy to Operating Model
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Toreon adding privacy by design in secure application development oss18 v20...
Urgensi RUU Perlindungan Data Pribadi
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
The Art of Cloud Auditing - ISACA ID
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Privacy by design for peerlyst meetup
3 oraclex evento reg puglia_v2017-09-14-2
Privacy by Design and by Default + General Data Protection Regulation with Si...
General Data Protection Regulation (GDPR)
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
Cybersecurity in Oil & Gas Company
Enlightened Privacy – by Design for a Smarter Grid
Steal This Data - Email Security and DLP
2st Corporate Overview
Ad

Similar to GDPR project board deck (example) (20)

PPTX
Valuing the data asset
PPTX
Secure Iowa Oct 2016
PPT
PPTX
Deconstructing Data Breach Cost
PDF
Co3 rsc r5
PPT
The data quality challenge
PPTX
Information Security Risk Management and Compliance.pptx
PPTX
Impact of data science in financial reporting
PPTX
Alpes strategie v5
PPTX
PrivIQ Product Overview Plataforma de Compliance LGPD
PDF
CNIT 160 4b: Security Program Management (Part 2)
PDF
CNIT 160 Ch 4b: Security Program Management
PDF
CNIT 160 Ch 4b: Security Program Management
PPTX
From Asset to Impact - Presentation to ICS Data Protection Conference 2011
PPTX
20250424 - CWF - GDPR - Data protection notice v2.pptx
PPT
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
PDF
Enterprise Data World 2018
PDF
Enterprise Risk Management.pdf
PDF
TrustedAgent GRC for Public Sector
PDF
TrustedAgent GRC for Public Sector
Valuing the data asset
Secure Iowa Oct 2016
Deconstructing Data Breach Cost
Co3 rsc r5
The data quality challenge
Information Security Risk Management and Compliance.pptx
Impact of data science in financial reporting
Alpes strategie v5
PrivIQ Product Overview Plataforma de Compliance LGPD
CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program Management
From Asset to Impact - Presentation to ICS Data Protection Conference 2011
20250424 - CWF - GDPR - Data protection notice v2.pptx
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
Enterprise Data World 2018
Enterprise Risk Management.pdf
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public Sector
Ad

More from Tommy Vandepitte (20)

DOCX
DPIA template
DOCX
Gegevensbescherming-clausule in (overheids)opdracht
PPTX
20190131 - Presentation Q&A on legislation's influence (on travel management)
PPTX
GDPR toegepast op huur-verhuur (Dutch)
PPTX
Controller-to-processor agreements
PPTX
Gegevensbescherming makelaars
PPTX
EEAS - Cultivate your data protection
PPTX
Presentation for the LSEC GDPR event - 20171130
PPTX
GDPR voor steden en gemeenten (Dutch)
PPTX
IS/DPP for staff #8 - Monitoring
PPTX
IS/DPP for staff #7 - Incidents
PPTX
IS/DPP for staff #6 - Acceptable use
PPTX
IS/DPP for staff #5b - Passwords
PPTX
IS/DPP for staff #5a - Access
PPTX
IS/DPP for staff #3b - Data Classification
PPTX
IS/DPP for staff #3a - Data
PPTX
IS/DPP for staff #2 - Why?
PPTX
IS/DPP for staff #1 - intro
PPTX
Training Procurement
PPTX
Training Information Asset Owners
DPIA template
Gegevensbescherming-clausule in (overheids)opdracht
20190131 - Presentation Q&A on legislation's influence (on travel management)
GDPR toegepast op huur-verhuur (Dutch)
Controller-to-processor agreements
Gegevensbescherming makelaars
EEAS - Cultivate your data protection
Presentation for the LSEC GDPR event - 20171130
GDPR voor steden en gemeenten (Dutch)
IS/DPP for staff #8 - Monitoring
IS/DPP for staff #7 - Incidents
IS/DPP for staff #6 - Acceptable use
IS/DPP for staff #5b - Passwords
IS/DPP for staff #5a - Access
IS/DPP for staff #3b - Data Classification
IS/DPP for staff #3a - Data
IS/DPP for staff #2 - Why?
IS/DPP for staff #1 - intro
Training Procurement
Training Information Asset Owners

