SlideShare a Scribd company logo
Enviar pesquisa
Carregar
Entrar
Cadastre-se
Michael Josephs
Denunciar
daveGBE
Seguir
27 de Oct de 2014
•
0 gostou
•
320 visualizações
1
de
15
Michael Josephs
27 de Oct de 2014
•
0 gostou
•
320 visualizações
Baixar agora
Baixar para ler offline
Denunciar
Negócios
Michael Josephs
daveGBE
Seguir
Recomendados
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix LLC
23 visualizações
•
16 slides
California Consumer Privacy Act (CCPA)
Happiest Minds Technologies
86 visualizações
•
6 slides
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Eryk Budi Pratama
684 visualizações
•
17 slides
The Art of Cloud Auditing - ISACA ID
Eryk Budi Pratama
2.2K visualizações
•
38 slides
Responding to a Data Breach, Communications Guidelines for Merchants
- Mark - Fullbright
896 visualizações
•
16 slides
Data security and privacy
rajab ssemwogerere
75 visualizações
•
7 slides
Mais conteúdo relacionado
Mais procurados
Cyber Resilience - Welcoming New Normal - Eryk
Eryk Budi Pratama
449 visualizações
•
26 slides
Cybersecurity in Oil & Gas Company
Eryk Budi Pratama
753 visualizações
•
26 slides
Data privacy and security in uae
RishalHalid1
194 visualizações
•
5 slides
The Rise of Data Ethics and Security - AIDI Webinar
Eryk Budi Pratama
916 visualizações
•
29 slides
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET Journal
42 visualizações
•
5 slides
Looking Forward - Regulators and Data Incidents
Resilient Systems
469 visualizações
•
26 slides
Mais procurados
(20)
Cyber Resilience - Welcoming New Normal - Eryk
Eryk Budi Pratama
•
449 visualizações
Cybersecurity in Oil & Gas Company
Eryk Budi Pratama
•
753 visualizações
Data privacy and security in uae
RishalHalid1
•
194 visualizações
The Rise of Data Ethics and Security - AIDI Webinar
Eryk Budi Pratama
•
916 visualizações
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET Journal
•
42 visualizações
Looking Forward - Regulators and Data Incidents
Resilient Systems
•
469 visualizações
Boards' Eye View of Digital Risk & GDPR v2
Graham Mann
•
1K visualizações
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Eryk Budi Pratama
•
1K visualizações
iKnow Solutions Laura Eisenhardt
BigDataExpo
•
317 visualizações
The impact of regulatory compliance on DBA(latest)
Craig Mullins
•
2.4K visualizações
Defensible cybersecurity-jan-25th-
IT Strategy Group
•
92 visualizações
Solving the Data Management Challenge for Healthcare
Delphix
•
551 visualizações
Common Practice in Data Privacy Program Management
Eryk Budi Pratama
•
667 visualizações
Getting Your House in Order: Cost-effective Litigation Readiness
Iron Mountain
•
852 visualizações
Threat Ready Data: Protect Data from the Inside and the Outside
DLT Solutions
•
747 visualizações
Database auditing essentials
Craig Mullins
•
2.2K visualizações
William A. Tanenbaum Association of Benefit Administrators April 2015
William Tanenbaum
•
341 visualizações
Cross border - off-shoring and outsourcing privacy sensitive data
Ulf Mattsson
•
1.3K visualizações
Data Governance Overview - Doreen Christian
Doreen Christian
•
242 visualizações
Internal Audit
Nigel Robinson
•
166 visualizações
Similar a Michael Josephs
Data Privacy and Security in UAE.pdf
RishalHalid1
62 visualizações
•
6 slides
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
1.5K visualizações
•
45 slides
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
David Kearney
1.1K visualizações
•
32 slides
Data Privacy and Security in UAE.pptx
Adarsh748147
5 visualizações
•
12 slides
Who changed my data? Need for data governance and provenance in a streaming w...
DataWorks Summit
472 visualizações
•
26 slides
Big Data LDN 2017: Applied AI for GDPR
Matt Stubbs
162 visualizações
•
25 slides
Similar a Michael Josephs
(20)
Data Privacy and Security in UAE.pdf
RishalHalid1
•
62 visualizações
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
•
1.5K visualizações
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
David Kearney
•
1.1K visualizações
Data Privacy and Security in UAE.pptx
Adarsh748147
•
5 visualizações
Who changed my data? Need for data governance and provenance in a streaming w...
