Bridging the Gap between Privacy and Security: Using Technology to Manage Complex Breach Disclosure Regulations

IBM Security
IBM SecurityIBM Security
Bridging the Gap between Privacy and
Security: Using Technology to Manage
Complex Breach Disclosure Regulations
2 IBM Security
Next-Generation SOAR Platform with Intelligent Orchestration
IBM Resilient: The Market Leader in Incident Response
Largest and most trusted
install base in the world
More than 350 customers globally
Customers in more than
30 countries
Part of the largest
enterprise security
organization in the world
Resilient is the hub of IBM Security’s
Immune System
Expanding customer support
and services resources
Only incident response
platform with built-in
intelligent orchestration
IBM Resilient Partner Ecosystem
delivered through IBM Security App
Exchange
Technology-agnostic platform delivers
enterprise-grade integrations with
IT and security tools
Includes orchestration and
automation capabilities
3 IBM Security
Our Speakers
Monica Dubeau, CIPP/US
Privacy Program Director - Resilient, IBM
Alan Rodger
Senior Analyst, Ovum
Using Technology to Manage
Complex Breach Disclosure
Regulations
Alan Rodger
Senior Analyst
Ovum
27 February 2019
Ovum | TMT intelligence | informa5 Copyright © Informa PLC
Double danger - damaging breaches + escalating consequences
Dealing with breaches effectively, as a business
How solutions can help (Ovum Market Radar report)
Agenda
Ovum | TMT intelligence | informa6 Copyright © Informa PLC
What constitutes a breach? How common are they?
Many potential sources of data breaches:
• Cybersecurity attack
• Lost device
• Inadequate password protection
• Unauthorized use of data
59,000 data breaches reported in EU countries
(Source: DLA Piper survey results - 25 May ‘18 thru January ’19):
• NL – 15,400 (also highest per capita)
• DE – 12,600
• UK – 10,600
• Even small countries’ regulators are being notified of breaches (Lichtenstein,
Iceland and Cyprus)
Ovum | TMT intelligence | informa7 Copyright © Informa PLC
▪ Regulations are increasing the penalties
▪ In GDPR, up to 4% of global turnover, or EUR20M
▪ Timescale limitations add to the challenge
▪ We may see political ‘competition’ across regulatory jurisdictions
▪ These add to other direct and indirect financial impacts (internal and external):
▪ Operational costs
▪ Tying up expertise
▪ Delays to plans
▪ Trust and reputation
▪ Relationships and supply chain
Consequences of data breaches
Ovum | TMT intelligence | informa8 Copyright © Informa PLC
Information security is still a fundamental challenge
Source: Ovum ICT Enterprise Insights 2018/19 – Global: ICT Drivers and Technology Priorities
Ovum | TMT intelligence | informa9 Copyright © Informa PLC
▪ Complex operational planning, and commitment to compliance
▪ Access to right types (and levels) of expertise:
▪ DPO
▪ Legal / compliance (relationship with supervisory authorities, compliance oversight)
▪ HR (policy; training; employee issues, roles, and personal data)
▪ Marketing (customer relationship ‘owner’)
▪ Comms (media liaison, PR)
▪ IT (advisory on data, security, applications, and architecture)
Dealing with breaches effectively, as a business
▪ Awareness of responsibilities
▪ Leadership team ‘skin in the game’
Ovum | TMT intelligence | informa10 Copyright © Informa PLC
Solution schematic and value
Breach reporting:
- supervisory authority
- citizens affected
Processes /
capabilities
Information
/ insight /
expertise
Stakeholders
• Incidents
• Security logs
• Regulation context/advice
• Legal / compliance
• HR
• Marketing / comms
• Senior leadership
• IT
• Partners / service providers
• Organizational workflows
• Approvals
• Roles and contacts
• Scheduling / alerts
• Visibility / auditability
• Risk analysis
• Data integration
• Testing / modelling
• Visual design
• Templates
• Multiple supervisory contacts
• Digital submission
Ovum | TMT intelligence | informa11 Copyright © Informa PLC
▪ An early-stage market (with some mature solutions – but very few competing)
▪ Widespread adoption expected within a few years
▪ Alternatives (spreadsheets, checklists, manual processes) are inadequate
▪ Awareness will grow of non-compliance consequences
Ovum’s findings on Data Breach Management/Reporting solution market
▪ Our recommendations:
▪ Follow up earlier GDPR programs by spreading awareness of breach-reporting non-compliance risks, and the options available
▪ A successful compliance capability must:
▪ Ensure commitment of resources from across the organization, and external parties where needed
▪ Use a data breach management and reporting solution fully to maximize benefits
▪ Ensure that all parties are aware of their roles and responsibilities, should a data breach occur
Ovum | TMT intelligence | informa12 Copyright © Informa PLC
Thank you
alan.rodger@ovum.com
Privacy Module
Monica Dubeau
February 27, 2019
Privacy Program Director
14 IBM Security
What is IBM Resilient Intelligent Orchestration?What is IBM Resilient Intelligent Orchestration?
15 IBM Security
Over 160 global regulations in product
to help customers to remain compliant
with the complex breach notification
requirements
Privacy Module Capabilities
Integrated breach notification with the
wider Cyber Security Incident
Response plan – one central place of
incident management
Full simulation and table-top capabilities
to train Privacy & IR teams on
consistent, repeatable procedures
Reporting tools provide a clear
picture of the specific threats
facing the organization –
helping to identify gaps
16 IBM Security
How It Works
Select data types lost
17 IBM Security
How It Works
Select applicable jurisdictions
18 IBM Security
Demonstrate a Consistent Process for Assessing Risk
Text box to document
conclusion
Guidance that helps
user assess risk
19 IBM Security
Meet Short Notification Timelines
The breach notification timeline is
already set and counting down
Tasks can be assigned to team
members for accountability
20 IBM Security
Notify in Phases
21 IBM Security
Maintain Required Documentation
22 IBM Security
Dashboards & Reporting
Q&A
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOU
1 de 24

