SlideShare a Scribd company logo
Risk assessments and applying
organisational controls for GDPR
compliance
Presented by:
• Alan Calder, founder and executive chairman, IT Governance
2 November 2017
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
• Alan Calder
• Founder of IT Governance
• The single source for IT governance, cyber risk management and IT
compliance
• IT Governance: An International Guide to Data Security and ISO 27001/ISO
27002, 6th edition (Open University textbook)
• www.itgovernance.co.uk
Introduction
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
IT Governance Ltd: GRC one-stop shop
All verticals, sectors and all organisational sizes
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
• An overview of the General Data Protection Regulation (GDPR) and
risk assessments.
• The process for risk management and industry best practice for risk
treatment.
• The components of an internal control system and privacy
compliance framework.
• ISO 31000 principles and the risk management process.
Agenda
Copyright IT Governance Ltd 2017 – v1.0
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
The GDPR’s impact
• UK organisations that process personal data only have a short time to make sure that
they are compliant.
• The Regulation extends the data rights of individuals, and requires organisations to
develop clear policies and procedures to protect personal data, and adopt appropriate
technical and organisational measures.
“This Regulation shall be binding in its entirety and directly
applicable in all Member States.”
Final text of the Regulation: http://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX%3A32016R0679
8 April 2016
Council of the
European Union
adopted the
GDPR
12 April 2016
The GDPR was
adopted by the
European
Parliament
4 May 2016
The official text
of the Regulation
was published in
the Official
Journal of the EU
24 May 2016
The Regulation
entered into
force
25 May 2018
The GDPR will
apply
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Material and territorial scope
Natural person = a living individual
• Natural persons have rights
associated with:
– The protection of personal
data;
– The processing of personal
data; and
– The unrestricted movement of
personal data within the EU.
In material scope:
– Personal data that is
processed wholly or partly by
automated means.
– Personal data that is part of a
filing system, or intended to
be.
The Regulation applies to controllers and processors in the EU, irrespective of
where processing takes place.
It applies to controllers outside the EU that provide services into the EU.
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Penalties
Administrative fines
• Administrative fines will, in each case, be effective, proportionate and
dissuasive, and take account of the technical and organisational
measures that have been implemented.
€10,000,000 or, in the case of an undertaking, up to 2% of the total worldwide
annual turnover of the preceding financial year.
€20,000,000 or, in the case of an undertaking, up to 4% of the total worldwide
annual turnover in the preceding financial year.
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
The GDPR and risk management frameworks
• Article 32: “The controller and the processor shall implement appropriate
technical and organisational measures to ensure a level of security
appropriate to the risk.”
• “In assessing the appropriate level of security account shall be taken in
particular of the risks that are presented by processing, in particular from
accidental or unlawful destruction, loss, alteration, unauthorised disclosure of,
or access to personal data transmitted, stored or otherwise processed.”
• “Taking into account the nature, scope, context and purposes of processing
as well as the risks of varying likelihood and severity for the rights and
freedoms of natural persons, the controller shall implement appropriate
technical and organisational measures to ensure and to be able to
demonstrate that processing is performed in accordance with this Regulation.”
(Article 24-1)
The data protection officer (DPO) plays a key bridging role between corporate risk
management, broader cyber security risk management and managing risks to personal data.
NB: Network and Information Systems (NIS) Directive and Government Cyber Security
Strategy
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Risk assessments under the GDPR
Article 35: Where processing, in particular using new technologies, and
taking into account the nature, scope, context and purposes of the
processing, is likely to result in a high risk to the rights and freedoms
of natural persons.
• A data protection impact assessment (DPIA) is particularly
required in the case of:
– Automated processing, including profiling, and on which decisions are based
that produce legal effects concerning natural persons;
– Large-scale processing of special categories of data or of personal data
relating to criminal convictions; and
– A systematic monitoring of a publicly accessible area on a large scale.
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
DPIAs
A DPIA will set out as a minimum:
• A systematic description of the processing and purposes.
• Legitimate interests (where applicable) pursued by the controller.
• An assessment of the necessity and proportionality of the processing.
• An assessment of the risks to the rights and freedoms of the data subjects.
• The measures envisaged to address the risks, including:
