GDPR Is Now Effective

The long-anticipated General Data Protection Regulation is finally upon us. For the benefit of anyone that has been living under a rock, GDPR is a regulation put forth by the European Union that intends to ensure stronger data protection and better ownership of private data for all European citizens. 

It gives control over private data back to said citizens and includes some very severe penalties for any organisation that does not comply. Most notably, it makes no distinction as to whether an organisation is based in the EU or internationally, if they hold the private data of a European citizen, they have to comply with GDPR. 

It became enforceable on Friday May 25, 2018. After this, any organisation that is not already compliant will very likely be hit with significant fines, and possibly even sanctions. 

Even if you haven’t been scrambling to ensure compliance, you’ve at least heard of GDPR in passing. And you’ve (hopefully) at least considered what’s involved in becoming compliant.

Ultimately, it all comes down to data hygiene. It comes down to knowing exactly what data is stored where, how that data is used, how that data is secured, who uses that data, and who has a right to it. It also comes down to having systems and processes in place for effective data erasure, and redundant architecture to ensure full availability of data to citizens. 

It’s all stuff that you should be doing anyway, in other words. Yet it’s also stuff that most businesses rather bafflingly don’t bother doing. Their reasons are many, a lack of expertise, a lack of resources, an unexpected period of growth….
But the end result is the same. They’re non-compliant, and that will come back to bite them. If not now, then in the very near future. 

“GDPR is a wake-up call for American companies to solidify best practices around their big data and data science initiatives,” explains Datanami’s Alex Woodie. 

“While American firms today must follow a mishmash of data handling laws for specific sectors like healthcare and banking, there’s no single overarching law telling what they can and can’t do with data in a broad sense.”

That’s the purpose that GDPR serves. And if you think there won’t soon be more regulations like it, if you think that more governments will not soon follow suit, you simply haven’t been paying attention. 
Cyber-security and privacy are rapidly coming into the public eye.

People want more ownership over their identities. People are growing more cautious and concerned about cyber-security. And people want businesses to be held accountable for carelessness where sensitive data is concerned. 

GDPR is the end result of those desires, the end result of governments paying closer attention to cyber-security and data protection. And it should serve as a warning for you to follow suit. Because if you don’t, you’ll have only yourself to blame when you’re brought low by non-compliance penalties. 

The Work for GDPR has just Begun
Now that the implementation date has arrived, it would be simple for CISOs and cybersecurity professionals to see GDPR as job done. Yet the task to comply with GDPR does not finish today. Cybersecurity professionals will play an intrinsic role to ensure compliance is maintained long term. For example, cyber professionals will always be monitoring for any abuse, illegal access or breaches and then working with the legal team and Data Protection Officer to report it to DPAs (or publicly if needed) should one occur.

Additional Legislation
While Europe’s attention has been heavily focused on GDPR, there are other regulations which CISOs and cybersecurity professionals must manage. Most notably is the Networks and Information Security(NIS) Directive, which aims to improve the EU’s preparedness for cyber-attacks, particularly on critical infrastructure such as energy, utilities, finance, healthcare, digital infrastructure and transport. 

This regulation means that CISOs operating in these industries and the public sector will have to implement high defenses against cyber-attacks.

While GDPR focuses on personal data, this regulation is about system-level infrastructure, and so will be a great challenge for the relevant CISOs. We may also envisage the trends around AI and IoT as big issues to handle in a near future.
GDPR is the start of a new era for cybersecurity professionals and, in particular, CISOs. While it remains a critical role of the CISO to ensure their business is compliant, with GDPR and other legislation, there’s also a large opportunity.

To contact the GDPR Advisory Board please visit: www.gdpr-board.co.uk

Information-Management:

You Might Also Read:

GDPR - More People Will Share Data:

GDPR: It’s A Marathon, Not A Sprint:

 

 

 

« Japan’s Secret Spy Agency
Nation State Cyber Attacks Are An Act Of War »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Certus Software

Certus Software

Our Secure Data Erasure solutions protect customer data confidentiality by completely erasing it from data storage devices.

Mondo

Mondo

Mondo is the largest national staffing agency specializing exclusively in high-end, niche IT, Tech, and Digital Marketing talent. Areas of expertise include Cybersecurity.

SAI360

SAI360

SAI360 (formerly SAI Global) provide products and services for enterprise risk management including Governance, Risk & Compliance and Digital Risk solutions.

StationX

StationX

StationX is a leading provider of cyber security training, consultancy and services.

EdgeWave

EdgeWave

EdgeWave provides simple but highly effective data security and advanced threat protection in solutions that are affordable, scalable and easy to use.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

SPARTA Consortium

SPARTA Consortium

SPARTA tackles hard innovation challenges, leading the way in building transformative capabilities and forming a world-leading cybersecurity competence network across the EU.

Outsource UK

Outsource UK

Outsource UK is an independent recruitment company supplying highly-skilled technology, change and engineering talent to clients within a range of specialist sectors including Cyber Security.

Krypsis

Krypsis

Krypsys is an information security company with a focus on helping you defend your information and data against emerging security threats.

StartupXseed Ventures

StartupXseed Ventures

StartupXseed Ventures is a smart capital provider for Deep Tech, B2B, Early Stage Startups. We support, NextGen Tech Entrepreneurs, who have potential to deliver the outsized growth.

Inpher

Inpher

Inpher has pioneered cryptographic Secret Computing® that enables advanced analytics and machine learning while keeping data private, secure, and distributed.

Communicate Technology

Communicate Technology

Communicate Technology are IT, telecoms and cyber-security specialists, keeping over 500 businesses and 50,000 users connected and secure across the UK.

Aiden Technologies

Aiden Technologies

Aiden simplifies your IT process, giving you peace of mind and security by ensuring your computers get exactly the software they need and nothing else.

CNF Technologies

CNF Technologies

CNF Technologies is an award-winning cyber company providing technology-focused research and development to commercial, federal, and Department of Defense clients.

Aikido Security

Aikido Security

Aikido is the no-nonsense security platform for developers. Secure your code, cloud, and runtime in one central system. Find and fix vulnerabilities automatically.

SKADI Cyber Defense

SKADI Cyber Defense

At SKADI Cyber Defense, we specialize in enterprise-grade cybersecurity solutions tailored for small to medium businesses.