SlideShare a Scribd company logo
GDPR Compliance
Finto Thomas
Information Security
Agenda
 Purpose of “GDPR”
 Helicopter view
 Articles for sample
 Seven Principles (Heart of GDPR 1)
 User Rights (Heart of GDPR 2)
 Personal Data
 Responsibilities
 12 Step Ladder to GDPR
 GDPR in numbers
 The fear factor
 Business Use case
 Next step
Remain Pages - 14
Protect personal data & Strengthen privacy rights
of EU individuals
(Who stay in EU, not for EU citizens stay outside of EU)
Protection
Purpose
91
GDPR
Articles
72
Hours
to reports data
breach
8
key Individual
Data Rights
4%
Global business
turnover fine
20 million EURO
82
Pages
of text
2%
EU companies
GDPR complaint
on 25th May
2018
Risk Based
Controls
12
Step for GDPR
from ICO-UK
7
Principles
Helicopter view
Sample Articles
Seven Principles
Heart of GDPR
⚖ LAWFULNESS, FAIRNESS
AND TRANSPARENCY
Personal data shall be processed lawfully, fairly and in a
transparent manner in relation to the data Subject
� PURPOSE LIMITATION
Personal data shall be collected for specified. Explicit and
legitimate purpose and not further processed in a manner that
is incompatible with those purposes.
� DATA MINIMISATION
Personal data shall be adequate, relevant and limited to what is
necessary in relation to the purposes for which they are
processed.
✔ ACCURACY
Personal data shall be accurate and where necessary, kept up to
date.
⏳ STORAGE LIMITATION
Personal data shall be kept in a form which permits
identification of data subjects for no longer than is necessary for
the purposes for which the personal data are processed.
� INTEGRITY AND
CONFIDENTIALITY
Personal data shall be processed in a manner that ensures
appropriate security of the personal data, including protection
against unauthorized or unlawful processing and against
accidental loss, destruction or damage, using appropriate
technical or organizational measures.
� ACCOUNTABILITY
The controller shall be responsible for, and be able to
demonstrate compliance with Data Protection Principles
Eight User Rights
Data Subject have below rights over their personal data
� RIGHT TO BE INFORMED
About the collection and use of their personal data. This is a key
transparency, purpose of data collection.
✍ RIGHT TO ACCESS
Information if personal data are processed, the purpose, what
data types, the period of storage
� RIGHT TO RECTIFICATION
Correction of inaccurate personal data concerning the data
subject with out any delay.
� RIGHT TO ERASURE
Right to forgotten, to erase all personal data if no necessary
anymore if the users withdraws consent.
� RIGHT TO DATA PORTABILITY
To receive user’s concerning personal data, in a structured format.
⛔ RIGHT TO RESTRICTION OF
PROCESSING
If the data accuracy is contested, unlawful or not need anymore.
When processing is restricted, you are permitted to store the
personal data, but not use it.
� RIGHT TO OBJECT
Stop processing of personal data on request, unless the controller
demonstrates compelling reasons overriding the individuals
interests rights.
� RIGHTS RELATED TO AUTOMATED
DECETION MAKING INCLUDING
PROFILING
Making a decision solely by automated means without any human
involvement. Article 22 need to be followed with individual’s
explicit consent.
• Name
• Address
• Phone
• Bank / Credit cards
• Email Address
• IP address
• Cookies
• Online Identifiers
Personal Data
• Medical records
• Biometric data
• Cultural Background
• Genetic data
• Religious Beliefs
• Sexual Orientations
• Trade union memberships
Special Personal Data
Data category
Personal Data
Responsibilities
Data Subject
“ EU Residence “
Make the decision
Validate the decision Sub Data
Processor
Sub Data
Processor
Data Controller
Keep Consent records
Analyze data
Use for purpose
Update decision
record
Data Processor
Platform / Service
Vendor
Keep record of the
decision and pass it
over to Controller.
Gather and process
Subject’s data
Update Consent
Allow or Deny
Use service
Ask consent
12 Steps ladder for GDPR
Gdpr brief and controls ver2.0
Fear Factors
• Business can not grow at Europe or even globally.
as we are the DATA PROCESSOR and can not meet the requirements with DATA CONTROLLER
• Highest fines if we fail to meet the GDPR criteria’s.
“Forget the fear factor, GDPR will be a force for good”
Business use cases
• Transparency : Clients should be informed about the personal data collection,
type, purpose and duration while onboarding and wherever any change on this
terms.
• Client should be able to view their profile online or should able provide on
their request to “validate” and update.
• Ability to detect, deter, delay, respond and recover on time for any kind data
breaches
• Risk management and Security by Design
“Personal Data should not be breached”
Patterns and Governance
1) Enterprise Security Framework and Architecture (Patterns)
• IT service management (ITSM) by ITIL
• Service design , service operations, etc..
• Information Security Management system (ISMS)
• Cloud Computing patterns
• Public Web Server patterns
• Security by Design and default
2) Governance Risk and Compliance (GRC)
• Risk Assessment and management program
• Risk Acceptance level ( residual risk)
• Risk Register
• NESA and GDPR definition to Alef by Legal
• Security Awareness program for all employee and contractors ( general and technical
teams)
• Internal and External Security audits process
Tools and Process - 3/6
1) Infrastructure Protection
• Regular Hardening and patching with continues monitoring on all platforms ( server , container
, Laptops , network devices , cloud services, etc..)
• Continues Vulnerability management process
• Malware Protection for all laptops, servers, email and Web
• Web Protection on internet access for employee and services ( forward proxy)
• Email protection from spam and spear phishing
• Wireless security to prevent rouge Access Points (AP), BYOD and Mobiles devices
2) Identity and Access management
• Central employee and contractor directory service
• Privilege ID management ( admins ,root, network , servers, API, Token, shared Credentials, etc)
3) Application Security
• Source code analysis (SAST) and Dynamic software assessments (DAST)
• Software Composite Analysis (SCA) with Repository manager and real time code feed back to
developer
Tools and Process - 3/6
4) Data Protection ( PII and Intellectual Properties )
• Data Classification and tagging
• Data leakage protection and CASB for cloud services ( G drive, AWS bucket, etc..)
5) Cryptography Service
• Encryption for all sensitive data stored in servers ,databases, files, laptops, cloud
services ( AWS, G Drive)
• Encryption on remote connectivity for laptops and remote offices via VPN
• Encryption on data on transfer via SSL for internal and External web services and API
• Code signing for Alef platform
6) Security Operation Center
• Central event and log collection and real time correlation for anomaly detections across
Alef Estate (SIEM)
• Security Incident management and Incident response plan
Q&A
Thank you

