SlideShare a Scribd company logo
Dr Marco Ermini, CISA, CISM, CISSP, ITILv3, GCIH, RCSS, PhD
Senior Security and Compliance Officer, Orange Business Services
The impact of GDPR on Third-
Party and M&A security
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Describe the impact of GDPR on three different but connected
business processes:
– Mergers & Acquisitions (M&A)
– Third-party security
– Outsourcing security
• Approaching an external organization is
going to be different after GDPR is in
force
Take away
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• GDPR impact has been mostly focused on technology
• Understand the general impact of GDPR on M&A prospects
• Impact of GDPR on third-party and outsourcing security
• Identify specific GDPR programs, which affect third-party,
outsourcing and M&A processes
• What "privacy" means in the context of M&A activities,
outsourcing and third-party
What is this all about?
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Let’s get started!
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Compressed GDPR
or
“GDPR for dummies”
Setting the stage
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Legal. The GDPR is a law. This research note is not
intended as legal advice or comprehensive guidance.
• Procedural. (New) roles, responsibilities, accountabilities and
processes to be implemented
• Technical. The GDPR includes many data protection principles
and requirements that must be enabled by technology, or that
require technology to limit impact to internal operations
Three Dimensions of GDPR
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• The GDPR is about protection of personal data and privacy
• Securing personal data is only a subset of all requirements
• “Personal data" in the GDPR depends on context
• Ask the company's legal advisor
Personal Data and Privacy
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
1. GDPR is enacted law, not an elective standard; penalties for
noncompliance are potentially severe
2. GDPR is "extra-territorial“, which means it applies to all
organizations that offer goods and services into EU markets
3. Reputational damage, loss of employees and erosion of
customer trust are inevitable if you disregard the rights of data
subjects or fail to report and deal with a breach of their
personal data correctly
4. GDPR refers to the inclusion of a data processor in your
business process, which broadens the attack surface for
vulnerabilities and the controller's responsibility to keep
informed on the data processor’s status
Why GDPR is a concern
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
and/or
Implementing a GDPR program
Gap Analysis
Implement
Basic Aspects
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
1. Governance and Accountability
2. Privacy “by design” and “by default”
3. Privacy Impact Assessment
4. Enforcement
5. New rights for Data Subjects (DS)
6. New obligations for Data Processors (DP)
7. Privacy Notices
GDPR in a Nutshell – 1/2
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
6. User consent
7. Data Protection Officers (DPO)
8. Notification of security breaches
9. Enforcement scope
10.European Data Protection Board
11.Concepts of “pseudonomysed” data and
privacy seal (“EuroPriSe")
GDPR in a Nutshell – 2/2
Image credits:
https://www.peerlyst.com/posts/gdpr-
getting-to-the-lawful-basis-for-processing-
david-froud
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• The GDPR does provide data subjects with a set of rights over
the administration and use of their personal data
• Organizations that control personal-data processing activities
throughout the data life cycle should have less trouble enabling
these rights
• The right to data portability could be assured by implementing a
self-service portal; the same online platform can be used to
provide transparency and notification
• The right "not to be subject to a decision based solely on
automated processing, including profiling" implies a strong
focus on automation of analytics and the use of the subsequent
results
Data Subjects rights
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• It should be freely given, there can be no coercion or pressure
– Consider employee relations
• "Consent" in the GDPR requires several conditions:
– "By a clear affirmative act"
– "Specific“
– "(As an) informed and unambiguous indication of the data subject's
agreement to the processing of personal data“
• The burden of proof that consent was obtained lies with the
data controller
Data Subject consent
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Recap: DC vs DP
Data Controller Data Processor
Controls what personal data is
processed
Uses data only as instructed by Data
Controller
Responsible for the processing
purpose (e.g. determines why that
personal data is processed)
Processes data as instructed by the
Data Controller
Responsible for the means of
processing by the Data Processor
Must respect the contractual agreement
with the Data Controller
May create third-party agreements with
Data Processors and sub-Processors
May create sub-Processor agreements
as authorised by the Data Controller
Data Processor = Third-Party
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Organizations should be aware that they can occupy both roles
in different processing activities
• Using a cloud-hosting provider's services, an organization may
be a data controller and the hosting provider the data processor
as it stores and processes the data on behalf of the data
controller.
• Conversely, when deploying EU-based employees, the cloud
provider may be the controller for the HR activities.
• Similarly, a marketing agency may be a B2B client's data
processor in the initial service provision, but when it uses the
data gained in contracts to enrich profiles for a campaign of its
own, it is the data controller for the latter activity.
DC vs DP
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
GDPR Implementation Basics
Implementing a GDPR program
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
GDPR Personal Data Lifecycle
Collect + Classify
• Define the purposes of
collection
• Collect only the personal data
necessary
• Inform data subjects
• Identify the categories and
sensitivity of personal data
Secure
Implement technical and
organizational measures to
ensure a level of security
appropriate to the risk based
on the nature, scope, context
and purposes of processing.
Process
• Process personal data
lawfully, fairly and
transparently
• Facilitate the exercise of
Data Subject rights
Share
• Only share personal data
with processors that provide
sufficient guarantees
• Perform GDPR compliant
cross-border data transfers
Delete
• Do not keep personal data for
longer than it is necessary
• Upon lawful request, erase a
data subject’s personal data
without undue delay
• Notify any processors of the
erasure request
Document
Maintain records of all
processing activities covering
the entire personal data
lifecycle
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Performing a risk assessment
– data processing activities
– each technical and organizational control
• Developing a prioritized remediation roadmap
• Implementing technical, organizational, policy, and process
improvements
• Documenting the overall control environment
– strengths
– weaknesses
– intended future state
GDPR Gap Analysis How-To
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
1. Write a Privacy Notice and publish it
2. Inventory of processes and activities
3. Implement Data Retention
4. Implement Data Subject access rights and consent requests
– B2C
– HR
– Procurement
5. Perform Data Protection Impact Assessment
6. Implement Security & Privacy by design / privacy by default
7. Handle personal data transfer & Third-Party management
8. Ensure Data Breach management process is in place
Basics of GDPR Implementation
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Art. 30 is the foundation for all compliance activities
• Opportunity to leverage information being collected to enable
“flags” which indicates high-risk business processes
• Use art. 30 to set up a system which is starting to document
what is collected and from who is collected
• Automate time consuming and timely processes (sending
reminders, etc.)
• Setup thresholds to identify where something triggers a Data
Protection Impact Assessment (DPIA) – or not
• Use this system to check cross-border data transfer points
Art. 30, “Records of Processing Activities” – 1/2
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Justify the collection of data, data retention, and identify where
the right consent is given – legitimate business activity?
• Setup reminder of when data needs to be “retired”
• Build-in reporting for external vendors – interactive technology,
trigger questionnaires, etc.
