SlideShare a Scribd company logo
Boards’ Eye view
of Digital Risk &
GDPR
Graham Mann
Managing Director & Co-founder
CyberSpace Defence Ltd.
International House, 24 Holborn Viaduct, London
EC1A 2BN
g.mann@cyberspacedefence.com
Mobile 07714210433
Why care about digital risk?
It makes good business sense
It demonstrates customer focus
It safeguards a key asset – data
It underpins the business
It secures IP and corporate secrets
Increased governance = decreased fines
Drivers for digital risk
Increasing importance of data and its relative worth
Impact of personal data loss on people’s lives
Action to address data risk at the governmental level –
compliance [GDPR in Europe]
Exponential increase in cyber attacks
Ever-increasing fines for non-compliance with local
governance
Lack of an holistic approach to security within many
organisations
The need for a digital
strategy
A plan or in the digital world a roadmap for the application
of information and technology.
This will inevitably include data and thereby have
implications for data risk management.
Critical to all businesses in this connected age
Underpins business agility
Enables good data governance by providing advanced
notice of new data requirements or new processing
requirements.
Digital ‘Risk’ Strategy
Supports the Digital Strategy
Digital risk is an organisation-wide responsibility
Digital risk needs a clear goal and a plan
It supports good governance [GDPR]
Vital for boards to manage digital risk
This is essentially about managing your data
ho’s responsible?
hat’s the relative importance?
here it resides
ho should have, and who has access?
Data can no longer be an
afterthought
Organisations are expected to protect data by design and
default.
In this context, by design means that whenever business
practices, IT processes or physical infrastructures are
conceptualised, maintaining privacy, and data security
must be integrated at the outset.
Requirement for data impact risk assessments to be
made.
Basic Questions
You’ll need to be able to answer some basic questions
about your data:
hat data is being processed?
hy?
y whom?
or what purpose?
ho is it being shared with?
Can it be justified under GDPR or other governance
Digital Assets – Data
Management
GDPR
Classification of data
Storage, Encryption, Back-up and Removal
ata retention policy
here is the data?
Access rights – who has access to the data and under
what conditions?
Data leaks –what’s the plan?
Risk Appetite
Digital Risk spend v likelihood, impact & cost of a breach.
Based on what data?
GDPR changes established views
t’s now about proving you did all you could to protect
personally identifiable data.
he tide has changed in favour of the individual
reach detection has been brought into sharp focus
Data must be a key part of the ‘risk management
framework’.
Risk Appetite (cont’d)
Critical to have an external review of Digital Risk to cross-
compare against the internal
Parameters to the digital risk decision
Current security position
Reasonable expectation of security
Data strategy and plans
External factors – types of attacks, sectors targeted,
Need for business agility
Investment [in security] need
Governance
Organisation
Roles & Responsibilities
Board responsibilities
Senior management responsibilities
Data Protection Officer (GDPR requirement in some circumstances)
IT Team responsibilities
Security Team responsibilities (if you have one)
Employee responsibilities
Executive Risk Committee [digital and physical]
Security Working Groups
Auditors [internal if you have one]
Communication between key groups
R, Legal, Finance, Security, IT, HR…..
reach plan and procedures
The Board
Must set the agenda on data governance and digital risk
Need to determine which committees will have
responsibility for reviewing the detail and implementation
of data protection measures.
Company Secretary has an instrumental role
Reporting to the Board on all matters pertaining to
GDPR, data governance and breaches.
The Human Element
Education, education. education
Social networking activity by employees
Social engineering (Phishing)
Pre-employment security checks
Recruitment of cyber security professionals