More Related Content

PPTX
Security and Compliance Initial Roadmap
PPTX
BSIMM: Bringing Science to Software Security
PPTX
BSIMM-V: The Building Security In Maturity Model
PPTX
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
PDF
Security Program Development for the Hipster Company
PDF
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
PDF
Overview
PPTX
Survival of the Fittest: How to Build a Cyber Resilient Organization
Security and Compliance Initial Roadmap
BSIMM: Bringing Science to Software Security
BSIMM-V: The Building Security In Maturity Model
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Security Program Development for the Hipster Company
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Overview
Survival of the Fittest: How to Build a Cyber Resilient Organization

What's hot (20)

PPTX
Making Cloud Security Part of Your DNA Webinar Slides
PPTX
HPE Protect 2016 - Fearlessly Innovate
PDF
Security Orchestration and Automation with Hexadite+
PPTX
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
PDF
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
PDF
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
PPTX
Stay out of headlines for non compliance or data breach
PPTX
Operational Security Intelligence
PPTX
If We Only Had the Time: How Security Teams Can Focus On What’s Important
PDF
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
PPTX
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
PDF
Building a Next-Generation Security Operations Center (SOC)
PDF
Cybersecurity in Acquisition - Kristen J. Baldwin
PDF
Software Development Life Cycle – Managing Risk and Measuring Security
PPT
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
PDF
A case for Managed Detection and Response
PPTX
Quantifying Cloud Risk for Your Corporate Leadership
PDF
Security services mind map
PDF
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
PPT
OWASP - Building Secure Web Applications
Making Cloud Security Part of Your DNA Webinar Slides
HPE Protect 2016 - Fearlessly Innovate
Security Orchestration and Automation with Hexadite+
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
Stay out of headlines for non compliance or data breach
Operational Security Intelligence
If We Only Had the Time: How Security Teams Can Focus On What’s Important
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
Building a Next-Generation Security Operations Center (SOC)
Cybersecurity in Acquisition - Kristen J. Baldwin
Software Development Life Cycle – Managing Risk and Measuring Security
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
A case for Managed Detection and Response
Quantifying Cloud Risk for Your Corporate Leadership
Security services mind map
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
OWASP - Building Secure Web Applications
Ad

Similar to Gdpr brief and controls ver2.0 (20)