DataWorks Summit
•
472 visualizações
Big Data LDN 2017: Applied AI for GDPR
Matt Stubbs
•
162 visualizações
Institute for the entrepreneur v1r3
Dawn Simpson
•
303 visualizações
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Sirius
•
2.7K visualizações
Hadoop: Making it work for the Business Unit
DataWorks Summit
•
1.5K visualizações
Data Privacy: The Hidden Beast within Mergers & Acquisitions
TrustArc
•
134 visualizações
Asset Management: Climbing the Asset Maturity Curve
Information Services Group (ISG)
•
2.5K visualizações
2016 01-05 csr css non-confidential slide deck
Richard (Dick) Kaufman
•
92 visualizações
Big Data is Here for Financial Services White Paper
Experian
•
579 visualizações
GDPR: Leverage the Power of Graphs
Neo4j
•
1.4K visualizações
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
confluent
•
1.9K visualizações
Data Governance
Axis Technology, LLC
•
4.1K visualizações
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
Blancco
•
396 visualizações
The Most Wonderful Time of the Year for Health-IT...NOT
Compliancy Group
•
3.9K visualizações
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Cillian Kieran
•
587 visualizações
GDPR and NIS Compliance - How HyTrust Can Help
Jason Lackey
•
635 visualizações
Mais de daveGBE
Suren Gupta
daveGBE
557 visualizações
•
25 slides
Scott Strickland
daveGBE
365 visualizações
•
24 slides
Richard Rushing
daveGBE
321 visualizações
•
10 slides
Jay Ferro
daveGBE
655 visualizações
•
44 slides
J Schwan
daveGBE
563 visualizações
•
26 slides
Emmet B. Keeffe iii
daveGBE
242 visualizações
•
17 slides
Mais de daveGBE
(8)
Suren Gupta
daveGBE
•
557 visualizações
Scott Strickland
daveGBE
•
365 visualizações
Richard Rushing
daveGBE
•
321 visualizações
Jay Ferro
daveGBE
•
655 visualizações
J Schwan
daveGBE
•
563 visualizações
Emmet B. Keeffe iii
daveGBE
•
242 visualizações
Douglas Briggs
daveGBE
•
462 visualizações
Brian Mc callister
daveGBE
•
442 visualizações
Último
Keep the Competitive Edge and Reduce Churn
Aggregage
65 visualizações
•
31 slides
BGC - Bible Club Sept 13, 2023.pdf
Carlos Garcia
106 visualizações
•
10 slides
BREAK THROUGH THE NOISE.pdf
Bloomerang
223 visualizações
•
30 slides
13. Gary Dessler - Human resource management (2020).pdf
min chan myae
89 visualizações
•
724 slides
VC AI Deep Dive: Embracing the Potential, Addressing the challenges, and Pinp...
saastr
23 visualizações
•
29 slides
Emerson_SETHMATTISON.pdf
SethMattison1
553 visualizações
•
20 slides
Último
(20)
Keep the Competitive Edge and Reduce Churn
Aggregage
•
65 visualizações
BGC - Bible Club Sept 13, 2023.pdf
Carlos Garcia
•
106 visualizações
BREAK THROUGH THE NOISE.pdf
Bloomerang
•
223 visualizações
13. Gary Dessler - Human resource management (2020).pdf
min chan myae
•
89 visualizações
VC AI Deep Dive: Embracing the Potential, Addressing the challenges, and Pinp...
saastr
•
23 visualizações
Emerson_SETHMATTISON.pdf
SethMattison1
•
553 visualizações
ICv2 Hobby Games White Paper - Summer 2023
DennisViau
•
34 visualizações
Presentatie Chantal Smink BrightonSEO-final.pptx
Chantalsmink.nl
•
78 visualizações
Companny Profile 2022.pdf
apandimnpi
•
30 visualizações
Detroit Homecoming Report_Final.pdf
HannahRobar1
•
90 visualizações
Under the hood: A Look at How Salesforce Runs Its Internal Forecasting Process
saastr
•
23 visualizações
Lessons (Un)Learned: Successes & Setbacks on the Road to $1B with Docebo
saastr
•
324 visualizações
Media Kit
CJHaight
•
777 visualizações
NewBase 14 September 2023 Energy News issue - 1656 by Khaled Al Awadi.pdf
Khaled Al Awadi
•
20 visualizações
Apply Indianvisa Onilne For UK Citizens.pdf
https://indianvisa.online/
•
19 visualizações
SWOT Analaysis - Dr. Emmanuel Dotong.pdf
Dotong Consulting
•
84 visualizações
BlueSnap Overview Deck
Norma Mushkat Gaffin
•
23 visualizações
Project Report BBA 2023.pptx
Sarang Bhola
•
15 visualizações
Strategies for Effective Time Management.pptx
Parimal Astik Business Coach “Unlock Your Potential, Empower Your Success”
•
50 visualizações
RISKS & BENEFITS OF SUPPLIER CONSOLIDATION IN IT PROCUREMENT
Markit
•
26 visualizações
Michael Josephs
1.
