SlideShare a Scribd company logo
GET IT RIGHT THE FIRST TIME
Hosted by: Peter Geelen, Edwin Jerald
7 April 2022 12 PM CST
D A T A C O M P L I A N C E : T H E S E R I E S
Introduction
1
Data is the new oil…
2
How to get started in practice
4
Data management essentials
3
Some take-aways
5
What we'll
discuss today
Hexnode and compliance
6
https://www.linkedin.com/in/pgeelen/
Sustainable secure & safe. Life hacker.
Anything information security, data
protection & privacy, cyber & cloud
security. IAM, trainer & coach.
About me
Peter GEELEN
ISMS/PIMS Master, cDPO,
Accredited Lead Auditor
ISMS/PIMS/BCMS/QMS
Data is the new oil
Whatever
business you
run…
.. it won't run
without data
•Business data
•Management data
•HR data
•Technical data
•Network data
•Personal data (PII)
•Communications
•Mail data
•Financial data
•Operational data
•Intelligence
•Intellectual Property
(IP)
•Ideas
•…
Other businesses want your data as well
Also other businesses need
your data…
Massive growth of digital business
• Direct marketing
• Data brokers
• Data Intelligence
• Data analytics
• Big data
• Artificial intelligence
• Machine learning
• Health care, research & development
• …
But also … the dark side
wants your
DATA
Your data in the wrong hands
Current state of crime
• Phishing
• Ransomware
– not only encryption
– data leak extortion
• Reconnaissance & Hacking
• Data breaches
• Biometric data
• Digital & Economical war
Now the question is…
How
do
YOU
get
in control?
You can't simply lock it up…
because
data
needs to flow
Data management essentials to get grip
How much €$ can you spend
to protect your data?
You can
only protect
what
you know
you have
Without
an owner
there is
no protection
Nothing is
stable
Everything has
a lifecycle
Create
Store
Update & Change
Archive
Dispose
The start
of the cycle is mostly
short,
easy to manage
low security risk.
The end
of the cycle is mostly
long,
difficult to manage
high security risk.
Eeh…
What is risk?
Assets have
Vulnerabilities (weaknesses/properties)
that can be exploited by
Threats (activities)
with impact ($$ cost)
You need to balance
the protection
against
the impact
You don't want to
over-spend
or
under-protect
Your boss (or insurance)
needs a budget
Spreading cost
over a year
Or 2..3..4..5.
Your boss (or insurance)e)
needs a budget
Spreading cost
over a year
Or 2..3..4..5.
How to get started
•International regulations (GDPR, …)
•National regulations (SOC, …)
•Sector regulations (PCI-DSS, ..)
•Contractual obligations
•Enterprise vs PII/personal data requirements
Getting grip on your data
Know the external context
Getting grip on your data
Know the internal context
•Know your business (what)
•Know your organization (organigram)
•Make an inventory of processes and interfaces
•Assign business ownership
–For each process
–For each asset
Getting grip on your data
Know the processes
•Know the data flow
•Know your sources (IN)
•Know the data processing
•Know your receivers (OUT)
Getting grip on your data
Know the data in the processes
•Categorize your data - data types
– Enterprise data
– PII / Personal data (GDPR !)
– Other ?
Getting grip on your data
Categorization (define data classes)
•Sensitivity = linked to business impact
•Ask the owner : "What if data is …"
– unavailable
– changed
– destroyed
– leaked
– accessed unauthorized, illegally, unlawfully,…
Getting grip on your data
Categorization (define data classes)
•Categorize your data sensitivity
– Enterprise data, for example
• Unclassified, Official, Restricted, Confidential, Secret, Top
Secret (NATO)
• Public, Company internal, Confidential, Strictly confidential
• TLP RED, TLP Amber, TLB Green, TLP White (public)
Getting grip on your data
Classification (apply the labels)
•Responsibility of owner
•Label all data
•Label containers if you can't label the data
– Folder or File share
– Data base
– mailbox
– …
Getting grip on your data
Mind the lifecycle
• Get started
• Keep going
• Start over again
• Think about security when
– creating new processes
– changing processes
– removing processes
– recheck on a regular schedule (even when nothing changes)
