Jeremy Daniel

Find Competitive Advantage through AWS by Partnering With The Experts

Setting up your cloud configuration is too important to not involve the experts MediaTemple & CloudTweaks Thought Leadership Brand Series So many great business ideas fail at the moment when strategy must turn to execution. Even the best laid plans often come to nothing, drowned
/
Leveraging machine learning models for predictive maintenance of network services

Leveraging machine learning models for predictive maintenance of network services

Leveraging machine learning models As per lightreading's service assurance and analytics research study conducted with 100+ network operators and service providers, nearly 40% reported that issues around service assurance as a massive challenge. Service assurance is a big focus area for all the digital service
/
Daren Glenister

Countdown to GDPR: Preparing for Global Data Privacy Reform

Preparing for Global Data Privacy Reform

Multinational businesses who aren’t up to speed on the regulatory requirements of the European Union’s General Data Protection Regulation (GDPR) are in for a rude awakening when 2018 rolls around.

It’s not enough for businesses to simply adopt cloud migration the way consumers do.

Companies face an extra set of rules when dealing with the lifecycle of sensitive data. Business leaders believe the GDPR will put U.S. companies at a disadvantage, and 50% of companies believe they are going to be fined for failing to comply with GDPR, due to its complexity.

In the interest of individuals, companies will need to offer easier access to their own data, the right to data portability through transferring personal data between service providers and the right to be notified of a data breach involving the individual’s personal information.

Is your vendor asking, ‘please come audit us?’

To help prepare for 2018, companies need to reevaluate cloud strategies and data governance in addition to developing a privacy impact assessment when considering a new vendor or creating a new product. It’s important for companies to view and treat their vendors as an extension of their own organization as they continue to move data into the cloud.

Performing both an online and in-person evaluation can also help determine whether the current privacy control settings and policies meet expectations. Scrutinizing vendor readiness will play a major role in compliance as companies will be at fault for their inability to comply.

Global Data Privacy Reform

Some questions to consider are:

  • Why did I choose this vendor?
  • What risk will this bring me?
  • Do they have proper policies and governance structures in place?
  • Are their employees being trained on data privacy?

Vendors should be ready to roll out the welcome mat to customers or prospects at any time and have an open-door policy. They should also be able to provide proof that they can pass regulatory audits.

The importance of a CPO in the C-Suite

The rewards of hiring a Chief Privacy Officer (CPO) are endless when it comes to data privacy regulations and compliance. Not only will they keep IT departments in line and up to speed with global data privacy mandates, but they will also be on top of sharing which questions businesses should be asking cloud vendors. Appointing an expert in data privacy will save your company from non-compliance fines in all of the regions where you do business.

Although the rate at which data is revolutionizing companies defies the speed of light, it also poses more privacy risks extending beyond the IT team’s scope of work and knowledge. That’s where a CPO comes into play. As the data privacy landscape drastically changes, so will the organization’s team.

Companies will need dedicated resources to not only keep up, but help meet ongoing regulations, such as GDPR. In fact, part of the GDPR regulations require certain companies conducting business in Europe to have a CPO, so getting a jump start on hiring for this professional is better than playing catch up.

It’s always a good idea to have a successful security strategy in place in the event of a data breach, but whose job is it to implement, execute, and ensure customer data stays safe and secure? CPOs can work closely with IT to help drive strategies and tactics to keep personally identifiable information (PII) protected, in addition to keeping the rest of the C-suite up to speed.

Are you ready?

It’s critical for companies to understand the consequences and roadmap before regulations go into effect as remediation could cost more than just time, as the fines for data breaches are set to be around 4% of global revenue.

Rather than putting aside budget to pay the expected fines for noncompliance, businesses should invest in preparing their people, processes and systems to meet the regulatory guidelines the same way security vendors need to keep customers compliant.

By Daren Glenister

Daren Glenister

Daren is the Field Chief Technology Officer for Intralinks. Daren serves as a customer advocate, working with enterprise organizations to evangelize data collaboration solutions and translate customer business challenges into product requirements.

Glenister brings more than 20 years of industry experience and leadership in security, compliance, secure collaboration and enterprise software, having worked with many Fortune 1000 companies to turn business challenges into real-world solutions.

View Website
SSO

How SSO Software Works and Why Single Sign-On Is Important

The Functionality and Importance of SSO Software SSO is an acronym for Single Sign-On, a software program which uses one set of login credentials to ...
Steve Prentice CloudTweaks

How Printers Help Hackers Hide In Plain Sight

Printers and Hackers Spies and thieves often do their best work by hiding in plain sight. No one suspects the person sipping coffee at the ...
Finding and Implementing Startup Tools

Finding and Implementing The Right Tools For Your Startup

Implementing Startup Tools Many startups believe implementing cloud tools help reduce operation costs as well as the time taken to enter a market, and so ...
Steve Prentice CloudTweaks

Dark Clouds On The Horizon: The Rise Of Sophisticated Cybercrime

Sophisticated Cybercrime The story reads as if it were pulled from the pages of a Tom Clancy novel: a collection of US banks suddenly starts ...
Reuters news

Toyota fetches new way to use AI, self-drive tech in Tokyo Games

/
TOKYO (Reuters) - Miniature remote controlled cars have proved to be a crowd pleaser at track and field throwing events, but for the Tokyo 2020 Olympics Toyota Motor Corp is ...
Washington post

Trump says Pentagon’s $10 billion cloud contract should be investigated. Again. – The Washington Post

/
President Trump on Thursday said he would direct aides to investigate a pending military contract widely expected to be awarded to Amazon, saying he had heard multiple complaints about an ...
Vice

Vice: Researchers Trick Cylance’s AI-Based Antivirus Into Thinking Malware Is ‘Goodware’

/
By taking strings from an online gaming program and appending them to malicious files, researchers were able to trick Cylance’s AI-based antivirus engine into thinking programs like WannaCry and other ...