Outsourced Services
Open environment for reporting potential data breach
issues
Communications
Digital risk
Environment
Governance, Standards &
Certifications
It makes life easier adopting a standard like ISO 27001/2,
Cyber Essentials, NIST, etc.
If you haven’t already, you are strongly advised to adhere
to a certification/standard
A standard will provide structure to the cyber security
protecting your digital assets
You will almost certainly need to comply with GDPR -
General Data Protection Regulation
ompliance relating to personal data
GDPR – in a nutshell
Covers personal identifiable data on European subjects
held and/or processed by you or a body authorised by
you.
Fines are potentially eyewatering.
If you suffer a breach you need to notify the authorities
within 72 hours
You need to be able to demonstrate compliance, so
processes and record keeping are essential
You’re jointly responsible for your service provider
breaches
Personal data: If you don’t need it, don’t keep it
Personal Data
Individuals have the right under GDPR to:
ccess their own data, or
equest rectification or
rasure of data; and
he right to request a restriction to processing or
o ask for data to be handed over for use by another
processor.
Are you geared up for this?
Risk Landscape (Cyber
attacks and threats)
Despite more money being spent on cyber security - $$$
A plethora of very clever cyber security solutions
A huge base of highly-qualified cyber security
professionals
……the risk landscape is worse than ever:
why?
Well, Here’s Why…
the readily available and cheap attack tool-kits
the chronic lack of cyber security professionals
the high rewards to the hackers and criminals;
the insatiable drive for business agility;
the sheer number of cyber security solutions;
the complexity of our networks;
the explosion in the Internet of Things
…and an ever-increasing connected world.
The issue is compounded
by..
Sector-based implications and associated risk levels
Antiquated network/security architecture
Supply chain risk implications (soft underbelly)
Lack of sufficient digital risk due diligence in M&A
No data-centric approach
Too much reliance on IT, security people and a technical
solution
Organisations require a top-down approach to digital risk
Digital Risk
Planning
Plan for an attack
Response
all-out
ommunication
Internal and external
Defences
Identification
Forensics
Strategy
...and if all fails insurance
Supportive Technology
Technology isn’t the entire solution
stablished suppliers v start-up technology
echnology v Services
endering issues
Inclusive digital risk awareness/training programme
Continuous assessments
Acceptance that humans are the weakest link whatever
technology you put in place
An inclusive approach
Interaction between physical & digital risk [security]
Convergence of digital & physical security
Corporate structure – does it support the digital risk
strategy?
Digital Risk permeates every part of business and any
plan must be inclusive to succeed.
That means everyone
Fiduciary responsibility
Can’t emphasise enough the boards’ role
Need for a digital strategy and a digital risk strategy
Protect your digital assets
Sector comparisons
Justification process
ormula for allocations
Return on investment
Governance
Digital Risk Reporting
Essential at various levels throughout the organisation
Needs to be applicable to the subject matter
Should enable issues to be easily identified [drill down]
Linked to compliance/governance
Must be relevant to the audience it’s addressing [simple
traffic lights]
Jargon buster
Accurate and truthful
Public Trust
Get your marketing people engaged
GDPR is an opportunity to communicate with all you
stakeholders.
Be seen to embrace GDPR
Winning public trust is worth the effort.
In conclusion
Re-evaluate your approach, your structure and your
systems in relation to digital assets/risk
Digital risk must be a focal point of the business –
develop a strategy
It affects everyone and must encompass everyone
Digital risk is fluid and needs constant review
Recognise your defences are fragile - plan for an attack
Embrace the changes that GDPR will bring