• Make it simple for the Data Subject
– single point of contact and front-end process (self-service portal)
– standard templates (informative and standard)
– backend processes codified and standardised
• Interaction as a positive experience, reflect the company
positively
Art. 30, “Records of Processing Activities” – 2/2
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Information is an asset
– Like software and hardware assets, build an inventory
• Information is fluid
– Include data flow diagrams
• Answer these questions & document the answers
– What data do we have?
– How and why do we collect it?
– What do we do with it?
– Where do we store it?
– How do we secure it?
– Who do we share it with?
– How long do we retain it?
– What do we do with it at end of life?
Information is the new gold
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Source: Awareness Briefings on Russian Government Activity against Critical Infrastructure
Third-Party vs Critical Infrastructure
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Attackers are patient (instances of laying in wait for over a year)
• Attackers know not to walk in the digital front door, preferring to
hit weak vendors
• Pivoting is not confined to just a company, pivoting across
companies is very real
• “Secure” vendors are not as secure as they want us to think
• When vendors brag about having certain companies as clients,
they open themselves up as targets
• External firms are being used as staging and exfiltration points
• Moving between traditional IT and ICS/SCADA is relatively
simple today
Lessons learned
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Many organizations outsource processing of personal data with
third-party service providers
– Very little control over data, increased risk of noncompliance
– Security posture is rarely an evaluation criterion
• Recommendations
– Specify vendor-selection criteria
– Add requirements as exclusion/inclusion criterion in procurement
– Ensure adherence to the requirements throughout the lifetime of
the contract by leveraging one or more assurance methods as
described
Third-party and GDPR
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Google’s VSAQ
Source: Google VSAQ
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Use automation for vendor management
• Reduce the amount of work. Look for control that meets the
purpose, they meet controls and documentation level that you
expect for your own internal level
• Teeth in the contracts, periodic review
• Breach due to vendor? Data exposed? Show that due diligence
was done, appropriate controls where in place and additional
security practices where instantiated to protect to the best level
of ability and appropriate to the level of sensitivity
• Diversified data stores – pulling data from different IT security
applications, everything you said you will do is done, if not,
create a gap analysis and remediation plan. Visibility is the key.
Minimize third-party and internal risks
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Supplier’s Management – ISO 27001
Screening /
Auditing
Selecting
clauses in
the
agreement
Access
control
Compliance
monitoring
Termination
of the
agreement
Risk
Assessment
clause 6.1.2 control A.7.1.1 control A.15.1.2 control A.9.4.1 control A.15.2.1
control A.8.1.4
control A.9.2.6
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Why M&A need Cyber Security support?
• What is the impact from the GDPR?
• What value does a security professional bring to the team?
Cybersecurity and GDPR for M&A
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Confidentiality
• Speed
• Business as usual
– Zero Impact
• Informed Business Decision on Risk
Business Drivers
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Special Interest Groups – gain from the Operation
– Financial Criminals
– Competitors
– Acquisition / Merger Company
– Disgruntled Employees
• General Interest Groups – gain from Impact
– Script Kiddies / Hackers
– Hacktivists / Terrorists
– Spies
M&A Threats
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
This used to be the only threat…
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Publicity, raising profile — your interest gets attacker’s interest!
• Impact on:
– Resources
– Technologies
– Infrastructure
• Disgruntled Employees
• Change in threat and risk model
• Absorbing unknown / confusion
• Creating new attack vectors and window of opportunity
• Business drivers force the hand of the Security Manager very quickly
• Are we all really equipped for change?
Introspection moment
Scoping the Risks
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
How Due Diligence looks for real
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Virtual Data Rooms
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Significant behavioural change in acquirers
• Embed GDPR considerations in technology due diligence
• Failing to do this brings significant transaction risks
• Gap Analysis for GDPR readiness
• Key areas: due diligence and post-merger integration
GDPR driving changes in M&A
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Actual liabilities in terms of compliance
• How divergent a target is from the buyer’s internal processes
and standards
– potential impact on the post-merger roadmap
• Latent security issues in the product/service
– reputational, operational, financial or legal impact
• Identify risks in:
– Compliance
– Market
– Technical assets including intellectual property
– Operations
– Integration
Due diligence – technical goals
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• “Privacy risk”
• Much more comprehensive
• How target collects, stores, uses and transfers personal data
• Historical data breaches
• Include data processing in NDAs
• QUIZ time!
Due diligence risk assessment
Buyer
Target
Data Controller
Data Processor
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
M&A experts on GDPR and Cybersecurity
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Engage cybersecurity experts
• New questions
– How is cyber-diligence conducted?
– Specialist service providers?
– What do we need to be aware of?
– Has the business enough technical knowledge?
Engage cybersecurity risks for GDPR in M&A
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Completeness and suitability of the approach of target
• Data sets, risks and mitigations for GDPR risks have been
assessed
• Changes to the treatment of the data sets, risks and mitigations
for GDPR risks have been assessed as a result of the M&A
activity
• Analysis of the separation and carve out risks for GDPR
Four Steps for Due Diligence
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Capture
• Connect
• Combine
• Consolidate
Post-Merger activities – Basics
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Address consent from existing Data Subjects
• Security Transformation Program
• Manage risk in the short/medium term while satisfying
compliance
• Ensure detect and respond strategy for cyber security incidents
• Technical Security consulting in cyber security
Post-Merger activities – GDPR specifics
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Protecting the effort itself
– Confidentiality of the total effort
– Confidentiality of the team’s work
• Evaluating the security condition of the target company
– Impact on the deal’s value – GDPR into play
– Asking the right questions
• Providing subject matter expertise
– Identify Security Requirements for the New Company
– Controlling Rumors
– Managing Global/International Aspects
– “Team Consultant”
– Low Hanging Fruits
The Role of the Cybersecurity Expert
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Preliminary background investigations
– Collection of Open-Source information
• Due diligence
– More in-depth look
– Estimation of Costs of Cyber Security – GDPR impact!
• Operations security – post-merger into focus
– Protect operational activities
– Develop and implement protective measures
– Appropriate for each phase of the acquisition
The Cybersecurity Expert in action
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Resources, staffing, processes, and systems
• Business processes
• IT tools
• Active Directory merging strategy is key!