 Compliance with approved codes of conduct should be taken into account.
 All safeguards and security measures to protect data and to demonstrate
compliance.
• Where appropriate, consult the data subjects.
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
What is risk?
• The effect of uncertainty on objectives (ISO 31000, etc.).
• A combination of the likelihood of an incident occurring
and the impact, if it does occur, on the organisation.
• A probability or threat of damage, injury, liability, loss, or
any other negative occurrence that is caused by external
or internal vulnerabilities, and that may be avoided
through pre-emptive action (businessdictionary.com).
• Risk can be good or bad.
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Key definitions
Risk assessments: the overall process of risk
identification, risk analysis and risk evaluation.
Risk management: the coordinated activities to direct and
control an organisation with regard to risk.
Risk treatment: the process to modify risk.
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Risk and what it means under the GDPR
Risks to individuals: the potential for
damage or distress.
Risks to organisations: financial and/or
reputational impact of a data breach.
Privacy risk should already be on the
CORPORATE RISK REGISTER
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Risk assessments
Risk assessments help:
• Identify the threats that could harm and affect an
organisation’s assets;
• Determine the value and sensitivity of data by identifying
the level of risk that data carries if threatened; and
• Implement cost-effective measures to mitigate and
reduce the risk.
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Risk assessments
Asset Vulnerability Threat Risk
Risk assessments determine the appropriate controls to reach
acceptable levels of risk.
Risk cannot exist without these three components:
1. An asset that has value and requires protection.
2. A threat that can hurt it.
3. A vulnerability – a weakness that allows the threat to reach
the asset.
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Why do we assess risk?
A risk assessment informs a proper balance of safeguards
against the risk of failing to meet business objectives.
Inform a position so that:
• Removal of safeguards will increase the risk of loss to an
unacceptable level; and
• Adding any safeguards would make the security system too
expensive/bureaucratic.
... and therefore it is a means by which expenditure on security
and contingency can be justified.
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Examples of risk
Inaccurate, insufficient
or out-of-date
Kept for too long Excessive or irrelevant
Disclosed to the wrong
people
Insecurely
transmitted/stored
Used in ways that are
unacceptable or
unexpected
Data that is:
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Risk assessment (based on ISO 31000)
• Workshop, facilitated by a risk expert
• (Key) Assets at risk
• (Key) Threat – vulnerability relationships
• NB: ‘vulnerability’: weakness of an asset or control that can be exploited by
one or more threats
Identify risks
• Consequence (impact)
• Probability (likelihood)
• Level of risk (e.g. impact x likelihood)
Analyse risks
• Compare risks with risk criteria (e.g. risk appetite)
Evaluate risks
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Risk criteria – per ISO 31000
• When defining risk criteria, consider:
– The nature and types of causes and consequences that can occur
and how they will be measured;
– How likelihood will be defined;
– The timeframe(s) of the likelihood and/or consequence(s);
– How the level of risk is to be determined;
– The views of stakeholders;
– The level at which risk becomes acceptable or tolerable; and
– Whether combinations of multiple risks should be taken into account
and, if so, how and which combinations should be considered.
• www.itgovernance.co.uk/shop/p-747-iso31000-iso-31000-risk-
management-guidelines.aspx
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Risk scenarios – components
Adapted from ISACA, The Risk IT Framework, USA, 2009
Risk
scenario
Actor
• Internal (staff,
contractor)
• External (competitor,
outsider, business
partner, regulator,
market)
Threat type
• Malicious
• Accidental/error
• Failure
• Natural
• External requirement
Event
• Disclosure
• Interruption
• Modification
• Theft
• Destruction
• Ineffective design
• Ineffective execution
• Rules and regulations
• Inappropriate use
Asset/resource
• People & organisation
• Process
• Infrastructure
(facilities)
• IT Infrastructure
• Information
• Applications
Time
• Duration
• Timing of occurrence
(critical, non-critical)
• Timing to detect
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
ISO 27005 – risk management
Context establishment
Risk assessment
Risk identification
Risk analysis
Risk evaluation
Risk acceptance
Riskcommunicationand
consultation
Riskmonitoring
andreview
Risk treatment
Risk decision point 1
Assessment satisfactory?
N
Y
N
Y
Risk decision point 2
Treatment satisfactory?
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Risk and countermeasures
High
Medium
Very high
Likelihood
High
Medium
Medium
Low
Very low Low
Negative impact
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Risk treatment controls
• ISO 27001 information security management system
(ISMS) controls are typically selected by objective, taking
into account:
– National and international legislation and regulations and
baseline security criteria;
– Organisational objectives;
– Operational requirements and constraints;
