SlideShare a Scribd company logo
© 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC.
GDPR
Is machine data relevant and how can it help?
GIOVANNI MORREALE
EMEA Technical Distribution Manager
The European General Data Protection Regulation
PRAGUE 1ST NOVEMBER 2017
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Goal of the General Data Protection Regulation
“The aim of the GDPR is to protect all EU
citizens from privacy and data breaches
in an increasingly data-driven world”
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
GDPR
Briefing Overview
GDPR
A Deeper Look
How Splunk
supports GDPR
compliance
Splunk and
Reporting
Examples
Agenda
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
GDPR
Briefing Overview
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
GDPR Timelines
The regulation is binding across all EU members states
January, 2012
Commissioner Proposed reform
to Data Protection regulation
May, 2018
Effective Data Protection
Framework comes into force (25th
May, 2018)
April, 2016
EU Council adopted new
regulation
December, 2015
EU agreement on regulation
including the UK after Brexit
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Key Features of GDPR
Applicable to any company doing business in the European Union
European
Data
Protection
Harmoniza
tion
Fines up
to
€20m or
4% of
turnove
r
Mandatory
Privacy
Impact
Assessme
nts
Privacy by
Design &
Default
72 Hour
Breach
Notificatio
n
Mandator
y Data
Erasure &
Portability
Consent
for
Personal
Data
Profiling
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
GDPR Advice
from the
information
commisioner
office
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
GDPR
A Deeper Look
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Looking into the Details
http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679&from=EN
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Taking into account the state of the art, the costs of implementation and the
nature, scope, context and purposes of processing as well as the risk of varying
likelihood and severity for the rights and freedoms of natural persons, the
controller and the processor shall implement appropriate technical and
organisational measures to ensure a level of security appropriate to the risk,
including inter alia as appropriate:
Article 32 – Security of processing
Understand Threats
& Risks
Use of Encryption &
Anonymization
Regular Evaluation
of the Security Policy
& Practices
Ensure
Confidentiality,
Integrity, Availability
and Resilience of
PII Systems and
Services
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
1. In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72
hours after having become aware of it, notify the personal data breach to the supervisory authority competent in
accordance with Article 55, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural
persons. Where the notification to the supervisory authority is not made within 72 hours, it shall be accompanied by reasons
for the delay.
...
3. The processor shall notify the controller without undue delay after becoming aware of a personal data breach.
The notification referred to in paragraph 1 shall at least:
(a) describe the nature of the personal data breach including where possible, the categories and approximate number
of data subjects concerned and the categories and approximate number of personal data records concerned;
(b) communicate the name and contact details of the data protection officer or other contact point where more information
can be obtained;
(c) describe the likely consequences of the personal data breach;
(d) describe the measures taken or proposed to be taken by the controller to address the personal data breach,
including, where appropriate, measures to mitigate its possible adverse effects
....
Article 33 – Notification of a personal data breach
to the supervisory authority
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
“In the case of a personal data breach, the controller shall without undue delay and, where feasible, not
later than 72 hours after having become aware of it, notify the personal data breach to the supervisory
authority competent in accordance with Article 55, unless the personal data breach is unlikely to result in a
risk to the rights and freedoms of natural persons. Where the notification to the supervisory authority is not
made within 72 hours, it shall be accompanied by reasons for the delay.” …
1. When the personal data breach is likely to result in a high risk to the rights and freedoms of natural
persons, the controller shall communicate the personal data breach to the data subject without undue
delay.
2. The communication to the data subject referred to in paragraph 1 of this Article shall describe in clear and
plain language the nature of the personal data breach and contain at least the information and
measures referred to in points (b), (c) and (d) of Article 33(3).
Article 34 – Communication of a personal data
breach to the data subject
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
“Each controller and, where applicable,
the controller's representative, shall
maintain a record of processing activities
under its responsibility”
Article 30 – Records of Processing Activity
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Finding of the ICO at a
Privacy Audit
Search and
Report on
data
processing
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
You wake up in the
morning and your
data privacy officer
is on the phone
The Day in a life of a
GDPR Breach
● Breach Happening, How it looks like
● Crisis Communication Internally
● Investigation Steps
● Finding out who was impacted, when it
did start, what type of a breach it was
● Communication Strategy Externally
● Data Privacy Audits from the
government
● You need to prove you did everything to
mitigate the risk for individuals
● You need to answer when did you know
what and how did you know about it?