• The Target company has comparable / same security
• Exceptions are documented and signed off by leadership
• Agreed-upon designs
• Operations turned to standard support
• Weekly or recurring meetings
Combining the two companies
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Target Characteristics Security Guidelines SLAs
SMALL
➤ Small employee base (< 200 employees)
➤ Low complexity
➤ Private ownership
➤ Little to no geographical diversity
➤ No separate legal entities
➤ No/limited need to keep the same facilities
➤ No/limited to keep the existing technologies
➤ Purchased for limited product portfolio, technology, talent, or
local presence
➤ Baseline security
controls Target is fully
absorbed into IT
infrastructure
➤ All IT labor is absorbed
into IT global business
units
➤ Security controls established or
confirmed in less than 100 days
MEDIUM
➤ Similar to previous kind, but Target has certain identifiable
complexities that require specific sensitivity during integration
➤ Fewer than 500 employees
➤ Needs to be stand-alone for a certain period of time
➤ During stand-alone time, Target maintains defined non-
compliances
➤ Supports its own IT infrastructure during the stand-alone
phase
➤ Integration of Target
may be full, hybrid, or
standalone
➤ All IT labor is absorbed
into IT global business
units
➤ Operation integration of some IT
infrastructure may take +180 days
➤ Processes may take 3 to 9 months
LARGE
➤ More than 500 employees
➤ Relatively large operations
➤ Significant multinational presence and subsidiaries
➤ Target contains certain identifiable complexities that require
specific sensitivity during integration
➤ Integration of Target
may be full, hybrid, or
standalone
➤ IT labor can stay
funded by Target
company
➤ Operation integration of some IT
infrastructure may take +180 days
➤ Customized integration plan
➤ IT Support is shared
➤ Processes take more than 12 months
IT/Cybersecurity Post-Mergers Objectives
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Safeguards against disgruntled employees
• New employee contracts
– Are existing Policies still relevant?
– Are we “dumbing down” their security?
• Existing employee contracts
– Do they protect you?
– Do they meet new relationship?
• Identify key policies — yours vs theirs
– Work with Legal Departments
Merging Policies
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Lack of privacy documentation can lower target’s value
• Privacy by design and by default can have business fall behind
• “Personal information is the new gold”
• Strategy for cost-effective data protection =
– Competitive advantage
– Boost in value
– Considered more secure trustworthy by customers
– Emphasize valuation
• Rewards in greater utilization of personal data
• Potential reward: increase M&A deal value significantly
Conclusions
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Using Cloud Services invokes a shared responsibility model
• GDPR creates issues for organizations that process personal
data in the Public Clouds
– rights of data subjects
– data residency
– cross-border transfers
• The level of support from cloud providers may not be known
• Recommendations:
– gap analysis
– identify the organizational and technical actions required
– ask all public cloud service providers to provide required
certification or proof of adherence to a code of conduct
GDPR has no specific guidance on Cloud
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• A Data Controller is responsible for the conduct of any of its
Data Processors – even if they are Cloud Providers
• Noncompliance with regard to GDPR on the vendor side
reflects on the compliance of the end-user organization
• Moving to the cloud may add to the security aspects of the
processing activity, but could also lead to residency concerns
• CASB service may be helpful
• Data protection in hybrid or on-premises operations is
increased by adoption of DCAP products
• Privacy compliance is demonstrated by mapping, dashboarding
and logical control application
Helpful Cloud tools
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• IaaS cannot make a company GDPR-compliant, but can help
• On their own, Clouds’ behaviour and tools will be insufficient
– Google and Microsoft have specific awareness of user-generated
personal data
– AWS currently offers this in a limited way with Amazon Macie
• Recommendations
– Perform a DPIA when selecting a Cloud Provider
– Perform a DPIA for each business process using a Cloud Provider
– Use Cloud-provided tools when the risk assessment identifies that
they can adequately address that part of the GDPR problem
Cloud IaaS and GDPR
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Can I insure against GDPR violations?
Implementing a GDPR program
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Generally, any fine
– especially if connected to deliberate
recklessness or connected to a
criminal offence
• Customer’s churn
• An insurer may not be liable for
payment of indemnity in certain
circumstances
What cannot be insured
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
What can be insured
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
GDPR Regulatory Heat Map
Source: DLA Piper (update 2018)
Not insurable
Austria, Belgium, Bulgaria,
Cyprus, Croatia, Czech
Republic, Denmark,
France, Hungary, Ireland,
Italy, Latvia, Luxembourg,
Malta, Portugal, Romania,
Slovakia, Spain,
Switzerland, United
Kingdom
Unclear
Estonia, Germany, Greece,
Netherland, Poland,
Lithuania, Sweden
Insurable
Finland, Norway
Data Regulatory Environment
High
Austria, Belgium, France,
Germany, Ireland, Italy,
Netherlands, Norway, Poland,
Portugal, Spain, Sweden,
Switzerland
Fairly High
Cyprus, Czech Republic,
Denmark, Estonia, Finland,
Greece, Hungary, Latvia,
Luxembourg, Romania,
Slovakia, Slovenia
Moderate
Bulgaria, Croatia, Lithuania,
Malta
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Three dimensions of continuous improvement
Risk Management
Information Lifecycle
Privacy by Design
Privacy by Default
Data Discovery & Classification
Asset Management
Physical Security
Change Management
Incident Response
Breach Notification
Compliance Programs
Vulnerability Management
Third-party Management
Documentation Management
Access Control
Data Deletion
Encryption
Pseudonymisation (Data Masking)
Monitoring
Secure Configuration
DR/BCM
Application Security
Data Leakage Prevention
Content Filtering
Employment Procedures
Confidentiality Agreements
Security & Privacy Awareness
Acceptable Use Policy
Access Controls
Technical Measures
Organizational
Measures
Security Processes
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Selected Controls Supporting GDPR Activities
Consent
Management
Art. 7
Data
Portability
Art. 20
Record of
Processing
Activities
(ROPAs)
Art. 30
Data Privacy
Impact
Assessment
(DPIA)
Art. 35
Right to
Access
Art. 15
Protection by
Design and Default
Art. 25
Continuous
Compliance
Art. 32
International
Data Transfer
Art. 44-46
Ability to Erase
Personal Data
Art. 17
Pseudonymisation
(Data Masking)
Art. 6
R. 26, 28
Breach
Notification
Art. 33, 34
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Encrypted data usually leads to pseudonymisation
– Re-identification and decryption after a data breach are still a risk
• Anonymise means delete or change identification marks so that
re-identification is impossible
• Pseudonymisation means prevent identification of the individual
by unauthorized parties or render such identification difficult
• Pseudonymisation can include data masking, redaction,
tokenization and/or encryption
• Ways to enhance security, but do not necessarily create data
that is out of scope for the GDPR
• Data breaches on encrypted personal data should be still
reported to regulatory authority
Encryption and Pseudonymisation
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Two main reasons to use data masking
1. personal identifiable data can only be used for designated
purposes
2. masking reduces risk/impact from a data breach
Data Masking
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Tokenisation vs Encryption
Tokenisation Encryption
Output is format and length
preserving
Output is generally not format length
preserving, except for FPE/OPE
May or may not use encryption as
mapping function (can use hashing
as mapping table)
Encryption does not have any use for
tokenisation
Output may or may not be reversible Given the key, output is always
reversible
PCI DSS, GDPR GDPR, HIPAA
Main use case: reduce PCI scope Main use case: confidentiality of data
at rest
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Standards are lacking
• Building trust-based relationships between consumers and
brands that put consumers in control of their personal data.
