SlideShare a Scribd company logo
CLOUD STORAGE &
SECURITY:
SOLVING COMPLIANCE
CHALLENGES
MEET THE PANEL
Director,
Information
Systems and
Security,
Jurinnov LLC
Eric Vanderburg
Partner, DLA
Piper
Giulio Coraggio
Presenters
Director of
Cloud & Data
Center Erasure
Solutions,
Blancco
Technology
Group
Fredrik Forslund
Moderator
WHAT WE’LL EXPLORE
The Realities & Pain Points of
Storing Data in the Cloud
How, Where & When Cloud Security
Could Be Compromised
Navigating Through Legal & Regulatory
Compliance
What to Consider in Deploying the Right
Cloud Storage Strategy
Recommendations to Store, Manage &
Protect Data in the Cloud
THE REALITIES & PAIN POINTS
OF STORING DATA IN THE
CLOUD
Source: SkyHigh Q4 2015 Cloud Report
15.8% OF FILES IN THE CLOUD CONTAIN SENSITIVE DATA
6
Source: SkyHigh Q4 2015 Cloud Report
SENSITIVE
DATA
7.6%
2.3%
1.6%
Protected Health
Information
Payment Data
Documents in File
Sharing Services
Personally
Identifiable
Information
4.3%
MANAGING DATA IN THE CLOUD IS
COMPLICATED & TOUGH
7
Organizations that experienced
breaches in the cloud cited malware
as the top private cloud attack
vector
Cloud Breaches
33%
Cite unauthorized access to data
from other tenants as the most
pressing concern with public cloud
deployments
Unauthorized Access
40%
Store or process
sensitive data in the
cloud
Sensitive Data
40%
Do not currently have visibility
into their public cloud
providers’ operations
Lack of Visibility
33%
*Source: SANS Institute, ‘Orchestrating Security in the Cloud’ Paper, 2015
Webinar Audience Poll
Question: What type of cloud strategy does your business implement?
Responses:
• Private
• Public
• Hybrid
• I don’t know
Hybrid Cloud
More scalable than private
Requires some higher upfront
costs
More control over data flows
Private Cloud
High degree of control
Higher upfront costs
More difficult to scale
Public Cloud
Highly scalable
Pay for what you use
Easy to deploy and manage
MANY CLOUD STRATEGIES TO CHOOSE
HOW, WHERE & WHEN
CLOUD SECURITY COULD BE
COMPROMISED
Webinar Audience Poll
Question: Has your company suffered a cloud data breach in the last 12 months?
Responses:
• Yes
• No
• I don’t know
INTERNAL & EXTERNAL THREATS CAN’T BE IGNORED
Source: SkyHigh Q4 2015 Cloud Report
WHEN/WHERE IS DATA MOST AT RISK?
During Data Migration During Data Use or
Storage
Data End-of-Life
Equipment End-of-Life
NAVIGATING THROUGH
LEGAL & REGULATORY
COMPLIANCE
15
ENTERPRISE BUSINESSES MUST GET ON BOARD
National Data Protection
Law
EU Data Protection
Regulation 2015
Right to be Forgotten
ISO Standard 27001,
27040 etc.
Sarbanes-Oxley
HIPAA (Health
Insurance Portabiltiy
and Accountability)
Credit Card Industry
PCI-DSS
01
02
03
04
ISO/IEC 27001: SETTING THE BAR HIGH
FOR SECURITY STANDARDS
16
TOP
MANAGEMENT
Must implement
information security
policy themselves
RISK MANAGEMENT
Relevant security
risks should be
addressed and
mitigated
INTERNAL
AUDITS
Must verify all
security risks have
been addressed and
operational
processes are set
DATA
REMOVAL
Sensitive data and
licensed software
must be securely
removed prior to
disposal or reuse
ISO 27018: PROTECTION OF PRIVACY &
PERSONAL DATA IN THE CLOUD
17
Home PC
Push Sync
Back Up All Files
Work Laptop
Push Sync
Work Files
Notebook
Smart Sync
Select Files
Tablet
Sync Local
Stream the Rest
Smartphon
e
Sync a Few
Stream the
Rest
!
My
Documents
My Photos My Music My Work
Files
Special
Project
Webinar Audience Poll
Question: How Prepared Is Your Organization for GDPR?
Responses:
• Fully Prepared
• Somewhat Prepared
• Early Preparation Stages
• Unprepared
• Don’t Know
Source: ‘EU GDPR: A Corporate Dilemma’, Blancco Technology Group, 2016
Somewhat Prepared;
Still Need to Find Right
Data Removal
Software
Fully Prepared
(Established Processes,
Policies & Technology)
Unprepared;
Don’t Know How
or Where to
Start
Don’t Know
On Right Track (Currently
Researching & Developing