– Cost of implementation and operation (versus risks being
reduced and proportional to the organisation);
– That they should be implemented to monitor, evaluate and
improve the efficiency and effectiveness of information security
controls to support the organisation’s aims; and
– Balancing investment against harm from security failures.
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Example countermeasures
Product/technology
Site/building physical security
Bomb detection
Fire/power outage protection
Identification and authentication
Logical access control
Software change control
Process
System admin controls
Financial accounting
Business continuity planning
Reporting and reacting to
incidents
Media controls
People
Security training
and awareness
Staff vetting
Leaver
management
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Examples of risk treatment
Reduce data collected
Retention policy
Secure destruction of information
Access control
Training and awareness
Pseudonymise information
Contracts or data-sharing agreements
Acceptable use policy
Subject access request process
External supplier risk assessments
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Assess the costs and benefits
Cost
Controls
implemented
Vulnerabilities
Risk acceptance
Number of controls
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Next steps
A practical approach to risk management for GDPR
compliance:
• Agree approach to risk management.
• Degree of assurance required.
• Conduct risk assessment:
– Ensure those involved understand the methodology (training?)
to ensure comparable and reproducible results.
• Manage (reduce) risk to level of assurance required using controls
and compare to standards such as ISO 30001 or ISO 27001.
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Next steps
A practical approach to risk management for
GDPR compliance
Step 1:
Assess risk
Identify risk
Prioritise initiatives
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Next steps
A practical approach to risk management for
GDPR compliance
Step 2:
Classify data
Take action
Implement incident
management response
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Next steps
A practical approach to risk management for
GDPR compliance
Step 3:
Demonstrate ongoing risk
and incident monitoring
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
Risk assessment tool: vsRisk™
• Key benefits include:
– Simplification: minimises the manual hassle and complexity
of carrying out an information security risk assessment, saving
time and resources.
– Replication: risk assessments can be repeated easily in a
standard format year after year.
– Generates reports: for exporting, editing and sharing across
the business and with auditors.
– Automation: the fast and simple way to carry out a risk
assessment.
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
IT Governance: GDPR one-stop shop
Self-help materials
A pocket guide
www.itgovernance.co.uk/shop/P
roduct/eu-gdpr-a-pocket-guide
Implementation manual
www.itgovernance.co.uk/shop/Pr
oduct/eu-general-data-protection-
regulation-gdpr-an-
implementation-and-compliance-
guide
Documentation toolkit
www.itgovernance.co.uk/shop/P
roduct/eu-general-data-
protection-regulation-gdpr-
documentation-toolkit
Compliance gap assessment
tool
www.itgovernance.co.uk/shop/Pr
oduct/eu-gdpr-compliance-gap-
assessment-tool
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
IT Governance: GDPR one-stop shop
Training courses
One-day accredited Foundation course (classroom, online, distance
learning)
www.itgovernance.co.uk/shop/Product/certified-eu-general-data-
protection-regulation-foundation-gdpr-training-course
Four-day accredited Practitioner course (classroom, online, distance
learning)
www.itgovernance.co.uk/shop/Product/certified-eu-general-data-
protection-regulation-practitioner-gdpr-training-course
One-day DPIA workshop (classroom)
www.itgovernance.co.uk/shop/Product/data-protection-impact-
assessment-dpia-workshop
Copyright IT Governance Ltd 2017 – v1.1
TM
www.itgovernance.co.uk
• Gap analysis
Our experienced data protection consultants can assess the exact standing of your current
legal situation, security practices and operating procedures in relation to the Data
Protection Act (DPA) or the GDPR.
• Data flow audit
Data mapping involves plotting all of your data flows, drawing up an extensive inventory
of the data to understand where the data flows from, within and to. This type of analysis
is a key requirement of the GDPR.
• DPO as a service
Outsourcing the DPO role can help your organisation address the compliance demands of
the GDPR while staying focused on its core business activities.
• Implementing a personal information management system (PIMS)
Establishing a PIMS as part of your overall business management system will make sure
that data protection management is placed within a robust framework, which will be looked
upon favourably by the regulator when it comes to DPA compliance.
• Implementing an ISMS compliant with ISO 27001
We offer flexible and cost-effective consultancy packages, and a comprehensive range of
bespoke ISO 27001 consultancy services, that will help you implement an ISO 27001-
compliant ISMS quickly and without hassle, no matter where your business is located.
• Cyber Health Check
The two-day Cyber Health Check combines on-site consultancy and audit with remote
vulnerability assessments to assess your cyber risk exposure.
IT Governance: GDPR one-stop shop
GDPR consultancy
Questions?