Recomendados

Integrated Response with v32 of IBM Resilient por
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
1K visualizações21 slides
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated... por
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
742 visualizações18 slides
Accelerating SOC Transformation with IBM Resilient and Carbon Black por
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
966 visualizações20 slides
Are You Ready to Move Your IAM to the Cloud? por
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
2K visualizações22 slides
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P... por
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
775 visualizações12 slides
Automation: Embracing the Future of SecOps por
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
2K visualizações22 slides

Mais conteúdo relacionado

Mais procurados

Close the Loop on Incident Response por
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
2.6K visualizações1 slide
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec... por
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
1.1K visualizações23 slides
See How You Measure Up With MaaS360 Mobile Metrics por
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsIBM Security
1.2K visualizações12 slides
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks por
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksIBM Security
3.7K visualizações17 slides
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration por
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
1.3K visualizações27 slides
10 Security Essentials Every CxO Should Know por
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
8.6K visualizações22 slides

Mais procurados(20)

Close the Loop on Incident Response por IBM Security
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
IBM Security2.6K visualizações
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec... por IBM Security
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
IBM Security1.1K visualizações
See How You Measure Up With MaaS360 Mobile Metrics por IBM Security
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
IBM Security1.2K visualizações
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks por IBM Security
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
IBM Security3.7K visualizações
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration por IBM Security
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
IBM Security1.3K visualizações
10 Security Essentials Every CxO Should Know por IBM Security
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
IBM Security8.6K visualizações
Compete To Win: Don’t Just Be Compliant – Be Secure! por IBM Security
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!
IBM Security1.1K visualizações
QRadar & XGS: Stopping Attacks with a Click of the Mouse por IBM Security
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
IBM Security1.5K visualizações
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System por IBM Security
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
IBM Security1.1K visualizações
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso... por IBM Security
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security1.9K visualizações
4 Ways to Build your Immunity to Cyberthreats por IBM Security
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats
IBM Security1.3K visualizações
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment por IBM Security
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
IBM Security2.1K visualizações
Ibm security products portfolio por Patrick Bouillaud
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
Patrick Bouillaud4.2K visualizações
The 2016 Ponemon Cost of a Data Breach Study por IBM Security
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
IBM Security5.1K visualizações
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba... por IBM Security
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
IBM Security1.1K visualizações
Compliance is a pit stop – your destination lies ahead por IBM Security
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies ahead
IBM Security846 visualizações
IBM QRadar UBA por IBM Security
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
IBM Security5.7K visualizações
Valuing Data in the Age of Ransomware por IBM Security
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
IBM Security703 visualizações
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it por IBM Security
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
IBM Security745 visualizações