PPTX
Vuzion Love Cloud GDPR Event
PDF
Big Data LDN 2017: Applied AI for GDPR
PDF
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
PPTX
My presentation- Ala about privacy and GDPR
PDF
Balancing Data Protection and Artificial Intelligence
PDF
Impact of GDPR on Third Party and M&A Security
PPTX
How Cloudera SDX can aid GDPR compliance 6.21.18
PDF
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
PPTX
General Data Protection Regulation
PDF
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
PDF
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
PPTX
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
PDF
Toreon adding privacy by design in secure application development oss18 v20...
PPTX
How Cloudera SDX can aid GDPR compliance
PDF
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
PDF
Cross border - off-shoring and outsourcing privacy sensitive data
PPTX
5 Ways to Make Your Postgres GDPR-Ready
 
PPTX
GDPR Webinar January 2018
 
PPTX
GDPR How to get started?
PPTX
BigID GDPR Compliance Automation Webinar Slides
Vuzion Love Cloud GDPR Event
Big Data LDN 2017: Applied AI for GDPR
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
My presentation- Ala about privacy and GDPR
Balancing Data Protection and Artificial Intelligence
Impact of GDPR on Third Party and M&A Security
How Cloudera SDX can aid GDPR compliance 6.21.18
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
General Data Protection Regulation
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
Toreon adding privacy by design in secure application development oss18 v20...
How Cloudera SDX can aid GDPR compliance
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Cross border - off-shoring and outsourcing privacy sensitive data
5 Ways to Make Your Postgres GDPR-Ready
 
GDPR Webinar January 2018
 
GDPR How to get started?
BigID GDPR Compliance Automation Webinar Slides
Ad

More from Finto Thomas , CISSP, TOGAF, CCSP, ITIL. JNCIS (8)

Recently uploaded (20)

PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPTX
Major-Components-ofNKJNNKNKNKNKronment.pptx
PPTX
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPT
Quality review (1)_presentation of this 21
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PPTX
Database Infoormation System (DBIS).pptx
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
Computer network topology notes for revision
PPTX
Introduction to Knowledge Engineering Part 1
PDF
Launch Your Data Science Career in Kochi – 2025
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PPTX
Supervised vs unsupervised machine learning algorithms
Introduction-to-Cloud-ComputingFinal.pptx
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
Galatica Smart Energy Infrastructure Startup Pitch Deck
Major-Components-ofNKJNNKNKNKNKronment.pptx
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
climate analysis of Dhaka ,Banglades.pptx
Quality review (1)_presentation of this 21
STUDY DESIGN details- Lt Col Maksud (21).pptx
Database Infoormation System (DBIS).pptx
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
Computer network topology notes for revision
Introduction to Knowledge Engineering Part 1
Launch Your Data Science Career in Kochi – 2025
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
Supervised vs unsupervised machine learning algorithms