More Related Content

PPTX
BigID GDPR Compliance Automation Webinar Slides
PPTX
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
PDF
Everything you Need to Know about The Data Protection Officer Role
PPTX
Privacy by Design: legal perspective
PDF
Data Privacy Compliance
PDF
LGPD | VISÃO GERAL | JORNADA DE ADEQUAÇÃO | SGPD - SISTEMA DE GESTÃO DE PROTE...
PPTX
The GDPR and its requirements for implementing data protection impact assessm...
PDF
Building a Next-Generation Security Operations Center (SOC)
BigID GDPR Compliance Automation Webinar Slides
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
Everything you Need to Know about The Data Protection Officer Role
Privacy by Design: legal perspective
Data Privacy Compliance
LGPD | VISÃO GERAL | JORNADA DE ADEQUAÇÃO | SGPD - SISTEMA DE GESTÃO DE PROTE...
The GDPR and its requirements for implementing data protection impact assessm...
Building a Next-Generation Security Operations Center (SOC)

What's hot (20)

PPTX
GDPR Presentation slides
PPTX
How to handle data breach incidents under GDPR
PPTX
Risk management ISO 27001 Standard
PDF
Privacy-ready Data Protection Program Implementation
PDF
General Data Protection Regulation (GDPR) - Cross-Border Data Transfers
 
PPTX
Governance, Risk & Compliance Management Solution
PPTX
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
PDF
Introduction: CISSP Certification
PPT
Information Assurance And Security - Chapter 3 - Lesson 1
PPTX
Leveraging ISO 31000 for Effective Integration of Risk Management and Interna...
PPT
ISO 27001 Benefits
PDF
Risk management process
PPTX
Legal obligations and responsibilities of data processors and controllers und...
PPTX
Gdpr presentation
PPTX
GDPR training
 
PDF
Information Security It's All About Compliance
PDF
Physical Security Management System
PPTX
GDPR Data Lifecycle
PPTX
Privacy by Design - taking in account the state of the art
GDPR Presentation slides
How to handle data breach incidents under GDPR
Risk management ISO 27001 Standard
Privacy-ready Data Protection Program Implementation
General Data Protection Regulation (GDPR) - Cross-Border Data Transfers
 
Governance, Risk & Compliance Management Solution
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Introduction: CISSP Certification
Information Assurance And Security - Chapter 3 - Lesson 1
Leveraging ISO 31000 for Effective Integration of Risk Management and Interna...
ISO 27001 Benefits
Risk management process
Legal obligations and responsibilities of data processors and controllers und...
Gdpr presentation
GDPR training
 
Information Security It's All About Compliance
Physical Security Management System
GDPR Data Lifecycle
Privacy by Design - taking in account the state of the art
Ad

Similar to Risk assessments and applying organisational controls for GDPR compliance (20)