Recently uploaded (20)

PPT
Criminal law and civil law under of collage corriculum
PDF
OpenAi v. Open AI Summary Judgment Order
PDF
CRIMINAL PROCEDURE BY HON. JUSTICE BAH.pdf
PPTX
Lecture 3 RulesRegulation-in-Meat-Inspection_Laylay-Edrian.pptx
PPTX
prenuptial agreement ppt my by a phd scholar
PPTX
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
PDF
AHRP LB - Quick Look of the Newly-initiated Koperasi Merah Putih (KMP).pdf
PPTX
PART-3-FILIPINO-ADMINISTRATIVE-CULTURE.pptx
PPT
Cyber-Crime-in- India at Present day and Laws
PDF
A SEP and FRAND Overview 13 Aug 2024.pdf
PDF
algor mortis or cooling of body after death THANATOLOGY
PDF
Constitution of India and fundamental rights pdf
PPTX
Learning-Plan-4-Core-Principles.pptx htts
PPTX
2.....FORMULATION OF THE RESEARCH PROBLEM.pptx
PDF
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
PDF
Vinayaka Mission Law School Courses and Infrastructure.pdf
PDF
Plausibility - A Review of the English and EPO cases
PDF
New York State Bar Association Journal, September 2014
PPTX
Ethiopian Civil procedure short note.pptx
PPTX
Ethiopian Law of Contract short note.pptx
Criminal law and civil law under of collage corriculum
OpenAi v. Open AI Summary Judgment Order
CRIMINAL PROCEDURE BY HON. JUSTICE BAH.pdf
Lecture 3 RulesRegulation-in-Meat-Inspection_Laylay-Edrian.pptx
prenuptial agreement ppt my by a phd scholar
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
AHRP LB - Quick Look of the Newly-initiated Koperasi Merah Putih (KMP).pdf
PART-3-FILIPINO-ADMINISTRATIVE-CULTURE.pptx
Cyber-Crime-in- India at Present day and Laws
A SEP and FRAND Overview 13 Aug 2024.pdf
algor mortis or cooling of body after death THANATOLOGY
Constitution of India and fundamental rights pdf
Learning-Plan-4-Core-Principles.pptx htts
2.....FORMULATION OF THE RESEARCH PROBLEM.pptx
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
Vinayaka Mission Law School Courses and Infrastructure.pdf
Plausibility - A Review of the English and EPO cases
New York State Bar Association Journal, September 2014
Ethiopian Civil procedure short note.pptx
Ethiopian Law of Contract short note.pptx

GDPR project board deck (example)

