Get Into Gear On GDPR

The introduction of the General Data Protection Regulation (GDPR) in May 2018 represents a watershed moment for data regulation. 

The Data Protection Act of 1998 will be bolstered by the European regulation that is set to reshape how organisations handle personal data with ramifications for every organisation doing business in Europe. This legislation has created a flurry of fear and confusion globally which has been building towards its enforcement date. 

Scenario planning must be front and center when a company’s finances, brand or reputation is at stake; and the GDPR is no different. 

The regulation’s legal obligations will require those businesses in possession of European citizens’ personal data to be honest, open and transparent about their digital practices, more so than ever before, protecting the rights of natural persons. Slowly but surely, organisations are waking up to the challenge, amid concerns around the potential financial implications of what failed compliance would look like.

Worryingly however, the majority of organisations are still a long way off GDPR compliance. According to a recent global survey from Veritas Software, less than two per cent of organisations currently meet the necessary requirements. It’s unlikely however that mere laziness is the cause, but rather inertia over decision-making. 

Simply getting started on the journey towards compliance is undoubtedly one of the biggest obstacles. Both the intricate nature of the regulation and its multiple parts, are likely to be the root causes for the lack of action in many companies. 
Certain measures will generate results faster than others. Our recommendation is to first examine the IT estate to pinpoint those applications most likely to be used to access personal data. A manufacturing organisation on our books has 35,000 employees that regularly use as many as 11,000 distinct software titles, both on premise and in the cloud, a significant amount of software, but no more so than any other organisation of this scale. 

But 11,000 is still a high number of software titles to filter through manually, requiring an understanding of each application, the kind of data that is likely to be accessed, where it is being accessed and by whom. 

Comparing the software inventory with those applications with identifiable potential GDPR risk alone means the organisation can focus on less than 500 applications, as opposed to the original 11,000. A seemingly impossible task now becomes manageable. 

Those who comprise the GDPR team (i.e. data, legal and SAM teams) must still be able to identify which applications are accessing what data; who was using that application, how that data is being stored and where it is located. This work is now only required for the less-than-five percent of applications that are relevant to the GDPR, as opposed to every piece of software owned by the company. 

RoPA Yourself
Those starting now must focus on what can be addressed before the deadline to make themselves a less attractive target to those regulators charged with enforcing the GDPR.  To satisfy regulators and build a plan for achieving compliance in a sensible timeframe, GDPR teams should turn to the Record of Processing Activities (RoPA) (Article 30 of the regulation), which comprises five key obligations. For those consultants launching an ‘emergency’ project for clients, they should be making it crystal clear the RoPA is essential for focus and success.

The inventory of applications is also key when creating the RoPA, enabling the GDPR team to spot and investigate any risks associated with the data. Teams internally and externally can then complete the RoPA and address any major risks head on. 

You can only do your best
The deadline of May 2018 is only the beginning, not the end. Policy makers are already under monumental pressure to smoke out prosecutable cases in the aftermath of the regulation’s implementation. As an organisation, if you cannot complete your GDPR project in time for the deadline, taking firm steps to indicate ‘best efforts’ are vital to make your organization a far less attractive target. 

Evidence that you are investigating the risks and have a continuing plan in place to mitigate them could, and should, be enough. 

Infosecurity Magazine:

You Might Also Read: 

The GDPR Advisory Board Offers Expert Advice:

The New GDPR Rules Focus On Consumer Protection:

What Does The UK’s Data Protection Bill Mean For Business?:
 

« Russian Hackers Steal $10M From Banks
Why Is The Price Of Bitcoin So High? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Continuum

Continuum

Continuum is the IT management platform company that allows Managed IT Services Providers to maintain and back up on-premise and cloud-based servers, desktops, mobile devices and other endpoints

RiskLens

RiskLens

RiskLens is a software company that specializes in the quantification of cybersecurity risk.

Mnemonica

Mnemonica

Mnemonica specializes in providing data protection system, information security compliance solutions, cloud and managed services.

ODSC

ODSC

ODSC is a security systems integrator that provides services and expertise in identity management and access.

Scanmeter

Scanmeter

Scanmeter helps identifying vulnerabilities in software and systems before they can be exploited by an attacker.

Plexal

Plexal

Plexal is East London's innovation centre and co-working space. We offer startups flexible memberships, giving them access to office space plus all the benefits and support they need to scale.

Zercurity

Zercurity

Zercurity is on a mission to build the ultimate cybersecurity operations platform for businesses. To help protect against a growing number of internal and external threats.

SOC Experts

SOC Experts

SOC Experts is a pioneer (we started SOC training well before people realized how big the domain was going to be) and the only institution to provide end-to-end training on Security Operations Centers

Lavabit

Lavabit

Lavabit's Dark Internet Mail Environment is a secure, open-source, secure end-to-end communications platform for asynchronous messaging across the internet.

Netox

Netox

Netox is a comprehensive IT service provider that combines IT support services, IT solutions and specialist services; specializing in cybersecurity solutions.

IT-Schulungen.com / New Elements GmbH

IT-Schulungen.com / New Elements GmbH

Under the name IT-Schulungen.com, the Nuremberg-based New Elements GmbH has been operating one of the largest training centres in the German-speaking world for over 20 years.

Haiku

Haiku

Haiku stands at the forefront of cybersecurity upskilling, leveraging video games to immerse you in a flow state for accelerated, enduring learning.

Btech

Btech

Btech is the market leader in providing affordable managed IT security services for credit unions.

Cyberhill Partners

Cyberhill Partners

Cyberhill is a professional engineering services firm solving complex software implementation and integration challenges.

Airbus Protect

Airbus Protect

Airbus Protect is an Airbus subsidiary bringing together the Company’s expertise in cybersecurity, safety and sustainability-related services.

RealmOne

RealmOne

RealmOne addresses the most challenging issues in the realms of defense and cyberspace, adapting to the continuously changing demands of our national security customers.