SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

Similar documents
MITIGATE CYBER ATTACK RISK

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

FOR FINANCIAL SERVICES ORGANIZATIONS

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

RSA NetWitness Suite Respond in Minutes, Not Months

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

SOLUTION BRIEF RSA NETWITNESS PLATFORM ACCELERATED THREAT DETECTION & AUTOMATED RESPONSE FROM THE ENDPOINT TO THE CLOUD

EU General Data Protection Regulation (GDPR) Achieving compliance

THE EVOLUTION OF SIEM

Cybersecurity Considerations for GDPR

General Data Protection Regulation (GDPR) and the Implications for IT Service Management

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

INTELLIGENCE DRIVEN GRC FOR SECURITY

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

GDPR: An Opportunity to Transform Your Security Operations

IBM Security Guardium Analyzer

Accelerate GDPR compliance with the Microsoft Cloud

SIEM Solutions from McAfee

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

EU GDPR and . The complete text of the EU GDPR can be found at What is GDPR?

Best Practices in Securing a Multicloud World

GDPR How to Comply in an HPE NonStop Environment. Steve Tcherchian GTUG Mai 2018

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

CipherCloud CASB+ Connector for ServiceNow

NEXT GENERATION SECURITY OPERATIONS CENTER

Demonstrating Compliance in the Financial Services Industry with Veriato

WHITE PAPER. The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Martijn Loderus. Merritt Maxim. Principal Analyst Forrester. Director & Global Practice Partner for Advisory Consulting Janrain

A Security Admin's Survival Guide to the GDPR.

The Resilient Incident Response Platform

Oracle Data Cloud ( ODC ) Inbound Security Policies

General Data Protection Regulation (GDPR) The impact of doing business in Asia

The GDPR Are you ready?

DATA SHEET RSA NETWITNESS PLATFORM PERVASIVE VISIBILITY. ACTIONABLE INSIGHTS.

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

The Role of the Data Protection Officer

Security. Made Smarter.

Fabrizio Patriarca. Come creare valore dalla GDPR

ARE YOU READY FOR GDPR?

RSA INCIDENT RESPONSE SERVICES

IBM services and technology solutions for supporting GDPR program

GDPR: A QUICK OVERVIEW

CA Security Management

SOLUTION BRIEF RSA ARCHER BUSINESS RESILIENCY

The GDPR data just got personal

General Data Protection Regulation (GDPR) Key Facts & FAQ s

RSA ADVANCED SOC SERVICES

RSA INCIDENT RESPONSE SERVICES

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

Getting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

General Data Protection Regulation (GDPR)

HPE DATA PRIVACY AND SECURITY

GDPR Controls and Netwrix Auditor Mapping

Securing Office 365 with SecureCloud

How icims Supports. Your Readiness for the European Union General Data Protection Regulation

CyberArk Privileged Threat Analytics

GDPR is here to stay. How prepared are you?

RSA Advanced Cyber Defence Summit

Securing Your Digital Transformation

TRUE SECURITY-AS-A-SERVICE

Data Privacy in Your Own Backyard

What You Need to Know About Addressing GDPR Data Subject Rights in Pivot

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

CloudSOC and Security.cloud for Microsoft Office 365

All you need to know and do to comply with the EU General Data Protection Regulation

Cybersecurity Auditing in an Unsecure World

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

Data Privacy and Protection GDPR Compliance for Databases

Putting security first for critical online brand assets. cscdigitalbrand.services

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

Recommendations on How to Tackle the D in GDPR. White Paper

Aon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready?

Robert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe

On the Radar: IBM Resilient applies incident response orchestration to GDPR data breaches

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Developing your GDPR response for competitive advantage. EU General Data Protection Regulation (GDPR)

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Islam21c.com Data Protection and Privacy Policy

deep (i) the most advanced solution for managed security services

Version 1/2018. GDPR Processor Security Controls

EY s Data Privacy Services. January 2019

Vulnerability Assessments and Penetration Testing

ARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

Enterprise GRC Implementation

IT MANAGEMENT AND THE GDPR: THE VMWARE PERSPECTIVE

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Charting the Course to GDPR: Setting Sail

