SlideShare a Scribd company logo
© 2024 TrustArc Inc. Proprietary and Confidential Information.
Simplifying Data Inventory Management:
Automation and Code-Based Data
Discovery Using TrustArc and Privya
2
Legal Disclaimer
The information provided during this webinar does
not, and is not intended to, constitute legal advice.
Instead, all information, content, and materials presented during
this webinar are for general informational purposes only.
3
Speakers
Val Ilchenko
General Counsel & Chief Privacy Officer
TrustArc
Assaf Amitay
CEO
Privya
Kristen Nosky
Vice President of Product Management
TrustArc
Dr. Uzy Hadad
Founder & CTO
Privya
Agenda
● Why Do Data Inventories Matter?
● Problem Statement
● Data Inventory Hub Overview
● TrustArc’s Inventory and Discovery Strategy
● Privya’s Code-Based Data Discovery Strategy
● The Privya-TrustArc Integration
5
Why Do Data Inventories Matter?
● Regulatory Compliance
○ Streamline privacy program compliance operations especially around responding to
individual rights requests and managing consents.
○ In addition to GDPR/UK GDPR, and the State of CA, a number of national privacy laws
(e.g., Brazil, Thailand, and Vietnam) require maintaining records of processing activities.
● Risk Management
○ Important to understand risk footprint. Inventories help assess what is being processed by
your organization.
● InfoSec Planning
○ Businesses need to understand what data they maintain to understand proper security
measures, possible blast radius in the event of an incident, etc.
● Strategic and Budget Planning
○ Understanding data collection and maintenance helps with budget planning around all
functions that deal with privacy, security, availability, etc.
● Customer Obligations; Sales Support
○ RFP, InfoSec/Privacy Questionnaires, online disclosure (e.g., sub-processors), etc.
increasingly require “taking inventory” of systems, data, etc. in use.
✓
✓
✓
✓
✓
6
Problem Statement: Manual, Time-Consuming, Challenging
Creating a comprehensive data inventory is important for legal, regulatory, transparency, security,
budget planning, and other purposes – as noted in the prior slide. However, legacy methods are
no longer viable – by the end of this year (2024), Gartner predicts that 75% of the modern world
will be covered by privacy laws and systems continue to become more complex.
● Manual data inventory creation (e.g., excel sheets, manual questionnaires, etc.) can
significantly prolong the process, ranging from weeks to months without automation
● Common methods rely on manual tactics:
● Cross-functional teams engage in assessments and collaborative efforts with the
Privacy and Security teams to ensure data accuracy and security
● Alignment with Security and Procurement teams
● Regular follow up and revalidation – highly manual
● Responses are static (not maintained between audits)
● The absence of automation impedes the realization of tool benefits, remaining a significant
blocker for many organizations' program goals.
● Streamlining data inventory management and incorporating automation is imperative
to identify, prioritize, and monitor your data risk.
● Note on Val’s Personal Experience
7
Data Inventory Hub Overview
● Data Inventory Creation - map your data
and data flows for ROPA compliance
across your systems, vendors, company
affiliates, and internal processes
● Risk Detection - detect data transfer risk
and receive alerts. Proprietary risk engine
is based on 130+ global laws.
● Report Generation - export pre-built
reports such as Article 30 report or
Business Process report to demonstrate
compliance to regulators.
● Automated Remediation - generate
automated follow-up actions for each
record and flag through Automation Rules
to conduct a PIA or Vendor Assessment.
8
Partnership
TrustArc’s Data Discovery & Automation Strategy
Third Party & System
Record Exchange
TrustArc’s Record Exchange
is pre-populated with the
most popular system and
third party records.
Customers can add
pre-created records to their
own inventory’s with one
click.
Integrations
Use our third party
connector library to
automatically create
third party and system
records.
TrustArc Data Inventory Hub Solutions
Third Party Discovery
TrustArc’s Third Party