• Key to avoid the high costs of noncompliance
• It will likely be absorbed into consolidated marketing suites
– Document precise user experience (UX) requirements
– Develop a granular consent matrix
– Provide a customer consent dashboard
– Determine if a packaged consent management solution is justified
– Implement formal review and approval for consent flow designs
– Prototype with designers and customer experience experts
– Designs soliciting consent where its value is clear to users
Consent Management Tools
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Heart of data compliance strategy
• Central SSO management is critical for Cloud control
– “GDPR policy”
– Multi-factor authentication
– Restrict contractors/externals
– Geographical policies
• Can be paired with a CASB product
Identity and Access Management
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• “Privacy-preserving messaging protocols that enable entities to prove
that information available to both of them is correct, without the
requirement to transmit or share the underlying information”
• Characteristics
A) Completeness – encoding as a polynomial problem
• The prover wants to convince the verifier that this equality holds
B) Succinctness by random sampling
• Reduces both the proof size and the verification time tremendously
C) Homomorphic encoding / encryption
• Allows proving E(func(s)) without knowing s
D) Zero Knowledge
• The prover obfuscates in a way that the verifier can still check their
correct structure without knowing the actual encoded value
Zero Knowledge Proofs
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Gain a deeper understanding of the nature of these controls
• Be realistic with the current immaturity of ZKP solutions
• Evaluate how such controls may impact transaction authentication and
ultimately consumers
• Assess the impact on the broader information management strategy
• Assess the architectural implications for using ZKP with different
blockchains and distributed ledgers
Zero Knowledge Proofs – user advice
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
“Hype-Cycle” of GDPR
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Preparatory plan
• Build relationships
– Identify stakeholders
– Campaign internally
– Increase organizational understanding
– Map out a plan for the future
• Establish the Privacy Program
– Maintain privacy documentation for business units and users
– Establish a companywide mandatory reporting mechanism
– Review existing personal-data-processing operations
– Prioritize actions
• Keep reputation for integrity, inside and outside the company
Privacy Officers
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Incident Management
Incident Management
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Recent Incidents
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Recent Incidents
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Reporting to the CFO and Potential Investors
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Shares hit low point approximately 14 market days after breach
– share prices -2.89% on average, underperform NASDAQ by 4.6%
• After about a month, share prices rebound and catch up to
NASDAQ performance
• After first month, companies performed better than prior breach
– six months before breach, average share price +3.64%, but is
+7.02% after breach
– underperformed the NASDAQ by 1.53% before breach, outperform
it by 0.09% afterward
• Finance and payment companies have largest drop in share
price performance, Healthcare companies are the least affected
• Highly sensitive information see larger drops in share price
Key Findings from breached companies
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
• Plan for a security incident.
• Determine and document your response priorities and escalation paths.
• Brainstorm with members of the organization to think through various
scenarios.
• Draft messaging and corporate communications based on the
scenarios.
• Know which vendors are material to your operations.
• Make sure that those involved in the response know what their roles will
be and what authority they hold. Document it.
• Exercise the plan at least twice per year — preferably quarterly. The
more realism you inject into the exercise, the more likely it will execute
smoothly in real life.
Dealing with a Breach
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Backup Slides
Backup Slides
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
GDPR Implementation Landscape
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Practice Validation Requirements
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Gartner’s Recipe for GDPR Compliance
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Gartner’s Priority Matrix for GDPR

More Related Content

PPTX
Teradata's approach to addressing GDPR
PDF
Everything you Need to Know about The Data Protection Officer Role
PDF
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
PDF
How IBM Supports Clients around GDPR and Cybersecurity Legislation
PDF
GDPR and Irish SMEs May 2017
PDF
Complete Guide to General Data Protection Regulation (GDPR)
PPTX
An Essential Guide to EU GDPR
PDF
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Teradata's approach to addressing GDPR
Everything you Need to Know about The Data Protection Officer Role
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
How IBM Supports Clients around GDPR and Cybersecurity Legislation
GDPR and Irish SMEs May 2017
Complete Guide to General Data Protection Regulation (GDPR)
An Essential Guide to EU GDPR
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...

What's hot (20)

PPTX
BigID GDPR Compliance Automation Webinar Slides
PPTX
GDPR security services - Areyou ready ?
PDF
[Presentation] GDPR - How to Ensure Compliance
PDF
Data Privacy & Security
PPTX
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
PDF
Beginning your General Data Protection Regulation (GDPR) Journey
PDF
GDPR changes affect direct marketing
PPTX
GDPR practical info session for development
PPTX
GDPR: Your Journey to Compliance
PPTX
Vuzion Love Cloud GDPR Event
PPTX
GDPR: 3 Months On | Guest Speaker: Data Protection Commissioners
PDF
DAMA Ireland - GDPR
PPT
Building a register of data processing
PPTX
GDPR: Training Materials by Qualsys
PPTX
Gdpr action plan - ISSA
PPTX
GDPR From the Trenches - Real-world examples of how companies are approaching...
PDF
Addressing analytics, data warehouse and Big Data challenges beyond database ...
PPTX
12 steps to gdpr compliance unleashed
PDF
Developer view on new EU privacy legislation (GDPR)
PPTX
GDPR – The Practicalities of a New Reality
BigID GDPR Compliance Automation Webinar Slides
GDPR security services - Areyou ready ?
[Presentation] GDPR - How to Ensure Compliance
Data Privacy & Security
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
Beginning your General Data Protection Regulation (GDPR) Journey
GDPR changes affect direct marketing
GDPR practical info session for development
GDPR: Your Journey to Compliance
Vuzion Love Cloud GDPR Event
GDPR: 3 Months On | Guest Speaker: Data Protection Commissioners
DAMA Ireland - GDPR
Building a register of data processing
GDPR: Training Materials by Qualsys
Gdpr action plan - ISSA
GDPR From the Trenches - Real-world examples of how companies are approaching...
Addressing analytics, data warehouse and Big Data challenges beyond database ...
12 steps to gdpr compliance unleashed
Developer view on new EU privacy legislation (GDPR)
GDPR – The Practicalities of a New Reality
Ad

Similar to Impact of GDPR on Third Party and M&A Security (20)

PDF
#HR and #GDPR: Preparing for 2018 Compliance
PPTX
ABM Display Advertising Success in the World of GDPR [PPT]
PDF
GDPR- The Buck Stops Here
PPTX
EU's General Data Protection Regulation (GDPR)
PDF
GDPR: What does it mean for your business?
PDF
GDPR – Readiness in IT offshore organization
PDF
GDPR is Coming, Five Things You Can Do Now To Prepare
PPTX
GDPR How to get started?
