CAN MICROSOFT HELP MEET THE GDPR

Similar documents
Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Managing Microsoft 365 Identity and Access

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Accelerate GDPR compliance with the Microsoft Cloud Ole Tom Seierstad National Security Officer Microsoft Norway

U susret GDPR regulativi Dočekajmo spremni Maj 2018

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong

Office 365: Modern Workplace

This presentation is intended to provide an overview of GDPR and is not a definitive statement of the law.

Go mobile. Stay in control.

Identity & Access Management

Accelerate GDPR compliance with the Microsoft Cloud

EU General Data Protection Regulation (GDPR) Achieving compliance

Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops.

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

Microsoft Security Management

Use EMS to protect your mobile data and mobile app

GDPR - What does this mean for you? Accelerate GDPR compliance with the Microsoft Services. Konstantin Sviridov Andrey Ivanov.

Closing Keynote: Addressing Data Privacy and GDPR on Microsoft Data Platform Technologies. Ronit Reger, Senior Program Manager at Microsoft

MD-101: Modern Desktop Administrator Part 2

SMS - GUI003. GDPR Information. Release Certificate SMS - GUI003. Version: 1.0 Date: 27/03/2018 Page 1 of 25

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices. Internal Audit, Risk, Business & Technology Consulting

Data Management and Security in the GDPR Era

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

ZIMBRA & THE IMPACT OF GDPR

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Cloud Customer Architecture for Securing Workloads on Cloud Services

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products

Windows 10. scalable IT services & solutions. October 25, Bruce Ward, VP of Business Strategy. Dan Sharp, Senior Consultant

How do you decide what s best for you?

EXPERTS LIVE SUMMER NIGHT. Close your datacenter and give your users-wings

Hybrid Identity de paraplu in de cloud

Phil Schwan Technical

Understand & Prepare for EU GDPR Requirements

Microsoft 365. A complete, intelligent, secure solution to empower employees. Integrated for simplicity. Built for teamwork. Unlocks creativity

SharePoint Online for Administrators

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

Google Cloud & the General Data Protection Regulation (GDPR)

What s new in System Center Configuration Manager Current Branch? Ievgen Liashov

Modern Database Architectures Demand Modern Data Security Measures

McAfee Total Protection for Data Loss Prevention

Microsoft 365 Business FAQs

CloudSOC and Security.cloud for Microsoft Office 365

General Data Protection Regulation (GDPR) The impact of doing business in Asia

Netwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

GDPR: An Opportunity to Transform Your Security Operations

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Best Practices in Securing a Multicloud World

ARE YOU READY FOR GDPR?

Monitoring Active Directory: Both Azure AD and On-Premise AD and How Synchronization and Federation Play In

Windows Server The operating system

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

MaaS360 Secure Productivity Suite

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9

GDPR: A technical perspective from Arkivum

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

Introducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer

Accelerate GDPR compliance with the Microsoft Cloud

Securing Office 365 with MobileIron

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Martijn Loderus. Merritt Maxim. Principal Analyst Forrester. Director & Global Practice Partner for Advisory Consulting Janrain

McAfee MVISION Mobile Microsoft Intune Integration Guide

Today s top THREAT ACTORS pose unique challenges

[ Sean TrimarcSecurity.com ]

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

Comprehensive Database Security

Everything visible. Everything secure.

Service Description VMware Workspace ONE

Virtual Machine Encryption Security & Compliance in the Cloud

Securing Your Most Sensitive Data

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved

Microsoft SharePoint Online for Administrators

GDPR How to Comply in an HPE NonStop Environment. Steve Tcherchian GTUG Mai 2018

What the GDPR is and how to deal with it. Russell McDermott Sales Engineer +44 (0) x 2208

IBM Security Guardium Analyzer

General Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant

Data Privacy and Protection GDPR Compliance for Databases

Embedding GDPR into the SDLC

McAfee epolicy Orchestrator

SharePoint Server 2016 Feature Comparison* Accessibility Standards Support Yes Yes. Asset Library Enhancements/Video Support Yes Yes.

Embedding GDPR into the SDLC. Sebastien Deleersnyder Siebe De Roovere

EXPLORE MICROSOFT SHAREPOINT SERVER 2016 AND BEYOND #ILTAG70

ProteggereiDatiAziendalion-premises e nel cloud

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

Microsoft: What s new and cool FY16

Microsoft Intune App Protection Policies Integration. VMware Workspace ONE UEM 1811

Fabrizio Patriarca. Come creare valore dalla GDPR

General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant

Use Microsoft EMS. to Protect your Mobile Data and Mobile Apps. Chris Nackers Nackers Consulting

#1 Enterprise File Share, Sync, Backup and Mobile Access for Business

Magento GDPR Frequently Asked Questions

Cisco Webex Messenger

Kā pielāgot uzņēmuma IT mūsdienu prasībām: jauni izaicinājumi un iespējas

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018

Transcription:

CAN MICROSOFT HELP MEET THE GDPR REQUIREMENTS? Danny Uytgeerts Microsoft 365 TSP / P-Seller Privacy Consultant (certified DPO) Member of DPO-Pro (Professional association of Belgian DPOs) danny.uytgeerts@realdolmen.com www.linkedin.com/in/duytgeerts