Discovery tool scan’s
customer’s websites and
identifies the third parties
being used and
automatically creates
those third party records
in the data inventory.
AI Autofill
Autofill System and
Third Party Records
using our AI Autofill
feature. Simply type in
the system or third
party record name and
click the AI Autofill
button to populate the
remaining fields.
Data Discovery
Privya's AI-driven code
scanning helps organizations
save resources, comply with
regulations, and protect their
reputation by automatically
identifying and mapping
personal data collection,
usage, and storage, including
third-party access. This
eliminates manual processes
and ensures regulatory
compliance.
NOW LIVE
NOW LIVE
Data Discovery
Use Cases &
Benefits
Data discovery solutions focus on automating portions of data
inventory building and bringing visibility to which systems and
what data is being processed by your organization
Leveraging Privya’s code-based scanning technology and
integration with TrustArc, Data Inventory Hub customers
will be able to:
Streamline Inventory Creation: Automate the process of creating
and managing data inventory records
Auto Detect AI Usage: Auto detect when AI is being used to
process data and take remedial action
Automate Risk & Reporting: Leverage discovered data to
understand your organization’s risk and produce reports
Understanding Code-Based Data
Discovery
11
In the simplest term…
Scanning lines of
code
Identify keywords,
patterns/flows and/or
themes for PII or SPI
(e.g. drivers license,
phone number, email
address, etc.)
Categorize and
assess risk!
12
Data Identification and Classification
● Scans the entire code portfolio, including legacy
systems, cloud-based applications, and
third-party integrations
● Automatically identifies and categorizes
personal information (PI), sensitive personal
information (SPI), and other critical data such
as when AI is being used to process data
● Up-to-date automatic data classification
across the organization
● Save time and resources by eliminating manual
data discovery processes
● Enables proactive privacy risk management
and compliance with regulations such as GDPR,
CCPA/CPRA, HIPAA, PCI DSS and more
13
Data Lineage and Flow Mapping
● Maps the flow of data throughout the organization,
providing a complete view of data movement across
systems, applications, and third parties
● Enables end-to-end tracing of data from origin to
destination, identifying dependencies, potential
vulnerabilities, and compliance gaps
● Identifies complex relationships between projects,
including direct and indirect data flows, and other hidden
connections
● Offers powerful impact analysis capabilities to
understand the downstream effects of one project on the
entire software ecosystem
14
AI/ML Model Detection and Governance
● Automatically detects and inventories artificial intelligence (AI) and machine learning (ML) models within the
codebase, across all frameworks and libraries used
● Facilitates end-to-end governance of AI/ML technologies, ensuring compliance with emerging regulations such
as the EU AI Act and NIST AI RMF
● Provides insights into the purpose of AI/ML models, enabling informed decision-making and the
implementation of appropriate governance measures
15
Third-Party Data Sharing and Risk Management
● Detects data sharing with third
parties, providing insights into what
data is shared and how it is
processed
● Identifies and assesses risks
associated with third-party data
access (vendor assessment),
helping organizations prioritize and
mitigate potential vulnerabilities
● Provides a centralized view of
third-party access rights and
permissions*
● Integrates with identity and access
management (IAM) platforms like
Okta
* Coming soon
16
The Privya-TrustArc Integration
Data inventory
SPI/PI
AI/ML
Third Party Sharing
Data Inventory Hub
● End-to-end data privacy automation: from discovery
to risk analysis and reporting
● Continuous code-based data discovery, including
AI/ML model detection
● Automated data collection for ROPA, DPIA, and
real-time compliance risks
● Integration with TrustArc's Data Inventory Hub
● Robust privacy and security risk analysis using
TrustArc's proprietary risk engine
17
Thank You!