More Related Content

PDF
Mergers and Acquisition Security - Areas of Interest
PPTX
Cybertopic_1security
PDF
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
PPTX
MCGlobalTech Service Presentation
PDF
M&A security - E-crime Congress 2017
PPTX
MCGlobalTech Consulting Service Presentation
PDF
New technologies - Amer Haza'a
PPTX
A guide to Sustainable Cyber Security
Mergers and Acquisition Security - Areas of Interest
Cybertopic_1security
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
MCGlobalTech Service Presentation
M&A security - E-crime Congress 2017
MCGlobalTech Consulting Service Presentation
New technologies - Amer Haza'a
A guide to Sustainable Cyber Security

What's hot (16)

PDF
The Business Case for Data Security
PDF
Enabling Science with Trust and Security – Guest Keynote
PPT
A Guide to Managed Security Services
PDF
Cybersecurity solution-guide
PPTX
ComResource Agency Solutions
PDF
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
PDF
Business case for information security program
PDF
MCGlobalTech Commercial Cybersecurity Capability Statement
PDF
Information Security Benchmarking 2015
PDF
Cybersecurity Preparedness Trends and Best Practices
PPT
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
PDF
Building an effective Information Security Roadmap
PDF
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
PDF
Protective Intelligence
PPTX
Robert Nichols: Cybersecurity for Government Contractors
The Business Case for Data Security
Enabling Science with Trust and Security – Guest Keynote
A Guide to Managed Security Services
Cybersecurity solution-guide
ComResource Agency Solutions
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Business case for information security program
MCGlobalTech Commercial Cybersecurity Capability Statement
Information Security Benchmarking 2015
Cybersecurity Preparedness Trends and Best Practices
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Building an effective Information Security Roadmap
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Protective Intelligence
Robert Nichols: Cybersecurity for Government Contractors
Ad

Similar to Boards' Eye View of Digital Risk & GDPR (20)

PPT
Boards' Eye View of Digital Risk & GDPR v2
PPTX
Risk assessments and applying organisational controls for GDPR compliance
PDF
CIR Magazine - Cyber Readiness, key to survival
PDF
eu-market-access-gdpr-fundamentals-by-risk-associates
PDF
2023 ITM Short Course - Week 1.pdf
PDF
Cybersecurity Rubicon: Emerging Threats
PDF
Cybersecurity op de bestuurstafel
PPTX
EU/US boards’ approach to cyber risk governance - webinar presentation
PPTX
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
PDF
4th Digital Finance Forum, Simon Brady
PDF
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
PPTX
Data protection within development
PPTX
A practical data privacy and security approach to ffiec, gdpr and ccpa
PPTX
Risk Product.pptx
PPTX
Global Threats| Cybersecurity|
PPTX
Best practices to mitigate data breach risk
PPTX
The Need for Information Security (powerpoint)
PPTX
Navigating-the-Digital-Frontier-A-Guide-to-Cyber-Security Surojit.pptx.pptx
PPTX
Risk Product Management - Creating Safe Digital Experiences, Product School 2019
PPTX
Cyber Safe Southwark
Boards' Eye View of Digital Risk & GDPR v2
Risk assessments and applying organisational controls for GDPR compliance
CIR Magazine - Cyber Readiness, key to survival
eu-market-access-gdpr-fundamentals-by-risk-associates
2023 ITM Short Course - Week 1.pdf
Cybersecurity Rubicon: Emerging Threats
Cybersecurity op de bestuurstafel
EU/US boards’ approach to cyber risk governance - webinar presentation
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
4th Digital Finance Forum, Simon Brady
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Data protection within development
A practical data privacy and security approach to ffiec, gdpr and ccpa
Risk Product.pptx
Global Threats| Cybersecurity|
Best practices to mitigate data breach risk
The Need for Information Security (powerpoint)
Navigating-the-Digital-Frontier-A-Guide-to-Cyber-Security Surojit.pptx.pptx
Risk Product Management - Creating Safe Digital Experiences, Product School 2019
Cyber Safe Southwark
Ad

Recently uploaded (20)

