SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
1
•GDPR
Auf der Zielgeraden zur DSGVO / GDPR
Stephanus Schulte
Partner Technical Architect, Microsoft Deutschland
Twitter: @StephanusSch
Email: stephanus.schulte@microsoft.com
Ragnar Heil, MVP
Microsoft Alliances Manager EMEA
Twitter: @ragnarh
Email: rheil@metalogix.com
2
Agenda GDPR Trivia
Microsoft GDPR Resources
Office 365 E5 Compliance Demos
Metalogix Hybrid Solutions
Q&A
Privacy,Trust, and the General
Data ProtectionRegulation
1
2
3
4
5
6
3
4
Which issues are GDPR related?
A. Security
B. Legal
C. Compliance
D. Risk
E. Data
5
What is GDPR?
A. General Data Protection Regulation
B. General Data Protection Guideline
C. General Data Protection Recommendation
6
What is the maximum data breach penalty,
under the GDPR compliance directives?
A. 20,000,000 euros or up to 4% of annual turnover, whichever is greater
B. 10,000,000 euros or up to 2% of annual turnover, whichever is greater
C. There is no maximum fine
7
A. Any organization that processes personal data
B. All data controllers and processors established in the EU and organizations that
target EU citizens
C. Data controllers operating in the EU
GDPR applies to which types of individuals or
organizations:
8
A. Within 48 hours
B. Within 12 hours
C. Within 72 hours
Within what period of time must an organization
notify a supervising authority about a data breach?
9
A. The right to be forgotten
B. The right of data portability
C. The right to ignore GDPR
D. Both A and B
In May 2018, GDPR regulations will give EU
residents and citizens more rights and control over
their data. However, in what terms will they have
more rights and control?
10
General Data Protection Regulation
Who is affected?
• Any organization handling a EU citizen’s data –
regardless of size or location
What is covered?
• Personal Data
• Data privacy and explicit consent
• Governance and compliance
GDPR impacts organizations worldwide
11
12
Impact of GDPR
Non-compliance could lead to…
1. Fines of up to €20M or 4% of annual revenue
2. Class action lawsuits
3. Lengthy government audit
4. Customer dissatisfaction
5. Contract default / termination
Changes the way organizations process, store, and protect data
SOURCE: Ovum Report - Data privacy laws: Cutting the red tape
of global IT decision
makers think that they
will be fined due to the
GDPR
52%
13
What are the key changes to address the GDPR?
Personal
privacy
Controls and
notifications
Transparent
policies
IT and training
Organizations will need to:
• Train privacy personnel &
employee
• Audit and update data
policies
• Employ a Data Protection
Officer (if required)
• Create & manage
compliant vendor
contracts
Organizations will need to:
• Protect personal data using
appropriate security
• Notify authorities of
personal data breaches
• Obtain appropriate consents
for processing data
• Keep records detailing data
processing
Individuals have the right to:
• Access their personal
data
• Correct errors in their
personal data
• Erase their personal data
• Object to processing of
their personal data
• Export personal data
Organizations are required
to:
• Provide clear notice of
data collection
• Outline processing
purposes and use cases
• Define data retention
and deletion policies
14
15
15
Microsoft Confidential – for internal only use by partners.
Discover
Identify what personal data you have and
where it resides1
Manage
Govern how personal data is used
and accessed2
Protect
Establish security controls to prevent, detect,
and respond to vulnerabilities & data breaches3
Report
Keep required documentation, manage data
requests and breach notifications4
Step-by-Step GDPR Compliance
16
16
Microsoft Confidential – for internal only use by partners.
In-scope:
Any data that helps you
identify a person
• Name
• Email address
• Social media posts
• Physical, physiological, or
genetic information
• Medical information
• Location
• Bank details
• IP address
• Cookies
• Cultural identity
Inventory:
Identifying where
personal data is collected
and stored
• Emails
• Documents
• Databases
• Removable media
• Metadata
• Log files
• Backups
• Microsoft Azure
Microsoft Azure Data Catalog
• Enterprise Mobility + Security (EMS)
Microsoft Cloud App Security
• Dynamics 365
Audit Data & User Activity
Reporting & Analytics
• Office & Office 365
Data Loss Prevention
Advanced Data Governance
Office 365 eDiscovery
• SQL Server and Azure SQL Database
SQL Query Language
1
Discover
Identifywhatpersonaldatacustomershave andwhere
itresides
16
Example solutions
17
17
Microsoft Confidential – for internal only use by partners.
Data governance:
Defining policies, roles and
responsibilities for the
management and use of
personal data
• At rest
• In process
• In transit
• Storing
• Recovery
• Archiving
• Retaining
• Disposal
Data classification:
Organizing and labeling data to
ensure proper handling
• Types
• Sensitivity
• Context / use
• Ownership
• Custodians
• Administrators
