mdennedy acsac keynote 05 dec 2018 · brand identity permission marketing / customer relationship...

34
Michelle Finneran Dennedy @mdennedy VP and Chief Privacy Officer December 2018 Bridge to the possible Privacy Engineering

Upload: others

Post on 28-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

Michelle Finneran Dennedy @mdennedyVP and Chief Privacy OfficerDecember 2018

Bridge to the possiblePrivacy Engineering

Page 2: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Data privacy is our future

2017Japan

Amended Privacy Law

2017 China

Cybersecurity Law

2018 Australia

Breach Law

2018 EU General Data

Protection Regulation

(GDPR)

• Data is essential to digital strategies & innovation

• Technology must meet customer requirements

• As business partners, we must protect our customers’ data & privacy

• New laws & regulations pose huge potential fines & costs; reputational & brand risk

DIGITIZATION

Page 3: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

“The Privacy Revolt: The Growing Demand for Privacy-as-a-Service” Wired magazine

“No matter what market you’re in, no matter what service you provide or product you sell… from right now until the end of time, you’re in the privacy game. Welcome.”

Page 4: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

How did I get here?

Page 5: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Value of Data

Enterprise or customer

focused

Product or business

operation focused

1. Know your data

• Ownership

• Inventory

• Classify

2. Embed controls to protect data

• Security

• Privacy

• Governance

4. Drive business insights • Analytics & data science

• Drive actions

3. Democratize the data

• Curate to make data accessible

• Manage processors to

policy-based controls

5. MAXIMIZE VALUE• Identify AI/ML/product uses

• Treat data as asset to maximize business

intelligence

Page 6: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

6

CURATEYOUR DATA

Page 7: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Curate technology

Don’t Do

Page 8: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Curate retail merchandise

Don’t Do

Page 9: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Curate digital life

Don’t Do

Page 10: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

US media company in Beacon Group research study, 2018

“Companies must be good data stewards. If you are not, we will not do business with you.”

Page 11: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Path to curation: privacy engineering

Discipline Innovation Data-centricity

Page 12: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

We are all privacy engineers

• Needs more than just technical skills to protect and extend the value of data

• Draws from artistic creativity and expression to innovate• Learns from, but disregards, the failures of the past

A privacy engineer…

Page 13: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

13

Privacy engineering: practitioner process

Page 14: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Start with privacy scoping

What market requirements apply?What regulations must you meet?Whose data are you processing? Where is the data?What corporate rules apply?

Gather all document retention periods established by statute or regulation working with…

Legal teamFunctional teamsIndustry compliance teamsRecords management team3rd-party providers

Page 15: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Privacy scoping process

Project Initiation

User Interface Prototype

Roll Out Solution

Design Solution

Quality Assurance

Construct SolutionScoping

Develop Class / Data Models

Develop Requirements Use Cases

Page 16: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Scope your environment

• Where are your employees and customers?

• What applications are you running? • What data do you use in your

processes?• Where do you process data?

Collection, use, 3rd-party sharing, analytics

• Whose data are you using?• Where does data reside?• Where do your cloud providers

securely process data?• What is your security plan for

infrastructure, application, and product development?

Data management, protection and privacy programs, IT & InfoSec

Page 17: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Privacy engineering development process

Procedures & Processes

Privacy Mechanisms

Requirements

Privacy Policy

Quality Assurance

Things

QualityAssurance Feedback

Privacy Awareness Training

Enterprise & User Goals

Page 18: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Privacy engineering = setting and executing on privacy requirements

DataPurposeCollection meansNoticeChoice/consent: TransferAccess, correction, deletion

SecurityMinimizationProportionalityRetentionThird partiesAccountability

Page 19: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Requirements derived from enterprise privacy policy

Privacy Policy

Realistic technology capabilities and limitations

Ethical obligations

Enforceability and compliance

Economic pressure to create value through efficient sharing / relationship building

Usability, access and availability for end users of information systems

Industry standards

Brand identity

Permission marketing / customer relationship management / business

intelligence

Local and international legal, jurisdictional and regulatory necessities

Organization / business requirements

Page 20: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

• Defines requirements for systems/software engineering process for privacy-oriented considerations regarding products, services, and systems using employee, customer or other external user's personal data.

• Extends across lifecycle from policy through development, quality assurance, and value realization. I

• Includes a use case and data model (including metadata).

