Sunteți pe pagina 1din 6

The countdown to

GDPR has begun


One year to go
How ready are you?
GDPR touches your entire organisation from people to processes and
technology. With one year to go until GDPR kicks in, how ready are you?

Plan your time. Know where to focus. GDPR = Better Business Explore four steps to better information
visibility and protection to help make
Deploy the right technology now. Remember that any technologies you deploy to support your business more competitive
Our Symantec GDPR Planner helps you understand: GDPR compliance now, will help you to improve your
overall security stance so that you can be a better,
oo How ready you are. more competitive business.
oo What risks your organisation could be exposed to.
oo The key technology-based projects you could undertake
in preparation for the GDPR.
Step 01
Prepare
If you cant see your data you cant protect it.

Better business concept


If you know the data you have, who uses it and how,
you can more effectively support competitive advantage.
What are the biggest compliance risks
Readiness test
to our data and technology? Do we have Do you know where all your data resides in order to assess
full visibility over the personal data we whether it meets the requirements of GDPR compliance?
possess, irrespective of where it is? This will also help you to understand whether a breach However, Symantec can help you expedite
or misuse of data could occur. the process using the following process:
oo Find complex, sensitive data in structured or
Immediate GDPR project unstructured environments with Symantec DLP.
Data Discovery & Risk Assessment
oo Extend this visibility to legitimate and shadow cloud
Identify what is personal data and where it is in your apps by integrating Symantec CloudSoc (Cloud Access
cloud/on-premises environments. This could take months Security Broker) with DLP.
and involve working with all departments to understand
oo Perform a GDPR specific risk assessment using
what data they use, store and transact.
Symantec Control Compliance Suite (CCS).
This helps you identify, prioritise and manage the
most significant risk and track improvements.
oo Prepare for the latest threats with Symantec
Threat Intelligence.
Step 02
Protect
If data is left exposed on unsecured systems it is Factors to consider and how Symantec
at risk of non-compliance. can help you keep data in the right hands:
oo Identify personal data and stop it being sent to the
Better business concept
wrong person with DLP, CASB and Symantec Web
Retain the value of your data in-house. Losing data risks Gateway (SWG).
Is our data adequately protected fines, damage to brand reputation, and lost revenue.
oo Enable only the right people to access your data
against external attack and misuse? Readiness test systems with Symantec Validation & ID Protection
Can you protect your IT systems from attacks and control (VIP), CASB and SWG.
data so that it doesnt fall into the wrong hands? If it did, oo Prevent malware being used to take over your data
could you render it unusable? systems by protecting endpoints, servers, networks
and gateways from advance attacks with Symantec
Immediate GDPR project Endpoint Protection (SEP), Symantec Advanced Threat
Data Protection Audit Protection (ATP) and SWG.
Now you know where all your personal data is, you must oo Make breached data unintelligible/useless with
evaluate whether the right technologies and processes are tokenisation technology, such as Symantec Cloud
in place to help you control access to your data systems. Data Protection, and encryption.
oo Reduce system vulnerability by using patch
management with Symantec IT Management Suite.
Step 03
Detect
Readiness test
Can you rely upon your existing, traditional cyber defences
to pinpoint an attack in real-time and protect your personal
data assets? Can those systems learn from past attacks
to better protect your organisation in future?
Would we be able to detect advanced
Immediate GDPR project
and stealthy threats that are active in
Cyber Security Tech Review
our environment? Could we detect and
Evaluate your current cyber security estate to establish
assess the scale of a data breach as it whether the technologies you have in place provide an Heres how Symantec can help you to be proactive
is taking place? integrated, real-time defence, purpose-built for the era in defending against advanced threats:
of advanced persistent threats. In other words, those Monitor for and pinpoint advanced threats before they
complex malwares that are designed to evade traditional exfiltrate data using advanced detection techniques such
Data breaches must be notified. Failure to comply can lead signature-based security. Identify all vulnerabilities and as machine learning, sandboxing, user behaviour analysis
to significant fines up to 4% annual worldwide turnover gaps. Work with an expert partner who will help you to and traffic correlations between endpoint and websites.
or 20 million, whichever is highest. create a holistic, integrated approach.
Build unified protection against advanced threats.
Symantec Managed Security Services (MSS), Symantec
Better business concept
CCS (as deployed in the PREPARE phase), Symantec
Allowing advanced malware to live on your systems Security Analytics, Symantec Advanced Threat Protection,
risks valuable data being exfiltrated and competitive Symantec Web Gateway with Content Analysis and Malware
advantage eroded. Analysis delivering improved visibility and forensics.
Step 04
Respond
You must notify the authorities (and sometimes affected Immediate GDPR project
individuals) without undue delay, and at least within Incident Response Plan
72 hours of a breach.
Put the technology and escalation processes in place to stop
According to Article 34.3 (a), if you experience a breach a breach, mitigate the impacts, and report it. Your report
that is likely to result in a high risk to the rights of the to authorities must include likely consequences of the
Can we respond quickly to incidents, individuals, you are not obliged to report it if the data breach and the action you will take to mitigate adverse
mitigate the impact and the future risk? was encrypted. consequences to the data subjects.
Could we afford to pay up to 4% annual Better business concept Possible actions and how Symantec can support you:
worldwide turnover or 20 million for Being able to respond quickly in the event of a breach oo Automatically quarantine and remediate the source of
failure to report an incident? prevents undue loss of data and builds brand trust. the breach/the malware that is responsible with Symantec
Advanced Threat Protection and malware remediation.
Readiness test
Then tell responders what action to take.
Can you stop a breach quickly following its detection?
Assess the systems and data that have been compromised oo Gather the insights you need in order to understand
and report on how you can remedy the situation? the full context of a breach before, during and after
it happened. Symantec Security Analytics gives you
the forensic information to understand how the breach
occurred, what data was affected and what you need to
do to resolve the situation. Symantec Incident Response
Services can provide help to contain, remediate and
inform people about an incident quickly.
Next
Actions
For more ideas and support
Click here
The materials contained in this presentation are not intended to provide,
and do not constitute or comprise, legal advice on any particular matter
and are provided for general information purposes only.
You should not act or refrain from acting on the basis of any material
contained in this presentation, without seeking appropriate legal or
other professional advice.

S-ar putea să vă placă și