Data breach and Cybersecurity incident reporting regulations are becoming more widespread. The introduction of GDPR in May 2018, with its 72-hour reporting requirement, resulted in organizations having to review their incident response processes and more regional and industry-specific regulations are being introduced all the time. Security Operations and Privacy teams need to be aligned to meet these new requirements. Technology such as Security Orchestration and Automation is also being adopted to collaborate on the investigation and remediation of security incidents.
This webinar, hosted by Privacy experts from Ovum and IBM, will look at how technology can close the gap between Privacy and Security to reduce the time to contain incidents and maintain compliance with complex breach laws.
View the recording: https://event.on24.com/wcc/r/1930112/BE462033358FFF36C4B27F76C9755753?partnerref=LI
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Bridging the Gap between Privacy and Security: Using Technology to Manage Complex Breach Disclosure Regulations
1. Bridging the Gap between Privacy and
Security: Using Technology to Manage
Complex Breach Disclosure Regulations
2. 2 IBM Security
Next-Generation SOAR Platform with Intelligent Orchestration
IBM Resilient: The Market Leader in Incident Response
Largest and most trusted
install base in the world
More than 350 customers globally
Customers in more than
30 countries
Part of the largest
enterprise security
organization in the world
Resilient is the hub of IBM Security’s
Immune System
Expanding customer support
and services resources
Only incident response
platform with built-in
intelligent orchestration
IBM Resilient Partner Ecosystem
delivered through IBM Security App
Exchange
Technology-agnostic platform delivers
enterprise-grade integrations with
IT and security tools
Includes orchestration and
automation capabilities
3. 3 IBM Security
Our Speakers
Monica Dubeau, CIPP/US
Privacy Program Director - Resilient, IBM
Alan Rodger
Senior Analyst, Ovum
4. Using Technology to Manage
Complex Breach Disclosure
Regulations
Alan Rodger
Senior Analyst
Ovum
27 February 2019
14. 14 IBM Security
What is IBM Resilient Intelligent Orchestration?What is IBM Resilient Intelligent Orchestration?
15. 15 IBM Security
Over 160 global regulations in product
to help customers to remain compliant
with the complex breach notification
requirements
Privacy Module Capabilities
Integrated breach notification with the
wider Cyber Security Incident
Response plan – one central place of
incident management
Full simulation and table-top capabilities
to train Privacy & IR teams on
consistent, repeatable procedures
Reporting tools provide a clear
picture of the specific threats
facing the organization –
helping to identify gaps
18. 18 IBM Security
Demonstrate a Consistent Process for Assessing Risk
Text box to document
conclusion
Guidance that helps
user assess risk
19. 19 IBM Security
Meet Short Notification Timelines
The breach notification timeline is
already set and counting down
Tasks can be assigned to team
members for accountability