Processes/Policies
WHAT CHANGES WITH THE GENERAL DATA
PROTECTION REGULATION?
20
New Sanctions for
Violations & Breaches
New Liabilities for Cloud
Providers
New Obligations/
Protections
Environmental Protection
Physical Protection
Network Protection
Hardware Protection
Breach Notification
Secure Communications
Computing Security
DATA PROTECTION REGULATION CONSIDERATIONS
Right to be Forgotten
WHAT TO CONSIDER IN
DEPLOYING THE RIGHT
CLOUD STORAGE STRATEGY
CAPACITY PLANNING
• Pre-allocate = Low ROI with
unused space
• Grow as you need = Inconsistent
IT spending and potentials for
compromise
BACKUP AND RECOVERY
• Archiving costs (equipment and time)
• Offsite storage or offsite location
• Testing and validation
PRIVATE CLOUD STORAGE HURDLES
DIRECT CAPITAL
EXPENDITURE
MAINTAINENCE AND
SUPPORT
ADEQUATE DUE DILIGENCE ON CLOUD PROVIDER AND
CONTRACT NEGOTIATION
25
DATA MANAGEMENT CONSIDERATIONS
Specialized
Skills Sets
Required
Data
Analytics
Data
Inventory
Future
Scalability
into Hybrid
Cloud
Cloud Software
Customization
RECOMMENDATIONS TO
STORE, MANAGE & PROTECT
DATA IN THE CLOUD
27
Know Your Vendors
Evaluate Cost Benefits
Implement Industry Standards
Prepare for Future (Scalability, Technology,
Security)
Establish a Way to Measure ROI
THINGS TO REMEMBER WHEN STORING, MANAGING &
PROTECTING DATA IN THE CLOUD
DATA LIFECYCLE IN THE CLOUD
3. Data Use/Storage
5. Data End-Of-Life
1. Data Creation
& Classification
6. Decommissioning of
Device/Server
4. Data at Rest
2. Data Migration
&
CONTENT YOU MAY FIND USEFUL:
“Cloud & Data Center Erasure: Why Delete Doesn’t Suffice”: http://www2.blancco.com/en/white-paper/cloud-and-data-center-
erasure-why-delete-doesnt-suffice
“The Information End Game: What You Need to Know to Protect Corporate Data Throughout its Lifecycle”:
http://www2.blancco.com/en/white-paper/the-information-end-game-what-you-need-to-know-to-protect-corporate-data
“Data Storage Dilemmas & Solutions”: http://www.slideshare.net/BlanccoTechnologyGroup/data-storage-dilemmas-solutions
“EU GDPR: A Corporate Dilemma”: http://www2.blancco.com/EU-GDPR-Corporate-Dilemma-Research-Study
Blancco Technology Group is a leading, global provider of
mobile device diagnostics and secure data erasure solutions.
We help our clients’ customers test, diagnose, repair and
repurpose IT devices with the most proven and certified
software. Our clientele consists of equipment manufacturers,
mobile network operators, retailers, financial institutions,
healthcare providers and government organizations
worldwide. The company is headquartered in Alpharetta, GA,
United States, with a distributed workforce and customer
base across the globe.
DLA Piper is a global law firm with lawyers in the Americas, Asia Pacific, Europe, Africa and the Middle East, positioning us
to help companies with their legal needs around the world. We strive to be the leading global business law firm by delivering
quality and value to our clients. We achieve this through practical and innovative legal solutions that help our clients
succeed. We deliver consistent services across our platform of practices and sectors in all matters we undertake.
Our clients range from multinational, Global 1000, and Fortune 500 enterprises to emerging companies developing industry-
leading technologies. They include more than half of the Fortune 250 and nearly half of the FTSE 350 or their subsidiaries.
We also advise governments and public sector bodies.
JURINNOV works with IT and legal departments in a
wide variety of industries and sectors. We become a link,
an extension of both departments. We help them adopt
the most current standards and tools. We help
companies better manage and track electronic
information, uncover evidence, plan for data recovery,
and relax a little bit like in the good old days when
everything was filed neatly in its place.
ABOUT US