PDF
Flight East 2018 Presentation–Data Breaches and the Law
PPTX
New Security Legislation & Its Implications for OSS Management
PPTX
New Security Legislation and its Implications for OSS Management
PPT
New Security Legislation & It's Implications for OSS Management
PDF
Data Flow Mapping and the EU GDPR
PDF
Data Flow Mapping and the EU GDPR
PDF
A Major Revision of the CISRCP Program
PDF
Accountability under the GDPR: What does it mean for Boards & Senior Management?
PDF
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
PPT
Meeting the cyber risk challenge
PDF
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
PDF
Risk Management
PPTX
Legal and Ethical Implications of Cybersecurity.pptx
PDF
NY State's cybersecurity legislation requirements for risk management, securi...
PPTX
GDPR challenges for the healthcare sector and the practical steps to compliance
PDF
Biznesa infrastruktūras un datu drošības juridiskie aspekti
PDF
Data Breaches and the EU GDPR
PDF
2023 ITM Short Course - Week 1.pdf
PPTX
Cybersecurity-Course.9643104.powerpoint.pptx
PDF
European Risk Management Seminar 2018 - Cyber Report
Flight East 2018 Presentation–Data Breaches and the Law
New Security Legislation & Its Implications for OSS Management
New Security Legislation and its Implications for OSS Management
New Security Legislation & It's Implications for OSS Management
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
A Major Revision of the CISRCP Program
Accountability under the GDPR: What does it mean for Boards & Senior Management?
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
Meeting the cyber risk challenge
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Risk Management
Legal and Ethical Implications of Cybersecurity.pptx
NY State's cybersecurity legislation requirements for risk management, securi...
GDPR challenges for the healthcare sector and the practical steps to compliance
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Data Breaches and the EU GDPR
2023 ITM Short Course - Week 1.pdf
Cybersecurity-Course.9643104.powerpoint.pptx
European Risk Management Seminar 2018 - Cyber Report
Ad

More from IT Governance Ltd (20)

PDF
GDPR compliance and information security: Reducing data breach risks
PDF
Business Continuity Management: How to get started
PDF
Staff awareness: developing a security culture
PDF
GDPR compliance: getting everyone in the organisation on board
PDF
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
PDF
Creating an effective cyber security awareness programme
PPTX
The first steps towards GDPR compliance 
PPTX
Data transfers to countries outside the EU/EEA under the GDPR
PPTX
The GDPR’s impact on your business and preparing for compliance
PDF
Addressing penetration testing and vulnerabilities, and adding verification m...
PDF
Revising policies and procedures under the new EU GDPR
PDF
Privacy and the GDPR: How Cloud computing could be your failing
PDF
EU GDPR and you: requirements for marketing
PDF
Appointing a Data Protection Officer under the GDPR
PDF
GDPR: Requirements for Cloud Providers
PDF
Preparing for EU GDPR
PPTX
EU GDPR: The role of the data protection officer
PDF
Using international standards to improve US cybersecurity
PDF
Using international standards to improve Asia-Pacific cyber security
PDF
Using international standards to improve EU cyber security
GDPR compliance and information security: Reducing data breach risks
Business Continuity Management: How to get started
Staff awareness: developing a security culture
GDPR compliance: getting everyone in the organisation on board
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Creating an effective cyber security awareness programme
The first steps towards GDPR compliance 
Data transfers to countries outside the EU/EEA under the GDPR
The GDPR’s impact on your business and preparing for compliance
Addressing penetration testing and vulnerabilities, and adding verification m...
Revising policies and procedures under the new EU GDPR
Privacy and the GDPR: How Cloud computing could be your failing
EU GDPR and you: requirements for marketing
Appointing a Data Protection Officer under the GDPR
GDPR: Requirements for Cloud Providers
Preparing for EU GDPR
EU GDPR: The role of the data protection officer
Using international standards to improve US cybersecurity
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve EU cyber security

Recently uploaded (20)

PDF
MSPs in 10 Words - Created by US MSP Network
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
WRN_Investor_Presentation_August 2025.pdf
PDF
DOC-20250806-WA0002._20250806_112011_0000.pdf
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
Chapter 5_Foreign Exchange Market in .pdf
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PPTX
Probability Distribution, binomial distribution, poisson distribution
PDF
Business model innovation report 2022.pdf
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
PPTX
Lecture (1)-Introduction.pptx business communication
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
DOCX
Business Management - unit 1 and 2
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PDF
Deliverable file - Regulatory guideline analysis.pdf
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
MSPs in 10 Words - Created by US MSP Network
COST SHEET- Tender and Quotation unit 2.pdf
WRN_Investor_Presentation_August 2025.pdf
DOC-20250806-WA0002._20250806_112011_0000.pdf
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Chapter 5_Foreign Exchange Market in .pdf
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
Probability Distribution, binomial distribution, poisson distribution
Business model innovation report 2022.pdf
Belch_12e_PPT_Ch18_Accessible_university.pptx
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
New Microsoft PowerPoint Presentation - Copy.pptx
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
Lecture (1)-Introduction.pptx business communication
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
Business Management - unit 1 and 2
Ôn tập tiếng anh trong kinh doanh nâng cao
Deliverable file - Regulatory guideline analysis.pdf
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider

Risk assessments and applying organisational controls for GDPR compliance

  • 1. Risk assessments and applying organisational controls for GDPR compliance Presented by: • Alan Calder, founder and executive chairman, IT Governance 2 November 2017
  • 2. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk • Alan Calder • Founder of IT Governance • The single source for IT governance, cyber risk management and IT compliance • IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002, 6th edition (Open University textbook) • www.itgovernance.co.uk Introduction
  • 3. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk IT Governance Ltd: GRC one-stop shop All verticals, sectors and all organisational sizes
  • 4. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk • An overview of the General Data Protection Regulation (GDPR) and risk assessments. • The process for risk management and industry best practice for risk treatment. • The components of an internal control system and privacy compliance framework. • ISO 31000 principles and the risk management process. Agenda Copyright IT Governance Ltd 2017 – v1.0
  • 5. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk The GDPR’s impact • UK organisations that process personal data only have a short time to make sure that they are compliant. • The Regulation extends the data rights of individuals, and requires organisations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organisational measures. “This Regulation shall be binding in its entirety and directly applicable in all Member States.” Final text of the Regulation: http://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX%3A32016R0679 8 April 2016 Council of the European Union adopted the GDPR 12 April 2016 The GDPR was adopted by the European Parliament 4 May 2016 The official text of the Regulation was published in the Official Journal of the EU 24 May 2016 The Regulation entered into force 25 May 2018 The GDPR will apply
  • 6. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Material and territorial scope Natural person = a living individual • Natural persons have rights associated with: – The protection of personal data; – The processing of personal data; and – The unrestricted movement of personal data within the EU. In material scope: – Personal data that is processed wholly or partly by automated means. – Personal data that is part of a filing system, or intended to be. The Regulation applies to controllers and processors in the EU, irrespective of where processing takes place. It applies to controllers outside the EU that provide services into the EU.
  • 7. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Penalties Administrative fines • Administrative fines will, in each case, be effective, proportionate and dissuasive, and take account of the technical and organisational measures that have been implemented. €10,000,000 or, in the case of an undertaking, up to 2% of the total worldwide annual turnover of the preceding financial year. €20,000,000 or, in the case of an undertaking, up to 4% of the total worldwide annual turnover in the preceding financial year.
  • 8. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk The GDPR and risk management frameworks • Article 32: “The controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk.” • “In assessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data transmitted, stored or otherwise processed.” • “Taking into account the nature, scope, context and purposes of processing as well as the risks of varying likelihood and severity for the rights and freedoms of natural persons, the controller shall implement appropriate technical and organisational measures to ensure and to be able to demonstrate that processing is performed in accordance with this Regulation.” (Article 24-1) The data protection officer (DPO) plays a key bridging role between corporate risk management, broader cyber security risk management and managing risks to personal data. NB: Network and Information Systems (NIS) Directive and Government Cyber Security Strategy
  • 9. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Risk assessments under the GDPR Article 35: Where processing, in particular using new technologies, and taking into account the nature, scope, context and purposes of the processing, is likely to result in a high risk to the rights and freedoms of natural persons. • A data protection impact assessment (DPIA) is particularly required in the case of: – Automated processing, including profiling, and on which decisions are based that produce legal effects concerning natural persons; – Large-scale processing of special categories of data or of personal data relating to criminal convictions; and – A systematic monitoring of a publicly accessible area on a large scale.
  • 10. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk DPIAs A DPIA will set out as a minimum: • A systematic description of the processing and purposes. • Legitimate interests (where applicable) pursued by the controller. • An assessment of the necessity and proportionality of the processing. • An assessment of the risks to the rights and freedoms of the data subjects. • The measures envisaged to address the risks, including:  Compliance with approved codes of conduct should be taken into account.  All safeguards and security measures to protect data and to demonstrate compliance. • Where appropriate, consult the data subjects.
