SlideShare uma empresa Scribd logo
1 de 28
Baixar para ler offline
1
© 2023 TrustArc Inc. Proprietary and Confidential Information.
The Cost of Privacy Teams:
What Your Business Needs To Know
2
Speakers
Andrew Scott
Privacy Counsel
TrustArc
Gary Edwards
Executive Advisor,
Golfdale Consulting
3
Agenda
● Prioritizing privacy is a competitive advantage for businesses
● Where privacy sits within an organization and its impact on the cost of
building privacy teams
● How to get your organization prepared to handle privacy with fewer
privacy team members
● With fewer resources, Privacy Tech can help teams overcome more
challenges
● Q&A
4
Let’s Start With a Poll
5
Privacy Importance
6
Privacy Importance (a Closer Look)
7
Prioritizing Privacy Technology is a Competitive
Advantage for Businesses
8
Privacy as a Key Differentiator
9
● Employee
retention and
attraction
(Risk)
Re-Thinking the How and the Why to Prioritize Privacy
● Compliance
cannot be seen as
the end game
● Privacy
compliance is
not a zero-sum
game
● Businesses
need privacy
to stay
resilient in
the market
(Org. Risk)
● Privacy can
accelerate
innovation
(Business
Strategy) ● Leveraging
frameworks to
enter new
markets (Org
Risk/ Bus.
Strategy)
● Privacy can be a
values-
motivated
differentiator
for B2B/B2C
(Trust)
10
Using Privacy Technology to Your Advantage
● Compliance requires technology (e.g., Global Privacy Control)
● Create resiliency (e.g., efficiency for Risk Assessments and Inventories)
● Accelerate innovation (e.g., Privacy Enhancing Technologies)
● Enter new markets at scale (e.g., TrustArc’s PrivacyCentral)
● A values-motivated differentiator (e.g., certifications, privacy notices)
● Employee satisfaction/retention (e.g., vendor management tools)
● Not Zero Sum (e.g., a responsible and ethical strategy)
11
Where Privacy Sits Within an Organization and its Impact
on the Cost of Building Privacy Teams
12
It’s Time for Another Poll
13
Where Privacy Sits In an Organization
14
Where Privacy Sits In an Organization
15
Privacy Reporting Structure
16
Considerations of How Privacy Functions
What data do we have from the Benchmarks to support costs?
Size of the team determined by factors
● Size of organization, lines of business/products, understanding budget for
talent, stakeholder buy-in (Risk), privacy tech vendors
Reporting lines affect efficiency (centralized, decentralized, hybrid)
Is privacy part of the team or is it a team?
● Privacy team, program, counsel, or culture?
● Where are the privacy discussions taking place?
● Are employees aware of privacy implications in roles?
1
2
3
4
17
How to get your organization prepared to handle privacy
with fewer privacy team members
18
Privacy Team Composition (a closer look)
19
Privacy Role Demand
20
Privacy Role Demand (a closer look)
21
Spend on Privacy
22
With Less Resources, Privacy Tech can Help Teams
Overcome More Challenges
23
It’s Time to Chat!
24
2022 Challenges (Top 3)
25
2022 Challenges (Bottom 3)
26
Privacy Tech Creates a Competitive Advantage
● Honor and store Customer Consent Preferences
● Automate Data Subject Access Requests
● Automate Risk Assessments
● Automate Vendor Assessments
(facilitate trade relationships)
● Create Data Inventories
● Allow for compliance with GPC
● Evaluate the ability to enter multiple jurisdictions and
harmonize efforts
● Prepare for future compliance efforts
● Provide Government-Backed Certifications to transfer data (Privacy Shield/DPF)
● Engender Trust and build partnerships through validations/certifications
● Perform web crawls and scan for Third Party Trackers
● Facilitate communication linkage, reduce duplicative efforts, and promote efficiency
27
Final Poll
28
Thank You!
See http://www.trustarc.com/insightseries for
the 2023 Privacy Insight Series and past
webinar recordings.
If you would like to learn more about how TrustArc can support
you with compliance, please reach out to sales@trustarc.com for a
free demo.

