Playing Catch-Up With GDPR

After two years of waiting, Europe’s General Data Protection Regulation has officially taken effect. Beyond Europe, the regulation is expected to reshape how global organisations manage, share and protect their users’ personal data. 
 
Many organisations across the world have scrambled to be ready. But based on public statements from companies and client feedback, it is clear that many companies are still not in compliance. Still, with all the high-profile data breaches and misuses we have witnessed in the last few months; i.e. Equifax and Cambridge Analytica, global businesses are taking GDPR seriously. 
 
Not knowing the extent and depth to which the EU will enforce GDPR, the potential fines of up to 4 percent of global annual revenue or 20 million euros should still inspire an immediate need to review and subsequently adjust data privacy and protection programs. 
 
As a result, companies will have to restructure how they handle data, and, if they do not have a cyber infrastructure that is sound, they will have to rebuild from the ground up including their applications. Even if the GDPR does not directly affect your organisation, the requirements and guidelines contained within can help any organisation obtain resilient data privacy and protection.
 
Who is in Compliance?
The answer differs based on several factors. Over the past few weeks there have been at least four distinct studies with very different results. On May 21, a new GDPR study carried out by the Ponemon Institute found that 40 percent of the companies surveyed would not be ready.
 
A Crowd Research Partners report drawn from the Information Security Community on LinkedIn, says that only 40 percent of the organisations surveyed would be fully compliant by today’s GDPR deadline.
 
A World Federation of Advertisers (WFA) survey stated that 95 percent of respondents planned to be fully compliant by the deadline, of which 74 percent said they believe their company would likely be fully compliant by the deadline, with 42 percent of those respondents saying they would definitely be.
 
A Netsparker GDPR survey of 300 senior executives found that only 2 percent of those surveyed said that they do not expect to be compliant by today’s deadline.
 
The various survey results indicate that there is still much confusion around GDPR. For those organisations that are playing catch-up with GDPR, the first step is to realise that they will need their customer’s permission to collect and process their data. This includes internal tools used to share or analyse the data internally, exclusive of tools that encrypt the data end to end. 
 
The steps should be prioritised by risk and execution complexity within your organisation.
 
1. Revise your procedures that define how you are going to handle an individual's request for erasing or rectifying inaccurate data. Executing this process will take the longest time so it should be prioritized.
2. Review your contracts with third parties. Their compliance is your risk exposure so you need to make sure you ensure their compliance. 
3. Review and understand how you process your customer data mapping the data processing activities across the business processes. This activity, previously put on the back burner, needs to be moved up. It is a compliance activity not a systems analysis activity. It simply isn’t an option anymore.
4. Revise your data security practices and systems to be in compliance with GDPR. The core initiative for meeting EU GDPR compliance is to protect user data. If you have not already, you need to take inventory of your data and map your data to protected EU GDPR categories. 
5. Most importantly once you have the knowledge of where your data is and how is it being used a prudent step would be to also implement a data leak prevention tool and policy to enforce GDPR systematically. 
6. It is equally important to remember why GDPR was created in the first place. The main goal of the regulation was to protect the misuse of personal data by organisations for intrusive marketing and influencing activities. 
 
Moving forward, GDPR compliance will emphasise transparency of the data. The retention and processing of our data has to be with our permission and easily auditable. 
 
Complying with GDPR will be a significant challenge to all businesses. 
However, knowing what you have to do to be in compliance is the first and most important step. This will help you quickly get to a point where you demonstrate to the regulators that you can both identify and audit your data so that you can create a practical roadmap to GDPR compliance.
 
To contact the GDPR Advisory Board please visit:  www.gdpr-board.co.uk
 
Information-Management
 
You Might Also Read: 
 
What Your Board Needs To Know About GDPR:
 
Cybersecurity Advice For SMEs:
 
 
« Demand For Indian Cybersecurity Skills Rising Fast
Cybercrime: Law Enforcement Must Get Serious »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Certego

Certego

Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.

European Society of Criminology (ESC)

European Society of Criminology (ESC)

The ESC Working Group on Cybercrime is focused on cybercrime, its causes and offenders, impact on victims, and our response to it at the individual, corporate, and governmental levels.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

ABS Group

ABS Group

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations.

Dutch Innovation Park

Dutch Innovation Park

Dutch Innovation Park in Zoetermeer is a breeding ground for applied IT solutions in the field of cyber security, e-health, smart mobility and big data.

Basque Digital Innovation Hub (BDIH)

Basque Digital Innovation Hub (BDIH)

The aim of the BDIH initiative is to provide industrial enterprises, especially SMEs, with the technological capabilities needed to meet the challenges of industry 4.0.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance provides an array of cybersecurity services including cybersecurity policy management, risk assessments and regulatory compliance consulting.

Viettel Cyber Security

Viettel Cyber Security

Viettel Cyber Security is an organization under the Military Telecommunication Industry Group, conducting research and developing information security solutions for domestic and foreign customers.

SolCyber

SolCyber

SolCyber, a Forgepoint company, is the first modern MSSP to deliver a curated stack of enterprise strength security tools and services that are accessible and affordable for any organization.

Moss Adams

Moss Adams

Moss Adams is a fully integrated professional services firm dedicated to assisting clients with growing, managing, and protecting prosperity.

Redbot Security

Redbot Security

Redbot Security provides industry leading manual penetration testing. Protecting critical systems and data - red team attack and breach simulations, (OT) critical infrastructure testing.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

NetWitness

NetWitness

NetWitness empowers security teams to rapidly detect today’s targeted and sophisticated attacks with unparalleled visibility.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.