More Related Content

PPTX
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
PPTX
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
PPTX
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
PDF
Crown jewels risk assessment - Cost-effective risk identification
PDF
Developing a 360° view of risk and compliance
PPTX
Finding and Protecting Your Organizations Crown Jewels
PPT
Cyber Security 2016 Cade Zvavanjanja1
PPTX
Correct the most common web development security mistakes - Eric Vanderburg
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Crown jewels risk assessment - Cost-effective risk identification
Developing a 360° view of risk and compliance
Finding and Protecting Your Organizations Crown Jewels
Cyber Security 2016 Cade Zvavanjanja1
Correct the most common web development security mistakes - Eric Vanderburg

What's hot (20)

PPTX
Contracting for Better Cybersecurity
PDF
What it Takes to be a CISO in 2017
PPT
comesa cybersecurity
PPTX
A CISO's Guide to Cyber Liability Insurance
PPTX
A guide to Sustainable Cyber Security
PDF
Building a Next-Generation Security Operations Center (SOC)
PDF
5 Steps to Securing Your Company's Crown Jewels
PDF
Cybersecurity: Quick Preparedness Assessment
PDF
Vulnerability management - beyond scanning
PDF
Data Science Transforming Security Operations
PPT
Securing Your "Crown Jewels": Do You Have What it Takes?
PDF
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
PDF
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
PDF
How to emrace risk-based Security management in a compliance-driven culture
PDF
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
PDF
Bridging the Gap Between Threat Intelligence and Risk Management
PDF
Partnership with a CFO: On the Front Line of Cybersecurity
PDF
Enumerating your shadow it attack surface
PDF
Leveraging Threat Intelligence to Guide Your Hunts
PDF
Simple Safe Steps to Cyber Security
Contracting for Better Cybersecurity
What it Takes to be a CISO in 2017
comesa cybersecurity
A CISO's Guide to Cyber Liability Insurance
A guide to Sustainable Cyber Security
Building a Next-Generation Security Operations Center (SOC)
5 Steps to Securing Your Company's Crown Jewels
Cybersecurity: Quick Preparedness Assessment
Vulnerability management - beyond scanning
Data Science Transforming Security Operations
Securing Your "Crown Jewels": Do You Have What it Takes?
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
How to emrace risk-based Security management in a compliance-driven culture
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
Bridging the Gap Between Threat Intelligence and Risk Management
Partnership with a CFO: On the Front Line of Cybersecurity
Enumerating your shadow it attack surface
Leveraging Threat Intelligence to Guide Your Hunts
Simple Safe Steps to Cyber Security
Ad

Viewers also liked (12)