• Users
• Microsoft Azure
Azure Active Directory
Azure Role-Based Access Control (RBAC)
• Enterprise Mobility + Security (EMS)
Azure Information Protection
• Dynamics 365
Security Concepts
• Office & Office 365
Advanced Data Governance
Journaling (Exchange Online)
• Windows & Windows Server
Microsoft Data Classification Toolkit
2
Manage
Assist customersingoverninghowpersonaldataisused
andaccessed
17
Example solutions
18
18
Microsoft Confidential – for internal only use by partners.
Preventing data
attacks:
Protecting data
• Physical datacenter
protection
• Network security
• Storage security
• Compute security
• Identity management
• Access control
• Encryption
• Risk mitigation
Detecting &
responding to
breaches:
Monitoring for and detecting
system intrusions
• System monitoring
• Breach identification
• Calculating impact
• Planned response
• Disaster recovery
• Notifying DPA &
customers
• Microsoft Azure
Azure Key Vault
• Enterprise Mobility + Security (EMS)
Azure Active Directory Premium
Microsoft Intune
• Office & Office 365
Advanced Threat Protection
Threat Intelligence
• SQL Server and Azure SQL Database
Transparent data encryption
Always Encrypted
• Windows & Windows Server
Windows Hello
Credential Guard
3
Protect
Establishsecuritycontrolstoprevent,detect,andrespond
tovulnerabilitiesanddatabreaches
18
Example solutions
19
19
Microsoft Confidential – for internal only use by partners.
Record-keeping:
Enterprises will need to record
the:
• Purposes of processing
• Classifications of personal
data
• Third-parties with access to
the data
• Organizational and
technical security measures
• Data retention times
Reporting tools:
Implement reporting
capabilities
• Cloud services (processor)
documentation
• Audit logs
• Breach notifications
• Handling Data Subject
Requests
• Governance reporting
• Compliance reviews
• Microsoft Trust Center
Service Trust Portal
• Microsoft Azure
Azure Auditing & Logging
Microsoft Azure Monitor
• Enterprise Mobility + Security (EMS)
Azure Information Protection
• Dynamics 365
Reporting & Analytics
• Office & Office 365
Service Assurance
Office 365 Audit Logs
Customer Lockbox
4
Report
Keeprequireddocumentation,managedatarequestsand
breachnotifications
19
Example solutions
20
Presentation Notes (see footer)
Compliance Manager + Advanced Data Governance
21
PROCESS:
• Develop processes that
reinforce compliance activities
• Develop breach detection and
response plan
Solving for GDPR Compliance
PEOPLE:
• Assign a DPO
• Train staff on GDPR
requirements and new
processes
TECHNOLOGY:
• Leverage technology to
automate processes, build
redundancies, and reduce
human reliance
• Audit processes
Build a compliance program that focuses on resiliency
PEOPLE
PROCESS TECHNOLOGY
22
How We Can Help
Manage
Track personal data
and apply governance
Four Steps to GDPR Compliance Readiness
Discover & Locate
Find personal data stored in
SharePoint repositories
Protect
Protect personal data
from damage, loss, or
breach
Audit & Report
Prove compliance and
conduct regular audits
23
ControlPoint
Set and automatically enforce defined governance policies that
provide guardrails for normal and compliant business behavior.
Locate person-specific records on demand and govern personal
information as required.
Manage
Sensitive Content Manager
Scan data stored in SP on-prem / online, SP hybrid, or OneDrive for
Business for sensitive information in minutes using predetermined
search terms or customized searches.
Locate
How Our Products Align
24
ControlPoint
Gain visibility into who has accessed personal information and
sensitive content over any period of time and show consistent,
effective processes through regular audit.
Audit
ControlPoint
Monitor user behavior to detect and automatically react to unusual
activity, helping to protect against potential breaches and support
compliance with the GDPR requirement to report breaches within
72 hours.
Protect
How Our Products Align
25
Discover and scan SharePoint enPrem
26
Graph of scans and files found
27
Audit and list of files and actions taken by a user
28
Protect: Concrete Call to Actions
29
Upcoming Feature Releases
• GDPR Dashboard
A visualization for the end-user on the level of internal GDPR
compliance in their environment
• GDPR Value: Gain transparency into internal GDPR compliance
activities and full environmental content coverage in a singular
view
• Redaction Capability
Ability to surgically remove sensitive information from
documents
• GDPR Value: “Right to be forgotten” requires data controllers to
have the ability to erase personal data on demand, even within
documents in which that data is shared with other unique users
who are not making the same demand, or may still serve a
business purpose.
30
•GDPR
Which questions do you have?
Ragnar Heil, MVP
Microsoft Alliances Manager EMEA
Twitter: @ragnarh
Email: rheil@metalogix.com
31
THANK YOU, SPONSORS!
SHAREPOINT SATURDAY NORTH GERMANY 2018
32