  • 11. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk What is risk? • The effect of uncertainty on objectives (ISO 31000, etc.). • A combination of the likelihood of an incident occurring and the impact, if it does occur, on the organisation. • A probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities, and that may be avoided through pre-emptive action (businessdictionary.com). • Risk can be good or bad.
  • 12. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Key definitions Risk assessments: the overall process of risk identification, risk analysis and risk evaluation. Risk management: the coordinated activities to direct and control an organisation with regard to risk. Risk treatment: the process to modify risk.
  • 13. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Risk and what it means under the GDPR Risks to individuals: the potential for damage or distress. Risks to organisations: financial and/or reputational impact of a data breach. Privacy risk should already be on the CORPORATE RISK REGISTER
  • 14. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Risk assessments Risk assessments help: • Identify the threats that could harm and affect an organisation’s assets; • Determine the value and sensitivity of data by identifying the level of risk that data carries if threatened; and • Implement cost-effective measures to mitigate and reduce the risk.
  • 15. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Risk assessments Asset Vulnerability Threat Risk Risk assessments determine the appropriate controls to reach acceptable levels of risk. Risk cannot exist without these three components: 1. An asset that has value and requires protection. 2. A threat that can hurt it. 3. A vulnerability – a weakness that allows the threat to reach the asset.
  • 16. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Why do we assess risk? A risk assessment informs a proper balance of safeguards against the risk of failing to meet business objectives. Inform a position so that: • Removal of safeguards will increase the risk of loss to an unacceptable level; and • Adding any safeguards would make the security system too expensive/bureaucratic. ... and therefore it is a means by which expenditure on security and contingency can be justified.
  • 17. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Examples of risk Inaccurate, insufficient or out-of-date Kept for too long Excessive or irrelevant Disclosed to the wrong people Insecurely transmitted/stored Used in ways that are unacceptable or unexpected Data that is:
  • 18. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Risk assessment (based on ISO 31000) • Workshop, facilitated by a risk expert • (Key) Assets at risk • (Key) Threat – vulnerability relationships • NB: ‘vulnerability’: weakness of an asset or control that can be exploited by one or more threats Identify risks • Consequence (impact) • Probability (likelihood) • Level of risk (e.g. impact x likelihood) Analyse risks • Compare risks with risk criteria (e.g. risk appetite) Evaluate risks
  • 19. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Risk criteria – per ISO 31000 • When defining risk criteria, consider: – The nature and types of causes and consequences that can occur and how they will be measured; – How likelihood will be defined; – The timeframe(s) of the likelihood and/or consequence(s); – How the level of risk is to be determined; – The views of stakeholders; – The level at which risk becomes acceptable or tolerable; and – Whether combinations of multiple risks should be taken into account and, if so, how and which combinations should be considered. • www.itgovernance.co.uk/shop/p-747-iso31000-iso-31000-risk- management-guidelines.aspx
  • 20. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Risk scenarios – components Adapted from ISACA, The Risk IT Framework, USA, 2009 Risk scenario Actor • Internal (staff, contractor) • External (competitor, outsider, business partner, regulator, market) Threat type • Malicious • Accidental/error • Failure • Natural • External requirement Event • Disclosure • Interruption • Modification • Theft • Destruction • Ineffective design • Ineffective execution • Rules and regulations • Inappropriate use Asset/resource • People & organisation • Process • Infrastructure (facilities) • IT Infrastructure • Information • Applications Time • Duration • Timing of occurrence (critical, non-critical) • Timing to detect
  • 21. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk ISO 27005 – risk management Context establishment Risk assessment Risk identification Risk analysis Risk evaluation Risk acceptance Riskcommunicationand consultation Riskmonitoring andreview Risk treatment Risk decision point 1 Assessment satisfactory? N Y N Y Risk decision point 2 Treatment satisfactory?
  • 22. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Risk and countermeasures High Medium Very high Likelihood High Medium Medium Low Very low Low Negative impact
  • 23. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Risk treatment controls • ISO 27001 information security management system (ISMS) controls are typically selected by objective, taking into account: – National and international legislation and regulations and baseline security criteria; – Organisational objectives; – Operational requirements and constraints; – Cost of implementation and operation (versus risks being reduced and proportional to the organisation); – That they should be implemented to monitor, evaluate and improve the efficiency and effectiveness of information security controls to support the organisation’s aims; and – Balancing investment against harm from security failures.