Getting grip on your data
Mind the business and legal requirement
•Accountability & Responsibility
•Reporting & audit requirements (SOC I-II, …)
•Incident management requirements
•Data breach requirements (GDPR)
•Subject rights
Getting grip on your data
Mind the business and legal requirement
Source https://www.icfiles.net/security/what-is-soc-2/
Consequences of data management failure
•Financial loss
•Business loss
•Reputation loss
•Contract SLA violation
•Regulatory violations
•Fines
•Prosecution
•Personal accountability
Consequences of data management failure
Think about
•Direct and indirect impact
•Short term and long term impact
•How long can you survive a total breakdown?
TAKEAWAYS
KISS (Keep it simple and stuff..)
• Manage enterprise data like personal data
• Keep the categories simple (<7)
– 3 TLP (Red-Amber-Green) + 2 categories (public + highly critical)
• Define and maintain ownership
• Involve everyone
• Evangelize internal & external stakeholders (incl.
customers…)
• Lead by example
Use business best practices
•Use standards and frameworks
•ISO (international)
•NIST (US)
•ENISA (EU)
•COBIT (ISACA)
•…
Classification and labeling
•Force labeling
•Aim to classify everything
•Start with new data first
•Update labels when you change documents
•Set a default label for archived data that
doesn't change
•Don't set public as default
Think about the support
processes
• Incident management (ISO 27035 & NIST)
•Data breach management (GDPR & other …)
• Business continuity (ISO22301)
•Disaster recovery
HOW HEXNODE
HELPS
COMPANIES
ACHIEVE
DATA COMPLIANCE
" From desktops to mobile devices to IoT,
the device ecosystem
is vast and heterogeneous. "
Staying compliant with regulatory guidelines may be difficult, especially if
devices are not within the confines of the organization.
Here's how Hexnode can help
•Manage applications and ensure application
security
•Ensure network and device security
•Enforce data security and compliance
RISK:
UNAUTHORIZED ACCESS TO
UNATTENDED DEVICES
• Enforce strong password policies on devices.
• Enable data encryption on managed devices.
• Containerize and secure corporate data on personal
devices.
• Track device location and lock down devices when
outside work zones.
How
Hexnode
can
HELP
RISK:
DATA ACCESS THROUGH
UNSECURE APPLICATIONS
• Uninstall or blacklist unsecure applications.
• Set up application permissions and configurations.
• Monitor and control per-app data usage.
• Disable file sharing options on managed devices.
• Disable copy/paste options to control data flow.
• Secure data by locking devices down in kiosk mode.
How
Hexnode
can
HELP
RISK:
DEVICES DO NOT MEET SECURITY REQUIREMENTS
• Patch any known vulnerabilities by updating device
software and OS.
• Enforce restrictions and security configurations on managed
devices.
• Prevent users from tampering with sensitive device features
like USB debugging, factory reset, etc.
How
Hexnode
can
HELP
RISK:
CHANCE OF COMPROMISE WHILE DATA IS IN-
TRANSIT
• Configure email and contacts and calendars
• Push Wi-Fi and VPN configurations and prevent devices
from connecting to unsecured networks.
• Push web content filtering policies to keep corporate data
safe from fraudulent websites.
How
Hexnode
can
HELP
RISK:
UNMANAGED ACCESS TO
SENSITIVE INFORMATION
• Streamline access management using integrations with
directory services (Azure AD, Okta, G-Suite).
• Deploy certificates to manage user access to corporate tools
and services.
• Configure user and device groups on Hexnode to deploy
resources based on roles and privileges.
How
Hexnode
can
HELP
RISK:
LACK OF VISIBILITY ON POLICIES
AND OPERATIONS
• Monitor the security and compliant state of managed
devices.
• Identify non-compliant devices and perform corrective
actions on them.
• Remotely enable lost mode to protect corporate data on
stolen or lost devices.
• Generate reports on device status and health.
How
Hexnode
can
HELP
" Hexnode makes it easier for organizations
to maintain compliance with
regulatory requirements "
Data compliance - get it right the first time (Full color PDF)
Q n A