PPT
Lecture 3344;;,,(,(((((((((((((((((((((((
PPTX
operations management : demand supply ch
PDF
Solaris Resources Presentation - Corporate August 2025.pdf
PPTX
Sales & Distribution Management , LOGISTICS, Distribution, Sales Managers
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PDF
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
PPTX
CTG - Business Update 2Q2025 & 6M2025.pptx
PPTX
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
PDF
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
PPT
Lecture notes on Business Research Methods
PPTX
Principles of Marketing, Industrial, Consumers,
PPTX
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
PDF
Tata consultancy services case study shri Sharda college, basrur
PPTX
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
PDF
Technical Architecture - Chainsys dataZap
PPTX
basic introduction to research chapter 1.pptx
PPTX
2025 Product Deck V1.0.pptxCATALOGTCLCIA
PDF
Susan Semmelmann: Enriching the Lives of others through her Talents and Bless...
PDF
Introduction to Generative Engine Optimization (GEO)
Lecture 3344;;,,(,(((((((((((((((((((((((
operations management : demand supply ch
Solaris Resources Presentation - Corporate August 2025.pdf
Sales & Distribution Management , LOGISTICS, Distribution, Sales Managers
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
CTG - Business Update 2Q2025 & 6M2025.pptx
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
Lecture notes on Business Research Methods
Principles of Marketing, Industrial, Consumers,
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
Tata consultancy services case study shri Sharda college, basrur
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
Technical Architecture - Chainsys dataZap
basic introduction to research chapter 1.pptx
2025 Product Deck V1.0.pptxCATALOGTCLCIA
Susan Semmelmann: Enriching the Lives of others through her Talents and Bless...
Introduction to Generative Engine Optimization (GEO)