Mais conteúdo relacionado

Semelhante a The Cost of Privacy Teams: What Your Business Needs To Know

Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
 
How to select a wcms and the team to make it sing jboye13
How to select a wcms and the team to make it sing   jboye13How to select a wcms and the team to make it sing   jboye13
How to select a wcms and the team to make it sing jboye13
Scott Liewehr
 
ConnectTheGrid Overview Webinar - June 10, 2015
ConnectTheGrid Overview Webinar - June 10, 2015ConnectTheGrid Overview Webinar - June 10, 2015
ConnectTheGrid Overview Webinar - June 10, 2015
West Monroe Partners
 
Target Account Planning session
Target Account Planning sessionTarget Account Planning session
Target Account Planning session
Tony Shepherd
 

Semelhante a The Cost of Privacy Teams: What Your Business Needs To Know (20)

How to implement and align Technology within your GRC Framework
How to implement and align Technology within your GRC FrameworkHow to implement and align Technology within your GRC Framework
How to implement and align Technology within your GRC Framework
 
What makes a successful SSI strategy?
What makes a successful SSI strategy?What makes a successful SSI strategy?
What makes a successful SSI strategy?
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
SPS Abu Dhabi Communicating The Business Value of SharePoint
SPS Abu Dhabi Communicating The Business Value of SharePointSPS Abu Dhabi Communicating The Business Value of SharePoint
SPS Abu Dhabi Communicating The Business Value of SharePoint
 
How to select a wcms and the team to make it sing jboye13
How to select a wcms and the team to make it sing   jboye13How to select a wcms and the team to make it sing   jboye13
How to select a wcms and the team to make it sing jboye13
 
riobrochure
riobrochureriobrochure
riobrochure
 
Preview: 3 Steps to Monitoring in a Connected Enterprise
Preview: 3 Steps to Monitoring in a Connected Enterprise Preview: 3 Steps to Monitoring in a Connected Enterprise
Preview: 3 Steps to Monitoring in a Connected Enterprise
 
Green Leaf Consulting: Capabilities Deck
Green Leaf Consulting: Capabilities DeckGreen Leaf Consulting: Capabilities Deck
Green Leaf Consulting: Capabilities Deck
 
Go to Market Strategies
Go to Market StrategiesGo to Market Strategies
Go to Market Strategies
 
Business Value Measurements and the Solution Design Framework
Business Value Measurements and the Solution Design FrameworkBusiness Value Measurements and the Solution Design Framework
Business Value Measurements and the Solution Design Framework
 
ConnectTheGrid Overview Webinar - June 10, 2015
ConnectTheGrid Overview Webinar - June 10, 2015ConnectTheGrid Overview Webinar - June 10, 2015
ConnectTheGrid Overview Webinar - June 10, 2015
 
I Can't Make THAT Decision!
I Can't Make THAT Decision!I Can't Make THAT Decision!
I Can't Make THAT Decision!
 
Key drivers that influence a Tech Startup’s Software Outsourcing Decision
Key drivers that influence a Tech Startup’s Software Outsourcing DecisionKey drivers that influence a Tech Startup’s Software Outsourcing Decision
Key drivers that influence a Tech Startup’s Software Outsourcing Decision
 
Imperative of advanced analytics and ai in leadership excellence
 Imperative of advanced analytics and ai in leadership excellence Imperative of advanced analytics and ai in leadership excellence
Imperative of advanced analytics and ai in leadership excellence
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
 
Inselence
InselenceInselence
Inselence
 
Boardwalk consulting overview october 2013
Boardwalk consulting overview october 2013Boardwalk consulting overview october 2013
Boardwalk consulting overview october 2013
 
Building and Sustaining a Product Mindset
Building and Sustaining a Product MindsetBuilding and Sustaining a Product Mindset
Building and Sustaining a Product Mindset
 
Chris Ingle on successfully engaging with analysts
Chris Ingle on successfully engaging with analystsChris Ingle on successfully engaging with analysts
Chris Ingle on successfully engaging with analysts
 
