securing your data, reporting recommended practices
TRANSCRIPT
![Page 1: Securing your Data, Reporting Recommended Practices](https://reader035.vdocuments.us/reader035/viewer/2022070518/58eb5a841a28abaa718b4593/html5/thumbnails/1.jpg)
Securing Your DataLessons Learned from Ashley MadisonJohn Q Martin
Sales Engineer
Twitter: @SQLServerMonkey
Email: [email protected]
Blog: http://blogs.sqlsentry.com/author/JohnMartin/
![Page 2: Securing your Data, Reporting Recommended Practices](https://reader035.vdocuments.us/reader035/viewer/2022070518/58eb5a841a28abaa718b4593/html5/thumbnails/2.jpg)
Thank you to our sponsors
![Page 3: Securing your Data, Reporting Recommended Practices](https://reader035.vdocuments.us/reader035/viewer/2022070518/58eb5a841a28abaa718b4593/html5/thumbnails/3.jpg)
Introduce Yourself• John Q Martin
Working with data in many forms for more than a decade as a consultant and numerous operational IT roles and industries.
![Page 4: Securing your Data, Reporting Recommended Practices](https://reader035.vdocuments.us/reader035/viewer/2022070518/58eb5a841a28abaa718b4593/html5/thumbnails/4.jpg)
Agenda
Current landscape
Important Concepts
Compliance
![Page 5: Securing your Data, Reporting Recommended Practices](https://reader035.vdocuments.us/reader035/viewer/2022070518/58eb5a841a28abaa718b4593/html5/thumbnails/5.jpg)
Current Landscape
Criminal, State Sponsored, Vigilante, Corporate Espionage
Mobile, Dynamic, Agile workforce
Data Everywhere
Sharp focus on privacy
![Page 6: Securing your Data, Reporting Recommended Practices](https://reader035.vdocuments.us/reader035/viewer/2022070518/58eb5a841a28abaa718b4593/html5/thumbnails/6.jpg)
High Profile Data Breaches
TalkTalk
Ashley Madison
Sony
Starwood Hotels
![Page 7: Securing your Data, Reporting Recommended Practices](https://reader035.vdocuments.us/reader035/viewer/2022070518/58eb5a841a28abaa718b4593/html5/thumbnails/7.jpg)
What is a Data Breach?
“a breach of security leading to the accidental or unlawful destruction, loss, alteration,
unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed
in connection with the provision of a public electronic communications service”
Personal data breach definition – UK Information Commissioner's office.
![Page 8: Securing your Data, Reporting Recommended Practices](https://reader035.vdocuments.us/reader035/viewer/2022070518/58eb5a841a28abaa718b4593/html5/thumbnails/8.jpg)
The Work-Anywhere culture
Education• What are you working on• Simple precautions
Think Privacy• Privacy screen filters for devices• Select the right location
![Page 9: Securing your Data, Reporting Recommended Practices](https://reader035.vdocuments.us/reader035/viewer/2022070518/58eb5a841a28abaa718b4593/html5/thumbnails/9.jpg)
Working with data
Where does it reside• Are there limitations on where it can be sent• How do you transport it
Protective Markings• Tag your visualizations & data
![Page 10: Securing your Data, Reporting Recommended Practices](https://reader035.vdocuments.us/reader035/viewer/2022070518/58eb5a841a28abaa718b4593/html5/thumbnails/10.jpg)
Compliance
Understand if you need to comply• Industry Standards• Legislation Based
Understand how data is classified• What can be stored, retained, and displayed• What were the capture T&C’s
![Page 11: Securing your Data, Reporting Recommended Practices](https://reader035.vdocuments.us/reader035/viewer/2022070518/58eb5a841a28abaa718b4593/html5/thumbnails/11.jpg)
Compliance | UK DPA
Eight Key Data Protection Principles• Used fairly and lawfully.• Used for limited, specifically stated
purposes.• Used in a way that is adequate,
relevant and not excessive• Not transferred outside the
European Economic Area without adequate protection
• Accurate• Kept for no longer than is
absolutely necessary.• Handled according to people’s data
protection rights• Kept safe and Secure
![Page 12: Securing your Data, Reporting Recommended Practices](https://reader035.vdocuments.us/reader035/viewer/2022070518/58eb5a841a28abaa718b4593/html5/thumbnails/12.jpg)
Compliance | UK DPA
Eight Key Data Protection Principles• Used fairly and lawfully.• Used for limited, specifically stated
purposes.• Used in a way that is adequate,
relevant and not excessive• Not transferred outside the
European Economic Area without adequate protection
• Accurate• Kept for no longer than is
absolutely necessary.• Handled according to people’s data
protection rights• Kept safe and Secure
![Page 13: Securing your Data, Reporting Recommended Practices](https://reader035.vdocuments.us/reader035/viewer/2022070518/58eb5a841a28abaa718b4593/html5/thumbnails/13.jpg)
Compliance | UK DPA
“any set of information relating to individuals to the extent that, although the information is not
processed by means of equipment operating automatically in response to instructions given for
that purpose, the set is structured, either by reference to individuals or by reference to criteria relating to individuals, in such a way that specific information relating to a particular individual is
readily accessible.”
What type of information is protected by the Data Protection Act? – UK Information Commissioner's office.
![Page 14: Securing your Data, Reporting Recommended Practices](https://reader035.vdocuments.us/reader035/viewer/2022070518/58eb5a841a28abaa718b4593/html5/thumbnails/14.jpg)
Controlling, Processing, SharingDo you have a duty of care• What are you working on• Simple precautions
Who else can see the data• Shoulder Surfing• Granted access via sharing
![Page 15: Securing your Data, Reporting Recommended Practices](https://reader035.vdocuments.us/reader035/viewer/2022070518/58eb5a841a28abaa718b4593/html5/thumbnails/15.jpg)
SummaryAppropriate options
Protective Markings
Understand compliance requirements
Selective Sharing
![Page 16: Securing your Data, Reporting Recommended Practices](https://reader035.vdocuments.us/reader035/viewer/2022070518/58eb5a841a28abaa718b4593/html5/thumbnails/16.jpg)
Questions?
![Page 17: Securing your Data, Reporting Recommended Practices](https://reader035.vdocuments.us/reader035/viewer/2022070518/58eb5a841a28abaa718b4593/html5/thumbnails/17.jpg)
Thank You!
![Page 18: Securing your Data, Reporting Recommended Practices](https://reader035.vdocuments.us/reader035/viewer/2022070518/58eb5a841a28abaa718b4593/html5/thumbnails/18.jpg)