Boards' Eye View of Digital Risk & GDPR

  • 1. Boards’ Eye view of Digital Risk & GDPR Graham Mann Managing Director & Co-founder CyberSpace Defence Ltd. International House, 24 Holborn Viaduct, London EC1A 2BN g.mann@cyberspacedefence.com Mobile 07714210433
  • 2. Why care about digital risk? It makes good business sense It demonstrates customer focus It safeguards a key asset – data It underpins the business It secures IP and corporate secrets Increased governance = decreased fines
  • 3. Drivers for digital risk Increasing importance of data and its relative worth Impact of personal data loss on people’s lives Action to address data risk at the governmental level – compliance [GDPR in Europe] Exponential increase in cyber attacks Ever-increasing fines for non-compliance with local governance Lack of an holistic approach to security within many organisations
  • 4. The need for a digital strategy A plan or in the digital world a roadmap for the application of information and technology. This will inevitably include data and thereby have implications for data risk management. Critical to all businesses in this connected age Underpins business agility Enables good data governance by providing advanced notice of new data requirements or new processing requirements.
  • 5. Digital ‘Risk’ Strategy Supports the Digital Strategy Digital risk is an organisation-wide responsibility Digital risk needs a clear goal and a plan It supports good governance [GDPR] Vital for boards to manage digital risk This is essentially about managing your data ho’s responsible? hat’s the relative importance? here it resides ho should have, and who has access?
  • 6. Data can no longer be an afterthought Organisations are expected to protect data by design and default. In this context, by design means that whenever business practices, IT processes or physical infrastructures are conceptualised, maintaining privacy, and data security must be integrated at the outset. Requirement for data impact risk assessments to be made.
  • 7. Basic Questions You’ll need to be able to answer some basic questions about your data: hat data is being processed? hy? y whom? or what purpose? ho is it being shared with? Can it be justified under GDPR or other governance
  • 8. Digital Assets – Data Management GDPR Classification of data Storage, Encryption, Back-up and Removal ata retention policy here is the data? Access rights – who has access to the data and under what conditions? Data leaks –what’s the plan?
  • 9. Risk Appetite Digital Risk spend v likelihood, impact & cost of a breach. Based on what data? GDPR changes established views t’s now about proving you did all you could to protect personally identifiable data. he tide has changed in favour of the individual reach detection has been brought into sharp focus Data must be a key part of the ‘risk management framework’.
  • 10. Risk Appetite (cont’d) Critical to have an external review of Digital Risk to cross- compare against the internal Parameters to the digital risk decision Current security position Reasonable expectation of security Data strategy and plans External factors – types of attacks, sectors targeted, Need for business agility Investment [in security] need Governance
  • 12. Roles & Responsibilities Board responsibilities Senior management responsibilities Data Protection Officer (GDPR requirement in some circumstances) IT Team responsibilities Security Team responsibilities (if you have one) Employee responsibilities Executive Risk Committee [digital and physical] Security Working Groups Auditors [internal if you have one] Communication between key groups R, Legal, Finance, Security, IT, HR….. reach plan and procedures
  • 13. The Board Must set the agenda on data governance and digital risk Need to determine which committees will have responsibility for reviewing the detail and implementation of data protection measures. Company Secretary has an instrumental role Reporting to the Board on all matters pertaining to GDPR, data governance and breaches.
  • 14. The Human Element Education, education. education Social networking activity by employees Social engineering (Phishing) Pre-employment security checks Recruitment of cyber security professionals Outsourced Services Open environment for reporting potential data breach issues Communications
  • 16. Governance, Standards & Certifications It makes life easier adopting a standard like ISO 27001/2, Cyber Essentials, NIST, etc. If you haven’t already, you are strongly advised to adhere to a certification/standard A standard will provide structure to the cyber security protecting your digital assets You will almost certainly need to comply with GDPR - General Data Protection Regulation ompliance relating to personal data
  • 17. GDPR – in a nutshell Covers personal identifiable data on European subjects held and/or processed by you or a body authorised by you. Fines are potentially eyewatering. If you suffer a breach you need to notify the authorities within 72 hours You need to be able to demonstrate compliance, so processes and record keeping are essential You’re jointly responsible for your service provider breaches Personal data: If you don’t need it, don’t keep it
  • 18. Personal Data Individuals have the right under GDPR to: ccess their own data, or equest rectification or rasure of data; and he right to request a restriction to processing or o ask for data to be handed over for use by another processor. Are you geared up for this?
  • 19. Risk Landscape (Cyber attacks and threats) Despite more money being spent on cyber security - $$$ A plethora of very clever cyber security solutions A huge base of highly-qualified cyber security professionals ……the risk landscape is worse than ever: why?
  • 20. Well, Here’s Why… the readily available and cheap attack tool-kits the chronic lack of cyber security professionals the high rewards to the hackers and criminals; the insatiable drive for business agility; the sheer number of cyber security solutions; the complexity of our networks; the explosion in the Internet of Things …and an ever-increasing connected world.
  • 21. The issue is compounded by.. Sector-based implications and associated risk levels Antiquated network/security architecture Supply chain risk implications (soft underbelly) Lack of sufficient digital risk due diligence in M&A No data-centric approach Too much reliance on IT, security people and a technical solution Organisations require a top-down approach to digital risk
  • 23. Plan for an attack Response all-out ommunication Internal and external Defences Identification Forensics Strategy ...and if all fails insurance
  • 24. Supportive Technology Technology isn’t the entire solution stablished suppliers v start-up technology echnology v Services endering issues Inclusive digital risk awareness/training programme Continuous assessments Acceptance that humans are the weakest link whatever technology you put in place
  • 25. An inclusive approach Interaction between physical & digital risk [security] Convergence of digital & physical security Corporate structure – does it support the digital risk strategy? Digital Risk permeates every part of business and any plan must be inclusive to succeed. That means everyone
  • 26. Fiduciary responsibility Can’t emphasise enough the boards’ role Need for a digital strategy and a digital risk strategy Protect your digital assets Sector comparisons Justification process ormula for allocations Return on investment Governance
  • 27. Digital Risk Reporting Essential at various levels throughout the organisation Needs to be applicable to the subject matter Should enable issues to be easily identified [drill down] Linked to compliance/governance Must be relevant to the audience it’s addressing [simple traffic lights] Jargon buster Accurate and truthful
  • 28. Public Trust Get your marketing people engaged GDPR is an opportunity to communicate with all you stakeholders. Be seen to embrace GDPR Winning public trust is worth the effort.
  • 29. In conclusion Re-evaluate your approach, your structure and your systems in relation to digital assets/risk Digital risk must be a focal point of the business – develop a strategy It affects everyone and must encompass everyone Digital risk is fluid and needs constant review Recognise your defences are fragile - plan for an attack Embrace the changes that GDPR will bring