Prevent million dollar fines - preparing for the EU General Data Regulation
-
Upload
sophos-benelux -
Category
Education
-
view
287 -
download
1
Transcript of Prevent million dollar fines - preparing for the EU General Data Regulation
11
The proposed EU Data Regulation and what this means for you
• Anthony Merry• Director of Product Management
2
Agenda
• Proposed EU Data Protection Regulation• Survey results: European attitudes to data protection• How to comply with the Regulation and minimize fines in the
event of a breach• Stopping breaches in the first place• Summary
33
EU Data Protection Regulation
4
Establish a single, pan-European law to replace the current inconsistent patchwork of national laws.
Modernize the principles enshrined in the 1995 Data Protection Directive
Goal
5
Benefits of the new Regulation
Benefits for businesses1. One EU market, one law2. One-stop-shop – a single supervisory authority3. Same rules for all companies
Benefits for EU citizens4. Better data security5. Putting people in control
6
Data security focus
3 key Articles pertaining to data security :
1. Security of processing (Article 30)a. prevent any unauthorized access to personal datab. prevent any unauthorized disclosure, reading, copying, modification,
erasure or removal of personal data
2. Notification of a personal data breach to the supervisory authority (Article 31)
3. Communication of a personal data breach to the data subject (Article 32)
7
What you need to know
• Organizations must:• implement appropriate security measures to protect personal data• have a clear data protection policy• have a named Data Protection officer (except SMEs)
• Fines for unprotected data breaches will range up to €1 million or 2% of annual turnover.
• If you suffer a breach and can show that the personal data can’t be accessed by unauthorized people (e.g. it was encrypted):• The likelihood of being fined should be very greatly reduced • You won’t need to notify affected data subjects of the breach
88
How to ensure compliance with the Regulation
9
Encryption is key
The Regulation will require organizations to:
1. Implement ‘appropriate security measures’ to protect personal dataEncryption is widely agreed to be the best data security measure
available
2. Notify affected parties in the event of a personal data breachIf you can prove the data was encrypted you don’t need to notify the
individuals concerned
3. Pay fines in the event of a personal data breachIf the data was encrypted it’s highly likely that no fines will be
imposed
10
Encryption is key
But What? Where? When?
11
Lost or Stolen Device
Unencrypted Encrypted
• Accidental loss or Theft of a device is a common occurrence.
• Only authorized user should access devices.• How many devices have you lost?
12
Copy Files to Removable Media
• These tiny devices can store large amounts of data and are easily misplaced.
• Block or protect?• Where is your first USB stick and what was on it?
13
Attach Files to E-Mail
• We all email & we all make mistakes (it happens)• What’s the consequence of sending the wrong
attachment to the wrong person?• Encrypt file attachments or examine at Gateway?
14
Copy Files to a Network Share
• Today’s Operating Systems make sharing data on the Network very simple.
• Protect against Internal Threats.• Who is allowed to access company/user data?
15
Copy Files to the Cloud
• Cloud Storage Services revolutionized the way we share data between users and devices.
• What have you stored in the Cloud and what happens if someone steals it?
• Encrypt the data before sending it to the Cloud.
16
Rock solid data protection strategy
It’s all about the data
1. How does data flow into and out of your organization?
2. How do end users use the data?
3. Who has access to company data and do they need it to perform their job?
4. How does data glow out of an organization?
1717
Preventing breaches
18
5 steps to stop data getting into the wrong hands
1. Keep patches up-to-dateData-stealing malware often exploits known vulnerabilities.
2. Apply multi-layered entry-point protectionSecure against multiple vectors of attack with Web, Email and Malware protection at the gateway.
3. Select Advanced Threat ProtectionChoose a next-generation firewall that detects and blocks attacks directly on the network.
4. Use Selective SandboxingSecure against slow-moving or delayed threats.
5. Limit dissemination of sensitive data Deploy Application Control and Data Control
1919
Summary
20
Summary
• This legislation WILL go ahead• It has already progressed very far, and with very high support. It will not be
allowed to fail.• Key stakeholders want to move fast
• European Commission• European Parliament• Data Protection Authorities• Individual Governments
• Media pressure is building up• PRISM, large scale data thefts (e.g. Target)• Confidence from citizens in online activities is eroding
• You need to be ready• Implement appropriate data security measures • Create and communicate your data protection policy
21
Resources available to help you
• Sample Data Protection Policy• 60-Second EU Data Security Compliance Check• Whitepaper on EU Data Protection Regulation• Try the Sophos products for free
All available at www.sophos.com/EU
2222
Questions?
23© Sophos Ltd. All rights reserved.