GDPR COMPLIANCE REPORT

Getting ready for GDPR

Transcription:

HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

PREPARATION FOR GDPR IS ESSENTIAL The EU GDPR imposes interrelated obligations for organizations handling personal data of EU citizens, including: Adopting policies and procedures to ensure and demonstrate that PII is handled in compliance with the regulation Maintaining documentation of all processing operations Assessing electronic and physical data security risk to personal data including accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed Implementing appropriate technical and organizational controls to ensure a level of security appropriate to the risk Implementing procedures to verify the effectiveness of the controls which align with the results of the risk assessment Performing data protection impact assessments on planned processing of highly sensitive personal data Providing transparent notice to EU residents at the time information is collected, upon later inquiry For some organizations, appointment of a Data Protection Officer charged with the responsibility of monitoring the organization s compliance with the EU GDPR requirements The European Union (EU) General Data Protection Regulation (GDPR) that takes effect in May 2018 will bring changes to organizations that handle personally identifiable information (PII) of European residents. This regulation is intended to strengthen the protection of PII within the EU, and anywhere it is transferred outside of the EU. The scope of the GDPR encompasses all businesses based in the EU as well as any business that controls or processes personal data related to individuals in the EU. These requirements apply regardless of where the organization is based, making GDPR a truly global compliance requirement. Non-compliance with GDPR requirements carries with it the potential for significant negative impacts; failure to achieve and maintain compliance is expected to result in fines up to 4% of an organization s annual world-wide revenue or 20 million Euros, whichever is greater. Without a holistic approach to GDPR compliance, organizations are likely to prematurely exhaust available human and capital resources and take an unnecessarily long time to prepare for the impending regulation. Data protection is one of the key elements of the GDPR. After all, what good are all the GDPR s personal privacy enhancements if you can t keep the data secure and safe from misuse or theft? The GDPR sets forth requirements for data protection, and introduces new responsibilities that organizations must meet. Breach Response is a key responsibility under the GDPR. Article 33 of the regulation lays out specific requirements for notification of a personal data breach to the supervisory authority. Notifications must take place generally within 72 hours after the organization becomes aware of the breach. That s not much time to perform forensics that will answer the important question: What s the impact? The answer to that question will help to determine whether you must notify everyone who was affected. Accomplishing this objective will require a combination of processes and technical capabilities including security incident management, security operations and breach management, as well as tools for deep monitoring and analysis of security data, including strong forensics tools. RSA: SUPPORTING A HOLISTIC APPROACH TO ADDRESSING DATA BREACHES RSA offers business-driven security solutions that uniquely link business context with security incidents to help organizations manage risk and protect what matters most. RSA solutions are designed to help organizations effectively detect and respond to advanced attacks; manage user identities and access; and, reduce business risk, all essential steps in helping an organizations develop a holistic strategy for responding to GDPR. With GDPR requirements as context, let s take a closer look at the RSA product and service portfolio, and how these offerings can help organizations prepare for GDPR. 2

RSA NETWITNESS SUITE The RSA NetWitness Suite is a leading threat detection and response platform that is designed to allow security teams to detect and understand the full scope of a compromise. RSA NetWitness Suite is differentiated from competitive solutions by two important characteristics: Visibility by leveraging logs, packets, and endpoints, RSA NetWitness Suite enables you to see across your organization s data, including cloud and virtualized environments. This unmatched breadth of visibility is what enables RSA NetWitness customers to correlate seemingly unconnected alerts and events, to focus on the threats that matter. Productivity With an all-new security analyst user experience, RSA NetWitness Suite provides visual cues to threats. Advanced threat intelligence and analytics are engineered to find the threats and create a prioritized investigation queue, while rich visualization capabilities make anomalous activity pop within the sea of legitimate data. Pivot tools permit analysts to quickly drill down on specific data to isolate and eliminate exploits. For the GDPR, RSA NetWitness Suite offers specific capabilities that will help organizations detect and report security incidents. Its rich analytics capabilities are also great in assisting with compliance, which is about documenting your efforts and reporting accurately on what has taken place. In those important 72 hours before reporting a breach, RSA NetWitness Suite can document what happened, who was affected, and what was the impact. The GDPR is clear that organizations must implement appropriate security controls, and those that don t will be called into account for it in the event of a violation. RSA NetWitness Suite also helps organizations address GDPR requirements for user data protection in the threat discovery and response activity itself. The platform is designed to provide a range of controls, such as obfuscation, that security analysts can leverage to protect privacy-sensitive data, without reducing analytical capability. The RSA NetWitness Suite is designed to be configured to limit exposure of privacy-sensitive metadata and raw content (packets and logs) using a combination of techniques, including: Data Obfuscation Privacy-sensitive metakeys can be obfuscated for specified analysts/roles Data Retention Enforcement Retain privacy-sensitive data only as long as needed Audit Logging Audit trail for privacy-sensitive activities, e.g., attempts to view/modify data 3