More Related Content

PDF
Data compliance - get it right the first time (Black/White printable PDF)
PDF
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
PPTX
CBC GDPR The Physics
PPTX
Improve IT Security and Compliance with Mainframe Data in Splunk
PPTX
20250424 - CWF - GDPR - Data protection notice v2.pptx
PPTX
Vuzion Love Cloud GDPR Event
PPTX
Microsoft Cloud GDPR Compliance Options (SUGUK)
Data compliance - get it right the first time (Black/White printable PDF)
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
CBC GDPR The Physics
Improve IT Security and Compliance with Mainframe Data in Splunk
20250424 - CWF - GDPR - Data protection notice v2.pptx
Vuzion Love Cloud GDPR Event
Microsoft Cloud GDPR Compliance Options (SUGUK)

Similar to Data compliance - get it right the first time (Full color PDF) (20)

PPTX
Protecting the Crown Jewels – Enlist the Beefeaters
PDF
How to implement gdpr in your document repository
PDF
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
PPTX
Privacy for tech startups
PPTX
BSIDES DETROIT 2015: Data breaches cost of doing business
PPTX
Gdpr presentation
PPTX
GDPR Privacy Introduction
PPTX
Protect your Database with Data Masking & Enforced Version Control
PPTX
GDPR Enforcement is here. Are you ready?
PPTX
Privacies are Coming
PPTX
GDPR - Why it matters and how to make it Easy
PPTX
GDPR in the Healthcare Industry
PDF
Transform Unstructured Data Into Relevant Data with IBM StoredIQ
PDF
#HR and #GDPR: Preparing for 2018 Compliance
PPT
Data security in the cloud
PPTX
The Need for Information Security (powerpoint)
PDF
GDPR- The Buck Stops Here
PPTX
Presentation on Information Privacy
PDF
Classification-HowToBoostInformationProtection
PPTX
Gain Visibility & Control of IT Assets in a Perimeterless World
Protecting the Crown Jewels – Enlist the Beefeaters
How to implement gdpr in your document repository
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Privacy for tech startups
BSIDES DETROIT 2015: Data breaches cost of doing business
Gdpr presentation
GDPR Privacy Introduction
Protect your Database with Data Masking & Enforced Version Control
GDPR Enforcement is here. Are you ready?
Privacies are Coming
GDPR - Why it matters and how to make it Easy
GDPR in the Healthcare Industry
Transform Unstructured Data Into Relevant Data with IBM StoredIQ
#HR and #GDPR: Preparing for 2018 Compliance
Data security in the cloud
The Need for Information Security (powerpoint)
GDPR- The Buck Stops Here
Presentation on Information Privacy
Classification-HowToBoostInformationProtection
Gain Visibility & Control of IT Assets in a Perimeterless World
Ad

More from Peter GEELEN ✔ (8)

PPTX
AI, Cloud and Modern Workplace Conference 2025 – Securing your cloud is not g...
PDF
PECB Webinar ISO27001 and how 27032 can help vFinal.pdf
PPTX
Red flags and attention points in cloud security audit, watch the security ga...
PDF
20210325 Slides - (ISC) BeLux Chapter - Using Enterprise Security for cyberse...
PDF
20201014 iso27001 iso27701 nist v2 (extended version)
PDF
20200206 privatum privacy after work - notes 3p
PPTX
Risk management basics
PPT
Identity Days 2019 - Sécurisation MiM (Peter Geelen)
AI, Cloud and Modern Workplace Conference 2025 – Securing your cloud is not g...
PECB Webinar ISO27001 and how 27032 can help vFinal.pdf
Red flags and attention points in cloud security audit, watch the security ga...
20210325 Slides - (ISC) BeLux Chapter - Using Enterprise Security for cyberse...
20201014 iso27001 iso27701 nist v2 (extended version)
20200206 privatum privacy after work - notes 3p
Risk management basics
Identity Days 2019 - Sécurisation MiM (Peter Geelen)
Ad

