Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Similar documents
Accelerate GDPR compliance with the Microsoft Cloud

U susret GDPR regulativi Dočekajmo spremni Maj 2018

This presentation is intended to provide an overview of GDPR and is not a definitive statement of the law.

Accelerate GDPR compliance with the Microsoft Cloud Ole Tom Seierstad National Security Officer Microsoft Norway

CAN MICROSOFT HELP MEET THE GDPR

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

celerate GDPR compliance h the use of new technologies oni Papanikolaou orate, External & Legal Affairs Director soft Greece, Cyprus & Malta

Managing Microsoft 365 Identity and Access

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

GDPR - What does this mean for you? Accelerate GDPR compliance with the Microsoft Services. Konstantin Sviridov Andrey Ivanov.

Microsoft Security Management

IBM Security Guardium Analyzer

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

Fabrizio Patriarca. Come creare valore dalla GDPR

How do you decide what s best for you?

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

FOR FINANCIAL SERVICES ORGANIZATIONS

Identity & Access Management

General Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

Data Management and Security in the GDPR Era

Go mobile. Stay in control.

Securing Your Digital Transformation

locuz.com SOC Services

Microsoft 365 Business FAQs

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

GDPR COMPLIANCE REPORT

Closing Keynote: Addressing Data Privacy and GDPR on Microsoft Data Platform Technologies. Ronit Reger, Senior Program Manager at Microsoft

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

QBS Talks. June GDPR a Microsoft perspective Ole Kjeldsen, CTO Microsoft DK

align security instill confidence

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

MITIGATE CYBER ATTACK RISK

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

The Oracle Trust Fabric Securing the Cloud Journey

Netwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer

Best Practices in Securing a Multicloud World

CipherCloud CASB+ Connector for ServiceNow

Accelerate GDPR compliance with the Microsoft Cloud

EU General Data Protection Regulation (GDPR) Achieving compliance

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

IBM services and technology solutions for supporting GDPR program

The Resilient Incident Response Platform

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Privileged Account Security: A Balanced Approach to Securing Unix Environments

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

GDPR: An Opportunity to Transform Your Security Operations

BHConsulting. Your trusted cybersecurity partner

the SWIFT Customer Security

Avanade s Approach to Client Data Protection

By 2020, a corporate no-cloud policy will be as rare as a no-internet policy is today. 1

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

WHITE PAPER. The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help

ARE YOU READY FOR GDPR?

DIGITAL TRUST AT THE CORE

TRUE SECURITY-AS-A-SERVICE

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

ForeScout Extended Module for Splunk

AKAMAI CLOUD SECURITY SOLUTIONS

CloudSOC and Security.cloud for Microsoft Office 365

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Symantec Security Monitoring Services

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Clearing the Path to PCI DSS Version 2.0 Compliance

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Securing Your Most Sensitive Data

An Oracle White Paper April Oracle Technology for Government Cybersecurity

PROTECT AND AUDIT SENSITIVE DATA

Google Cloud & the General Data Protection Regulation (GDPR)

Oracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

McAfee Total Protection for Data Loss Prevention

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

A Security Admin's Survival Guide to the GDPR.

Data Privacy and Protection GDPR Compliance for Databases

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Incident Response Services

RHM Presentation. Maas 360 Mobile device management

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

CYBER RISK MANAGEMENT: ADDRESSING THE CHALLENGE SIMON CRUMPLIN, FOUNDER & CEO

Recommendations on How to Tackle the D in GDPR. White Paper

Accelerate your General Data Protection Regulation (GDPR) compliance journey with Microsoft 365

Getting personal with your customers and GDPR

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

THE EU GENERAL DATA PROTECTION REGULATION (GDPR)

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

MEETING ISO STANDARDS

SMS - GUI003. GDPR Information. Release Certificate SMS - GUI003. Version: 1.0 Date: 27/03/2018 Page 1 of 25

Building a Resilient Security Posture for Effective Breach Prevention

Securing Office 365 with MobileIron

Transcription:

