thrive in a gdpr world - rsa.com › content › dam › en › infographic › thrive-in...june...

1
JUNE Thrive in a GDPR World The GDPR represents a new way of doing business. With strict requirements around data privacy and protection—and big penalties for noncompliance—the GDPR is accelerating the convergence of business risk and IT risk. With the right tools and processes, organizations can address the GDPR while gaining the benefits of a Business-Driven Security™ strategy. What does it take? Data Governance Data governance is crucial in controlling who has access to data in organizations from a data protection point of view. Organizations must protect PII (personally identifiable information) in a number of different ways and must be able to demonstrate due diligence in keeping accurate records of processing activities. Breach Response Article 33 of the GDPR outlines specific requirements for notification of a personal data breach to the supervisory authority. Accomplishing this objective will require a combination of processes and technical capabilities including security incident management, security operations and breach management, as well as tools for deep monitoring, forensics and analysis of data activities. Compliance Management Compliance program management provides the framework for establishing a scalable and flexible environment to document and manage your organization’s policies and procedures to comply with the GDPR. This includes documenting policies and standards, assigning ownership, and mapping policies to key business areas, objectives and controls. With a unique scope of products and services spanning risk assessment, security controls deployment and management, and ongoing compliance management, RSA can act as a strategic partner to help any organization in its journey towards GDPR compliance. Risk Assessment Article 32 of the regulation outlines appropriate elements of a security risk assessment process to ensure controls and risk are appropriately designed and implemented. An effective risk assessment process accelerates identification of the linkage between risks and internal controls, reducing GDPR compliance gaps and improving risk mitigation strategies. BUSINESS-DRIVEN SECURITY IN A GDPR WORLD PARTNERS BUSINESS UNITS CONSUMERS THIRD PARTIES EMPLOYEES SOC APPLICATION APPLICATION Handle Threats Quickly – The RSA NetWitness ® Suite is a threat detection and response platform designed to allow security teams to detect and understand the full scope of a compromise by leveraging logs, packets, endpoints, and threat intelligence. Report Breaches Within 72 Hours of Discover – RSA NetWitness ® can help speed up the process of understanding the scope and nature of a breach with improved visibility into the attack sequence. RSA Archer ® can help manage the processes for breach and crisis management response. Document and Manage Processing Activities – RSA Archer ® offers specific use cases designed to help organizations establish and maintain a data catalog and execute PIA/DPIAs in support of GDPR compliance. Control Access to Data – The RSA SecurID ® Suite, including RSA SecurID ® Access and RSA ® Identity Governance and Lifecycle, is designed to help any size organization minimize identity risk and deliver convenient and secure access to their modern workforce. Implement a Risk and Compliance Program – The RSA Archer ® Suite is an industry leading solution engineered to help organizations manage multiple dimensions of risk on one configurable, integrated software platform. Build a Program for the Future – RSA offers organizations a range of strategic services designed to craft a business-driven security strategy, build an advanced security operations center and revitalize your governance, risk and compliance (GRC) program. Learn more at RSA.com/GDPR COMPLIANCE MANAGEMENT DATA GOVERNANCE BREACH RESPONSE RISK ASSESSMENT O W NERS AND USERS OF PII ©2018 Dell Inc. or its subsidiaries. All rights reserved. 1 1 2 2 3 3 4 4

Upload: others

Post on 30-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Thrive in a GDPR World - RSA.com › content › dam › en › infographic › thrive-in...JUNE Thrive in a GDPR World The GDPR represents a new way of doing business. With strict

JUNE

Thrive in a GDPR WorldThe GDPR represents a new way of doing business. With strict requirements around data privacy and protection—and big penalties for

noncompliance—the GDPR is accelerating the convergence of business risk and IT risk. With the right tools and processes, organizations

can address the GDPR while gaining the benefits of a Business-Driven Security™ strategy.

What does it take?

Data Governance

Data governance is crucial in controlling who hasaccess to data in organizations from a data protection point of view. Organizations must protect PII(personally identifiable information) in a number of different ways and must be able to demonstrate due diligence in keeping accurate records of processing activities.

Breach Response

Article 33 of the GDPR outlines specific requirements for notification of a personal data breach to the supervisory authority. Accomplishing this objective will require a combination of processes andtechnical capabilities including security incidentmanagement, security operations and breachmanagement, as well as tools for deep monitoring,forensics and analysis of data activities.

Compliance Management

Compliance program management provides theframework for establishing a scalable and flexibleenvironment to document and manage your organization’s policies and procedures to complywith the GDPR. This includes documenting policiesand standards, assigning ownership, and mappingpolicies to key business areas, objectives and controls.

With a unique scope of products and services spanning risk assessment, security controls deployment andmanagement, and ongoing compliance management,RSA can act as a strategic partner to help any organizationin its journey towards GDPR compliance.

Risk Assessment

Article 32 of the regulation outlines appropriate elements of a security risk assessment process toensure controls and risk are appropriately designedand implemented. An effective risk assessmentprocess accelerates identification of the linkagebetween risks and internal controls, reducing GDPRcompliance gaps and improving risk mitigationstrategies.

BUSINESS-DRIVEN SECURITYIN A GDPR WORLD

PARTNERS

BUSINESSUNITS

CONSUMERS

THIRDPARTIES

EMPLOYEES

SOC

APPLICATION

APPLICATION

Handle Threats Quickly – The RSA NetWitness® Suite is a threat detection and response platform designed to allow security teams to detect and understand the full scope of a compromise by leveraging logs, packets, endpoints, and threat intelligence.

Report Breaches Within 72 Hours of Discover – RSA NetWitness® can help speed up the process of understanding the scope and nature of a breach with improved visibility into the attack sequence. RSA Archer® can help manage the processes for breach and crisis management response.

Document and Manage Processing Activities – RSA Archer® offers specific use cases designed to help organizations establish and maintain a data catalog and executePIA/DPIAs in support of GDPR compliance.

Control Access to Data – The RSA SecurID® Suite, including RSA SecurID® Access and RSA® Identity Governance and Lifecycle, is designed to help any size organization minimize identity risk and deliver convenient and secure access to their modern workforce.

Implement a Risk and Compliance Program – The RSA Archer® Suite is an industry leading solution engineered to help organizations manage multiple dimensions of risk on one configurable, integrated software platform.

Build a Program for the Future – RSA offers organizations a range of strategic servicesdesigned to craft a business-driven security strategy, build an advanced security operations center and revitalize your governance, risk and compliance (GRC) program. Learn more at RSA.com/GDPR

COMPLIANCEMANAGEMENT

DATA GOVERNANCE

BREACHRESPONSE

RISK ASSESSMENT

OWNERS AND USERS OF PII

©20

18 D

ell I

nc. o

r its

subs

idia

ries.

All

right

s res

erve

d.

1

1

2

2

3

3

4

4