PDF
What's Next - General Data Protection Regulation (GDPR) Changes
PPTX
Domain management and brand protection in the era of the EU's GDPR
PPTX
How GDPR will change Personal Data Control and Affect Everyone
PPTX
Gdpr action plan
PDF
GDPR - Sink or Swim
PPTX
GDPR Benefits and a Technical Overview
PDF
Gdpr for business full
PPTX
My presentation- Ala about privacy and GDPR
PPTX
Data Privacy for Information Security Professionals Part 1
PDF
Getting Ready for GDPR
PPTX
GDPR Data Life Cycle
PPTX
GDPR Enforcement is here. Are you ready?
#HR and #GDPR: Preparing for 2018 Compliance
ABM Display Advertising Success in the World of GDPR [PPT]
GDPR- The Buck Stops Here
EU's General Data Protection Regulation (GDPR)
GDPR: What does it mean for your business?
GDPR – Readiness in IT offshore organization
GDPR is Coming, Five Things You Can Do Now To Prepare
GDPR How to get started?
What's Next - General Data Protection Regulation (GDPR) Changes
Domain management and brand protection in the era of the EU's GDPR
How GDPR will change Personal Data Control and Affect Everyone
Gdpr action plan
GDPR - Sink or Swim
GDPR Benefits and a Technical Overview
Gdpr for business full
My presentation- Ala about privacy and GDPR
Data Privacy for Information Security Professionals Part 1
Getting Ready for GDPR
GDPR Data Life Cycle
GDPR Enforcement is here. Are you ready?
Ad

More from EQS Group (9)

PDF
Blockchain: everyone wants to sell me that - but is that really right for my ...
PDF
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
PDF
M&A security - E-crime Congress 2017
PDF
Architecting Security across global networks
PDF
313 – Security Challenges in Healthcare IoT - ME
PPT
Achieving PCI-DSS compliance with network security implementations - April 2011
PPT
Top risks in using NIPS - Brighttalk - July 2010
PPT
Best practices in NIPS - IDC Sofia - March 2010
PPT
Best practices in NIPS - Brighttalk - January 2010
Blockchain: everyone wants to sell me that - but is that really right for my ...
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
M&A security - E-crime Congress 2017
Architecting Security across global networks
313 – Security Challenges in Healthcare IoT - ME
Achieving PCI-DSS compliance with network security implementations - April 2011
Top risks in using NIPS - Brighttalk - July 2010
Best practices in NIPS - IDC Sofia - March 2010
Best practices in NIPS - Brighttalk - January 2010

Recently uploaded (20)

DOCX
Euro SEO Services 1st 3 General Updates.docx
PPTX
Probability Distribution, binomial distribution, poisson distribution
PDF
How to Get Funding for Your Trucking Business
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PDF
Chapter 5_Foreign Exchange Market in .pdf
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
Deliverable file - Regulatory guideline analysis.pdf
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
DOC-20250806-WA0002._20250806_112011_0000.pdf
PPT
Data mining for business intelligence ch04 sharda
PPTX
Business Ethics - An introduction and its overview.pptx
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PPTX
5 Stages of group development guide.pptx
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
Euro SEO Services 1st 3 General Updates.docx
Probability Distribution, binomial distribution, poisson distribution
How to Get Funding for Your Trucking Business
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Chapter 5_Foreign Exchange Market in .pdf
unit 1 COST ACCOUNTING AND COST SHEET
Deliverable file - Regulatory guideline analysis.pdf
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Power and position in leadershipDOC-20250808-WA0011..pdf
DOC-20250806-WA0002._20250806_112011_0000.pdf
Data mining for business intelligence ch04 sharda
Business Ethics - An introduction and its overview.pptx
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
COST SHEET- Tender and Quotation unit 2.pdf
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Belch_12e_PPT_Ch18_Accessible_university.pptx
5 Stages of group development guide.pptx
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi

Impact of GDPR on Third Party and M&A Security

  • 1. Dr Marco Ermini, CISA, CISM, CISSP, ITILv3, GCIH, RCSS, PhD Senior Security and Compliance Officer, Orange Business Services The impact of GDPR on Third- Party and M&A security
  • 2. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Describe the impact of GDPR on three different but connected business processes: – Mergers & Acquisitions (M&A) – Third-party security – Outsourcing security • Approaching an external organization is going to be different after GDPR is in force Take away
  • 3. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • GDPR impact has been mostly focused on technology • Understand the general impact of GDPR on M&A prospects • Impact of GDPR on third-party and outsourcing security • Identify specific GDPR programs, which affect third-party, outsourcing and M&A processes • What "privacy" means in the context of M&A activities, outsourcing and third-party What is this all about?
  • 4. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Let’s get started!
  • 5. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Compressed GDPR or “GDPR for dummies” Setting the stage
  • 6. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Legal. The GDPR is a law. This research note is not intended as legal advice or comprehensive guidance. • Procedural. (New) roles, responsibilities, accountabilities and processes to be implemented • Technical. The GDPR includes many data protection principles and requirements that must be enabled by technology, or that require technology to limit impact to internal operations Three Dimensions of GDPR
  • 7. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • The GDPR is about protection of personal data and privacy • Securing personal data is only a subset of all requirements • “Personal data" in the GDPR depends on context • Ask the company's legal advisor Personal Data and Privacy
  • 8. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. 1. GDPR is enacted law, not an elective standard; penalties for noncompliance are potentially severe 2. GDPR is "extra-territorial“, which means it applies to all organizations that offer goods and services into EU markets 3. Reputational damage, loss of employees and erosion of customer trust are inevitable if you disregard the rights of data subjects or fail to report and deal with a breach of their personal data correctly 4. GDPR refers to the inclusion of a data processor in your business process, which broadens the attack surface for vulnerabilities and the controller's responsibility to keep informed on the data processor’s status Why GDPR is a concern
  • 9. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. and/or Implementing a GDPR program Gap Analysis Implement Basic Aspects
  • 10. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. 1. Governance and Accountability 2. Privacy “by design” and “by default” 3. Privacy Impact Assessment 4. Enforcement 5. New rights for Data Subjects (DS) 6. New obligations for Data Processors (DP) 7. Privacy Notices GDPR in a Nutshell – 1/2
  • 11. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. 6. User consent 7. Data Protection Officers (DPO) 8. Notification of security breaches 9. Enforcement scope 10.European Data Protection Board 11.Concepts of “pseudonomysed” data and privacy seal (“EuroPriSe") GDPR in a Nutshell – 2/2 Image credits: https://www.peerlyst.com/posts/gdpr- getting-to-the-lawful-basis-for-processing- david-froud
  • 12. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • The GDPR does provide data subjects with a set of rights over the administration and use of their personal data • Organizations that control personal-data processing activities throughout the data life cycle should have less trouble enabling these rights • The right to data portability could be assured by implementing a self-service portal; the same online platform can be used to provide transparency and notification • The right "not to be subject to a decision based solely on automated processing, including profiling" implies a strong focus on automation of analytics and the use of the subsequent results Data Subjects rights
  • 13. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • It should be freely given, there can be no coercion or pressure – Consider employee relations • "Consent" in the GDPR requires several conditions: – "By a clear affirmative act" – "Specific“ – "(As an) informed and unambiguous indication of the data subject's agreement to the processing of personal data“ • The burden of proof that consent was obtained lies with the data controller Data Subject consent