  • 24. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Example countermeasures Product/technology Site/building physical security Bomb detection Fire/power outage protection Identification and authentication Logical access control Software change control Process System admin controls Financial accounting Business continuity planning Reporting and reacting to incidents Media controls People Security training and awareness Staff vetting Leaver management
  • 25. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Examples of risk treatment Reduce data collected Retention policy Secure destruction of information Access control Training and awareness Pseudonymise information Contracts or data-sharing agreements Acceptable use policy Subject access request process External supplier risk assessments
  • 26. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Assess the costs and benefits Cost Controls implemented Vulnerabilities Risk acceptance Number of controls
  • 27. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Next steps A practical approach to risk management for GDPR compliance: • Agree approach to risk management. • Degree of assurance required. • Conduct risk assessment: – Ensure those involved understand the methodology (training?) to ensure comparable and reproducible results. • Manage (reduce) risk to level of assurance required using controls and compare to standards such as ISO 30001 or ISO 27001.
  • 28. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Next steps A practical approach to risk management for GDPR compliance Step 1: Assess risk Identify risk Prioritise initiatives
  • 29. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Next steps A practical approach to risk management for GDPR compliance Step 2: Classify data Take action Implement incident management response
  • 30. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Next steps A practical approach to risk management for GDPR compliance Step 3: Demonstrate ongoing risk and incident monitoring
  • 31. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk Risk assessment tool: vsRisk™ • Key benefits include: – Simplification: minimises the manual hassle and complexity of carrying out an information security risk assessment, saving time and resources. – Replication: risk assessments can be repeated easily in a standard format year after year. – Generates reports: for exporting, editing and sharing across the business and with auditors. – Automation: the fast and simple way to carry out a risk assessment.
  • 32. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk IT Governance: GDPR one-stop shop Self-help materials A pocket guide www.itgovernance.co.uk/shop/P roduct/eu-gdpr-a-pocket-guide Implementation manual www.itgovernance.co.uk/shop/Pr oduct/eu-general-data-protection- regulation-gdpr-an- implementation-and-compliance- guide Documentation toolkit www.itgovernance.co.uk/shop/P roduct/eu-general-data- protection-regulation-gdpr- documentation-toolkit Compliance gap assessment tool www.itgovernance.co.uk/shop/Pr oduct/eu-gdpr-compliance-gap- assessment-tool
  • 33. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk IT Governance: GDPR one-stop shop Training courses One-day accredited Foundation course (classroom, online, distance learning) www.itgovernance.co.uk/shop/Product/certified-eu-general-data- protection-regulation-foundation-gdpr-training-course Four-day accredited Practitioner course (classroom, online, distance learning) www.itgovernance.co.uk/shop/Product/certified-eu-general-data- protection-regulation-practitioner-gdpr-training-course One-day DPIA workshop (classroom) www.itgovernance.co.uk/shop/Product/data-protection-impact- assessment-dpia-workshop
  • 34. Copyright IT Governance Ltd 2017 – v1.1 TM www.itgovernance.co.uk • Gap analysis Our experienced data protection consultants can assess the exact standing of your current legal situation, security practices and operating procedures in relation to the Data Protection Act (DPA) or the GDPR. • Data flow audit Data mapping involves plotting all of your data flows, drawing up an extensive inventory of the data to understand where the data flows from, within and to. This type of analysis is a key requirement of the GDPR. • DPO as a service Outsourcing the DPO role can help your organisation address the compliance demands of the GDPR while staying focused on its core business activities. • Implementing a personal information management system (PIMS) Establishing a PIMS as part of your overall business management system will make sure that data protection management is placed within a robust framework, which will be looked upon favourably by the regulator when it comes to DPA compliance. • Implementing an ISMS compliant with ISO 27001 We offer flexible and cost-effective consultancy packages, and a comprehensive range of bespoke ISO 27001 consultancy services, that will help you implement an ISO 27001- compliant ISMS quickly and without hassle, no matter where your business is located. • Cyber Health Check The two-day Cyber Health Check combines on-site consultancy and audit with remote vulnerability assessments to assess your cyber risk exposure. IT Governance: GDPR one-stop shop GDPR consultancy