More Related Content

PDF
TrustArc Webinar - Master Your Data Inventory And Meet Your ROPA Requirements
PPTX
Smarter Management for Your Data Growth
PDF
TrustArc Webinar - Understanding the 3 Best Practices for DPIA Compliance
PDF
Enable Better Decision Making with Power BI Visualizations & Modern Data Estate
 
PDF
Future of Data Strategy (ASEAN)
PDF
TrustArc Webinar - Unlocking AI Potential: Leveraging PIA Processes for Compr...
DOCX
The Future of Data.docx
PDF
Accelerate Return on Data
TrustArc Webinar - Master Your Data Inventory And Meet Your ROPA Requirements
Smarter Management for Your Data Growth
TrustArc Webinar - Understanding the 3 Best Practices for DPIA Compliance
Enable Better Decision Making with Power BI Visualizations & Modern Data Estate
 
Future of Data Strategy (ASEAN)
TrustArc Webinar - Unlocking AI Potential: Leveraging PIA Processes for Compr...
The Future of Data.docx
Accelerate Return on Data

Similar to TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery (20)

PDF
Maturing Your Organization's Information Risk Management Strategy
PDF
TrustArc Webinar - 2024 Global Privacy Survey: A 360 View Into Key Privacy De...
PPTX
Automatski - The Internet of Things - Privacy Standards
PPTX
INTERNET OF THINGS On data acquisition m2m systems
PDF
Maximize the Value of Your Data: Neo4j Graph Data Platform
PDF
ZIGRAM Introduction September 2020
PDF
How to teach your data scientist to leverage an analytics cluster with Presto...
PDF
Data & Analytic Innovations: 5 lessons from our customers
PDF
eBook: 5 Steps to Secure Cloud Data Governance
PDF
What is the future of data strategy?
PDF
ANIn Bengaluru Dec 2024 | Elevating AdTech Standards: Harnessing Big Data and...
PDF
Data Privacy: A runbook for engineers 1st Edition Nishant Bhajaria
PDF
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
PDF
Accelerating Cyber Threat Detection With GPU
PDF
How Can Analytics Improve Business?
PDF
7 Features to Spot the Best Data Discovery Tools.pdf
PDF
Emerging Trends in Information Security and Privacy
PDF
White Paper- Know Your Data
PDF
AIIM_ASG-Automating-Information_Governan
PPTX
The Top 5 Data Science And Analytics Trends In 2023
Maturing Your Organization's Information Risk Management Strategy
TrustArc Webinar - 2024 Global Privacy Survey: A 360 View Into Key Privacy De...
Automatski - The Internet of Things - Privacy Standards
INTERNET OF THINGS On data acquisition m2m systems
Maximize the Value of Your Data: Neo4j Graph Data Platform
ZIGRAM Introduction September 2020
How to teach your data scientist to leverage an analytics cluster with Presto...
Data & Analytic Innovations: 5 lessons from our customers
eBook: 5 Steps to Secure Cloud Data Governance
What is the future of data strategy?
ANIn Bengaluru Dec 2024 | Elevating AdTech Standards: Harnessing Big Data and...
Data Privacy: A runbook for engineers 1st Edition Nishant Bhajaria
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
Accelerating Cyber Threat Detection With GPU
How Can Analytics Improve Business?
7 Features to Spot the Best Data Discovery Tools.pdf
Emerging Trends in Information Security and Privacy
White Paper- Know Your Data
AIIM_ASG-Automating-Information_Governan
The Top 5 Data Science And Analytics Trends In 2023
Ad

More from TrustArc (20)

PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
PDF
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
PDF
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
PDF
TrustArc Webinar - 2025 Global Privacy Benchmarks Survey: Trends and Perspect...
PDF
TrustArc Webinar - Mastering Privacy Contracting: Key Clauses, Risks & Negoti...
PDF
TrustArc Webinar - Cross-Border Data Transfers in 2025: Regulatory Changes, A...
PDF
TrustArc Webinar - Consumer Expectations vs Corporate Realities on Data Broke...
PDF
TrustArc Webinar - Data Privacy and Cyber Security: A Symbiotic Relationship
PDF
TrustArc Webinar - Strategies for Future-Proofing Privacy for Healthcare
PDF
TrustArc Webinar - How to Create a Privacy-First Culture
PDF
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
PDF
TrustArc Webinar - State of State Privacy Laws
PDF
TrustArc Webinar - Data Privacy Management in the Age of AI
PDF
TrustArc Webinar - Data Privacy in the EU: What You Need To Know
PDF
TrustArc Webinar - Data Privacy: Looking to 2025 and Beyond
PDF
TrustArc Webinar - Into The Future: The Evolution of AdTech & Data Privacy
PDF
TrustArc Webinar - Elevate Your Business: Unpack the Power of Privacy Certifi...
PDF
TrustArc Webinar - PrivacyCentral: Keep Pace with Global Privacy Laws & Autom...
PDF
TrustArc Webinar - Everything You Need To Know About Global CBPR But Are Afra...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc Webinar - 2025 Global Privacy Benchmarks Survey: Trends and Perspect...
TrustArc Webinar - Mastering Privacy Contracting: Key Clauses, Risks & Negoti...
TrustArc Webinar - Cross-Border Data Transfers in 2025: Regulatory Changes, A...
TrustArc Webinar - Consumer Expectations vs Corporate Realities on Data Broke...
TrustArc Webinar - Data Privacy and Cyber Security: A Symbiotic Relationship
TrustArc Webinar - Strategies for Future-Proofing Privacy for Healthcare
TrustArc Webinar - How to Create a Privacy-First Culture
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc Webinar - State of State Privacy Laws
TrustArc Webinar - Data Privacy Management in the Age of AI
TrustArc Webinar - Data Privacy in the EU: What You Need To Know
TrustArc Webinar - Data Privacy: Looking to 2025 and Beyond
TrustArc Webinar - Into The Future: The Evolution of AdTech & Data Privacy
TrustArc Webinar - Elevate Your Business: Unpack the Power of Privacy Certifi...
TrustArc Webinar - PrivacyCentral: Keep Pace with Global Privacy Laws & Autom...
TrustArc Webinar - Everything You Need To Know About Global CBPR But Are Afra...
Ad