Weitere ähnliche Inhalte

Was ist angesagt?

GDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping ELGDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping ELEugene Lee
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditOmo Osagiede
 
TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...
TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...
TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...Omo Osagiede
 
Pronti per la legge sulla data protection GDPR? No Panic! - Stefano Sali, Dom...
Pronti per la legge sulla data protection GDPR? No Panic! - Stefano Sali, Dom...Pronti per la legge sulla data protection GDPR? No Panic! - Stefano Sali, Dom...
Pronti per la legge sulla data protection GDPR? No Panic! - Stefano Sali, Dom...Codemotion
 
Ensuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify GuideEnsuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify GuideZymplify
 
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceGeek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceIDERA Software
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesDimitri Sirota
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceCobweb
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
GDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to KnowGDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to KnowRachel Roach
 
Gdpr and ISMS Quick Map Framework EL
Gdpr and ISMS Quick Map Framework ELGdpr and ISMS Quick Map Framework EL
Gdpr and ISMS Quick Map Framework ELEugene Lee
 
Why We Require GDPR?
Why We Require GDPR?Why We Require GDPR?
Why We Require GDPR?Jatin Kochhar
 
GDPR Data Life Cycle
GDPR Data Life CycleGDPR Data Life Cycle
GDPR Data Life CycleJatin Kochhar
 
Practical steps to GDPR compliance
Practical steps to GDPR compliance Practical steps to GDPR compliance
Practical steps to GDPR compliance Jean-Michel Franco
 
Cleaning up Redundant, Obsolete and Trivial Data to Reclaim Capacity and Mana...
Cleaning up Redundant, Obsolete and Trivial Data to Reclaim Capacity and Mana...Cleaning up Redundant, Obsolete and Trivial Data to Reclaim Capacity and Mana...
Cleaning up Redundant, Obsolete and Trivial Data to Reclaim Capacity and Mana...Index Engines Inc.
 
Universal Search for Legal Enterprises
Universal Search for Legal EnterprisesUniversal Search for Legal Enterprises
Universal Search for Legal EnterprisesAdhereSolutions
 
Compliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_enCompliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_enBalázs Antók
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001Owako Rodah
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataNeo4j
 

Was ist angesagt? (20)

GDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping ELGDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping EL
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal Audit
 
TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...
TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...
TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...
 
