Fabrizio Patriarca. Come creare valore dalla GDPR

Similar documents
IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

IBM services and technology solutions for supporting GDPR program

Integrated, Intelligence driven Cyber Threat Hunting

Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES

May the (IBM) X-Force Be With You

The New Era of Cognitive Security

Be effective in protecting against the cybercrime

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

Ponemon Institute s 2018 Cost of a Data Breach Study

The McGill University Health Centre (MUHC)

IBM MaaS360 Kiosk Mode Settings

IBM Security Guardium Analyzer

Le sfide di oggi, l evoluzione e le nuove opportunità: il punto di vista e la strategia IBM per la Sicurezza

Data Management and Security in the GDPR Era

Charting the Course to GDPR: Setting Sail

Accelerate GDPR compliance with the Microsoft Cloud

IBM Application Security on Cloud

ISAM Federation STANDARDS AND MAPPINGS. Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support.

ISAM Advanced Access Control

Securing global enterprise with innovation

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

How to Secure Your Cloud with...a Cloud?

GDPR: An Opportunity to Transform Your Security Operations

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Staying GDPR Ready with MaaS360. Ankur Acharya Offering Manager, IBM MaaS360

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

IBM Security Guardium Tech Talk

BigFix 101- Server Pricing

WORKSHARE SECURITY OVERVIEW

IBM Guardium Data Encryption

MITIGATE CYBER ATTACK RISK

MSS VSOC Portal Single Sign-On Using IBM id IBM Corporation

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

IBM Security Guardium Data Activity Monitor

IBM Security Vaš digitalni imuni sistem. Dejan Vuković Security BU Leader South East Europe IBM Security

The Resilient Incident Response Platform

Aligning with HIPAA mandates in healthcare

Continuous Diagnostics and Mitigation demands, CyberScope and beyond

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

GDPR How to Comply in an HPE NonStop Environment. Steve Tcherchian GTUG Mai 2018

Cisco & IBM Security SECURING THE THREATS OF TOMORROW, TODAY, TOGETHER

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Predators are lurking in the Dark Web - is your network vulnerable?

Everyday Security: Simple Solutions to Complex Security Problems

Notice on Names and Logos Used in This Presentation

The Common Controls Framework BY ADOBE

IBM Next Generation Intrusion Prevention System

Oracle Database Security Assessment Tool

IBM Security Guardium: : Sniffer restart & High CPU correlation alerts

Accelerating growth and digital adoption with seamless identity trust

EU General Data Protection Regulation (GDPR)

IBM BigFix Compliance

SWD & SSA Updates 2018

Let s Talk About Threat Intelligence

White Paper. How to Write an MSSP RFP

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

IBM Resilient Incident Response Platform On Cloud

Data Lakes & Leaks Erno Doorenspleet. IBM Security

locuz.com SOC Services

Healthcare Cognitive Security

GUIDE. Navigating the General Data Protection Regulation Mini Guide

BigFix Query Unleashed!

Are we breached? Deloitte's Cyber Threat Hunting

Understanding my data and getting value from it

Information Technology Branch Organization of Cyber Security Technical Standard

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Combatting advanced threats with endpoint security intelligence

Big data privacy in Australia

Governance, Risk, and Compliance: A Practical Guide to Points of Entry

IBM Security Network Protection Solutions

Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments

Getting personal with your customers and GDPR

CyberArk Privileged Threat Analytics

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

SYMANTEC DATA CENTER SECURITY

Checklist: Credit Union Information Security and Privacy Policies

IBM Resilient Incident Response Platform On Cloud

IBM Threat Protection System: XGS - QRadar Integration

Mapping BeyondTrust Solutions to

SIEMLESS THREAT MANAGEMENT

IBM Security Guardium: Troubleshooting No Traffic Issues

RSA NetWitness Suite Respond in Minutes, Not Months

Best Practices in Securing a Multicloud World

EU General Data Protection Regulation (GDPR) Achieving compliance

Latest from the Lab: What's New Machine Learning Sam Buhler - Machine Learning Product/Offering Manager