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Tartificialntelligence_presentation.pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Hybrid model detection and classification of lung cancer
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
project resource management chapter-09.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
Digital-Transformation-Roadmap-for-Companies.pptx
1 - Historical Antecedents, Social Consideration.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
DP Operators-handbook-extract for the Mautical Institute
Enhancing emotion recognition model for a student engagement use case through...
Univ-Connecticut-ChatGPT-Presentaion.pdf
1. Introduction to Computer Programming.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Getting Started with Data Integration: FME Form 101
Tartificialntelligence_presentation.pptx
Zenith AI: Advanced Artificial Intelligence
Hybrid model detection and classification of lung cancer
Encapsulation_ Review paper, used for researhc scholars
project resource management chapter-09.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Heart disease approach using modified random forest and particle swarm optimi...
A comparative study of natural language inference in Swahili using monolingua...
NewMind AI Weekly Chronicles - August'25-Week II

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery

  • 1. © 2024 TrustArc Inc. Proprietary and Confidential Information. Simplifying Data Inventory Management: Automation and Code-Based Data Discovery Using TrustArc and Privya
  • 2. 2 Legal Disclaimer The information provided during this webinar does not, and is not intended to, constitute legal advice. Instead, all information, content, and materials presented during this webinar are for general informational purposes only.
  • 3. 3 Speakers Val Ilchenko General Counsel & Chief Privacy Officer TrustArc Assaf Amitay CEO Privya Kristen Nosky Vice President of Product Management TrustArc Dr. Uzy Hadad Founder & CTO Privya
  • 4. Agenda ● Why Do Data Inventories Matter? ● Problem Statement ● Data Inventory Hub Overview ● TrustArc’s Inventory and Discovery Strategy ● Privya’s Code-Based Data Discovery Strategy ● The Privya-TrustArc Integration
  • 5. 5 Why Do Data Inventories Matter? ● Regulatory Compliance ○ Streamline privacy program compliance operations especially around responding to individual rights requests and managing consents. ○ In addition to GDPR/UK GDPR, and the State of CA, a number of national privacy laws (e.g., Brazil, Thailand, and Vietnam) require maintaining records of processing activities. ● Risk Management ○ Important to understand risk footprint. Inventories help assess what is being processed by your organization. ● InfoSec Planning ○ Businesses need to understand what data they maintain to understand proper security measures, possible blast radius in the event of an incident, etc. ● Strategic and Budget Planning ○ Understanding data collection and maintenance helps with budget planning around all functions that deal with privacy, security, availability, etc. ● Customer Obligations; Sales Support ○ RFP, InfoSec/Privacy Questionnaires, online disclosure (e.g., sub-processors), etc. increasingly require “taking inventory” of systems, data, etc. in use. ✓ ✓ ✓ ✓ ✓
  • 6. 6 Problem Statement: Manual, Time-Consuming, Challenging Creating a comprehensive data inventory is important for legal, regulatory, transparency, security, budget planning, and other purposes – as noted in the prior slide. However, legacy methods are no longer viable – by the end of this year (2024), Gartner predicts that 75% of the modern world will be covered by privacy laws and systems continue to become more complex. ● Manual data inventory creation (e.g., excel sheets, manual questionnaires, etc.) can significantly prolong the process, ranging from weeks to months without automation ● Common methods rely on manual tactics: ● Cross-functional teams engage in assessments and collaborative efforts with the Privacy and Security teams to ensure data accuracy and security ● Alignment with Security and Procurement teams ● Regular follow up and revalidation – highly manual ● Responses are static (not maintained between audits) ● The absence of automation impedes the realization of tool benefits, remaining a significant blocker for many organizations' program goals. ● Streamlining data inventory management and incorporating automation is imperative to identify, prioritize, and monitor your data risk. ● Note on Val’s Personal Experience
  • 7. 7 Data Inventory Hub Overview ● Data Inventory Creation - map your data and data flows for ROPA compliance across your systems, vendors, company affiliates, and internal processes ● Risk Detection - detect data transfer risk and receive alerts. Proprietary risk engine is based on 130+ global laws. ● Report Generation - export pre-built reports such as Article 30 report or Business Process report to demonstrate compliance to regulators. ● Automated Remediation - generate automated follow-up actions for each record and flag through Automation Rules to conduct a PIA or Vendor Assessment.