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
How Splunk Supports
GDPR Compliance
© 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2016 SPLUNK INC. CONFIDENTIAL. INTERNAL USE ONLY.
Splunk can help your Organization with GDPR
▶ GDPR about People (IT & Legal), Process and
Technology
▶ Splunk helps to detect, prevent and investigate
breaches
• Breach Notification Article
• Breach Communication to Individuals Article
• Implement appropriate techn. Measures (Article)
▶ Prove GDPR security controls are enforced
• Data security article / state of the art tech / implement
appropriate techn. Measures
▶ Search and report on personal data processing
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Prove GDPR
Security Controls
are enforced
Detect, Prevent
and Investigate
Data Breaches
Search and Report
on Personal Data
Processing
Splunk for GDPR
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Splunk for GDPR
Detect, Prevent
and Investigate
Data Breaches The Forrester Wave:
Security Analytics Platforms, Q1 2017Gartner MQ for SIEM, Aug. 2016
IT Operations
Application Delivery
Industrial Data & IoT
Business Analytics, Future Markets
IT Security, Compliance & Fraud
Monitor Detect Investigate Respond
Enterprise
ES, UEBA
On-Premise, Cloud, Hybrid | Analytics for Hadoop
Different people
asking
different questions…
…of the same data.
Machine
Data
Article 33 - Notification of a personal data breach to the supervisory authority
Article 34 - Communication of a personal data breach to the data subject
Data Breach
Notification
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Splunk for GDPR
Prove GDPR
Security Controls
are enforced
Article 32 - Security of processing
Article 58 - Supervisory Investigative Powers
Risk
Minimization
Report
Compliance
DPIA
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Splunk for GDPR
Search and Report
on Personal Data
Processing
Article 30 - Records of Processing Activity
Article 5, 15, 17, 18 and 28 - Data Subject Rights
Supply chain
Obligations
Right to be
Forgotten
Right of
rectification
Right of access
Right of data
portability
…
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Machine Data plays a critical role and helps your organization to
comply with the GDPR - Are you prepared?
We invite you to ask for a GDPR Workshop!
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
▶ What’s the current status within your Organizations? Data Impact Assessments
happened?
▶ Who owns the GDPR Program in your organization?
▶ What are the Key Challenges?
▶ What are expected changes that influences the IT Department? What changes
have happened already?
▶ What capabilities need to be established for breach notification?
▶ What capabilities need to be established for data privacy audits?
▶ How about monitoring of PII processing activities?
Questions to ask yourself
HINTS
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Visibility and Enforcement for GDPR
API
SDKs UI
Report Compliance
Detect, Prevent
and Investigate
Data Breaches
Example Data Sources…
On-Premise, Cloud, Hybrid
No rigid schemas – add in data from any other source.
Protect
…
Classify
SDM/ControlPoint
…
Find
Trust Center
…
Prove GDPR
Security Controls
are enforced
Search and Report
on Personal Data
Processing
Govern
Content Manager
…
Securiity
IT-Ops
Cloud
IoT
…
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Top Goals Top Splunk Benefits
▶ Continuously Protect the business
against:
• Data Breaches
• Malware
• Fraud
• IP Theft
▶ Comply with audit requirements
▶ Provide enterprise Visibility
▶ 70% to 90% improvement with
detection and research of events
▶ 70% to 95% reduction in security
incident investigation
▶ 10% to 30% reduction in risks
associated with data breaches, fraud
and IP theft
▶ 70% to 90% reduction in compliance
labour
Splunk for Security & Compliance
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
▶ Data in transit: Encryption
▶ Data at rest: Encryption
▶ Data at rest: Integrity
▶ Data/Fields within Splunk:
• Anonymization in raw event
• Anonymization in presentation layer
• Pseudonymization in raw event
• Pseudonymization in presentation layer
CTA: Pseudonymization of PII
Stay compliant whatever occurs in your machine data
risk
minimization
strategy
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Splunk
and
Reporting Examples
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
How can Splunk help?