• Applies to orgs and projects developing and deploying products, systems, processes, and applications that involve personal information.

• With specific procedures, diagrams, and checklists, users perform conformity assessments on their privacy practices.

IEEE P7002 Data Privacy Process

Page 21: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

It’s all connected

Enterprise Architecture

BusinessResults

Application Architecture

Information Architecture

User Interface Architecture

Business Strategy

Technology

Information Application

Business

Page 22: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Privacy Requirement Workshops

1. Understand context

2. Review use cases and data

3. Understand the user interface and user experience

4. Review context, use cases, data, UI and UX with a privacy filter

5. Review requirements you’ve identified

6. Next steps

Five components:

Page 23: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Questions help you understand privacy as part of...

23

SystemRequirements

DataRequirements

BusinessRequirements

Page 24: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Based on context and process

If context diagrams and use cases/activity diagrams are not available, we build them in the workshop…

Order Mgt (UML Use Case)SA/2001

Mon Oct 01, 2001 20:26Comment

CollectPreference/Profile

Information-onlyFullfillment

Collect InitialProfile Information

Shopper/Recommender

Handle CustomerCall

Handle InternetSign-on

<<actor>>Product Mgt

<<actor>>Credit System

<<actor>>Manufacturing System

<<actor>>Purchasing

<<actor>>Logistics System

SaleFullfillment

Call Center

Internet User

<<uses>>

<<uses>>

<<extends>>

<<extends>><<extends>>Call Center LogisticsProduct Mgt PurchasingManufacturingCredit MgtCall Center LogisticsProduct Mgt PurchasingManufacturingCredit Mgt

CollectInformation Only

Profile

Collect OrderComponents

Collect Initial ProfileInformation

CollectShopping

Information

MakeProduct

Component

BuyProduct

Component

CheckOrderStatus

Shopper /Recommender

Detrmn CustSrv Rep

Get fromInventory

ProvisionOrder

PlaceOrder

Fullfill InfoCollateral

Ship Order

Recmmdtn AcceptedCredit Approved

Shopping or Information

Call Complete

Call Center Call Recvd

Order Status

Order Status Needed

NoNo

Yes

Need More InfoNeed More Info

Yes

Recommendation

Info Only

Shopping

Page 25: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Distill privacy requirements based on…

Scope of enterprise

Business drivers

Mission statement

Context diagram

UI and UX design

Action locations

Triggering events

Information flows

Business processes

Other/serendipity ?

Page 26: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Context and use case diagrams

Page 27: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Context diagrams

Actors Information/control flows

What event triggers the flow? • Participant Actor

• Ultimate customer• In support of ultimate

customer• Where located?

• System interface• What system?• Where located?

• What information/material/control does user/system supply us?

• What information/material/control do we supply to user/system?

Page 28: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Use stick figures

Page 29: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

• A use case is a complete course of events initiated by an actor Actors are people, functional roles, or interfacing systems that interact with the enterprise. Develop one or more use cases for each actor.

• Use cases allow business people to define requirements in business terms (business people can write use cases).

• Use cases specify interactions between the actor and business processes, automated or not. Use them to begin to understand system interfaces.

Use cases help you gather requirements

Page 30: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Order Mgt (UML Use Case)SA/2001

Mon Oct 01, 2001 20:26Comment

CollectPreference/Profile

Information-onlyFullfillment

Collect InitialProfile Information

Shopper/Recommender

Handle CustomerCall

Handle InternetSign-on

<<actor>>Product Mgt

<<actor>>Credit System

<<actor>>Manufacturing System

<<actor>>Purchasing

<<actor>>Logistics System

SaleFullfillment

Call Center

Internet User

<<uses>>

<<uses>>

<<extends>>

<<extends>><<extends>>

Again, stick figures are fine…

Page 31: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Workshop results

It’s a start, not

an end

Initial list of privacy

requirements (and risks) to consider

& solve for during

development

Page 32: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

If you can imagine it, you can build the bridge to get you there

Page 33: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

For more information

Cisco Trust and Transparency Centertrust.cisco.comPodcast: www.cisco.com/go/ridersThe Privacy Engineer’s Manifesto free at apress.com

Tweet @mdennedy

Page 34: MDennedy ACSAC keynote 05 Dec 2018 · Brand identity Permission marketing / customer relationship management / business intelligence Local and international legal, jurisdictional

The bridge to possible