SlideShare a Scribd company logo
Analyze. Detect. Protect.
Jamie Graves, CEO
j.graves@zonefox.com
@zonefox
@DrJamieGraves
GDPR In Practice
ZoneFox UEBA
★ User Entity Behaviour Analytics (UEBA)
★ Detects and alerts on human behaviour
○ Rules - for the known (compliance)
○ Machine Learning – for the unknown
Agenda
• A refresher on GDPR
• Some Activities to get you GDPR ready
• Where’s my data?
• Data Breach Notification
• UEBA
• 72 hours…
Background
• The GDPR states clearly in Article 32 that as of May 2018:
– “The controller and the processor shall implement appropriate technical
and organisational measures to ensure a level of security appropriate to
the risk, including inter alia as appropriate:
• The pseudonymisation and encryption of personal data;
• The ability to ensure the ongoing confidentiality, integrity,
availability and resilience of processing systems and services;
• The ability to restore the availability and access to personal data in
a timely manner in the event of a physical or technical incident;
• A process for regularly testing, assessing and evaluating the
effectiveness of technical and organisational measures for
ensuring the security of the processing.”"
Effect
• Increased fines - 4% of global turnover or €20,000,000
• Opt-in consent - Clear, no opt-out, use data only as agreed
• Breach notification - 72 hours to regulators, users “without delay”
• Territorial scope - All organizations with data on EU individuals
• Joint liability - Data controllers and processors
• Right to removal - The users are in charge
• Removes ambiguity - 28 laws become one
• Data transfer - Data keeps privacy rights as it moves globally
• Common enforcement - Authorities will be strict
• Collective redress - Class action lawsuits from individuals
• 25th May 2018
The Challenge
• Goal: By 1 May 18 - Ensure corporate security polices, corporate security
procedures meet minimum data protection standards under the GDPR.
– Conduct GDPR gap analysis on corporate security polices & corporate
security procedures
– Construct roadmap for to meet minimum data protection requirements
under GDPR
The Basics
• Fundamental Information Security Principles
– Policies
– People
– Processes
• Ensuring
– Board Buy-in
– Continuous Monitoring
– Risk-based methodology
– The appropriate technologies to mitigate risk
– Employee Training and Awareness
– CISO in charge of security
– Conduct Threat Assessments
– Necessary skills are covered
– Incident Response
Implementation Activities/Timeline
• Review of PII in Organisation
• Board Buy-in
• Review - Analysis of Existing Capabilities
– Legal; data privacy and use criteria, permissions
– Operational; where is PII data at the moment?
– Policy; what are existing policies in relation to date use,
• Gap Identification
• Planning
– Breach Response
– Reporting for accountability
– Transparency Requirements
– Vendor Selection
– Education
– Data Tracking
• Execution
– Risk Mitigation
– Continuous Monitoring
Data Breach Notification
• On being informed of a breach you must:
– Understand the scope of the breach – is PII involved?
• If PII is involved,
– A plan must be developed and delivered to the regulator on how to
remedy thebreach
– All affected parties MUST be informed
• All within 72 hours.
Achieving Rapid Breach Notification
• Tracking and monitoring user access to PII
– The form of insight is at the source – the data layer itself
• UEBA technologies can help
– User
– Entity
– Behaviour
– Analytics
• Earlier Breach notification & Complementary Forensic Investigation
Covering the Basics – Some Examples
• Know your assets
• Enforce separation of duties and least privilege
• Clearly Document and consistently enforce policies and controls
• Implement strict password and account management policies and practices
• Incorporate insider threat awareness into periodic security training
• Define explicit security agreements for any cloud services
• Institutionalise system change controls
• Rules alone cannot catch everything
• Machine Learning
– NOT A.I.
– Well known Statistical Techniques applied to data that is
• Clean
• Consistent
• Concise
Machine Learning for Early Insights
Building a Baseline of behaviour
• Establish a baseline of normal network device behaviour
• Monitor and control remote access from all end points, including mobile
devices
• Use a log correlation engine and SIEM to log, monitor, and audit employee
actions
• Strong integration between IT and HR or other necessary functions
UEBA 101
• Record user activity; Ideally actual activity at the endpoint.
• Build a profile for a user over a period of time.
• Compare a user’s new activity to their previous activity.
• Use peer groups to reduce false positives.
How does it work?
Statistically relevant outlier
a.k.a Bad Guy
Forensics
• Forensic/Incident response required to drill into background/causes
• Need to quickly and accurately identify PII involved
• Need for logging, auditing and retention of traces of information relating to
– Data Movement
– Data CRUD activities
Threat Investigation Pipeline
Information
Identification
Exploration
Discovery
Action
Triage
Presentation
Report
Augmented Intelligence
Machine
Learning
Visualisation
Data
Mining
User
Driven
Argyle house, Edinburgh, EH3 9DR,
Scotland
+44 (0) 845 388 4999
info@zonefox.com
@zonefox
zonefox.com
Thanks for listening