  • 14. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Recap: DC vs DP Data Controller Data Processor Controls what personal data is processed Uses data only as instructed by Data Controller Responsible for the processing purpose (e.g. determines why that personal data is processed) Processes data as instructed by the Data Controller Responsible for the means of processing by the Data Processor Must respect the contractual agreement with the Data Controller May create third-party agreements with Data Processors and sub-Processors May create sub-Processor agreements as authorised by the Data Controller Data Processor = Third-Party
  • 15. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Organizations should be aware that they can occupy both roles in different processing activities • Using a cloud-hosting provider's services, an organization may be a data controller and the hosting provider the data processor as it stores and processes the data on behalf of the data controller. • Conversely, when deploying EU-based employees, the cloud provider may be the controller for the HR activities. • Similarly, a marketing agency may be a B2B client's data processor in the initial service provision, but when it uses the data gained in contracts to enrich profiles for a campaign of its own, it is the data controller for the latter activity. DC vs DP
  • 16. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. GDPR Implementation Basics Implementing a GDPR program
  • 17. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. GDPR Personal Data Lifecycle Collect + Classify • Define the purposes of collection • Collect only the personal data necessary • Inform data subjects • Identify the categories and sensitivity of personal data Secure Implement technical and organizational measures to ensure a level of security appropriate to the risk based on the nature, scope, context and purposes of processing. Process • Process personal data lawfully, fairly and transparently • Facilitate the exercise of Data Subject rights Share • Only share personal data with processors that provide sufficient guarantees • Perform GDPR compliant cross-border data transfers Delete • Do not keep personal data for longer than it is necessary • Upon lawful request, erase a data subject’s personal data without undue delay • Notify any processors of the erasure request Document Maintain records of all processing activities covering the entire personal data lifecycle
  • 18. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Performing a risk assessment – data processing activities – each technical and organizational control • Developing a prioritized remediation roadmap • Implementing technical, organizational, policy, and process improvements • Documenting the overall control environment – strengths – weaknesses – intended future state GDPR Gap Analysis How-To
  • 19. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. 1. Write a Privacy Notice and publish it 2. Inventory of processes and activities 3. Implement Data Retention 4. Implement Data Subject access rights and consent requests – B2C – HR – Procurement 5. Perform Data Protection Impact Assessment 6. Implement Security & Privacy by design / privacy by default 7. Handle personal data transfer & Third-Party management 8. Ensure Data Breach management process is in place Basics of GDPR Implementation
  • 20. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Art. 30 is the foundation for all compliance activities • Opportunity to leverage information being collected to enable “flags” which indicates high-risk business processes • Use art. 30 to set up a system which is starting to document what is collected and from who is collected • Automate time consuming and timely processes (sending reminders, etc.) • Setup thresholds to identify where something triggers a Data Protection Impact Assessment (DPIA) – or not • Use this system to check cross-border data transfer points Art. 30, “Records of Processing Activities” – 1/2
  • 21. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Justify the collection of data, data retention, and identify where the right consent is given – legitimate business activity? • Setup reminder of when data needs to be “retired” • Build-in reporting for external vendors – interactive technology, trigger questionnaires, etc. • Make it simple for the Data Subject – single point of contact and front-end process (self-service portal) – standard templates (informative and standard) – backend processes codified and standardised • Interaction as a positive experience, reflect the company positively Art. 30, “Records of Processing Activities” – 2/2
  • 22. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Information is an asset – Like software and hardware assets, build an inventory • Information is fluid – Include data flow diagrams • Answer these questions & document the answers – What data do we have? – How and why do we collect it? – What do we do with it? – Where do we store it? – How do we secure it? – Who do we share it with? – How long do we retain it? – What do we do with it at end of life? Information is the new gold
  • 23. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Source: Awareness Briefings on Russian Government Activity against Critical Infrastructure Third-Party vs Critical Infrastructure
  • 24. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Attackers are patient (instances of laying in wait for over a year) • Attackers know not to walk in the digital front door, preferring to hit weak vendors • Pivoting is not confined to just a company, pivoting across companies is very real • “Secure” vendors are not as secure as they want us to think • When vendors brag about having certain companies as clients, they open themselves up as targets • External firms are being used as staging and exfiltration points • Moving between traditional IT and ICS/SCADA is relatively simple today Lessons learned
  • 25. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Many organizations outsource processing of personal data with third-party service providers – Very little control over data, increased risk of noncompliance – Security posture is rarely an evaluation criterion • Recommendations – Specify vendor-selection criteria – Add requirements as exclusion/inclusion criterion in procurement – Ensure adherence to the requirements throughout the lifetime of the contract by leveraging one or more assurance methods as described Third-party and GDPR
  • 26. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Google’s VSAQ Source: Google VSAQ
  • 27. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Use automation for vendor management • Reduce the amount of work. Look for control that meets the purpose, they meet controls and documentation level that you expect for your own internal level • Teeth in the contracts, periodic review • Breach due to vendor? Data exposed? Show that due diligence was done, appropriate controls where in place and additional security practices where instantiated to protect to the best level of ability and appropriate to the level of sensitivity • Diversified data stores – pulling data from different IT security applications, everything you said you will do is done, if not, create a gap analysis and remediation plan. Visibility is the key. Minimize third-party and internal risks
  • 28. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Supplier’s Management – ISO 27001 Screening / Auditing Selecting clauses in the agreement Access control Compliance monitoring Termination of the agreement Risk Assessment clause 6.1.2 control A.7.1.1 control A.15.1.2 control A.9.4.1 control A.15.2.1 control A.8.1.4 control A.9.2.6
  • 29. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Why M&A need Cyber Security support? • What is the impact from the GDPR? • What value does a security professional bring to the team? Cybersecurity and GDPR for M&A
  • 30. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Confidentiality • Speed • Business as usual – Zero Impact • Informed Business Decision on Risk Business Drivers
  • 31. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Special Interest Groups – gain from the Operation – Financial Criminals – Competitors – Acquisition / Merger Company – Disgruntled Employees • General Interest Groups – gain from Impact – Script Kiddies / Hackers – Hacktivists / Terrorists – Spies M&A Threats
  • 32. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. This used to be the only threat…
  • 33. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Publicity, raising profile — your interest gets attacker’s interest! • Impact on: – Resources – Technologies – Infrastructure • Disgruntled Employees • Change in threat and risk model • Absorbing unknown / confusion • Creating new attack vectors and window of opportunity • Business drivers force the hand of the Security Manager very quickly • Are we all really equipped for change? Introspection moment Scoping the Risks
  • 34. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. How Due Diligence looks for real
  • 35. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Virtual Data Rooms