4 RSA ARCHER SUITE The RSA Archer suite is an industry leading Governance, Risk & Compliance (GRC) solution that is engineered to empower organizations to manage multiple dimensions of risk with solutions built on industry standards and best practices on one configurable, integrated software platform. The RSA Archer Suite includes specific use cases designed to help organizations looking to improve capabilities related to responding to security issues. RSA Archer Data Governance is designed to provide a framework to help organizations identify, manage, and implement appropriate controls around personal data processing activities. RSA Archer Privacy Program Management is designed to enable organizations to group processing activities for the purposes of performing data protection impact assessments and tracking regulatory and data breach communications with data protection authorities. SECURITY INCIDENT MANAGEMENT RSA Archer Security Incident Management enables the processes to address the flood of security alerts and implement a managed process to escalate, investigate and resolve security incidents. The use case includes a centralized system to catalog IT assets for incident prioritization providing business context (usage of IT assets) to prioritize events. Workflow for security incidents with built in reporting of security incidents streamlines the process and enables teams to work effectively through the incident response process. Issues related to incident investigations can be tracked and defined procedures to handle security events can ensure incidents are handled properly. SECURITY OPERATIONS & BREACH MANAGEMENT RSA Archer Security Operations and Breach Management extends the security incident process by monitoring of key performance indicators, measurement of control efficacy, and management of the overall security operations team. Workflow is included to address data breaches enabling the security and business teams to react quickly to a breach of personal information. Enabling a focus on the most impactful incidents helps lower overall security risk and supports reacting promptly and appropriately to data breaches. RSA RISK AND CYBER SECURITY PRACTICE RSA offers a range of strategic services designed to help you craft a business-driven security strategy, build an advanced security operations center and revitalize your governance, risk and compliance (GRC) program. To complement our robust product offering, we also provide implementation and post-implementation support so that you can maximize your investment in our products. RSA INCIDENT RESPONSE PRACTICE Obviously, a major requirement within GDPR is the efficient and effective management of incidents when they do occur. When organizations discover a security breach, they need to determine in short order exactly what happened, how it happened, the scope and impact of the compromise, and the steps needed to contain and remediate it. RSA s incident response team can

help organizations quickly understand the details and necessary steps during a breach. Paired with other RSA Archer solutions, the Incident Response Practice can tailor those next steps to help organizations meet the unique requirements of GDPR. RSA ADVANCED CYBER DEFENSE PRACTICE The RSA Advanced Cyber Defense Practice can help security organizations develop the processes, procedures, workflows and automation that facilitate a prompt, decisive response to data breaches and other cyber incidents. CONCLUSION Globally, organizations are actively assessing the impact of GDPR on their business and data privacy and management operations. The deadline of May 2018 is looming, and any organization collecting PII of EU residents needs to work through the deployment of additional processes, policies and technologies to avoid the significant fines posed by the regulation. A breach of personal data can lead to significant consequences and organizations must implement a strategy to protect PII of EU citizens including the ability to identify and respond to security threats. With a unique scope of products and services targeting the critical areas of threat detection and security incident response, RSA can act as a strategic partner in any organizations journey towards GDPR compliance. 5 RSA, the RSA logo, are registered trademarks or trademarks of Dell Technologies in the United States and other countries. Copyright 2017 Dell Technologies. All rights reserved. Published in the USA. 08/17 Solution Brief H16549 RSA believes the information in this document is accurate as of its publication date. The information is subject to change without notice.