PPTX
Untangled Conference - November 8, 2014 - Security Awareness
PPTX
Hacktivism: Motivations, Tactics and Threats
PPTX
Countering malware threats - Eric Vanderburg
PPTX
A Guide to Secure Remote Access - Eric Vanderburg
PPTX
Computer Security Primer - Eric Vanderburg - JURINNOV
PPTX
Server Hardening Primer - Eric Vanderburg - JURINNOV
PPTX
Physical security primer - JURINNOV - Eric Vanderburg
PPTX
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
PPTX
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
PPTX
Security Governance Primer - Eric Vanderburg - JURINNOV
PPTX
Ransomware: 2016's Greatest Malware Threat
PPTX
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Untangled Conference - November 8, 2014 - Security Awareness
Hacktivism: Motivations, Tactics and Threats
Countering malware threats - Eric Vanderburg
A Guide to Secure Remote Access - Eric Vanderburg
Computer Security Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOV
Physical security primer - JURINNOV - Eric Vanderburg
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Security Governance Primer - Eric Vanderburg - JURINNOV
Ransomware: 2016's Greatest Malware Threat
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Ad

Similar to Cloud Storage and Security: Solving Compliance Challenges (20)

PPTX
Data Subject Access Request - Aerenlpo
PPTX
HPE Security Keynote from Istanbul 20th Jan 2016
PPT
Presentation to Irish ISSA Conference 12-May-11
PDF
The Definitive Guide to Data Loss Prevention
PPTX
The EU General Protection Regulation and how Oracle can help
PPTX
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
PPTX
BREACHED: Data Centric Security for SAP
PPTX
BSIDES DETROIT 2015: Data breaches cost of doing business
PDF
Microsoft 365 Compliance
PDF
So you want to prove PDPL Compliance in KSA?
PPTX
MYTHBUSTERS: Can You Secure Payments in the Cloud?
PPT
Prevención de la pérdida de datos (DLP) con O365
PDF
2015 09-22 Is it time for a Security and Compliance Assessment?
PDF
Big Data LDN 2017: Applied AI for GDPR
PPTX
Innovation Without Compromise: The Challenges of Securing Big Data
PPTX
PrivIQ Product Overview Plataforma de Compliance LGPD
PDF
Veritas corporate brochure emea
PDF
Adp global security trust the platform for business innovation
PPTX
Cybersecurity and Data Protection Executive Briefing
 
PPTX
Introduction to Information Governance and eDiscovery in the Cloud
Data Subject Access Request - Aerenlpo
HPE Security Keynote from Istanbul 20th Jan 2016
Presentation to Irish ISSA Conference 12-May-11
The Definitive Guide to Data Loss Prevention
The EU General Protection Regulation and how Oracle can help
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
BREACHED: Data Centric Security for SAP
BSIDES DETROIT 2015: Data breaches cost of doing business
Microsoft 365 Compliance
So you want to prove PDPL Compliance in KSA?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
Prevención de la pérdida de datos (DLP) con O365
2015 09-22 Is it time for a Security and Compliance Assessment?
Big Data LDN 2017: Applied AI for GDPR
Innovation Without Compromise: The Challenges of Securing Big Data
PrivIQ Product Overview Plataforma de Compliance LGPD
Veritas corporate brochure emea
Adp global security trust the platform for business innovation
Cybersecurity and Data Protection Executive Briefing
 
Introduction to Information Governance and eDiscovery in the Cloud

More from Eric Vanderburg (16)

PPTX
GDPR, Data Privacy and Cybersecurity - MIT Symposium
PPTX
Modern Security the way Equifax Should Have
PPTX
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
PPTX
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
PPTX
Mobile Forensics and Cybersecurity
PPT
Emerging Technologies: Japan’s Position
PPT
Principles of technology management
PPT
Japanese railway technology
PPT
Evaluating japanese technological competitiveness
PPT
Japanese current and future technology management challenges
PPT
Technology management in Japan: Robotics
PPT
Incident response table top exercises
PPTX
Deconstructing website attacks - Eric Vanderburg
PPTX
The security professional's guide to programming - Eric Vanderburg
PPTX
Guide to protecting networks - Eric Vanderburg
PPTX
Ethical hacking Chapter 12 - Encryption - Eric Vanderburg
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Modern Security the way Equifax Should Have
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Mobile Forensics and Cybersecurity
Emerging Technologies: Japan’s Position
Principles of technology management
Japanese railway technology
Evaluating japanese technological competitiveness
Japanese current and future technology management challenges
Technology management in Japan: Robotics
Incident response table top exercises
Deconstructing website attacks - Eric Vanderburg
The security professional's guide to programming - Eric Vanderburg
Guide to protecting networks - Eric Vanderburg
Ethical hacking Chapter 12 - Encryption - Eric Vanderburg