The Dark Side
of Big Data ……………………………………………... CIO, StrataCare, A Xerox Company Michael Josephs
2.
© 2014 StrataCare,
A Xerox Company All Rights Reserved. Big Data 2 Maslow’s Hierarchy of Needs Circa, 2014
3.
© 2014 StrataCare,
A Xerox Company All Rights Reserved. Big Data 3 It’s a Gold Mine Growth in Data Production –2.5 quintillion bytes estimated to be generated from sources such as online or mobile financial transactions, social media traffic, and GPS coordinates (1) –450 billion transactions per day by 2020 on the internet (B2B and B2C) has been estimated by IDC. –44 fold increase in overall data production 2020 over 2009 predicted (2) Replicated Costs & Risks: Many captured transactions are replicated 5 times (or more) Employee BYOD: Cisco survey found 89% of companies already have employee BYOD for work. (1)World Economic Forum Big Data, Big Impact: New possibilities for international development (2)CSC –Big Data Universe What Can You Do With It? $Accelerate More Intelligent decisions: Large data sets allow for more accurate instrumentation of processes for improved business results $Improve Services: Optimize distribution methods, better evaluate and allocate risk and detect fraud $Target Sales: More granularly segment customers and potential customers for more efficient business development $Create New Revenue Streams: Establish derived products and services We Breathe Data
4.
© 2014 StrataCare,
A Xerox Company All Rights Reserved. Big Data Big Data Has a Dark Side 4 It’s a Gold Mine What Can You Do With It? $Accelerate More Intelligent decisions: Large data sets allow for more accurate instrumentation of processes for improved business results $Improve Services: Optimize distribution methods, better evaluate and allocate risk and detect fraud $Target Sales: More granularly segment customers and potential customers for more efficient business development $Create New Revenue Streams: Establish derived products and services Cost and Risk Continuum Security Regulatory Compliance Liability Litigation and Discovery Infrastructure
5.
© 2014 StrataCare,
A Xerox Company All Rights Reserved. Big Data Most Significant Risks and Costs Aren’t Always Clearly Visible 5 Emerging Statutory Compliance & AuditsContractual Nuance and StipulationsExisting Infrastructure and SecurityeDiscovery ObligationsEvolving the Infrastructure & Security ApproachEstablish Service Level AgreementsRefine Data Retention Policies/ProceduresPrivacy by Design
6.
© 2014 StrataCare,
A Xerox Company All Rights Reserved. Big Data –Existing Infrastructure and Information Security 6 Data Segments Are Often Replicated Up To 5XTransactionalDB Mirror EDW Replicated Costs ++ –Standard data topologies often include 5 or more replications of data that must be protected –Technical and procedural approaches must be established and maintained for all of them –Separate (yet equally stringent) technical and procedural approaches are often needed for the business ecosystemThird Party Ecosystem DR/BC
7.
© 2014 StrataCare,
A Xerox Company All Rights Reserved. Big Data –Existing Infrastructure and Information Security 7 What is Going On Where is it Going –Executives are becoming more risk averse than ever before –At the same time, Big Data initiatives sometimes get a hall pass from complete business case rigor –Evolving Standards •Standards for what constitutes acceptable risk for sensitive data protection is changing rapidly •As a result, owners of sensitive data are continually reexamining their data security standards and security programs –Third party vendors and data custodians are under increasing pressure (& scrutiny to reduce risk levels) –IT Budgets are shifting emphasis from innovation to risk reduction Challenge is operating one comprehensive data security program (while adhering to customers “a la carte” data security demands) –Experienced InfoSec staff are in great demand, making hiring and retention increasing difficult –More targeting of standard management frameworks (ISO 27001:2, etc.) for data hosting and the security programs aimed at its protection –Data custodians retaining unlimited liability for data breach (no caps) and for ensuring subcontractors meet the same data security SLA’s –Increasing investment in data masking is becoming foundational to any data custodianship platform
8.
© 2014 StrataCare,
A Xerox Company All Rights Reserved. Big Data –Regulatory Compliance 8 What is Emerging Responding –Expanding Laws and Regulations: Expansion but without harmonization •Government Frameworks (FTC; The White House) •Complex international laws and regulations (EU, Canada, Australia, Asia, Latin America) –State Data Security and Privacy/Data Breach Laws: now 47 states have adopted laws that in many respects are far more rigorous than HIPPA/HITECH) –Know which laws and regulations apply to your (and your customer’s) business –Maintain compliance, and documented third party verification, for legally required practice standards (HIPAA, PCI, GLB, etc.) –Monitor emerging state data breach laws •Notification to affected individuals •Notice to state AGs (FL, MA, CA) •Government consent decrees (FTC) Organizational Design: Ensure executive compliance oversight has appropriate organizational stature and authority
9.