ALL DATA IS SECURITY RELEVANT
Security &
Compliance
Reporting
Real-time
Monitoring of
Known Threats
Detecting
Unknown
Threats
Fraud
Detection
Insider
Threat
Incident
Investigations
& Forensics
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Solution: Splunk, the Engine for Machine Data
Custom
dashboards
Report and
analyze
Monitor
and alert
Developer
Platform
Ad hoc
search
References – Coded fields, mappings, aliases
Dynamic information – Stored in non-traditional formats
Environmental context – Human maintained files, documents
System/application – Available only using application request
Intelligence/analytics – Indicators, anomaly, research, white/blacklist
Real-Time
Machine Data
On-Premises
Private Cloud
Public
Cloud
Storage
Online
Shopping Cart
Telecoms
Desktops
Security
Web
Services
Networks
Containers
Web
Clickstreams
RFID
Smartphones
and Devices
Servers
Messaging
GPS
Location
Packaged
Applications
Custom
Applications
Online
Services
DatabasesCall Detail
Records
Energy Meters
Firewall
Intrusion
Prevention
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
200+ APPS
The Splunk Platform for Security Intelligence
Splunk Enterprise (CORE)
Stream data
Cisco
Security Suite
Windows/ AD/
Exchange
Palo
Alto
Network
s
FireEy
e
Bit9
DShiel
d
DNS
OSSEC
Splunk UBASplunk for Security
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Thousands of Global Compliance Customers
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
▶ Who is accessing
which information?
Data Governance & Insight
Application Insights 360
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
▶ Assigned roles and
privileges
Data Governance & Insight
User Roles Overview
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Prove GDPR security
controls are enforced
Splunk helps to detect,
prevent and investigate
breaches
Search and report
on personal data
processing
What GDPR use cases does Splunk help solve?
Breach Investigation Notification: 72 Hours
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
▶ Next 7 Days
• Identify GDPR systems and applications in scope
• Find a lawyer within your organization and sync up with them to find out about their
requirements.
▶ Next 30 Days
• Review the current capabilities you have in place
• Think about how GDPR impacts the IT processes and systems you have already
• Review how the GDPR requirements can be incorporated into other compliance mandates you
have to comply with
• Reach out to us for a GDPR Workshop
Next Steps
© 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Thank you
© 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Backup Slides
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
How much control do you have over
the information you provide online?
To what extent do you trust authorities
and private organizations to protect
your data?
Key GDPR Drivers: Data Protection & Privacy
The Eurobarometer survey – June 2015
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Personal Data (PD)
• Data unique to an individual;
• Obvious identifiers → National Identifier, Passport No., Driver’s
License; email address (including work address)
• Less obvious identifiers → Cookies/beacons, IP address, MAC
address when connected to a person
Sensitive Data
• Ethnicity, gender orientation, race, religion, sex, health, criminal
history, etc.
Data….what data are we talking about?
© 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Thank You

More Related Content

PPTX
Using GDPR to Transform Customer Experience
PDF
GDPR Scotland 2017
PPTX
GDPR: Your Journey to Compliance
PPTX
GDPR From the Trenches - Real-world examples of how companies are approaching...
PDF
Beginning your General Data Protection Regulation (GDPR) Journey
PPTX
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
PDF
GDPR: Threat or Opportunity?
PPTX
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
Using GDPR to Transform Customer Experience
GDPR Scotland 2017
GDPR: Your Journey to Compliance
GDPR From the Trenches - Real-world examples of how companies are approaching...
Beginning your General Data Protection Regulation (GDPR) Journey
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
GDPR: Threat or Opportunity?
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...

What's hot (17)

PPTX
Vuzion Love Cloud GDPR Event
PPTX
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
PPTX
12th July GDPR event slides
PDF
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
PDF
Data- and database security & GDPR: end-to-end offer
PDF
A practical guide to GDPR preparation
PPTX
BigID GDPR Compliance Automation Webinar Slides
PPTX
Webianr: GDPR: How to build a data protection framework
PPTX
Teradata's approach to addressing GDPR
PDF
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
PDF
How is GDPR relevant for US companies
PDF
Beyond GDPR Compliance - Role of Internal Audit
PDF
7 Key GDPR Requirements & the Role of Data Governance
PDF
DAMA Ireland - GDPR
PPT
Building a register of data processing
PPTX
GDPR How to get started?