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
KodekX | Application Modernization Development
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Chapter 3 Spatial Domain Image Processing.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Network Security Unit 5.pdf for BCA BBA.
KodekX | Application Modernization Development
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Spectral efficient network and resource selection model in 5G networks
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
cuic standard and advanced reporting.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Reach Out and Touch Someone: Haptics and Empathic Computing
20250228 LYD VKU AI Blended-Learning.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Weekly Chronicles - August'25 Week I
MYSQL Presentation for SQL database connectivity
Understanding_Digital_Forensics_Presentation.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation

Data compliance - get it right the first time (Full color PDF)

  • 1. GET IT RIGHT THE FIRST TIME Hosted by: Peter Geelen, Edwin Jerald 7 April 2022 12 PM CST D A T A C O M P L I A N C E : T H E S E R I E S
  • 2. Introduction 1 Data is the new oil… 2 How to get started in practice 4 Data management essentials 3 Some take-aways 5 What we'll discuss today Hexnode and compliance 6
  • 3. https://www.linkedin.com/in/pgeelen/ Sustainable secure & safe. Life hacker. Anything information security, data protection & privacy, cyber & cloud security. IAM, trainer & coach. About me Peter GEELEN ISMS/PIMS Master, cDPO, Accredited Lead Auditor ISMS/PIMS/BCMS/QMS
  • 4. Data is the new oil
  • 6. .. it won't run without data •Business data •Management data •HR data •Technical data •Network data •Personal data (PII) •Communications •Mail data •Financial data •Operational data •Intelligence •Intellectual Property (IP) •Ideas •…
  • 7. Other businesses want your data as well
  • 8. Also other businesses need your data…
  • 9. Massive growth of digital business • Direct marketing • Data brokers • Data Intelligence • Data analytics • Big data • Artificial intelligence • Machine learning • Health care, research & development • …
  • 10. But also … the dark side wants your DATA
  • 11. Your data in the wrong hands
  • 12. Current state of crime • Phishing • Ransomware – not only encryption – data leak extortion • Reconnaissance & Hacking • Data breaches • Biometric data • Digital & Economical war
  • 13. Now the question is… How do YOU get in control?
  • 14. You can't simply lock it up…
  • 17. How much €$ can you spend to protect your data?
  • 22. The start of the cycle is mostly short, easy to manage low security risk.
  • 23. The end of the cycle is mostly long, difficult to manage high security risk.
  • 25. Assets have Vulnerabilities (weaknesses/properties) that can be exploited by Threats (activities) with impact ($$ cost)
  • 26. You need to balance the protection against the impact
  • 27. You don't want to over-spend or under-protect
  • 28. Your boss (or insurance) needs a budget Spreading cost over a year Or 2..3..4..5.
  • 29. Your boss (or insurance)e) needs a budget Spreading cost over a year Or 2..3..4..5.
  • 30. How to get started
  • 31. •International regulations (GDPR, …) •National regulations (SOC, …) •Sector regulations (PCI-DSS, ..) •Contractual obligations •Enterprise vs PII/personal data requirements Getting grip on your data Know the external context
  • 32. Getting grip on your data Know the internal context •Know your business (what) •Know your organization (organigram) •Make an inventory of processes and interfaces •Assign business ownership –For each process –For each asset
  • 33. Getting grip on your data Know the processes •Know the data flow •Know your sources (IN) •Know the data processing •Know your receivers (OUT)
  • 34. Getting grip on your data Know the data in the processes •Categorize your data - data types – Enterprise data – PII / Personal data (GDPR !) – Other ?
  • 35. Getting grip on your data Categorization (define data classes) •Sensitivity = linked to business impact •Ask the owner : "What if data is …" – unavailable – changed – destroyed – leaked – accessed unauthorized, illegally, unlawfully,…
  • 36. Getting grip on your data Categorization (define data classes) •Categorize your data sensitivity – Enterprise data, for example • Unclassified, Official, Restricted, Confidential, Secret, Top Secret (NATO) • Public, Company internal, Confidential, Strictly confidential • TLP RED, TLP Amber, TLB Green, TLP White (public)