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Providing clarity and consistency for the protection of personal data The General Data Protection Regulation (GDPR) imposes new rules on organizations in the European Union (EU) and those that offer goods and services to people in the EU, or that collect and analyze data tied to EU residents, no matter where they are located. Enhanced personal privacy rights Increased duty for protecting data Mandatory breach reporting Significant penalties for non-compliance Microsoft believes the GDPR is an important step forward for clarifying and enabling individual privacy rights

Protecting customer privacy with GDPR

Trust Protect your organization, data and people Integrated intelligent security Transparency and control Privacy by design Compliance leadership

GDPR Compliance Simplify your privacy journey Uncover risk & take action Leverage guidance from experts

How do I get started? 1 Discover Identify what personal data you have and where it resides 2 Manage Govern how personal data is used and accessed 3 Protect Establish security controls to prevent, detect, and respond to vulnerabilities & data breaches 4 Report Keep required documentation, manage data requests and breach notifications

1 Discover: In-scope: Inventory: Example solutions Microsoft Azure Microsoft Azure Data Catalog Enterprise Mobility + Security (EMS) Microsoft Cloud App Security Dynamics 365 Audit Data & User Activity Reporting & Analytics Office & Office 365 Data Loss Prevention Advanced Data Governance Office 365 ediscovery SQL Server and Azure SQL Database SQL Query Language Windows & Windows Server Windows Search

SEARCH

Translated to SQL technologies... Inventory personal data in database systems T-SQL Queries, Full Text search 1 Discover Review access model, understand the attack surface area Data classification Track data flows and map data lineage Vulnerability Assessment

A one-stop-shop to track and improve your SQL security state Get Visibility Discover sensitive data and potential security holes Remediate Actionable remediation and security hardening steps Customize Baseline policy tuned to your environment, so you focus on deviations Report Pass internal or external audits, facilitates compliance

2 Manage: Example solutions Data governance: Data classification: Microsoft Azure Azure Active Directory Azure Information Protection Azure Role-Based Access Control (RBAC) Enterprise Mobility + Security (EMS) Azure Information Protection Dynamics 365 Security Concepts Office & Office 365 Advanced Data Governance Journaling (Exchange Online) Windows & Windows Server Microsoft Data Classification Toolkit

Assess and manage compliance risk A real-time assessment of your compliance posture with actionable insights to improve your data protection capabilities. Protect personal data Data governance and protection of your sensitive data across devices, apps both on-premises and in the cloud. Streamline processes Built in audit-ready tools that help you collaborate between teams and manage your processes.

Compliance Manager Manage your compliance from one place

MICROSOFT S APPROACH TO INFORMATION PROTECTION Comprehensive protection of sensitive data throughout the lifecycle inside and outside the organization Detect Classify Protect Monitor D E V I C E S C L O U D O N P R E M I S E S

CLASSIFY & PROTECT YOUR SENSITIVE INFORMATION - ANYTIME, ANYWHERE WITH AZURE INFORMATION PROTECTION Detect, classify and label documents with sensitive data Manual and/or automatic process Applies encrypting and rights management into the specific document Provides detailed tracking and reporting Covers open documents on devices and can now also crawl existing documents on on-premises fileshare and SharePoint servers + with Cloud App Security extend capabilities into cloud environments

Translated to SQL technologies... Manage authentication and authorization mechanisms Windows authentication, Azure AD auth, role-base security 2 Manage Properly configure database firewall Azure SQL Firewall Limit application access according to authorization principles Dynamic Data Masking, Row- Level Security ADALSQL ADO.NET 4.6

3 Protect: Preventing data attacks: Detecting & responding to breaches: Example solutions Microsoft Azure Azure Key Vault Azure Security Center Azure Storage Services Encryption Enterprise Mobility + Security (EMS) Azure Active Directory Premium Microsoft Intune Office & Office 365 Advanced Threat Protection Threat Intelligence SQL Server and Azure SQL Database Transparent data encryption Always Encrypted Windows & Windows Server Windows Defender Advanced Threat Protection Windows Hello Device Guard

DETECT Detect Abnormal Behavior & Anomalies in Cloud Apps Identify high risk usage, cloud security issues, detect abnormal user behavior in cloud apps. Identify and stop known attack pattern activities originating from risky sources with threat prevention enhanced with vast Microsoft threat intelligence