Similar a Bridging the Gap between Privacy and Security: Using Technology to Manage Complex Breach Disclosure Regulations

3 Steps to Security Intelligence - How to Build a More Secure Enterprise por
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure EnterpriseIBM Security
3.8K visualizações30 slides
IBM - IAM Security and Trends por
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
1.8K visualizações17 slides
Securing Your "Crown Jewels": Do You Have What it Takes? por
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?IBM Security
4.3K visualizações24 slides
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin... por
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM Security
1.9K visualizações20 slides
Kista watson summit final public version por
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public versionIBM Sverige
206 visualizações58 slides
Introduction to Cybersecurity Fundamentals por
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
1.6K visualizações17 slides

Similar a Bridging the Gap between Privacy and Security: Using Technology to Manage Complex Breach Disclosure Regulations(20)

3 Steps to Security Intelligence - How to Build a More Secure Enterprise por IBM Security
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
IBM Security3.8K visualizações
IBM - IAM Security and Trends por IBM Sverige
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
IBM Sverige1.8K visualizações
Securing Your "Crown Jewels": Do You Have What it Takes? por IBM Security
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
IBM Security4.3K visualizações
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin... por IBM Security
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM Security1.9K visualizações
Kista watson summit final public version por IBM Sverige
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
IBM Sverige206 visualizações
Introduction to Cybersecurity Fundamentals por Toño Herrera
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
Toño Herrera1.6K visualizações
Case study financial_services por G. Subramanian
Case study financial_servicesCase study financial_services
Case study financial_services
G. Subramanian209 visualizações
Building a Next-Generation Security Operation Center Based on IBM QRadar and ... por IBM Security
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security20.9K visualizações
Breaking down the cyber security framework closing critical it security gaps por IBM Security
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
IBM Security4.6K visualizações
What is Information Governance por Atle Skjekkeland
What is Information GovernanceWhat is Information Governance
What is Information Governance
Atle Skjekkeland8.9K visualizações
Brendan Byrne, Security Services Consulting and Systems Integration Leader at... por Global Business Events
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Global Business Events1K visualizações
MaaS360 - Mobile Expense Management por Darryl Miles
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense Management
Darryl Miles334 visualizações
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje... por confluent
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
confluent2K visualizações
An Integrated, Intelligent Approach to Security por Gerard McNamee
An Integrated, Intelligent Approach to SecurityAn Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to Security
Gerard McNamee137 visualizações
Smarter cyber security v8 por John Palfreyman
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
John Palfreyman992 visualizações
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé... por AGILLY
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
AGILLY349 visualizações
Beyond BYOD por AGILLY
Beyond BYODBeyond BYOD
Beyond BYOD
AGILLY263 visualizações
Security Principles for CEOs por Morten Bjørklund
Security Principles for CEOsSecurity Principles for CEOs
Security Principles for CEOs
Morten Bjørklund2.3K visualizações
Topic11 por Anne Starr
Topic11Topic11
Topic11
Anne Starr76 visualizações
Bordless Breaches and Migrating Malware por Sarah Freemantle
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
Sarah Freemantle229 visualizações

Mais de IBM Security

Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on... por
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
914 visualizações39 slides
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence por
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
3.2K visualizações30 slides
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ... por
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
4.2K visualizações25 slides
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ... por
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
3.6K visualizações29 slides
WannaCry Ransomware Attack: What to Do Now por
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
6.9K visualizações15 slides
Mobile Vision 2020 por
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
1.5K visualizações1 slide

Mais de IBM Security(14)

Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on... por IBM Security
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
IBM Security914 visualizações
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence por IBM Security
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
IBM Security3.2K visualizações
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ... por IBM Security
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
IBM Security4.2K visualizações
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ... por IBM Security
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
IBM Security3.6K visualizações
WannaCry Ransomware Attack: What to Do Now por IBM Security
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
IBM Security6.9K visualizações
Mobile Vision 2020 por IBM Security
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
IBM Security1.5K visualizações
Retail Mobility, Productivity and Security por IBM Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
IBM Security1.4K visualizações
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli... por IBM Security
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
IBM Security1.4K visualizações
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights por IBM Security
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
IBM Security2.7K visualizações
Top 12 Cybersecurity Predictions for 2017 por IBM Security
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
IBM Security1.3K visualizações
Safeguard Healthcare Identities and Data with Identity Governance and Intelli... por IBM Security
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
IBM Security1.3K visualizações
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System por IBM Security
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
IBM Security675 visualizações
Top 5 Things to Look for in an IPS Solution por IBM Security
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS Solution
IBM Security1.4K visualizações
Detect and Respond to Threats Better with IBM Security App Exchange Partners por IBM Security
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security956 visualizações

Último

VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue por
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueShapeBlue
85 visualizações54 slides
Five Things You SHOULD Know About Postman por
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About PostmanPostman
40 visualizações43 slides
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T por
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TShapeBlue
56 visualizações34 slides
Kyo - Functional Scala 2023.pdf por
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdfFlavio W. Brasil
434 visualizações92 slides
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... por
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...ShapeBlue
88 visualizações20 slides
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... por
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...ShapeBlue
77 visualizações12 slides

Último(20)

VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue por ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue85 visualizações
Five Things You SHOULD Know About Postman por Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman40 visualizações
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T por ShapeBlue
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
ShapeBlue56 visualizações
Kyo - Functional Scala 2023.pdf por Flavio W. Brasil
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdf
Flavio W. Brasil434 visualizações
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... por ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue88 visualizações
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... por ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue77 visualizações
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... por ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue46 visualizações
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... por ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue57 visualizações
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue por ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue50 visualizações
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online por ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue102 visualizações
PharoJS - Zürich Smalltalk Group Meetup November 2023 por Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi141 visualizações
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... por Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Jasper Oosterveld28 visualizações
MVP and prioritization.pdf por rahuldharwal141
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdf
rahuldharwal14138 visualizações
Ransomware is Knocking your Door_Final.pdf por Security Bootcamp
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp76 visualizações
DRBD Deep Dive - Philipp Reisner - LINBIT por ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue62 visualizações
Scaling Knowledge Graph Architectures with AI por Enterprise Knowledge
Scaling Knowledge Graph Architectures with AIScaling Knowledge Graph Architectures with AI
Scaling Knowledge Graph Architectures with AI
Enterprise Knowledge53 visualizações
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... por ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue65 visualizações
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT por ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue91 visualizações
Why and How CloudStack at weSystems - Stephan Bienek - weSystems por ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue111 visualizações
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates por ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue119 visualizações

Bridging the Gap between Privacy and Security: Using Technology to Manage Complex Breach Disclosure Regulations

