CSX2018 - GDPR 3rd Party
CSX2018 - GDPR 3rd Party
CSX2018 - GDPR 3rd Party
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
What is this all about?
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Let’s get started!
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Setting the stage
Compressed GDPR
or
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Three Dimensions of GDPR
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Personal Data and Privacy
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Why GDPR is a concern
Gap Analysis
and/or
Implement
Basic Aspects
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
GDPR in a Nutshell – 1/2
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
GDPR in a Nutshell – 2/2
6. User consent
7. Data Protection Officers (DPO)
8. Notification of security breaches
9. Enforcement scope
10.European Data Protection Board Image credits:
https://www.peerlyst.com/posts/gdpr-
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Data Subjects rights
• The GDPR does provide data subjects with a set of rights over
the administration and use of their personal data
• Organizations that control personal-data processing activities
throughout the data life cycle should have less trouble enabling
these rights
• The right to data portability could be assured by implementing a
self-service portal; the same online platform can be used to
provide transparency and notification
• The right "not to be subject to a decision based solely on
automated processing, including profiling" implies a strong
focus on automation of analytics and the use of the subsequent
results
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Data Subject consent
• The burden of proof that consent was obtained lies with the
data controller
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Recap: DC vs DP
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
GDPR Personal Data Lifecycle
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
GDPR Gap Analysis How-To
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Basics of GDPR Implementation
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Art. 30, “Records of Processing Activities” – 2/2
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Information is the new gold
• Information is an asset
– Like software and hardware assets, build an inventory
• Information is fluid
– Include data flow diagrams
• Answer these questions & document the answers
– What data do we have?
– How and why do we collect it?
– What do we do with it?
– Where do we store it?
– How do we secure it?
– Who do we share it with?
– How long do we retain it?
– What do we do with it at end of life?
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Third-Party vs Critical Infrastructure
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Lessons learned
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Third-party and GDPR
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Google’s VSAQ
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Minimize third-party and internal risks
control A.8.1.4
clause 6.1.2 control A.7.1.1 control A.15.1.2 control A.9.4.1 control A.15.2.1
control A.9.2.6
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Cybersecurity and GDPR for M&A
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Business Drivers
• Confidentiality
• Speed
• Business as usual
– Zero Impact
• Informed Business Decision on Risk
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
M&A Threats
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
This used to be the only threat…
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Introspection moment
Scoping the Risks
• Publicity, raising profile — your interest gets attacker’s interest!
• Impact on:
– Resources
– Technologies
– Infrastructure
• Disgruntled Employees
• Change in threat and risk model
• Absorbing unknown / confusion
• Creating new attack vectors and window of opportunity
• Business drivers force the hand of the Security Manager very quickly
• Are we all really equipped for change?
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
How Due Diligence looks for real
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Virtual Data Rooms
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
GDPR driving changes in M&A
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Due diligence – technical goals
• “Privacy risk”
• Much more comprehensive
• How target collects, stores, uses and transfers personal data
• Historical data breaches
• Include data processing in NDAs
• QUIZ time!
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
M&A experts on GDPR and Cybersecurity
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Engage cybersecurity risks for GDPR in M&A
• New questions
– How is cyber-diligence conducted?
– Specialist service providers?
– What do we need to be aware of?
– Has the business enough technical knowledge?
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Four Steps for Due Diligence
• Data sets, risks and mitigations for GDPR risks have been
assessed
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Post-Merger activities – Basics
• Capture
• Connect
• Combine
• Consolidate
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Post-Merger activities – GDPR specifics
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
The Role of the Cybersecurity Expert
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Combining the two companies
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
IT/Cybersecurity Post-Mergers Objectives
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Conclusions
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
GDPR has no specific guidance on Cloud
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Cloud IaaS and GDPR
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Implementing a GDPR program
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
What cannot be insured
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
What can be insured
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
GDPR Regulatory Heat Map
Data Regulatory Environment
High
Austria, Belgium, France,
Not insurable Germany, Ireland, Italy,
Austria, Belgium, Bulgaria, Netherlands, Norway, Poland,
Cyprus, Croatia, Czech Portugal, Spain, Sweden,
Republic, Denmark, Switzerland
France, Hungary, Ireland,
Italy, Latvia, Luxembourg, Fairly High
Cyprus, Czech Republic,
Malta, Portugal, Romania,
Denmark, Estonia, Finland,
Slovakia, Spain, Greece, Hungary, Latvia,
Switzerland, United Luxembourg, Romania,
Kingdom Slovakia, Slovenia
Unclear
Moderate
Estonia, Germany, Greece,
Bulgaria, Croatia, Lithuania,
Netherland, Poland, Malta
Lithuania, Sweden
Insurable
Finland, Norway
Security Processes
Risk Management
Information Lifecycle
Privacy by Design
Privacy by Default
Data Discovery & Classification
Technical Measures
Asset Management Access Control
Physical Security Data Deletion
Change Management Encryption
Incident Response Pseudonymisation (Data Masking) Organizational
Breach Notification Monitoring Measures
Compliance Programs Secure Configuration Employment Procedures
Vulnerability Management DR/BCM Confidentiality Agreements
Third-party Management Application Security Security & Privacy Awareness
Documentation Management Data Leakage Prevention Acceptable Use Policy
Content Filtering Access Controls
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Selected Controls Supporting GDPR Activities
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Encryption and Pseudonymisation
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Tokenisation vs Encryption
Tokenisation Encryption
Output is format and length Output is generally not format length
preserving preserving, except for FPE/OPE
May or may not use encryption as Encryption does not have any use for
mapping function (can use hashing tokenisation
as mapping table)
Output may or may not be reversible Given the key, output is always
reversible
PCI DSS, GDPR GDPR, HIPAA
Main use case: reduce PCI scope Main use case: confidentiality of data
at rest
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Consent Management Tools
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Zero Knowledge Proofs
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Zero Knowledge Proofs – user advice
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
“Hype-Cycle” of GDPR
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Privacy Officers
• Preparatory plan
• Build relationships
– Identify stakeholders
– Campaign internally
– Increase organizational understanding
– Map out a plan for the future
• Establish the Privacy Program
– Maintain privacy documentation for business units and users
– Establish a companywide mandatory reporting mechanism
– Review existing personal-data-processing operations
– Prioritize actions
• Keep reputation for integrity, inside and outside the company
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Incident Management
Incident Management
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Recent Incidents
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Recent Incidents
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Reporting to the CFO and Potential Investors
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Key Findings from breached companies
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Backup Slides
Backup Slides
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
GDPR Implementation Landscape
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Practice Validation Requirements
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Gartner’s Recipe for GDPR Compliance
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
Gartner’s Priority Matrix for GDPR
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.