Recently uploaded (20)

PPTX
A Presentation on Artificial Intelligence
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Machine learning based COVID-19 study performance prediction
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Modernizing your data center with Dell and AMD
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
A Presentation on Artificial Intelligence
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Chapter 3 Spatial Domain Image Processing.pdf
NewMind AI Monthly Chronicles - July 2025
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Encapsulation_ Review paper, used for researhc scholars
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Unlocking AI with Model Context Protocol (MCP)
Machine learning based COVID-19 study performance prediction
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
MYSQL Presentation for SQL database connectivity
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Understanding_Digital_Forensics_Presentation.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Approach and Philosophy of On baking technology
Modernizing your data center with Dell and AMD
20250228 LYD VKU AI Blended-Learning.pptx

Cloud Storage and Security: Solving Compliance Challenges

  • 1. CLOUD STORAGE & SECURITY: SOLVING COMPLIANCE CHALLENGES
  • 2. MEET THE PANEL Director, Information Systems and Security, Jurinnov LLC Eric Vanderburg Partner, DLA Piper Giulio Coraggio Presenters Director of Cloud & Data Center Erasure Solutions, Blancco Technology Group Fredrik Forslund Moderator
  • 3. WHAT WE’LL EXPLORE The Realities & Pain Points of Storing Data in the Cloud How, Where & When Cloud Security Could Be Compromised Navigating Through Legal & Regulatory Compliance What to Consider in Deploying the Right Cloud Storage Strategy Recommendations to Store, Manage & Protect Data in the Cloud
  • 4. THE REALITIES & PAIN POINTS OF STORING DATA IN THE CLOUD
  • 5. Source: SkyHigh Q4 2015 Cloud Report
  • 6. 15.8% OF FILES IN THE CLOUD CONTAIN SENSITIVE DATA 6 Source: SkyHigh Q4 2015 Cloud Report SENSITIVE DATA 7.6% 2.3% 1.6% Protected Health Information Payment Data Documents in File Sharing Services Personally Identifiable Information 4.3%
  • 7. MANAGING DATA IN THE CLOUD IS COMPLICATED & TOUGH 7 Organizations that experienced breaches in the cloud cited malware as the top private cloud attack vector Cloud Breaches 33% Cite unauthorized access to data from other tenants as the most pressing concern with public cloud deployments Unauthorized Access 40% Store or process sensitive data in the cloud Sensitive Data 40% Do not currently have visibility into their public cloud providers’ operations Lack of Visibility 33% *Source: SANS Institute, ‘Orchestrating Security in the Cloud’ Paper, 2015
  • 8. Webinar Audience Poll Question: What type of cloud strategy does your business implement? Responses: • Private • Public • Hybrid • I don’t know
  • 9. Hybrid Cloud More scalable than private Requires some higher upfront costs More control over data flows Private Cloud High degree of control Higher upfront costs More difficult to scale Public Cloud Highly scalable Pay for what you use Easy to deploy and manage MANY CLOUD STRATEGIES TO CHOOSE
  • 10. HOW, WHERE & WHEN CLOUD SECURITY COULD BE COMPROMISED
  • 11. Webinar Audience Poll Question: Has your company suffered a cloud data breach in the last 12 months? Responses: • Yes • No • I don’t know
  • 12. INTERNAL & EXTERNAL THREATS CAN’T BE IGNORED Source: SkyHigh Q4 2015 Cloud Report
  • 13. WHEN/WHERE IS DATA MOST AT RISK? During Data Migration During Data Use or Storage Data End-of-Life Equipment End-of-Life
  • 14. NAVIGATING THROUGH LEGAL & REGULATORY COMPLIANCE
  • 15. 15 ENTERPRISE BUSINESSES MUST GET ON BOARD National Data Protection Law EU Data Protection Regulation 2015 Right to be Forgotten ISO Standard 27001, 27040 etc. Sarbanes-Oxley HIPAA (Health Insurance Portabiltiy and Accountability) Credit Card Industry PCI-DSS
  • 16. 01 02 03 04 ISO/IEC 27001: SETTING THE BAR HIGH FOR SECURITY STANDARDS 16 TOP MANAGEMENT Must implement information security policy themselves RISK MANAGEMENT Relevant security risks should be addressed and mitigated INTERNAL AUDITS Must verify all security risks have been addressed and operational processes are set DATA REMOVAL Sensitive data and licensed software must be securely removed prior to disposal or reuse
  • 17. ISO 27018: PROTECTION OF PRIVACY & PERSONAL DATA IN THE CLOUD 17 Home PC Push Sync Back Up All Files Work Laptop Push Sync Work Files Notebook Smart Sync Select Files Tablet Sync Local Stream the Rest Smartphon e Sync a Few Stream the Rest ! My Documents My Photos My Music My Work Files Special Project