Gdpr brief and controls ver2.0

  • 2. Agenda  Purpose of “GDPR”  Helicopter view  Articles for sample  Seven Principles (Heart of GDPR 1)  User Rights (Heart of GDPR 2)  Personal Data  Responsibilities  12 Step Ladder to GDPR  GDPR in numbers  The fear factor  Business Use case  Next step Remain Pages - 14
  • 3. Protect personal data & Strengthen privacy rights of EU individuals (Who stay in EU, not for EU citizens stay outside of EU) Protection Purpose
  • 4. 91 GDPR Articles 72 Hours to reports data breach 8 key Individual Data Rights 4% Global business turnover fine 20 million EURO 82 Pages of text 2% EU companies GDPR complaint on 25th May 2018 Risk Based Controls 12 Step for GDPR from ICO-UK 7 Principles Helicopter view
  • 6. Seven Principles Heart of GDPR ⚖ LAWFULNESS, FAIRNESS AND TRANSPARENCY Personal data shall be processed lawfully, fairly and in a transparent manner in relation to the data Subject � PURPOSE LIMITATION Personal data shall be collected for specified. Explicit and legitimate purpose and not further processed in a manner that is incompatible with those purposes. � DATA MINIMISATION Personal data shall be adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed. ✔ ACCURACY Personal data shall be accurate and where necessary, kept up to date. ⏳ STORAGE LIMITATION Personal data shall be kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed. � INTEGRITY AND CONFIDENTIALITY Personal data shall be processed in a manner that ensures appropriate security of the personal data, including protection against unauthorized or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organizational measures. � ACCOUNTABILITY The controller shall be responsible for, and be able to demonstrate compliance with Data Protection Principles
  • 7. Eight User Rights Data Subject have below rights over their personal data � RIGHT TO BE INFORMED About the collection and use of their personal data. This is a key transparency, purpose of data collection. ✍ RIGHT TO ACCESS Information if personal data are processed, the purpose, what data types, the period of storage � RIGHT TO RECTIFICATION Correction of inaccurate personal data concerning the data subject with out any delay. � RIGHT TO ERASURE Right to forgotten, to erase all personal data if no necessary anymore if the users withdraws consent. � RIGHT TO DATA PORTABILITY To receive user’s concerning personal data, in a structured format. ⛔ RIGHT TO RESTRICTION OF PROCESSING If the data accuracy is contested, unlawful or not need anymore. When processing is restricted, you are permitted to store the personal data, but not use it. � RIGHT TO OBJECT Stop processing of personal data on request, unless the controller demonstrates compelling reasons overriding the individuals interests rights. � RIGHTS RELATED TO AUTOMATED DECETION MAKING INCLUDING PROFILING Making a decision solely by automated means without any human involvement. Article 22 need to be followed with individual’s explicit consent.
  • 8. • Name • Address • Phone • Bank / Credit cards • Email Address • IP address • Cookies • Online Identifiers Personal Data • Medical records • Biometric data • Cultural Background • Genetic data • Religious Beliefs • Sexual Orientations • Trade union memberships Special Personal Data Data category Personal Data
  • 9. Responsibilities Data Subject “ EU Residence “ Make the decision Validate the decision Sub Data Processor Sub Data Processor Data Controller Keep Consent records Analyze data Use for purpose Update decision record Data Processor Platform / Service Vendor Keep record of the decision and pass it over to Controller. Gather and process Subject’s data Update Consent Allow or Deny Use service Ask consent
  • 10. 12 Steps ladder for GDPR
  • 12. Fear Factors • Business can not grow at Europe or even globally. as we are the DATA PROCESSOR and can not meet the requirements with DATA CONTROLLER • Highest fines if we fail to meet the GDPR criteria’s. “Forget the fear factor, GDPR will be a force for good”
  • 13. Business use cases • Transparency : Clients should be informed about the personal data collection, type, purpose and duration while onboarding and wherever any change on this terms. • Client should be able to view their profile online or should able provide on their request to “validate” and update. • Ability to detect, deter, delay, respond and recover on time for any kind data breaches • Risk management and Security by Design “Personal Data should not be breached”
  • 14. Patterns and Governance 1) Enterprise Security Framework and Architecture (Patterns) • IT service management (ITSM) by ITIL • Service design , service operations, etc.. • Information Security Management system (ISMS) • Cloud Computing patterns • Public Web Server patterns • Security by Design and default 2) Governance Risk and Compliance (GRC) • Risk Assessment and management program • Risk Acceptance level ( residual risk) • Risk Register • NESA and GDPR definition to Alef by Legal • Security Awareness program for all employee and contractors ( general and technical teams) • Internal and External Security audits process
  • 15. Tools and Process - 3/6 1) Infrastructure Protection • Regular Hardening and patching with continues monitoring on all platforms ( server , container , Laptops , network devices , cloud services, etc..) • Continues Vulnerability management process • Malware Protection for all laptops, servers, email and Web • Web Protection on internet access for employee and services ( forward proxy) • Email protection from spam and spear phishing • Wireless security to prevent rouge Access Points (AP), BYOD and Mobiles devices 2) Identity and Access management • Central employee and contractor directory service • Privilege ID management ( admins ,root, network , servers, API, Token, shared Credentials, etc) 3) Application Security • Source code analysis (SAST) and Dynamic software assessments (DAST) • Software Composite Analysis (SCA) with Repository manager and real time code feed back to developer
  • 16. Tools and Process - 3/6 4) Data Protection ( PII and Intellectual Properties ) • Data Classification and tagging • Data leakage protection and CASB for cloud services ( G drive, AWS bucket, etc..) 5) Cryptography Service • Encryption for all sensitive data stored in servers ,databases, files, laptops, cloud services ( AWS, G Drive) • Encryption on remote connectivity for laptops and remote offices via VPN • Encryption on data on transfer via SSL for internal and External web services and API • Code signing for Alef platform 6) Security Operation Center • Central event and log collection and real time correlation for anomaly detections across Alef Estate (SIEM) • Security Incident management and Incident response plan

Editor's Notes

  • #4: Companies have to protect the data and give the key to data owner for their personal data 
  • #15: https://www.opensecurityarchitecture.org/cms/library/patternlandscape