© 2014 StrataCare,
A Xerox Company All Rights Reserved. Big Data –Contractually Speaking 9 Trending…. Some Protective Steps –Hot Topic: Data security is one of (if not) the most hotly negotiated Terms and Conditions in data custodianship related contracts –Expanding SLA Coverage: Customers are now demanding that contract SLAs cover: Any and all federal and state laws and industry standards will apply to SLAs (even those that don’t apply) Data custodian retains unlimited liability for data breach (no caps) Data custodian remains liable for ensuring subcontractors meet all customer data security SLAs Data Custodian is responsible for breach notification Customers have audit rights Return/destruction of data (Data ownership remains a gray area?) Minimize the custom nature of provisions and align limitation of liability with insurance caps –Fully understand the cost of augmenting existing, or implementing and maintain new, security practices before contractual agreement (including the cost of ongoing audits) –Use of standards increasing as customers tend to bemore accepting of industry adopted management frameworks (ISO 27001:2, NIST, etc.), possibly reducing audit participation efforts –Maintain compliance, and documented third party verification, for legally required practice standards (HIPAA, PCI, etc.) –Blind Data/Feedback Licenses –Separate the cost of breach (vendor) notification from actual notification (customer)
10.
© 2014 StrataCare,
A Xerox Company All Rights Reserved. Big Data –Contractually Speaking (Third Party Ecosystem) 10 Realities Dealing –The Weak Link: •Your data security program is as strong as your weakest subcontractor/provider •Many niche service providers are not able to meet fundamental state of the practice information security standards –Data Custodians Have Two Key Duties: •Duty to Protect: Covers appropriate and reasonable measures to protect data against a breach •Duty to Disclose: Notification of breaches to affected parties and regulators; material risks for public companies –Take a comprehensive, no-concession approach to vendor audits/assessments. –Consider sharing data only AFTER a vendor is fully compliant with security and practice requirements –Make access to your clients dependent on keeping pace with the state of the practice –Engage with 3rdparty credentialing services such as 3PAS Ensure your 3rdparty service provider contracts are as comprehensive as the ones you establish with your clients
11.
© 2014 StrataCare,
A Xerox Company All Rights Reserved. Big Data –Data Retention 11 What is Going On Here Getting Out Ahead –Establish a well vetted and documented data retention policy (a “default” scenario is rarely a good one) –Standardize customer and 3rd party vendor contracts and maintain a centralized record for reference and compliance audits –Implement secure data destruction mechanisms as part of the program Data retention policies must balance the risks of having “it” with the rewards of leveraging “it” –Responding to Risk: Organizations are radically re-thinking their data retention policies (where they exist) –Key Drivers (for revised data retention policies) include: •Customer contract T’s & C’s •Vendor record retention policies and procedures; •Litigation holds •Laws (SEC, IRS, FTC, etc.) •Industry standards •360 degree cost of retention –Heterogeneity: Managing client-specific data retention plans can be highly costly to administer
12.
© 2014 StrataCare,
A Xerox Company All Rights Reserved. –Deploy technology for supporting eDiscovery needs OR contract for these services –Use data masking (data de-identification) along with an effective Data Retention program to reduce data scope for eDiscovery needs –Ensure close interaction of legal, IT, accounting and other organizations for common understanding of record retention, destruction, and litigation hold policies and procedures Big Data –eDiscovery 12 Growing Costs Some Steps to Take –Possession: If you have “it” (whether or not you should have it), you may have to produce and preserve it •Party Litigant (via eDiscovery Demand) •Non-party witness •Subject of government investigations –No Place to Hide: Cost or burden of production rarely matters (no excuse), especially for party litigants •Discovery/production-related costs can be massive Consider whether forensic experts will be required •Sanctions/penalties for non-production/spoliation could be worse (i.e., Contempt, monetary sanctions) Continuously balance the benefit (actual or perceived) of retaining data against the costs and risks of protecting and managing it
13.
© 2014 StrataCare,
A Xerox Company All Rights Reserved. Big Data 90% of an Iceberg’s Danger is Below the Visible Surface 13 This guy would know Edwin J. Smith Captain, RMS Titanic
14.
© 2014 StrataCare,
A Xerox Company All Rights Reserved. Big Data 90% of Big Data’s Danger is Below the Visible Surface 14 These folks would know
15.
© 2014 StrataCare,
A Xerox Company All Rights Reserved. Thank You mjosephs@stratacare.com