  • 36. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Significant behavioural change in acquirers • Embed GDPR considerations in technology due diligence • Failing to do this brings significant transaction risks • Gap Analysis for GDPR readiness • Key areas: due diligence and post-merger integration GDPR driving changes in M&A
  • 37. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Actual liabilities in terms of compliance • How divergent a target is from the buyer’s internal processes and standards – potential impact on the post-merger roadmap • Latent security issues in the product/service – reputational, operational, financial or legal impact • Identify risks in: – Compliance – Market – Technical assets including intellectual property – Operations – Integration Due diligence – technical goals
  • 38. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • “Privacy risk” • Much more comprehensive • How target collects, stores, uses and transfers personal data • Historical data breaches • Include data processing in NDAs • QUIZ time! Due diligence risk assessment Buyer Target Data Controller Data Processor
  • 39. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. M&A experts on GDPR and Cybersecurity
  • 40. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Engage cybersecurity experts • New questions – How is cyber-diligence conducted? – Specialist service providers? – What do we need to be aware of? – Has the business enough technical knowledge? Engage cybersecurity risks for GDPR in M&A
  • 41. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Completeness and suitability of the approach of target • Data sets, risks and mitigations for GDPR risks have been assessed • Changes to the treatment of the data sets, risks and mitigations for GDPR risks have been assessed as a result of the M&A activity • Analysis of the separation and carve out risks for GDPR Four Steps for Due Diligence
  • 42. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Capture • Connect • Combine • Consolidate Post-Merger activities – Basics
  • 43. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Address consent from existing Data Subjects • Security Transformation Program • Manage risk in the short/medium term while satisfying compliance • Ensure detect and respond strategy for cyber security incidents • Technical Security consulting in cyber security Post-Merger activities – GDPR specifics
  • 44. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Protecting the effort itself – Confidentiality of the total effort – Confidentiality of the team’s work • Evaluating the security condition of the target company – Impact on the deal’s value – GDPR into play – Asking the right questions • Providing subject matter expertise – Identify Security Requirements for the New Company – Controlling Rumors – Managing Global/International Aspects – “Team Consultant” – Low Hanging Fruits The Role of the Cybersecurity Expert
  • 45. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Preliminary background investigations – Collection of Open-Source information • Due diligence – More in-depth look – Estimation of Costs of Cyber Security – GDPR impact! • Operations security – post-merger into focus – Protect operational activities – Develop and implement protective measures – Appropriate for each phase of the acquisition The Cybersecurity Expert in action
  • 46. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Resources, staffing, processes, and systems • Business processes • IT tools • Active Directory merging strategy is key! • The Target company has comparable / same security • Exceptions are documented and signed off by leadership • Agreed-upon designs • Operations turned to standard support • Weekly or recurring meetings Combining the two companies
  • 47. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Target Characteristics Security Guidelines SLAs SMALL ➤ Small employee base (< 200 employees) ➤ Low complexity ➤ Private ownership ➤ Little to no geographical diversity ➤ No separate legal entities ➤ No/limited need to keep the same facilities ➤ No/limited to keep the existing technologies ➤ Purchased for limited product portfolio, technology, talent, or local presence ➤ Baseline security controls Target is fully absorbed into IT infrastructure ➤ All IT labor is absorbed into IT global business units ➤ Security controls established or confirmed in less than 100 days MEDIUM ➤ Similar to previous kind, but Target has certain identifiable complexities that require specific sensitivity during integration ➤ Fewer than 500 employees ➤ Needs to be stand-alone for a certain period of time ➤ During stand-alone time, Target maintains defined non- compliances ➤ Supports its own IT infrastructure during the stand-alone phase ➤ Integration of Target may be full, hybrid, or standalone ➤ All IT labor is absorbed into IT global business units ➤ Operation integration of some IT infrastructure may take +180 days ➤ Processes may take 3 to 9 months LARGE ➤ More than 500 employees ➤ Relatively large operations ➤ Significant multinational presence and subsidiaries ➤ Target contains certain identifiable complexities that require specific sensitivity during integration ➤ Integration of Target may be full, hybrid, or standalone ➤ IT labor can stay funded by Target company ➤ Operation integration of some IT infrastructure may take +180 days ➤ Customized integration plan ➤ IT Support is shared ➤ Processes take more than 12 months IT/Cybersecurity Post-Mergers Objectives
  • 48. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Safeguards against disgruntled employees • New employee contracts – Are existing Policies still relevant? – Are we “dumbing down” their security? • Existing employee contracts – Do they protect you? – Do they meet new relationship? • Identify key policies — yours vs theirs – Work with Legal Departments Merging Policies
  • 49. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Lack of privacy documentation can lower target’s value • Privacy by design and by default can have business fall behind • “Personal information is the new gold” • Strategy for cost-effective data protection = – Competitive advantage – Boost in value – Considered more secure trustworthy by customers – Emphasize valuation • Rewards in greater utilization of personal data • Potential reward: increase M&A deal value significantly Conclusions
  • 50. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Using Cloud Services invokes a shared responsibility model • GDPR creates issues for organizations that process personal data in the Public Clouds – rights of data subjects – data residency – cross-border transfers • The level of support from cloud providers may not be known • Recommendations: – gap analysis – identify the organizational and technical actions required – ask all public cloud service providers to provide required certification or proof of adherence to a code of conduct GDPR has no specific guidance on Cloud
  • 51. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • A Data Controller is responsible for the conduct of any of its Data Processors – even if they are Cloud Providers • Noncompliance with regard to GDPR on the vendor side reflects on the compliance of the end-user organization • Moving to the cloud may add to the security aspects of the processing activity, but could also lead to residency concerns • CASB service may be helpful • Data protection in hybrid or on-premises operations is increased by adoption of DCAP products • Privacy compliance is demonstrated by mapping, dashboarding and logical control application Helpful Cloud tools
  • 52. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • IaaS cannot make a company GDPR-compliant, but can help • On their own, Clouds’ behaviour and tools will be insufficient – Google and Microsoft have specific awareness of user-generated personal data – AWS currently offers this in a limited way with Amazon Macie • Recommendations – Perform a DPIA when selecting a Cloud Provider – Perform a DPIA for each business process using a Cloud Provider – Use Cloud-provided tools when the risk assessment identifies that they can adequately address that part of the GDPR problem Cloud IaaS and GDPR
  • 53. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Can I insure against GDPR violations? Implementing a GDPR program
  • 54. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Generally, any fine – especially if connected to deliberate recklessness or connected to a criminal offence • Customer’s churn • An insurer may not be liable for payment of indemnity in certain circumstances What cannot be insured
  • 55. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. What can be insured