More Related Content

PDF
Privacy and the GDPR: How Cloud computing could be your failing
PDF
Data Breaches and the EU GDPR
PDF
Revising policies and procedures under the new EU GDPR
PDF
Accountability under the GDPR: What does it mean for Boards & Senior Management?
PDF
GDPR: Requirements for Cloud Providers
PDF
NY State's cybersecurity legislation requirements for risk management, securi...
PDF
Preparing for EU GDPR
PPTX
EU GDPR: The role of the data protection officer
Privacy and the GDPR: How Cloud computing could be your failing
Data Breaches and the EU GDPR
Revising policies and procedures under the new EU GDPR
Accountability under the GDPR: What does it mean for Boards & Senior Management?
GDPR: Requirements for Cloud Providers
NY State's cybersecurity legislation requirements for risk management, securi...
Preparing for EU GDPR
EU GDPR: The role of the data protection officer

What's hot (20)

PDF
Appointing a Data Protection Officer under the GDPR
PDF
Data Flow Mapping and the EU GDPR
PDF
EU GDPR and you: requirements for marketing
PDF
GDPR in a nutshell
PPTX
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
PPTX
The GDPR and its requirements for implementing data protection impact assessm...
PDF
Addressing penetration testing and vulnerabilities, and adding verification m...
PPTX
The first steps towards GDPR compliance 
PDF
GDPR Cyber Insurance 11/1/2017
PDF
1211000-792-2-Promontory - Data Mapping Slides 06-06-16
PPTX
The GDPR’s impact on your business and preparing for compliance
PPTX
Sophie's Privacy - a story about GDPR
PDF
20170323 are you ready the new gdpr is here
PDF
EY General Data Protection Regulation: Are you ready?
PDF
Datum DPO outsourced May 2016
PPTX
Preparing for general data protection regulations (gdpr) within the hous...
PDF
GDPR 11/1/2017
PPTX
Data transfers to countries outside the EU/EEA under the GDPR
PPTX
Risk assessments and applying organisational controls for GDPR compliance
PPTX
The GDPR for Techies
Appointing a Data Protection Officer under the GDPR
Data Flow Mapping and the EU GDPR
EU GDPR and you: requirements for marketing
GDPR in a nutshell
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and its requirements for implementing data protection impact assessm...
Addressing penetration testing and vulnerabilities, and adding verification m...
The first steps towards GDPR compliance 
GDPR Cyber Insurance 11/1/2017
1211000-792-2-Promontory - Data Mapping Slides 06-06-16
The GDPR’s impact on your business and preparing for compliance
Sophie's Privacy - a story about GDPR
20170323 are you ready the new gdpr is here
EY General Data Protection Regulation: Are you ready?
Datum DPO outsourced May 2016
Preparing for general data protection regulations (gdpr) within the hous...
GDPR 11/1/2017
Data transfers to countries outside the EU/EEA under the GDPR
Risk assessments and applying organisational controls for GDPR compliance
The GDPR for Techies
Ad