IBM Resilient Incident Response Platform On Cloud

4 Reasons to Love the New IBM Guardium Data Encryption v3.0

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

ForeScout Extended Module for Splunk

Cybersecurity Auditing in an Unsecure World

Technical Brief Enterprise Vault Privileged Delete

SIEM: Five Requirements that Solve the Bigger Business Issues

Configuring zsecure To Send Data to QRadar

Express Monitoring 2019

Netwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

GDPR COMPLIANCE REPORT

Transcription:

Fabrizio Patriarca Come creare valore dalla GDPR

Disclaimer Notice: Clients are responsible for ensuring their own compliance with various laws and regulations, including the European Union General Data Protection Regulation. Clients are solely responsibility for obtaining advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulations that may affect the clients business and any actions the clients may need to take to comply with such laws and regulations. The products, services, and other capabilities described herein are not suitable for all client situations and may have restricted availability. IBM does not provide legal, accounting or auditing advice or represent or warrant that its services or products will ensure that clients are in compliance with any law or regulation. IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. 2 Welcome to the cognitive era.

IBM Security solutions QRadar App Exchange Data & App Risk Assessment Incident Response Resilient Incident Response INTEGRATED VALUE Discover personal data assets Data & App Assets; Identify GDPR relevant assets Security Intelligence Breach detection and response Identity attributes and privileged user activity Assess identify/help address risks and exposures Discover personal data assets Data Assess and reconcile user access roles and data activity Identity and Access Protect Pseudonimize, de-identify Data activity monitoring- audit trail Credential data and identity context Identify/mitigate personal data access risks Conform Audit trail, Respond Guardium Data Protection Identity Governance & Intelligence 3 Welcome to the cognitive era.

Security & Traceability Guardium Fine grained data access control Discover and classify data, assess vulnerabilities, report on entitlements Encrypt and redact sensitive data Monitor data and file activity Block, mask, alert, and quarantine dynamically Automate auditing 4 Welcome to the cognitive era.

Guardium Accelerator for GDPR Guardium GDPR Accelerator Data Discovery and Classification for Personal Data Predefined Policies and Groups Auditing and Monitoring reports Support for GDPR Impact Assessment Workflows and Audit Process Builder for notifications to auditors, controllers and DPO 5 Welcome to the cognitive era.

Identify and help address access risks with Identity Governance Process Automation Simplify self-service user access management Automate user and identity lifecycle processes Insider Threat Prevention Manage and audit privileged access Remediate user access policy violations Continuous Conformance and Access Risks Detection Visualize and certify user entitlements to personal data Provide insight into user risks Verify access visibility and context 6 Welcome to the cognitive era.

Security & Traceability Infrastructure control and advanced threat detection EXTENSIVE DATA SOURCES QRadar Sense Analytics Security devices Servers&mainframes Network and virtual activity Data activity Application activity Configuration data Vulnerabilities and threats Users &identities Global threat intelligence IDENTIFICATION Data collection, storage, and analysis Real-time correlation and threat intelligence Automatic asset, service and user discovery and profiling Activity baselining and anomaly detection Embedded Intelligence Prioritized incidents REMEDIATION Incident forensics Management, monitoring and detection Incident response 7 Welcome to the cognitive era.

Agile 3 Uncover, Analyze and Visualize potential datarelated risks Which lines of business have the highest risk? Who are the data owners? 8 Welcome to the cognitive era. Are the Crown Jewels classified & protected? Where are the Crown Jewels? What compliance issues do we have?

Introducing IBM Resilient Resilient integrates with existing security systems create a single hub for IR streamlining organizations security posture. Aligns people, process, and technology across the organization. Enables security teams to automate and orchestrate their IR processes. Ensures IR processes are consistent, intelligent, and configured to team s specific needs 9 Welcome to the cognitive era.

IBM Resilient Incident Response Platform Security Module Industry standard workflows (NIST, SANS) Threat intelligence feeds Organizational SOPs Community best practices Action Module Automate processes Enrich incident details Gather forensics Enact mitigation Privacy Module Global breach regulations Contractual obligations Third-party requirements Organizational SOPs Privacy best practices 10 Welcome to the cognitive era.

THANK YOU FOLLOW US ON: ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, includingfor use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products andservices are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.