  • 1. INFORMATION SECURITY & DATA PROTETION DATA PROTECTION @TommyVandepitte
  • 2. BUSINESS Price Profit Cost External Cost Internal Cost (perceived) value for customer Value proposition Value creation Value delivery Value capture experience convenience meeting the customers’ needs product design meeting the qualifiers image additional functionalities future proofquality people meeting the users’ needs culture
  • 3. VALUE CAPTURE IS HARD Value captured = Value of the business
  • 4. THE SAUCE IS ALWAYS AT RISK • Financial risk • Solvability • Liquidity • Cash flow • Operational risk • Counterparty risk • Customers • Credit risk • Suppliers • Market risk • Reputational risk • Legal risk • ...
  • 5. THE WORLD IS “VUCA”
  • 6. 4 KEY CHALLENGES “Change comes from outside. And that is what you should use to challenge how your team has got to the end product.” - Prof. Stijn Viaene - Use 4 key challenges: • Experience IS value, not just functionality. The reference experience is NOT the sector, it is Google, Facebook, Uber, … • Customers are moving targets. • You can’t (and shouldn’t) have it all in-house: data, skills, … What is core and should be owned? What can we outsource? • You need well architected information systems.
  • 7. APPLY Whatwecomprehend What there is to know What we don’t know we know What we know we know What we don’t know we don’t know What we know we don’t know Unknown Unknown Known Known
  • 8. MODELS & FRAMEWORKS • Business threats a.o. disruption / creative destruction
  • 13. ISDPP IS (JUST) ANOTHER RISK • Customers • Who are your customers? • What do your customers value? • Why do your customers choose you? • Suppliers • Who are your customers? • What relationship do you have with your suppliers? (“value partition”) • Why do you have this relationship with your suppliers? • Competitive edge • Culture • Ideas • Operational excellence • Cost control • Trade secrets • Protectable intellectual property • … Part of the secret sauce
  • 14. INFORMATION MANAGEMENT ARCHITECTURE LIFECYCLE • Databases • Links • Silos v transversal Information asset ownership
  • 15. ISDPP “INTELLIGENCE” WHAT IS OUT THERE? • (Information) Threat Intelligence • network • peers • vendor information • threat reports • threat intelligence services • futurists • sci-fi • …
  • 16. Environment Physical Human Device Application Repository Carrier LAYERS & DIMENSIONS Risk Assessment Risk Decision Controls Incident Management Changes • In the regulatory environment • In processes • In people (JLT) • In technology Network Data 3rd Parties • 1st line • 2nd line • 3rd line • Impact • Probability • Avoid • Mitigate • Share • Accept
  • 17. LEGAL OVERVIEW Control Data Subject Processing personal data Data Controller Data processor Finality Legitimacy Transparency Organisation proportional End-to-end
  • 18. GDPR - NEW • Processor now also an addressee • Organisation • ”Accountability” (reversal of the burden of proof), concrete • Processing register (and risk register) • Privacy impact assessment (“PIA”) • Privacy by Design and Privacy by Default • Data Protection Officer • Acknowledgement of “frame”-mechanisms: certifications, codes of conduct, binding corporate rules,… • Incident management and data breach notification • Rights of individual are increased and further elaborated • Enforcement • Administrative fines universal and uniform • Collective actions of individuals universal and uniform
  • 19. GDPR – CHANGE - VISUAL Control Data Subject Processing personal data Data Controller Data processor Finality Legitimacy Transparency Organisation proportional End-to-end
  • 20. CHANGE PROGRAM PROJECT • Change management • HR review • Roles and function review, a.o. o DPO needed? o Information asset owners ? • HR processes review • Communication & Training • Processes review • Processing register • In iterations for legacy processes • Consent of data subjects • Incident management review • Project management review • PIA, PbD, • Documentation => register • Complaints management (rights update) • Outsourcing partner review • Access management • IT review • Archicture view • Security measures: comfortable? • Need to have • Nice to have BUSINESS AS USUAL • Tone at the top ! • “Money where your mouth is” • Decisions on data protection • Sponsor • HR • Communication & Training • Awareness (= top of mind) • Processes • Periodic review and update • IT • Security is moving target – upgrade, patch, decommission • New development - PbD • Monitoring & Reporting • Test • Firs tline controls (KPI, SL, etc.) • Board reporting to ISO and DPO • Consolidating dashboard to top management In parts / iterations
  • 22. CONTROL THE CHANGE Change management • Decisions • Action plan • Tone at the top • Budget and skilled people • Multinational coordination ?

Editor's Notes

  • #8: “As we know, there are known knowns; there are things we know we know. We also know there are known unknowns; that is to say we know there are some things we do not know. But there are also unknown unknowns—the ones we don’t know we don’t know.” – Donald Rumsfeld https://www.theatlantic.com/politics/archive/2014/03/rumsfelds-knowns-and-unknowns-the-intellectual-history-of-a-quip/359719/
  • #10: Dorfman 1997 Tolerate (retain), Treat (mitigate), Terminate (eliminate) and Transfer (by contract or insurance) Check GRC Tuesdays: a new approach to risk oversight: A lens to look through and levers to pull” SAP