  • 1. Bridging the Gap between Privacy and Security: Using Technology to Manage Complex Breach Disclosure Regulations
  • 2. 2 IBM Security Next-Generation SOAR Platform with Intelligent Orchestration IBM Resilient: The Market Leader in Incident Response Largest and most trusted install base in the world More than 350 customers globally Customers in more than 30 countries Part of the largest enterprise security organization in the world Resilient is the hub of IBM Security’s Immune System Expanding customer support and services resources Only incident response platform with built-in intelligent orchestration IBM Resilient Partner Ecosystem delivered through IBM Security App Exchange Technology-agnostic platform delivers enterprise-grade integrations with IT and security tools Includes orchestration and automation capabilities
  • 3. 3 IBM Security Our Speakers Monica Dubeau, CIPP/US Privacy Program Director - Resilient, IBM Alan Rodger Senior Analyst, Ovum
  • 4. Using Technology to Manage Complex Breach Disclosure Regulations Alan Rodger Senior Analyst Ovum 27 February 2019
  • 5. Ovum | TMT intelligence | informa5 Copyright © Informa PLC Double danger - damaging breaches + escalating consequences Dealing with breaches effectively, as a business How solutions can help (Ovum Market Radar report) Agenda
  • 6. Ovum | TMT intelligence | informa6 Copyright © Informa PLC What constitutes a breach? How common are they? Many potential sources of data breaches: • Cybersecurity attack • Lost device • Inadequate password protection • Unauthorized use of data 59,000 data breaches reported in EU countries (Source: DLA Piper survey results - 25 May ‘18 thru January ’19): • NL – 15,400 (also highest per capita) • DE – 12,600 • UK – 10,600 • Even small countries’ regulators are being notified of breaches (Lichtenstein, Iceland and Cyprus)
  • 7. Ovum | TMT intelligence | informa7 Copyright © Informa PLC ▪ Regulations are increasing the penalties ▪ In GDPR, up to 4% of global turnover, or EUR20M ▪ Timescale limitations add to the challenge ▪ We may see political ‘competition’ across regulatory jurisdictions ▪ These add to other direct and indirect financial impacts (internal and external): ▪ Operational costs ▪ Tying up expertise ▪ Delays to plans ▪ Trust and reputation ▪ Relationships and supply chain Consequences of data breaches
  • 8. Ovum | TMT intelligence | informa8 Copyright © Informa PLC Information security is still a fundamental challenge Source: Ovum ICT Enterprise Insights 2018/19 – Global: ICT Drivers and Technology Priorities
  • 9. Ovum | TMT intelligence | informa9 Copyright © Informa PLC ▪ Complex operational planning, and commitment to compliance ▪ Access to right types (and levels) of expertise: ▪ DPO ▪ Legal / compliance (relationship with supervisory authorities, compliance oversight) ▪ HR (policy; training; employee issues, roles, and personal data) ▪ Marketing (customer relationship ‘owner’) ▪ Comms (media liaison, PR) ▪ IT (advisory on data, security, applications, and architecture) Dealing with breaches effectively, as a business ▪ Awareness of responsibilities ▪ Leadership team ‘skin in the game’
  • 10. Ovum | TMT intelligence | informa10 Copyright © Informa PLC Solution schematic and value Breach reporting: - supervisory authority - citizens affected Processes / capabilities Information / insight / expertise Stakeholders • Incidents • Security logs • Regulation context/advice • Legal / compliance • HR • Marketing / comms • Senior leadership • IT • Partners / service providers • Organizational workflows • Approvals • Roles and contacts • Scheduling / alerts • Visibility / auditability • Risk analysis • Data integration • Testing / modelling • Visual design • Templates • Multiple supervisory contacts • Digital submission
  • 11. Ovum | TMT intelligence | informa11 Copyright © Informa PLC ▪ An early-stage market (with some mature solutions – but very few competing) ▪ Widespread adoption expected within a few years ▪ Alternatives (spreadsheets, checklists, manual processes) are inadequate ▪ Awareness will grow of non-compliance consequences Ovum’s findings on Data Breach Management/Reporting solution market ▪ Our recommendations: ▪ Follow up earlier GDPR programs by spreading awareness of breach-reporting non-compliance risks, and the options available ▪ A successful compliance capability must: ▪ Ensure commitment of resources from across the organization, and external parties where needed ▪ Use a data breach management and reporting solution fully to maximize benefits ▪ Ensure that all parties are aware of their roles and responsibilities, should a data breach occur
  • 12. Ovum | TMT intelligence | informa12 Copyright © Informa PLC Thank you alan.rodger@ovum.com
  • 13. Privacy Module Monica Dubeau February 27, 2019 Privacy Program Director
  • 14. 14 IBM Security What is IBM Resilient Intelligent Orchestration?What is IBM Resilient Intelligent Orchestration?
  • 15. 15 IBM Security Over 160 global regulations in product to help customers to remain compliant with the complex breach notification requirements Privacy Module Capabilities Integrated breach notification with the wider Cyber Security Incident Response plan – one central place of incident management Full simulation and table-top capabilities to train Privacy & IR teams on consistent, repeatable procedures Reporting tools provide a clear picture of the specific threats facing the organization – helping to identify gaps
  • 16. 16 IBM Security How It Works Select data types lost
  • 17. 17 IBM Security How It Works Select applicable jurisdictions
  • 18. 18 IBM Security Demonstrate a Consistent Process for Assessing Risk Text box to document conclusion Guidance that helps user assess risk
  • 19. 19 IBM Security Meet Short Notification Timelines The breach notification timeline is already set and counting down Tasks can be assigned to team members for accountability
  • 21. 21 IBM Security Maintain Required Documentation
  • 23. Q&A
  • 24. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: THANK YOU