PDF
How IBM Supports Clients around GDPR and Cybersecurity Legislation
Vuzion Love Cloud GDPR Event
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
12th July GDPR event slides
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Data- and database security & GDPR: end-to-end offer
A practical guide to GDPR preparation
BigID GDPR Compliance Automation Webinar Slides
Webianr: GDPR: How to build a data protection framework
Teradata's approach to addressing GDPR
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
How is GDPR relevant for US companies
Beyond GDPR Compliance - Role of Internal Audit
7 Key GDPR Requirements & the Role of Data Governance
DAMA Ireland - GDPR
Building a register of data processing
GDPR How to get started?
How IBM Supports Clients around GDPR and Cybersecurity Legislation
Ad

Viewers also liked (7)

PDF
Doing Business in Europe? GDPR: What you need to know and do
PDF
2017 10 26 webinar - gdpr final
PDF
Will the GDPR Kibosh EU-US Discovery?
PDF
DevOpsDaysRiga 2017: Edward van Deursen - GDPR in DevOps for Dummies
PDF
GDPR en Cloud security
PDF
GDPR i offentlige anskaffelser
PPTX
Ensuring GDPR Compliance - A Zymplify Guide
Doing Business in Europe? GDPR: What you need to know and do
2017 10 26 webinar - gdpr final
Will the GDPR Kibosh EU-US Discovery?
DevOpsDaysRiga 2017: Edward van Deursen - GDPR in DevOps for Dummies
GDPR en Cloud security
GDPR i offentlige anskaffelser
Ensuring GDPR Compliance - A Zymplify Guide
Ad

Similar to Splunk: How Machine Data Supports GDPR Compliance (20)

PPTX
A Day in the Life of a GDPR Breach - September 2017: Germany
PPTX
A Day in the Life of a GDPR Breach
PPTX
A Day in the Life of a GDPR Breach - September 2017: France
PDF
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
PPTX
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
PDF
GDPR Breach Notification Demystifying What the Regulators Want
PPTX
GDPR Complaince: Don't Let SIEM BE Your Downfall
PPTX
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
PPTX
GDPR & digital strategy
PDF
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
PDF
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT2
PPTX
An Essential Guide to EU GDPR
PDF
Flight East 2018 Presentation–Data Breaches and the Law
PPTX
General Data Protection Regulation (GDPR)
PPTX
General Data Protection Regulation (GDPR)
PPTX
Pronti per la legge sulla data protection GDPR? No Panic! - Stefano Sali, Dom...
PPTX
Practical Guide to GDPR 2017
PDF
GDPR - Are you ready?
PDF
How the EU-GDPR May Affect Your Website
PPTX
Keep Calm and Comply: 3 Keys to GDPR Success
A Day in the Life of a GDPR Breach - September 2017: Germany
A Day in the Life of a GDPR Breach
A Day in the Life of a GDPR Breach - September 2017: France
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Complaince: Don't Let SIEM BE Your Downfall
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
GDPR & digital strategy
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT2
An Essential Guide to EU GDPR
Flight East 2018 Presentation–Data Breaches and the Law
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Pronti per la legge sulla data protection GDPR? No Panic! - Stefano Sali, Dom...
Practical Guide to GDPR 2017
GDPR - Are you ready?
How the EU-GDPR May Affect Your Website
Keep Calm and Comply: 3 Keys to GDPR Success

More from MarketingArrowECS_CZ (20)

PDF
INFINIDAT InfiniGuard - 20220330.pdf
PDF
Využijte svou Oracle databázi na maximum!
PDF
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
PDF
Chráníte správně svoje data?
PDF
Oracle databáze – Konsolidovaná Data Management Platforma
PDF
Nové vlastnosti Oracle Database Appliance
PDF
Infinidat InfiniGuard
PDF
Infinidat InfiniBox
PDF
Novinky ve světě Oracle DB a koncept konvergované databáze
PDF
Základy licencování Oracle software
PDF
Garance 100% dostupnosti dat! Kdo z vás to má?
PDF
Využijte svou Oracle databázi naplno
PDF
Oracle Data Protection - 2. část
PDF
Oracle Data Protection - 1. část
PDF
Benefity Oracle Cloudu (4/4): Storage
PDF
Benefity Oracle Cloudu (3/4): Compute
PDF
InfiniBox z pohledu zákazníka
PDF
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
PDF
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
PDF
Úvod do Oracle Cloud infrastruktury
INFINIDAT InfiniGuard - 20220330.pdf
Využijte svou Oracle databázi na maximum!
