google peter logli & jake shea

36
Data Security and Student Privacy Colloque RISQ 2016

Upload: colloquerisq

Post on 09-Jan-2017

34 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Google   peter logli & jake shea

Data Security and Student Privacy

Colloque RISQ 2016

Page 2: Google   peter logli & jake shea

+ What security and privacy concerns keep you up at night?

+ What objections do you hear to implementing G Suite for Edu?

The bad guys have become increasingly sophisticated and effective

Page 3: Google   peter logli & jake shea
Page 6: Google   peter logli & jake shea

OS

Network

Servers

Chips

Control and secure the entire stack

Page 7: Google   peter logli & jake shea

Jupiter Superblocks & Pluto Switches

Page 8: Google   peter logli & jake shea

Global infrastructure

Page 9: Google   peter logli & jake shea

Data center locations

Page 10: Google   peter logli & jake shea

Lay our own cables

Page 11: Google   peter logli & jake shea

Project Shield

Page 12: Google   peter logli & jake shea

1 device

MTBF = 10 years

100K devices(servers, routers,

networking, power supplies, cooling, …)

MTBF = 1 hour

Predictable reliability comes from software

Page 13: Google   peter logli & jake shea

Data Center

Data Center

Data Replication for high availability and security

Data Center

Data Center

Page 14: Google   peter logli & jake shea

Requesting Data

Page 15: Google   peter logli & jake shea

G Suitefor Edu

● Gmail + Attachments● Calendar● Drive*● Docs*● Sheets*● Slides*● Hangouts & Talk (on the record only)● Sites*● Contacts● Groups● Vault

* - excluding video and third party content

Core Services

Page 16: Google   peter logli & jake shea

Two factor authentication

Page 17: Google   peter logli & jake shea

Maintain complete control

Page 18: Google   peter logli & jake shea

Maintain complete control

Choose who you externally collaborate with

Page 19: Google   peter logli & jake shea

● 500+ security engineers

● 24/7 active watch

● 160 academic research

papers on security

● Invest literally billions on

a quarterly basis

Investment and scale

Page 20: Google   peter logli & jake shea

We don’t get upset, we reward

Page 21: Google   peter logli & jake shea

How do we think about today’s challenges in data protection?

What do you expect from us?

How are we doing?

Being more transparent

Page 22: Google   peter logli & jake shea

Communicate Store & Share Collaborate Manage

Thank you!

Page 23: Google   peter logli & jake shea

Appendix

Page 24: Google   peter logli & jake shea

Security PrivacyData Protection

Page 25: Google   peter logli & jake shea

Businesses have different needs than consumers

Page 26: Google   peter logli & jake shea

Empower you to made good decisions

Page 27: Google   peter logli & jake shea

You are the data controller. We are only the processor

Page 28: Google   peter logli & jake shea

Industry standard audits

Page 29: Google   peter logli & jake shea

Traditional audits only focused on security

Page 30: Google   peter logli & jake shea

Accountability Legitimacy

Data Quality FairnessPurpose

OpennessSensitivitySecurity

0%

80%

60%

40%

20%

100%

International Data Transfers

Independent Data Protection Authority

Strong Agreement

Medium Agreement

Strong Disagreement

Disagreement across governing bodies

Page 31: Google   peter logli & jake shea

ISO 27018 working group and certification

Page 32: Google   peter logli & jake shea

● Defines the requirements for ISMS (Information Security Management System)

● 114 Controls in 14 GroupsISO 27001/2:2013

● Focused on Public Cloud Providers that process PII● 19 Controls in 11 GroupsISO 27018:2014

● Defines the standard and provides scope and definitions● 4 GroupsISO 27000

ISO 27000 standard broken out

Page 33: Google   peter logli & jake shea

Overview of the Standard

Information Security Policy

Organizational Security

Human Resources

Asset Management

Access Control Cryptography

Physical +Environmental

Security

Operations Security

Communications Security

System Development +Maintenance

Supplier Relationships

Consent & Choice

Purpose / Scope of Processing

Collection Limitation

Data Minimization

Use / Retention / Disclosure

Accuracy + Quality

Sub-processing Disclosure

Individual Access / Participation Accountability

Information Security Privacy Compliance

Business Continuity Compliance Incident

Management

References of the Standard

Terms / Definitions of the Standard

Scope of the Standard

Introduction of the Standard

143 controls within 49 groups

Page 34: Google   peter logli & jake shea
Page 35: Google   peter logli & jake shea

Continuous dialog with customers and regulators

Page 36: Google   peter logli & jake shea

What’s in your data center? ;)