  • 37. Getting grip on your data Classification (apply the labels) •Responsibility of owner •Label all data •Label containers if you can't label the data – Folder or File share – Data base – mailbox – …
  • 38. Getting grip on your data Mind the lifecycle • Get started • Keep going • Start over again • Think about security when – creating new processes – changing processes – removing processes – recheck on a regular schedule (even when nothing changes)
  • 39. Getting grip on your data Mind the business and legal requirement •Accountability & Responsibility •Reporting & audit requirements (SOC I-II, …) •Incident management requirements •Data breach requirements (GDPR) •Subject rights
  • 40. Getting grip on your data Mind the business and legal requirement Source https://www.icfiles.net/security/what-is-soc-2/
  • 41. Consequences of data management failure •Financial loss •Business loss •Reputation loss •Contract SLA violation •Regulatory violations •Fines •Prosecution •Personal accountability
  • 42. Consequences of data management failure Think about •Direct and indirect impact •Short term and long term impact •How long can you survive a total breakdown?
  • 44. KISS (Keep it simple and stuff..) • Manage enterprise data like personal data • Keep the categories simple (<7) – 3 TLP (Red-Amber-Green) + 2 categories (public + highly critical) • Define and maintain ownership • Involve everyone • Evangelize internal & external stakeholders (incl. customers…) • Lead by example
  • 45. Use business best practices •Use standards and frameworks •ISO (international) •NIST (US) •ENISA (EU) •COBIT (ISACA) •…
  • 46. Classification and labeling •Force labeling •Aim to classify everything •Start with new data first •Update labels when you change documents •Set a default label for archived data that doesn't change •Don't set public as default
  • 47. Think about the support processes • Incident management (ISO 27035 & NIST) •Data breach management (GDPR & other …) • Business continuity (ISO22301) •Disaster recovery
  • 49. " From desktops to mobile devices to IoT, the device ecosystem is vast and heterogeneous. " Staying compliant with regulatory guidelines may be difficult, especially if devices are not within the confines of the organization.
  • 50. Here's how Hexnode can help •Manage applications and ensure application security •Ensure network and device security •Enforce data security and compliance
  • 51. RISK: UNAUTHORIZED ACCESS TO UNATTENDED DEVICES • Enforce strong password policies on devices. • Enable data encryption on managed devices. • Containerize and secure corporate data on personal devices. • Track device location and lock down devices when outside work zones. How Hexnode can HELP
  • 52. RISK: DATA ACCESS THROUGH UNSECURE APPLICATIONS • Uninstall or blacklist unsecure applications. • Set up application permissions and configurations. • Monitor and control per-app data usage. • Disable file sharing options on managed devices. • Disable copy/paste options to control data flow. • Secure data by locking devices down in kiosk mode. How Hexnode can HELP
  • 53. RISK: DEVICES DO NOT MEET SECURITY REQUIREMENTS • Patch any known vulnerabilities by updating device software and OS. • Enforce restrictions and security configurations on managed devices. • Prevent users from tampering with sensitive device features like USB debugging, factory reset, etc. How Hexnode can HELP
  • 54. RISK: CHANCE OF COMPROMISE WHILE DATA IS IN- TRANSIT • Configure email and contacts and calendars • Push Wi-Fi and VPN configurations and prevent devices from connecting to unsecured networks. • Push web content filtering policies to keep corporate data safe from fraudulent websites. How Hexnode can HELP
  • 55. RISK: UNMANAGED ACCESS TO SENSITIVE INFORMATION • Streamline access management using integrations with directory services (Azure AD, Okta, G-Suite). • Deploy certificates to manage user access to corporate tools and services. • Configure user and device groups on Hexnode to deploy resources based on roles and privileges. How Hexnode can HELP
  • 56. RISK: LACK OF VISIBILITY ON POLICIES AND OPERATIONS • Monitor the security and compliant state of managed devices. • Identify non-compliant devices and perform corrective actions on them. • Remotely enable lost mode to protect corporate data on stolen or lost devices. • Generate reports on device status and health. How Hexnode can HELP
  • 57. " Hexnode makes it easier for organizations to maintain compliance with regulatory requirements "
  • 59. Q n A