  • 18. Webinar Audience Poll Question: How Prepared Is Your Organization for GDPR? Responses: • Fully Prepared • Somewhat Prepared • Early Preparation Stages • Unprepared • Don’t Know
  • 19. Source: ‘EU GDPR: A Corporate Dilemma’, Blancco Technology Group, 2016 Somewhat Prepared; Still Need to Find Right Data Removal Software Fully Prepared (Established Processes, Policies & Technology) Unprepared; Don’t Know How or Where to Start Don’t Know On Right Track (Currently Researching & Developing Processes/Policies
  • 20. WHAT CHANGES WITH THE GENERAL DATA PROTECTION REGULATION? 20 New Sanctions for Violations & Breaches New Liabilities for Cloud Providers New Obligations/ Protections
  • 21. Environmental Protection Physical Protection Network Protection Hardware Protection Breach Notification Secure Communications Computing Security DATA PROTECTION REGULATION CONSIDERATIONS Right to be Forgotten
  • 22. WHAT TO CONSIDER IN DEPLOYING THE RIGHT CLOUD STORAGE STRATEGY
  • 23. CAPACITY PLANNING • Pre-allocate = Low ROI with unused space • Grow as you need = Inconsistent IT spending and potentials for compromise BACKUP AND RECOVERY • Archiving costs (equipment and time) • Offsite storage or offsite location • Testing and validation PRIVATE CLOUD STORAGE HURDLES DIRECT CAPITAL EXPENDITURE MAINTAINENCE AND SUPPORT
  • 24. ADEQUATE DUE DILIGENCE ON CLOUD PROVIDER AND CONTRACT NEGOTIATION
  • 25. 25 DATA MANAGEMENT CONSIDERATIONS Specialized Skills Sets Required Data Analytics Data Inventory Future Scalability into Hybrid Cloud Cloud Software Customization
  • 26. RECOMMENDATIONS TO STORE, MANAGE & PROTECT DATA IN THE CLOUD
  • 27. 27 Know Your Vendors Evaluate Cost Benefits Implement Industry Standards Prepare for Future (Scalability, Technology, Security) Establish a Way to Measure ROI THINGS TO REMEMBER WHEN STORING, MANAGING & PROTECTING DATA IN THE CLOUD
  • 28. DATA LIFECYCLE IN THE CLOUD 3. Data Use/Storage 5. Data End-Of-Life 1. Data Creation & Classification 6. Decommissioning of Device/Server 4. Data at Rest 2. Data Migration
  • 29. &
  • 30. CONTENT YOU MAY FIND USEFUL: “Cloud & Data Center Erasure: Why Delete Doesn’t Suffice”: http://www2.blancco.com/en/white-paper/cloud-and-data-center- erasure-why-delete-doesnt-suffice “The Information End Game: What You Need to Know to Protect Corporate Data Throughout its Lifecycle”: http://www2.blancco.com/en/white-paper/the-information-end-game-what-you-need-to-know-to-protect-corporate-data “Data Storage Dilemmas & Solutions”: http://www.slideshare.net/BlanccoTechnologyGroup/data-storage-dilemmas-solutions “EU GDPR: A Corporate Dilemma”: http://www2.blancco.com/EU-GDPR-Corporate-Dilemma-Research-Study
  • 31. Blancco Technology Group is a leading, global provider of mobile device diagnostics and secure data erasure solutions. We help our clients’ customers test, diagnose, repair and repurpose IT devices with the most proven and certified software. Our clientele consists of equipment manufacturers, mobile network operators, retailers, financial institutions, healthcare providers and government organizations worldwide. The company is headquartered in Alpharetta, GA, United States, with a distributed workforce and customer base across the globe. DLA Piper is a global law firm with lawyers in the Americas, Asia Pacific, Europe, Africa and the Middle East, positioning us to help companies with their legal needs around the world. We strive to be the leading global business law firm by delivering quality and value to our clients. We achieve this through practical and innovative legal solutions that help our clients succeed. We deliver consistent services across our platform of practices and sectors in all matters we undertake. Our clients range from multinational, Global 1000, and Fortune 500 enterprises to emerging companies developing industry- leading technologies. They include more than half of the Fortune 250 and nearly half of the FTSE 350 or their subsidiaries. We also advise governments and public sector bodies. JURINNOV works with IT and legal departments in a wide variety of industries and sectors. We become a link, an extension of both departments. We help them adopt the most current standards and tools. We help companies better manage and track electronic information, uncover evidence, plan for data recovery, and relax a little bit like in the good old days when everything was filed neatly in its place. ABOUT US