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Chráníte správně svoje data?
Oracle databáze – Konsolidovaná Data Management Platforma
Nové vlastnosti Oracle Database Appliance
Infinidat InfiniGuard
Infinidat InfiniBox
Novinky ve světě Oracle DB a koncept konvergované databáze
Základy licencování Oracle software
Garance 100% dostupnosti dat! Kdo z vás to má?
Využijte svou Oracle databázi naplno
Oracle Data Protection - 2. část
Oracle Data Protection - 1. část
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (3/4): Compute
InfiniBox z pohledu zákazníka
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Úvod do Oracle Cloud infrastruktury

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
cuic standard and advanced reporting.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Cloud computing and distributed systems.
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
MIND Revenue Release Quarter 2 2025 Press Release
cuic standard and advanced reporting.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Network Security Unit 5.pdf for BCA BBA.
“AI and Expert System Decision Support & Business Intelligence Systems”
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Dropbox Q2 2025 Financial Results & Investor Presentation
Per capita expenditure prediction using model stacking based on satellite ima...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The Rise and Fall of 3GPP – Time for a Sabbatical?
sap open course for s4hana steps from ECC to s4
Cloud computing and distributed systems.
Big Data Technologies - Introduction.pptx
Encapsulation_ Review paper, used for researhc scholars
Spectral efficient network and resource selection model in 5G networks
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Splunk: How Machine Data Supports GDPR Compliance

  • 1. © 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC. GDPR Is machine data relevant and how can it help? GIOVANNI MORREALE EMEA Technical Distribution Manager The European General Data Protection Regulation PRAGUE 1ST NOVEMBER 2017
  • 2. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Goal of the General Data Protection Regulation “The aim of the GDPR is to protect all EU citizens from privacy and data breaches in an increasingly data-driven world”
  • 3. © 2017 SPLUNK INC.© 2017 SPLUNK INC. GDPR Briefing Overview GDPR A Deeper Look How Splunk supports GDPR compliance Splunk and Reporting Examples Agenda
  • 4. © 2017 SPLUNK INC.© 2017 SPLUNK INC. GDPR Briefing Overview
  • 5. © 2017 SPLUNK INC.© 2017 SPLUNK INC. GDPR Timelines The regulation is binding across all EU members states January, 2012 Commissioner Proposed reform to Data Protection regulation May, 2018 Effective Data Protection Framework comes into force (25th May, 2018) April, 2016 EU Council adopted new regulation December, 2015 EU agreement on regulation including the UK after Brexit
  • 6. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Key Features of GDPR Applicable to any company doing business in the European Union European Data Protection Harmoniza tion Fines up to €20m or 4% of turnove r Mandatory Privacy Impact Assessme nts Privacy by Design & Default 72 Hour Breach Notificatio n Mandator y Data Erasure & Portability Consent for Personal Data Profiling
  • 7. © 2017 SPLUNK INC.© 2017 SPLUNK INC. GDPR Advice from the information commisioner office
  • 8. © 2017 SPLUNK INC.© 2017 SPLUNK INC. GDPR A Deeper Look
  • 9. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Looking into the Details http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679&from=EN
  • 10. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: Article 32 – Security of processing Understand Threats & Risks Use of Encryption & Anonymization Regular Evaluation of the Security Policy & Practices Ensure Confidentiality, Integrity, Availability and Resilience of PII Systems and Services
  • 11. © 2017 SPLUNK INC.© 2017 SPLUNK INC. 1. In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority competent in accordance with Article 55, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons. Where the notification to the supervisory authority is not made within 72 hours, it shall be accompanied by reasons for the delay. ... 3. The processor shall notify the controller without undue delay after becoming aware of a personal data breach. The notification referred to in paragraph 1 shall at least: (a) describe the nature of the personal data breach including where possible, the categories and approximate number of data subjects concerned and the categories and approximate number of personal data records concerned; (b) communicate the name and contact details of the data protection officer or other contact point where more information can be obtained; (c) describe the likely consequences of the personal data breach; (d) describe the measures taken or proposed to be taken by the controller to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects .... Article 33 – Notification of a personal data breach to the supervisory authority