  • 56. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. GDPR Regulatory Heat Map Source: DLA Piper (update 2018) Not insurable Austria, Belgium, Bulgaria, Cyprus, Croatia, Czech Republic, Denmark, France, Hungary, Ireland, Italy, Latvia, Luxembourg, Malta, Portugal, Romania, Slovakia, Spain, Switzerland, United Kingdom Unclear Estonia, Germany, Greece, Netherland, Poland, Lithuania, Sweden Insurable Finland, Norway Data Regulatory Environment High Austria, Belgium, France, Germany, Ireland, Italy, Netherlands, Norway, Poland, Portugal, Spain, Sweden, Switzerland Fairly High Cyprus, Czech Republic, Denmark, Estonia, Finland, Greece, Hungary, Latvia, Luxembourg, Romania, Slovakia, Slovenia Moderate Bulgaria, Croatia, Lithuania, Malta
  • 57. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Three dimensions of continuous improvement Risk Management Information Lifecycle Privacy by Design Privacy by Default Data Discovery & Classification Asset Management Physical Security Change Management Incident Response Breach Notification Compliance Programs Vulnerability Management Third-party Management Documentation Management Access Control Data Deletion Encryption Pseudonymisation (Data Masking) Monitoring Secure Configuration DR/BCM Application Security Data Leakage Prevention Content Filtering Employment Procedures Confidentiality Agreements Security & Privacy Awareness Acceptable Use Policy Access Controls Technical Measures Organizational Measures Security Processes
  • 58. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Selected Controls Supporting GDPR Activities Consent Management Art. 7 Data Portability Art. 20 Record of Processing Activities (ROPAs) Art. 30 Data Privacy Impact Assessment (DPIA) Art. 35 Right to Access Art. 15 Protection by Design and Default Art. 25 Continuous Compliance Art. 32 International Data Transfer Art. 44-46 Ability to Erase Personal Data Art. 17 Pseudonymisation (Data Masking) Art. 6 R. 26, 28 Breach Notification Art. 33, 34
  • 59. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Encrypted data usually leads to pseudonymisation – Re-identification and decryption after a data breach are still a risk • Anonymise means delete or change identification marks so that re-identification is impossible • Pseudonymisation means prevent identification of the individual by unauthorized parties or render such identification difficult • Pseudonymisation can include data masking, redaction, tokenization and/or encryption • Ways to enhance security, but do not necessarily create data that is out of scope for the GDPR • Data breaches on encrypted personal data should be still reported to regulatory authority Encryption and Pseudonymisation
  • 60. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Two main reasons to use data masking 1. personal identifiable data can only be used for designated purposes 2. masking reduces risk/impact from a data breach Data Masking
  • 61. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Tokenisation vs Encryption Tokenisation Encryption Output is format and length preserving Output is generally not format length preserving, except for FPE/OPE May or may not use encryption as mapping function (can use hashing as mapping table) Encryption does not have any use for tokenisation Output may or may not be reversible Given the key, output is always reversible PCI DSS, GDPR GDPR, HIPAA Main use case: reduce PCI scope Main use case: confidentiality of data at rest
  • 62. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Standards are lacking • Building trust-based relationships between consumers and brands that put consumers in control of their personal data. • Key to avoid the high costs of noncompliance • It will likely be absorbed into consolidated marketing suites – Document precise user experience (UX) requirements – Develop a granular consent matrix – Provide a customer consent dashboard – Determine if a packaged consent management solution is justified – Implement formal review and approval for consent flow designs – Prototype with designers and customer experience experts – Designs soliciting consent where its value is clear to users Consent Management Tools
  • 63. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Heart of data compliance strategy • Central SSO management is critical for Cloud control – “GDPR policy” – Multi-factor authentication – Restrict contractors/externals – Geographical policies • Can be paired with a CASB product Identity and Access Management
  • 64. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • “Privacy-preserving messaging protocols that enable entities to prove that information available to both of them is correct, without the requirement to transmit or share the underlying information” • Characteristics A) Completeness – encoding as a polynomial problem • The prover wants to convince the verifier that this equality holds B) Succinctness by random sampling • Reduces both the proof size and the verification time tremendously C) Homomorphic encoding / encryption • Allows proving E(func(s)) without knowing s D) Zero Knowledge • The prover obfuscates in a way that the verifier can still check their correct structure without knowing the actual encoded value Zero Knowledge Proofs
  • 65. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Gain a deeper understanding of the nature of these controls • Be realistic with the current immaturity of ZKP solutions • Evaluate how such controls may impact transaction authentication and ultimately consumers • Assess the impact on the broader information management strategy • Assess the architectural implications for using ZKP with different blockchains and distributed ledgers Zero Knowledge Proofs – user advice
  • 66. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. “Hype-Cycle” of GDPR
  • 67. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Preparatory plan • Build relationships – Identify stakeholders – Campaign internally – Increase organizational understanding – Map out a plan for the future • Establish the Privacy Program – Maintain privacy documentation for business units and users – Establish a companywide mandatory reporting mechanism – Review existing personal-data-processing operations – Prioritize actions • Keep reputation for integrity, inside and outside the company Privacy Officers
  • 68. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Incident Management Incident Management
  • 69. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Recent Incidents
  • 70. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Recent Incidents
  • 71. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Reporting to the CFO and Potential Investors
  • 72. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Shares hit low point approximately 14 market days after breach – share prices -2.89% on average, underperform NASDAQ by 4.6% • After about a month, share prices rebound and catch up to NASDAQ performance • After first month, companies performed better than prior breach – six months before breach, average share price +3.64%, but is +7.02% after breach – underperformed the NASDAQ by 1.53% before breach, outperform it by 0.09% afterward • Finance and payment companies have largest drop in share price performance, Healthcare companies are the least affected • Highly sensitive information see larger drops in share price Key Findings from breached companies
  • 73. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. • Plan for a security incident. • Determine and document your response priorities and escalation paths. • Brainstorm with members of the organization to think through various scenarios. • Draft messaging and corporate communications based on the scenarios. • Know which vendors are material to your operations. • Make sure that those involved in the response know what their roles will be and what authority they hold. Document it. • Exercise the plan at least twice per year — preferably quarterly. The more realism you inject into the exercise, the more likely it will execute smoothly in real life. Dealing with a Breach
  • 74. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Backup Slides Backup Slides
  • 75. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. GDPR Implementation Landscape
  • 76. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
  • 77. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
  • 78. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
  • 79. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
  • 80. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
  • 81. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
  • 82. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
  • 83. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
  • 84. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
  • 85. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
  • 86. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Practice Validation Requirements
  • 87. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Gartner’s Recipe for GDPR Compliance
  • 88. Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. Gartner’s Priority Matrix for GDPR