Viewers also liked (12)

PPTX
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
PDF
Data- and database security & GDPR: end-to-end offer
PPTX
DevOps vs GDPR: How to Comply and Stay Agile
PPTX
An Essential Guide to EU GDPR
PDF
GDPR and technology - details matter
PDF
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
PDF
EU personvernforordningen - hvor trykker skoen?
PPTX
International Data Privacy Day 2017
PDF
Simplifying Privacy Decisions: Towards Interactive and Adaptive Solutions
PPTX
GDPR From Implementation to Opportunity
PDF
Ey segregation of_duties
PPT
Sox Compliance Presentation
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
Data- and database security & GDPR: end-to-end offer
DevOps vs GDPR: How to Comply and Stay Agile
An Essential Guide to EU GDPR
GDPR and technology - details matter
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
EU personvernforordningen - hvor trykker skoen?
International Data Privacy Day 2017
Simplifying Privacy Decisions: Towards Interactive and Adaptive Solutions
GDPR From Implementation to Opportunity
Ey segregation of_duties
Sox Compliance Presentation
Ad

Similar to GDPR in practice (20)

PPTX
The general data protection act overview
PPTX
GDPR challenges for the healthcare sector and the practical steps to compliance
PPT
Information security
PDF
Cor concepts information governance-protection-of-personal-information-act-popi
PDF
Toreon adding privacy by design in secure application development oss18 v20...
PDF
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
PDF
The Next Gen Auditor - Auditing through technological disruptions
PDF
GDPR: The Application Security Twist
PPTX
7 Habits of Highly Secure Organizations
PPTX
GDPR | Cyber security process resilience
PPTX
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
PDF
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
PDF
#HR and #GDPR: Preparing for 2018 Compliance
PPTX
Security Architecture
PDF
Balancing Data Protection and Artificial Intelligence
PDF
Building an effective Information Security Roadmap
PDF
Flight East 2018 Presentation–Data Breaches and the Law
PDF
Internal Controls Over Information Systems
PPTX
ClicQA Security Testing Services GDPR
PPTX
Prepare Your Firm for GDPR
The general data protection act overview
GDPR challenges for the healthcare sector and the practical steps to compliance
Information security
Cor concepts information governance-protection-of-personal-information-act-popi
Toreon adding privacy by design in secure application development oss18 v20...
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
The Next Gen Auditor - Auditing through technological disruptions
GDPR: The Application Security Twist
7 Habits of Highly Secure Organizations
GDPR | Cyber security process resilience
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
#HR and #GDPR: Preparing for 2018 Compliance
Security Architecture
Balancing Data Protection and Artificial Intelligence
Building an effective Information Security Roadmap
Flight East 2018 Presentation–Data Breaches and the Law
Internal Controls Over Information Systems
ClicQA Security Testing Services GDPR
Prepare Your Firm for GDPR

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
cuic standard and advanced reporting.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Electronic commerce courselecture one. Pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Machine learning based COVID-19 study performance prediction
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
NewMind AI Weekly Chronicles - August'25 Week I
Encapsulation_ Review paper, used for researhc scholars
sap open course for s4hana steps from ECC to s4
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Per capita expenditure prediction using model stacking based on satellite ima...
Understanding_Digital_Forensics_Presentation.pptx
Encapsulation theory and applications.pdf
Empathic Computing: Creating Shared Understanding
cuic standard and advanced reporting.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Review of recent advances in non-invasive hemoglobin estimation
Electronic commerce courselecture one. Pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Machine learning based COVID-19 study performance prediction