  • 12. © 2017 SPLUNK INC.© 2017 SPLUNK INC. “In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority competent in accordance with Article 55, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons. Where the notification to the supervisory authority is not made within 72 hours, it shall be accompanied by reasons for the delay.” … 1. When the personal data breach is likely to result in a high risk to the rights and freedoms of natural persons, the controller shall communicate the personal data breach to the data subject without undue delay. 2. The communication to the data subject referred to in paragraph 1 of this Article shall describe in clear and plain language the nature of the personal data breach and contain at least the information and measures referred to in points (b), (c) and (d) of Article 33(3). Article 34 – Communication of a personal data breach to the data subject
  • 13. © 2017 SPLUNK INC.© 2017 SPLUNK INC. “Each controller and, where applicable, the controller's representative, shall maintain a record of processing activities under its responsibility” Article 30 – Records of Processing Activity
  • 14. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Finding of the ICO at a Privacy Audit Search and Report on data processing
  • 15. © 2017 SPLUNK INC.© 2017 SPLUNK INC. You wake up in the morning and your data privacy officer is on the phone The Day in a life of a GDPR Breach ● Breach Happening, How it looks like ● Crisis Communication Internally ● Investigation Steps ● Finding out who was impacted, when it did start, what type of a breach it was ● Communication Strategy Externally ● Data Privacy Audits from the government ● You need to prove you did everything to mitigate the risk for individuals ● You need to answer when did you know what and how did you know about it?
  • 16. © 2017 SPLUNK INC.© 2017 SPLUNK INC. How Splunk Supports GDPR Compliance
  • 17. © 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2016 SPLUNK INC. CONFIDENTIAL. INTERNAL USE ONLY. Splunk can help your Organization with GDPR ▶ GDPR about People (IT & Legal), Process and Technology ▶ Splunk helps to detect, prevent and investigate breaches • Breach Notification Article • Breach Communication to Individuals Article • Implement appropriate techn. Measures (Article) ▶ Prove GDPR security controls are enforced • Data security article / state of the art tech / implement appropriate techn. Measures ▶ Search and report on personal data processing
  • 18. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Prove GDPR Security Controls are enforced Detect, Prevent and Investigate Data Breaches Search and Report on Personal Data Processing Splunk for GDPR
  • 19. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Splunk for GDPR Detect, Prevent and Investigate Data Breaches The Forrester Wave: Security Analytics Platforms, Q1 2017Gartner MQ for SIEM, Aug. 2016 IT Operations Application Delivery Industrial Data & IoT Business Analytics, Future Markets IT Security, Compliance & Fraud Monitor Detect Investigate Respond Enterprise ES, UEBA On-Premise, Cloud, Hybrid | Analytics for Hadoop Different people asking different questions… …of the same data. Machine Data Article 33 - Notification of a personal data breach to the supervisory authority Article 34 - Communication of a personal data breach to the data subject Data Breach Notification
  • 20. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Splunk for GDPR Prove GDPR Security Controls are enforced Article 32 - Security of processing Article 58 - Supervisory Investigative Powers Risk Minimization Report Compliance DPIA
  • 21. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Splunk for GDPR Search and Report on Personal Data Processing Article 30 - Records of Processing Activity Article 5, 15, 17, 18 and 28 - Data Subject Rights Supply chain Obligations Right to be Forgotten Right of rectification Right of access Right of data portability …
  • 22. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Machine Data plays a critical role and helps your organization to comply with the GDPR - Are you prepared? We invite you to ask for a GDPR Workshop!