GDPR IS IT A THREAT OR AN OPPORTUNITY FOR YOUR ORGANIZATION? Game changer Identify shadow it Create a data inventory Know your business processes Opportunities Data cleanup Eliminate or manage shadow it Consolidate data sources and/or systems Reduce risks (breaches, exposure, impact) Important Note: Being compliant with security regulations doesn t automatically mean that you are secure (But it s a big step) Individual service/application readiness is not enough

Art. 46 Transfers subject to appropriate safeguards Art. 15 Right of access by the data subject Art. 16 Right to rectification Art. 32 Security of processing 11 chapters 99 articles Art. 17 Right to erasure ( right to be forgotten ) Microsoft 365 Art. 30 Records of processing activities Art. 25 Data protection by design and by default Art. 20 Right to data portability Try to avoid mapping technology into GDPR articles

NEXT 4 COMMON CASES TO GIVE YOU INSIGHT AND GET STARTED

DISCOVER CASE 1: I WANT TO DISCOVER ALL PERSONAL DATA On-Premise SP Exch File Server Scan data-at-rest Classify data-at-rest Scan data-at-rest Classify data-at-rest Discover & Classify Data Security Retention Scan data-at-rest (API) Classify data-at-rest

PROTECT CASE 2: HOW DO I ENSURE MY DATA IS PROTECTED ON-PREMISE, IN THE CLOUD AND ON MY DEVICES? On-Premise Data-at-rest encryption Windows Information Protection SP Exch File Server Data-at-rest encryption Automatic classification IRM (SP & Exch) Data-at-rest encryption Tenant based encryption Data/file based encryption Data/file based encryption MDM (device encryption) MAM (app encryption)

MANAGE CASE 3: I WANT CONTROL OF MY DATA STORED IN CLOUD APPS Discover Identify cloud apps on your network, gain visibility into shadow IT, ongoing analytics Control access in real time Manage and limit cloud app access based on conditions and session context, including user identity, device and location Protect your information Get granular control over data and use builtin or custom policiesfor data sharing and DLP Detect threats Identify high-risk usage and detect unusual behavior using threat intelligence and research

CONDITIONAL ACCESS: PROXY MANAGE Context-aware session policies Investigate & enforce app and data restrictions Unique integration with Azure AD Control access to cloud apps based on user, location, device and app Identify managed devices via VPN (location based), Domain joined devices, Intune compliant devices or client certificates Supports any SAML-based app, any OS Enforce browser-based view only mode for low-trust sessions Limit access to sensitive data Classify, label and protect on download Visibility into unmanaged device activity Integral component of Azure AD Conditional Access Simple deployment directly from your Azure AD portal Leverages existing device management mechanisms, no additional deployment required

REPORT CASE 4: HOW CAN WE PROVE OUR EFFORT REGARDING COMPLIANCY? Compliance Manager is a dashboard that provides a summary of your data protection and compliance stature and recommendations to improve data protection and compliance GDPR ISO27001 ISO27018 Actionable insights that are designed to improve your data protection and compliance posture Control management and audit-ready reporting tools to streamline your compliance workflow

Office 365 ediscovery Office 365 Advanced ediscovery AIP Scanner Productivity App Discovery (CAS) Office 365 Content Search SharePoint Search Service Content Search SQL Server & Azure SQL Database Sensitive Data Types Azure Data Catalog Windows Search Discover Azure Information Protection Office 365 Advanced Data Governance Office 365 Classification Azure Rights Management Service Office 365 Message Encryption Azure Role Based Access Control Azure Active Directory Manage Office 365 Retention Microsoft Data Classification Toolkit SharePoint Information Management Policies Exchange Journaling Microsoft Intune & Mobile Application Management Windows Information Protection Advanced Threat Protection Cloud App Security Multi-Factor Authentication Azure Key Vault Data Loss Prevention Azure Data Encryption Device Guard Azure Log Analytics Microsoft Advanced Threat Analytics Shielded Virtual Machines Office 365 Advanced Security Management Just in Time Administration Data Loss Prevention Productivity App Discovery Microsoft Antimalware for Azure Protect Credential Guard Windows Hello for Business Just Enough Administration Office 365 Threat Intelligence Office 365 Secure Score Microsoft Trust Center Customer Lockbox Report

WORKSHOP: CAN MICROSOFT HELP MEET THE GDPR REQUIREMENTS? Microsoft defines four pillars in that GDPR process where some products and services provide powerful solutions to handle compliancy: Discover - Identify what personal data you have and where it resides Manage- Determine how personal data is used and accessed Protect - Establish security controls to prevent, detect, and respond to vulnerabilities and data breaches Report - Execute on data requests, report data breaches, and keep required documentation Example Solutions: Azure Information Protection, Cloud App Security, Data Loss Prevention, Privileged Identity Management, Advanced Threat Protection, Compliance Manager, Secure Score,

Want to find out more? EU GDPR Portal https://www.eugdpr.org/ Download the Microsoft 365 GDPR white paper: https://aka.ms/m365-gdpr-paper Microsoft Trust Center GDPR: https://www.microsoft.com/en-us/trustcenter/privacy/gdpr/default.aspx GDPR How-to: Get organized and implement the right processes https://azure.microsoft.com/en-us/blog/gdpr-how-to-get-organized-and-implement-the-right-processes/ O365 Secure Score https://securescore.office.com Training for future Data Protection Officers https://education.realdolmen.com/en/course/dpo001 Contact me at danny.uytgeerts@realdolmen.com