Editor's Notes

  • #2: Brief housekeeping items (how to submit Q&A questions and that we will have a number of audience poll Q’s
  • #3: See ‘Intro’ in webinar flow notes
  • #6: FREDRIK SLIDE.
  • #7: FREDRIK SLIDE
  • #8: ERIC V. TO USE THIS AS HE ANSWERS QUESTION
  • #9: OPEN WITH A POLL QUESTION TO LEAD INTO NEXT SLIDES/TALKING POINTS.
  • #10: FREDRIK ASKS ERIC QUESTION -- When a company looks to store data in the cloud, what should they know about the different types of cloud strategies – the pros and cons of each?
  • #12: OPEN WITH A POLL QUESTION TO LEAD INTO NEXT SLIDES/TALKING POINTS.
  • #13: FREDRIK TO ASK GIULIO IF THIS MATCHES WHAT HE HEARS FROM DLA PIPER CUSTOMERS AND WHY IT’S SOMETHING NOT ENOUGH BUSINESSES THINK ABOUT.
  • #16: ISO 27018 is already released and ensures protection of privacy and personal data. ISO 27017 is coming. It ensures security controls for cloud providers.
  • #17: GIULIO TO SPEAK HERE.
  • #18: ISO 27018 is already released and ensures protection of privacy and personal data. ISO 27017 is coming. It ensures security controls for cloud providers.
  • #20: GIULIO TO SPEAK HERE.
  • #24: ERIC V. TO DISCUSS HERE.
  • #29: END WITH FREDRIK – TALK ABOUT WHY CLOUD STORAGE/SECURITY CHALLENGES CAN’T BE ADDRESSED WITHOUT FIRST UNDERSTANDING DATA’S LIFECYCLE IN THE CLOUD.