it's 10 o'clock do you know where your PII is?

it's 10 o'clock do you know where your PII is?

In May 2018, GDPR (General Data Protection Regulation) came into effect. Even though this is euro-centric, it caused ripples through many Australian companies. I saw varying responses ranging from the blasé 'this is a European directive and has nothing to do with us' to a panicked 'what do we need to do'?

At the time I was working for a service provider at an Australian company, and they were very concerned about GDPR. Representing my employer, I attended multiple meetings with contract managers, lawyers, IT and business unit executives to assess the potential impact of GDPR.

The customer elected to perform discovery to identify if and where GDPR data resided, and then assess whether existing controls provided appropriate protection.

So far so good, right?

Wrong.

‘Discovery’ in this case consisted of teams of people armed with clipboards and a pen, who interviewed system owners and asked them if the systems under their remit contained any GDPR data.

Once we had this ‘audit’ complete, security controls were assessed to determine whether they actually covered the systems hosting GDPR data, and whether the technology provided appropriate protection.

While this approach may have provided the company with warm and fuzzy sensations, at the risk of stating the obvious there were concerns about the approach:

-         Relying on system owners to provide information is flawed. Most systems owners didn’t know if they had such data, or where this critical data resided.

-         Even if system owners knew where critical data resided, they didn’t know if uncontrolled versions of this data existed elsewhere.

However, the real issue wasn’t about GDPR, it was about protecting Personally Identifiable Information (PII). And this organisation didn’t have a handle on where PII existed.

It took fear of a European regulation to start their journey, and this shouldn’t be the case.

要查看或添加评论,请登录

Lawrence Ostle的更多文章

  • The Security Operations Center – measuring the business benefits.

    The Security Operations Center – measuring the business benefits.

    A Security Operation Center (SOC) is a central function within an organisation utilising people, processes, and…

  • What motivates people?

    What motivates people?

    What motivates people? Is it money? Status? Bonuses? Ownership? Here is my top 5 in order of importance! Money is…

  • The ‘Essential Eight’ is no longer relevant….

    The ‘Essential Eight’ is no longer relevant….

    ..

    1 条评论
  • The Security Hype Cycle – What’s Your Take?

    The Security Hype Cycle – What’s Your Take?

    Gartner’s ‘Hype Cycle’ presentation has been criticised by some for its lack of science, the subjective nature of the…

    5 条评论
  • What's going to keep us awake in 2017?

    What's going to keep us awake in 2017?

    More of the same I think, with some subtle changes..

  • Is legacy endpoint dead or does it just smell funny?

    Is legacy endpoint dead or does it just smell funny?

    I attended a presentation from a business partner regarding ‘next generation endpoint protection’ recently. The pitch…

    5 条评论
  • A bridge too far?

    A bridge too far?

    THE ICT THREAT LANDSCAPE Most agree that the ICT security threat landscape is more dynamic now than ever before. The…

  • What makes the difference?

    What makes the difference?

    I’ve read that there are a number of ‘moments of truth’ during a company’s relationship with customers, usually when…

  • The Time Is Right For DLP

    The Time Is Right For DLP

    DLP Globally Much has been written in the overseas press (particularly in the US) about Data Loss Prevention (DLP). The…

    1 条评论
  • DLP

    DLP

    A while back, in another world I was involved in doing a DLP scan of a customer's network. This revealed a number of…

    2 条评论

社区洞察

其他会员也浏览了