DETECT Detect Abnormal Behaviors with Windows Defender ATP Detect targeted advanced attacks and zero days. Visually investigate forensic evidence across your devices to easily uncover scope of breach, assess the entire footprint of the incident, and trace it back to identify the root cause. Search and explore 6 months of historical data across your devices

4 Report: Record-keeping: Reporting tools: Example solutions Microsoft Trust Center Service Trust Portal Microsoft Azure Azure Auditing & Logging Azure Data Lake Azure Monitor Enterprise Mobility + Security (EMS) Azure Information Protection Dynamics 365 Reporting & Analytics Office & Office 365 Service Assurance Office 365 Audit Logs Customer Lockbox Windows & Windows Server Windows Defender Advanced Threat Protection

PROTECT Protect Your Email with O365 ATP Stop malicious attachments Provide time of click protection against malicious links Stop known email threats

RESPOND Respond to Malicious Email Files with O365 ATP Remove emails found to be malicious after they land in user inbox. Intelligent filters which update based on evolving cyber threat landscape. Ability to remediate for real-time malicious emails.

RESPOND Respond to Compromised Data with Cloud App Security Identify high-risk and anomalous usage in cross cloud apps - including office 365 Get recommendations and remediation actions for next steps

Make no mistake, the GDPR sets a new and higher bar for privacy rights, for security, and for compliance. And while your journey to GDPR may seem challenging, Microsoft is here to help all of our customers around the world. Brad Smith President & Chief Legal Officer Microsoft Corporation

Why Microsoft for GDPR Best path to compliance is with the Microsoft Cloud Committed to the Highest Privacy Standards Supporting your trust with contractual assurances Industry leading security and privacy certifications Microsoft products and services are available today to help meet the GDPR requirements. Through our cloud services and on-premises solutions we help customers locate and catalog the personal data in their systems, build more secure environments, simplify management and monitoring of personal data, and provide tools and resources needed to help them meet reporting and assessment requirements. Comprehensive guidance on beginning the GDPR journey Microsoft believes that the GDPR is an important step forward for clarifying and enabling individual privacy rights. We have committed to GDPR compliance across our cloud services when enforcement begins May 25, 2018. Microsoft and our partners can help customers meet the requirements of the GDPR. Blog post: Get GDPR compliant with the Microsoft Cloud Deep Investments in products and services Microsoft was the first global cloud services provider to publicly offer contractual commitments for our services. Our contractual commitments outline how we help customers: Respond to data subject requests. Detect and report personal data breaches. Demonstrate GDPR compliance The GDPR amendments can be found in the Online Services Terms (OST) at microsoft.com/licensing Largest portfolio of cloud solutions Microsoft's services are independently verified to meet legal and compliance requirements, are financially backed, and offer transparent information on their availability. Security policies and audit reports are made available to customers and if necessary, their regulators through the Trust Center (Microsoft.com/trustcenter). Broadest partner ecosystem Microsoft has published a large library of GDPR guidance covering the four steps (Discover, Manage, Protect and Report) and our products and services. Including the Beginning you GDPR Journey, GDPR Overview and product whitepapers. These and more can be found at Microsoft.com/gdpr. We continue to publish new resources on a regular basis. Microsoft has made significant investments in our products and services to help our customers with GDPR compliance within Azure, Office 365, Windows, EMS, SQL Database and Dynamics 365. For example, Microsoft 365 delivers a range of tools and services that enable GDPR scenarios such as data discovery, governance, and protection. We designed our cloud products (including Office 365, Azure, SQL, Windows and Dynamics 365) with industry-leading privacy policies and security measures to safeguard customer data in the cloud, including the categories of personal data identified by the GDPR. Please see How our products help you meet GDPR requirements for more detail The Microsoft Partner Network includes hundreds of thousands of organizations worldwide. By working with this broad partner ecosystem we offer customers more comprehensive solutions. Many of our partners, including Accenture and EY, have developed a wide array of practices to help customers achieve GDPR compliance.

Microsoft.com/GDPR