Target Account Planning session
Target Account Planning sessionTarget Account Planning session
Target Account Planning session
 

Mais de TrustArc

TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc
 

Mais de TrustArc (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

The Cost of Privacy Teams: What Your Business Needs To Know

  • 1. 1 © 2023 TrustArc Inc. Proprietary and Confidential Information. The Cost of Privacy Teams: What Your Business Needs To Know
  • 2. 2 Speakers Andrew Scott Privacy Counsel TrustArc Gary Edwards Executive Advisor, Golfdale Consulting
  • 3. 3 Agenda ● Prioritizing privacy is a competitive advantage for businesses ● Where privacy sits within an organization and its impact on the cost of building privacy teams ● How to get your organization prepared to handle privacy with fewer privacy team members ● With fewer resources, Privacy Tech can help teams overcome more challenges ● Q&A
  • 6. 6 Privacy Importance (a Closer Look)
  • 7. 7 Prioritizing Privacy Technology is a Competitive Advantage for Businesses
  • 8. 8 Privacy as a Key Differentiator
  • 9. 9 ● Employee retention and attraction (Risk) Re-Thinking the How and the Why to Prioritize Privacy ● Compliance cannot be seen as the end game ● Privacy compliance is not a zero-sum game ● Businesses need privacy to stay resilient in the market (Org. Risk) ● Privacy can accelerate innovation (Business Strategy) ● Leveraging frameworks to enter new markets (Org Risk/ Bus. Strategy) ● Privacy can be a values- motivated differentiator for B2B/B2C (Trust)
  • 10. 10 Using Privacy Technology to Your Advantage ● Compliance requires technology (e.g., Global Privacy Control) ● Create resiliency (e.g., efficiency for Risk Assessments and Inventories) ● Accelerate innovation (e.g., Privacy Enhancing Technologies) ● Enter new markets at scale (e.g., TrustArc’s PrivacyCentral) ● A values-motivated differentiator (e.g., certifications, privacy notices) ● Employee satisfaction/retention (e.g., vendor management tools) ● Not Zero Sum (e.g., a responsible and ethical strategy)
  • 11. 11 Where Privacy Sits Within an Organization and its Impact on the Cost of Building Privacy Teams
  • 12. 12 It’s Time for Another Poll
  • 13. 13 Where Privacy Sits In an Organization
  • 14. 14 Where Privacy Sits In an Organization
  • 16. 16 Considerations of How Privacy Functions What data do we have from the Benchmarks to support costs? Size of the team determined by factors ● Size of organization, lines of business/products, understanding budget for talent, stakeholder buy-in (Risk), privacy tech vendors Reporting lines affect efficiency (centralized, decentralized, hybrid) Is privacy part of the team or is it a team? ● Privacy team, program, counsel, or culture? ● Where are the privacy discussions taking place? ● Are employees aware of privacy implications in roles? 1 2 3 4
  • 17. 17 How to get your organization prepared to handle privacy with fewer privacy team members
  • 18. 18 Privacy Team Composition (a closer look)
  • 20. 20 Privacy Role Demand (a closer look)
  • 22. 22 With Less Resources, Privacy Tech can Help Teams Overcome More Challenges
  • 26. 26 Privacy Tech Creates a Competitive Advantage ● Honor and store Customer Consent Preferences ● Automate Data Subject Access Requests ● Automate Risk Assessments ● Automate Vendor Assessments (facilitate trade relationships) ● Create Data Inventories ● Allow for compliance with GPC ● Evaluate the ability to enter multiple jurisdictions and harmonize efforts ● Prepare for future compliance efforts ● Provide Government-Backed Certifications to transfer data (Privacy Shield/DPF) ● Engender Trust and build partnerships through validations/certifications ● Perform web crawls and scan for Third Party Trackers ● Facilitate communication linkage, reduce duplicative efforts, and promote efficiency
  • 28. 28 Thank You! See http://www.trustarc.com/insightseries for the 2023 Privacy Insight Series and past webinar recordings. If you would like to learn more about how TrustArc can support you with compliance, please reach out to sales@trustarc.com for a free demo.