GDPR Countdown

When did your company become aware of the General Data Protection Regulation and the need to do something about it?

GDPR has been a running story in DataIQ since it launched in 2011, through the 3,000-plus amendments and four years it took to become law and now in the final few months running up to enforcement.

With the first GDPR Impact research in 2016, 46.0% of businesses said they were very aware of the new data protection law. One year later, however, this figure was stuck at nearly the same level (50.0%).

Yet the last 12 months seem to have been decisive with a dramatic rise in this number to 84.3%.

Compliance is hard won and Never Certain

If this had not happened so close to the enforcement regime starting, it would have been a cause for concern. Companies need to look deeply into their data-driven processes, data management and data governance policies.

What they find is not always easy to resolve, which may explain that only 25.4% describe themselves as very prepared for GDPR.

Compliance is hard won and never certain, so it is understandable if 61.0% describe themselves as somewhat prepared.

With much guidance still pending and legal opinion either conflicting or so risk averse as to make existing business practices often look impossible to bring into line, it is better to adopt a cautious view.

But that is only if the Regulation is viewed from a purely compliance point of view. It certainly merits a legally-oriented perspective at the outset of any programme. Unless those strictures are closely considered and mapped against the operating model of the business, it will be difficult to spot the gaps in which risk might arise.

Ticking the box of compliance should not be the end-point, however. Whatever the letter of the law, GDPR is also a major opportunity to reset the relationship with customers and get ahead of any concerns they might have about data sharing, security and control.

This is why maturity in the adoption of data and analytics becomes a strong indicator of whether the underlying culture of an organisation has evolved or if it is just trying to stay within the parameters set out by the Regulation. In this perspective, there seems to be a positive correlation between preparing for GDPR and data ratification of the business.

Back in 2016, just 39% described themselves as in the upper two quintiles of maturity (Managed and Optimised). This year, the number has risen to 62.7%, meaning the majority of UK companies are putting data and analytics at the heart of how they operate. That is likely to mean they will realise commercial benefits from their compliance efforts, not just risk mitigation.

“It comes down to knowing how and where to focus training and measurement, rather than system fixes.”

So how can your company find out whether it is heading towards both compliance and value-adding data maturity? One way is to carry out a capability audit, like DQM GRC’s RADAR.

As technical director Peter Galdies explains, “this involves a real inspection of practice and process to understand the business thinking and highlight where business process needs to be re-engineered. Often, this comes down to knowing how and where to focus training and measurement, rather than system fixes.”

While it is tempting to believe that organisations only need to assess their compliance with GDPR once, the reality is very different, he warns.

“The law itself requires that the organisation be capable of continually demonstrating its compliance, and if you are the kind of organisation that needs a Data Protection Officer, then a key part of that role is to audit or assess that compliance.”

In fact, when it comes to implementation, the GDPR river runs very deep indeed. The cultural and system changes expected by the legislators cannot be fixed by technology or training alone and require a process of continual self-inspection. This is inherent in the expected behaviours of “privacy by design” and “data protection by default” which the regulators demand of organisations under the GDPR regime.

“To effectively understand your organisation’s ability to comply both today and, importantly, in the future, a robust assessment process (like our GDPR Radar) has to examine not only if you have the right controls, but also if you have the right management systems in place around those controls to ensure they will still be working for you going forwards,” says Galdies.

“That means measuring the maturity of your compliance processes, not just ticking boxes.”

Evidence gained from a data audit of this type provides a powerful basis on which to explain to the board what more might need to be done, above and beyond any box-ticking for compliance purposes.

It is also a useful demonstration of accountability to prove that you are reaching for compliance, too. And hitting two birds with one stone is always a real sign of advanced abilities.

To contact the GDPR Advisory Board please visit:  www.gdpr-board.co.uk

DataIQ

You Might Also Read:

GDPR - Questions & Answers:

« AI And Blockchain In A Disruptive World
Six Steps to Protect Customer Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

AusCERT

AusCERT

AusCERT is the premier Computer Emergency Response Team (CERT) in Australia and a leading CERT in the Asia/Pacific region

Montash

Montash

Montash is an award winning, global technology recruitment business, specialising in the acquisitions of high-performing talent across a number of core disciplines including Information Security.

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

Odix

Odix

Odix security software neutralizes file embedded targeted cyber attacks before they enter your organization’s network.

ACI Solutions

ACI Solutions

ACI Solutions is a managed IT services and network security provider working with diverse global commercial, government and public sector clients.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Abusix

Abusix

Abusix specializes in Internet security, network abuse handling, antispam and fraud prevention.

Montreal International

Montreal International

You’re an entrepreneur planning to launch a company in an innovative sector such as AI, cybersecurity, 'deeptech' or fintech? You’ve found the right place!

MONITORAPP

MONITORAPP

MONITORAPP is responsible for complete web security. Protect your business environment with Application Security Solutions from MONTORAPP.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

Antares NetlogiX

Antares NetlogiX

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services.

AirEye

AirEye

AirEye is a leader in Network Airspace Protection (NAP). Block attacks against your corporate network launched from wireless devices in your corporate network airspace.

NSR

NSR

NSR provide trusted solutions that deliver positive business outcomes for our clients in cybersecurity and data protection challenges.

SecAlliance

SecAlliance

SecAlliance is a cyber threat intelligence product and services company.

Protelion

Protelion

The Protelion Security Platform is uniquely architected to deliver security solutions that combine greater protection, flexibility, and performance.