  • 23. © 2017 SPLUNK INC.© 2017 SPLUNK INC. ▶ What’s the current status within your Organizations? Data Impact Assessments happened? ▶ Who owns the GDPR Program in your organization? ▶ What are the Key Challenges? ▶ What are expected changes that influences the IT Department? What changes have happened already? ▶ What capabilities need to be established for breach notification? ▶ What capabilities need to be established for data privacy audits? ▶ How about monitoring of PII processing activities? Questions to ask yourself HINTS
  • 24. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Visibility and Enforcement for GDPR API SDKs UI Report Compliance Detect, Prevent and Investigate Data Breaches Example Data Sources… On-Premise, Cloud, Hybrid No rigid schemas – add in data from any other source. Protect … Classify SDM/ControlPoint … Find Trust Center … Prove GDPR Security Controls are enforced Search and Report on Personal Data Processing Govern Content Manager … Securiity IT-Ops Cloud IoT …
  • 25. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Top Goals Top Splunk Benefits ▶ Continuously Protect the business against: • Data Breaches • Malware • Fraud • IP Theft ▶ Comply with audit requirements ▶ Provide enterprise Visibility ▶ 70% to 90% improvement with detection and research of events ▶ 70% to 95% reduction in security incident investigation ▶ 10% to 30% reduction in risks associated with data breaches, fraud and IP theft ▶ 70% to 90% reduction in compliance labour Splunk for Security & Compliance
  • 26. © 2017 SPLUNK INC.© 2017 SPLUNK INC. ▶ Data in transit: Encryption ▶ Data at rest: Encryption ▶ Data at rest: Integrity ▶ Data/Fields within Splunk: • Anonymization in raw event • Anonymization in presentation layer • Pseudonymization in raw event • Pseudonymization in presentation layer CTA: Pseudonymization of PII Stay compliant whatever occurs in your machine data risk minimization strategy
  • 27. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Splunk and Reporting Examples
  • 28. © 2017 SPLUNK INC.© 2017 SPLUNK INC. How can Splunk help? ALL DATA IS SECURITY RELEVANT Security & Compliance Reporting Real-time Monitoring of Known Threats Detecting Unknown Threats Fraud Detection Insider Threat Incident Investigations & Forensics
  • 29. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Solution: Splunk, the Engine for Machine Data Custom dashboards Report and analyze Monitor and alert Developer Platform Ad hoc search References – Coded fields, mappings, aliases Dynamic information – Stored in non-traditional formats Environmental context – Human maintained files, documents System/application – Available only using application request Intelligence/analytics – Indicators, anomaly, research, white/blacklist Real-Time Machine Data On-Premises Private Cloud Public Cloud Storage Online Shopping Cart Telecoms Desktops Security Web Services Networks Containers Web Clickstreams RFID Smartphones and Devices Servers Messaging GPS Location Packaged Applications Custom Applications Online Services DatabasesCall Detail Records Energy Meters Firewall Intrusion Prevention
  • 30. © 2017 SPLUNK INC.© 2017 SPLUNK INC. 200+ APPS The Splunk Platform for Security Intelligence Splunk Enterprise (CORE) Stream data Cisco Security Suite Windows/ AD/ Exchange Palo Alto Network s FireEy e Bit9 DShiel d DNS OSSEC Splunk UBASplunk for Security
  • 31. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Thousands of Global Compliance Customers
  • 32. © 2017 SPLUNK INC.© 2017 SPLUNK INC. ▶ Who is accessing which information? Data Governance & Insight Application Insights 360
  • 33. © 2017 SPLUNK INC.© 2017 SPLUNK INC. ▶ Assigned roles and privileges Data Governance & Insight User Roles Overview
  • 34. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Prove GDPR security controls are enforced Splunk helps to detect, prevent and investigate breaches Search and report on personal data processing What GDPR use cases does Splunk help solve? Breach Investigation Notification: 72 Hours
  • 35. © 2017 SPLUNK INC.© 2017 SPLUNK INC. ▶ Next 7 Days • Identify GDPR systems and applications in scope • Find a lawyer within your organization and sync up with them to find out about their requirements. ▶ Next 30 Days • Review the current capabilities you have in place • Think about how GDPR impacts the IT processes and systems you have already • Review how the GDPR requirements can be incorporated into other compliance mandates you have to comply with • Reach out to us for a GDPR Workshop Next Steps
  • 36. © 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC. Thank you
  • 37. © 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC. Backup Slides
  • 38. © 2017 SPLUNK INC.© 2017 SPLUNK INC. How much control do you have over the information you provide online? To what extent do you trust authorities and private organizations to protect your data? Key GDPR Drivers: Data Protection & Privacy The Eurobarometer survey – June 2015
  • 39. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Personal Data (PD) • Data unique to an individual; • Obvious identifiers → National Identifier, Passport No., Driver’s License; email address (including work address) • Less obvious identifiers → Cookies/beacons, IP address, MAC address when connected to a person Sensitive Data • Ethnicity, gender orientation, race, religion, sex, health, criminal history, etc. Data….what data are we talking about?
  • 40. © 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC.© 2017 SPLUNK INC. Thank You