  • 8. 8 Partnership TrustArc’s Data Discovery & Automation Strategy Third Party & System Record Exchange TrustArc’s Record Exchange is pre-populated with the most popular system and third party records. Customers can add pre-created records to their own inventory’s with one click. Integrations Use our third party connector library to automatically create third party and system records. TrustArc Data Inventory Hub Solutions Third Party Discovery TrustArc’s Third Party Discovery tool scan’s customer’s websites and identifies the third parties being used and automatically creates those third party records in the data inventory. AI Autofill Autofill System and Third Party Records using our AI Autofill feature. Simply type in the system or third party record name and click the AI Autofill button to populate the remaining fields. Data Discovery Privya's AI-driven code scanning helps organizations save resources, comply with regulations, and protect their reputation by automatically identifying and mapping personal data collection, usage, and storage, including third-party access. This eliminates manual processes and ensures regulatory compliance. NOW LIVE NOW LIVE
  • 9. Data Discovery Use Cases & Benefits Data discovery solutions focus on automating portions of data inventory building and bringing visibility to which systems and what data is being processed by your organization Leveraging Privya’s code-based scanning technology and integration with TrustArc, Data Inventory Hub customers will be able to: Streamline Inventory Creation: Automate the process of creating and managing data inventory records Auto Detect AI Usage: Auto detect when AI is being used to process data and take remedial action Automate Risk & Reporting: Leverage discovered data to understand your organization’s risk and produce reports
  • 11. 11 In the simplest term… Scanning lines of code Identify keywords, patterns/flows and/or themes for PII or SPI (e.g. drivers license, phone number, email address, etc.) Categorize and assess risk!
  • 12. 12 Data Identification and Classification ● Scans the entire code portfolio, including legacy systems, cloud-based applications, and third-party integrations ● Automatically identifies and categorizes personal information (PI), sensitive personal information (SPI), and other critical data such as when AI is being used to process data ● Up-to-date automatic data classification across the organization ● Save time and resources by eliminating manual data discovery processes ● Enables proactive privacy risk management and compliance with regulations such as GDPR, CCPA/CPRA, HIPAA, PCI DSS and more
  • 13. 13 Data Lineage and Flow Mapping ● Maps the flow of data throughout the organization, providing a complete view of data movement across systems, applications, and third parties ● Enables end-to-end tracing of data from origin to destination, identifying dependencies, potential vulnerabilities, and compliance gaps ● Identifies complex relationships between projects, including direct and indirect data flows, and other hidden connections ● Offers powerful impact analysis capabilities to understand the downstream effects of one project on the entire software ecosystem
  • 14. 14 AI/ML Model Detection and Governance ● Automatically detects and inventories artificial intelligence (AI) and machine learning (ML) models within the codebase, across all frameworks and libraries used ● Facilitates end-to-end governance of AI/ML technologies, ensuring compliance with emerging regulations such as the EU AI Act and NIST AI RMF ● Provides insights into the purpose of AI/ML models, enabling informed decision-making and the implementation of appropriate governance measures
  • 15. 15 Third-Party Data Sharing and Risk Management ● Detects data sharing with third parties, providing insights into what data is shared and how it is processed ● Identifies and assesses risks associated with third-party data access (vendor assessment), helping organizations prioritize and mitigate potential vulnerabilities ● Provides a centralized view of third-party access rights and permissions* ● Integrates with identity and access management (IAM) platforms like Okta * Coming soon
  • 16. 16 The Privya-TrustArc Integration Data inventory SPI/PI AI/ML Third Party Sharing Data Inventory Hub ● End-to-end data privacy automation: from discovery to risk analysis and reporting ● Continuous code-based data discovery, including AI/ML model detection ● Automated data collection for ROPA, DPIA, and real-time compliance risks ● Integration with TrustArc's Data Inventory Hub ● Robust privacy and security risk analysis using TrustArc's proprietary risk engine