GDPR in practice

  • 1. Analyze. Detect. Protect. Jamie Graves, CEO j.graves@zonefox.com @zonefox @DrJamieGraves GDPR In Practice
  • 2. ZoneFox UEBA ★ User Entity Behaviour Analytics (UEBA) ★ Detects and alerts on human behaviour ○ Rules - for the known (compliance) ○ Machine Learning – for the unknown
  • 3. Agenda • A refresher on GDPR • Some Activities to get you GDPR ready • Where’s my data? • Data Breach Notification • UEBA • 72 hours…
  • 4. Background • The GDPR states clearly in Article 32 that as of May 2018: – “The controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: • The pseudonymisation and encryption of personal data; • The ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; • The ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; • A process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.”"
  • 5. Effect • Increased fines - 4% of global turnover or €20,000,000 • Opt-in consent - Clear, no opt-out, use data only as agreed • Breach notification - 72 hours to regulators, users “without delay” • Territorial scope - All organizations with data on EU individuals • Joint liability - Data controllers and processors • Right to removal - The users are in charge • Removes ambiguity - 28 laws become one • Data transfer - Data keeps privacy rights as it moves globally • Common enforcement - Authorities will be strict • Collective redress - Class action lawsuits from individuals • 25th May 2018
  • 6. The Challenge • Goal: By 1 May 18 - Ensure corporate security polices, corporate security procedures meet minimum data protection standards under the GDPR. – Conduct GDPR gap analysis on corporate security polices & corporate security procedures – Construct roadmap for to meet minimum data protection requirements under GDPR
  • 7. The Basics • Fundamental Information Security Principles – Policies – People – Processes • Ensuring – Board Buy-in – Continuous Monitoring – Risk-based methodology – The appropriate technologies to mitigate risk – Employee Training and Awareness – CISO in charge of security – Conduct Threat Assessments – Necessary skills are covered – Incident Response
  • 8. Implementation Activities/Timeline • Review of PII in Organisation • Board Buy-in • Review - Analysis of Existing Capabilities – Legal; data privacy and use criteria, permissions – Operational; where is PII data at the moment? – Policy; what are existing policies in relation to date use, • Gap Identification • Planning – Breach Response – Reporting for accountability – Transparency Requirements – Vendor Selection – Education – Data Tracking • Execution – Risk Mitigation – Continuous Monitoring
  • 9. Data Breach Notification • On being informed of a breach you must: – Understand the scope of the breach – is PII involved? • If PII is involved, – A plan must be developed and delivered to the regulator on how to remedy thebreach – All affected parties MUST be informed • All within 72 hours.
  • 10. Achieving Rapid Breach Notification • Tracking and monitoring user access to PII – The form of insight is at the source – the data layer itself • UEBA technologies can help – User – Entity – Behaviour – Analytics • Earlier Breach notification & Complementary Forensic Investigation
  • 11. Covering the Basics – Some Examples • Know your assets • Enforce separation of duties and least privilege • Clearly Document and consistently enforce policies and controls • Implement strict password and account management policies and practices • Incorporate insider threat awareness into periodic security training • Define explicit security agreements for any cloud services • Institutionalise system change controls
  • 12. • Rules alone cannot catch everything • Machine Learning – NOT A.I. – Well known Statistical Techniques applied to data that is • Clean • Consistent • Concise Machine Learning for Early Insights
  • 13. Building a Baseline of behaviour • Establish a baseline of normal network device behaviour • Monitor and control remote access from all end points, including mobile devices • Use a log correlation engine and SIEM to log, monitor, and audit employee actions • Strong integration between IT and HR or other necessary functions
  • 14. UEBA 101 • Record user activity; Ideally actual activity at the endpoint. • Build a profile for a user over a period of time. • Compare a user’s new activity to their previous activity. • Use peer groups to reduce false positives.
  • 15. How does it work? Statistically relevant outlier a.k.a Bad Guy
  • 16. Forensics • Forensic/Incident response required to drill into background/causes • Need to quickly and accurately identify PII involved • Need for logging, auditing and retention of traces of information relating to – Data Movement – Data CRUD activities
  • 19. Argyle house, Edinburgh, EH3 9DR, Scotland +44 (0) 845 388 4999 info@zonefox.com @zonefox zonefox.com Thanks for listening