Pronti per la legge sulla data protection GDPR? No Panic! - Stefano Sali, Dom...
Pronti per la legge sulla data protection GDPR? No Panic! - Stefano Sali, Dom...Pronti per la legge sulla data protection GDPR? No Panic! - Stefano Sali, Dom...
Pronti per la legge sulla data protection GDPR? No Panic! - Stefano Sali, Dom...
 
Ensuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify GuideEnsuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify Guide
 
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceGeek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
GDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to KnowGDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to Know
 
Gdpr and ISMS Quick Map Framework EL
Gdpr and ISMS Quick Map Framework ELGdpr and ISMS Quick Map Framework EL
Gdpr and ISMS Quick Map Framework EL
 
Why We Require GDPR?
Why We Require GDPR?Why We Require GDPR?
Why We Require GDPR?
 
GDPR Data Life Cycle
GDPR Data Life CycleGDPR Data Life Cycle
GDPR Data Life Cycle
 
Practical steps to GDPR compliance
Practical steps to GDPR compliance Practical steps to GDPR compliance
Practical steps to GDPR compliance
 
Cleaning up Redundant, Obsolete and Trivial Data to Reclaim Capacity and Mana...
Cleaning up Redundant, Obsolete and Trivial Data to Reclaim Capacity and Mana...Cleaning up Redundant, Obsolete and Trivial Data to Reclaim Capacity and Mana...
Cleaning up Redundant, Obsolete and Trivial Data to Reclaim Capacity and Mana...
 
Universal Search for Legal Enterprises
Universal Search for Legal EnterprisesUniversal Search for Legal Enterprises
Universal Search for Legal Enterprises
 
Compliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_enCompliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_en
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
 

Ähnlich wie GDPR Compliance Tools

Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationGDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationDenodo
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution Google
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
Azure Privacy & GDPR @ Service Management World
Azure Privacy & GDPR @ Service Management WorldAzure Privacy & GDPR @ Service Management World
Azure Privacy & GDPR @ Service Management WorldJP Clementi
 
How Microsoft 365 can help with GDPR compliance
How Microsoft 365 can help with GDPR complianceHow Microsoft 365 can help with GDPR compliance
How Microsoft 365 can help with GDPR complianceIT Masterclasses
 
Ease out the GDPR adoption with ManageEngine
Ease out the GDPR adoption with ManageEngineEase out the GDPR adoption with ManageEngine
Ease out the GDPR adoption with ManageEngineManageEngine
 
O365Engage17 - Black belting office 365 security with secure score
O365Engage17 - Black belting office 365 security with secure scoreO365Engage17 - Black belting office 365 security with secure score
O365Engage17 - Black belting office 365 security with secure scoreNCCOMMS
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkPrecisely
 
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...MongoDB
 
Accelerating the Path to GDPR Compliance
Accelerating the Path to GDPR ComplianceAccelerating the Path to GDPR Compliance
Accelerating the Path to GDPR ComplianceHernan Huwyler, MBA CPA
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)Kimberly Simon MBA
 
Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPRJuan Niekerk
 
Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPRJuan Niekerk
 

Ähnlich wie GDPR Compliance Tools (20)

Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
GDPR
GDPRGDPR
GDPR
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationGDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data Virtualization
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Azure Privacy & GDPR @ Service Management World
Azure Privacy & GDPR @ Service Management WorldAzure Privacy & GDPR @ Service Management World
Azure Privacy & GDPR @ Service Management World
 
How Microsoft 365 can help with GDPR compliance
How Microsoft 365 can help with GDPR complianceHow Microsoft 365 can help with GDPR compliance
How Microsoft 365 can help with GDPR compliance
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
 
Ease out the GDPR adoption with ManageEngine
Ease out the GDPR adoption with ManageEngineEase out the GDPR adoption with ManageEngine
Ease out the GDPR adoption with ManageEngine
 
O365Engage17 - Black belting office 365 security with secure score
O365Engage17 - Black belting office 365 security with secure scoreO365Engage17 - Black belting office 365 security with secure score
O365Engage17 - Black belting office 365 security with secure score
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
 
Accelerating the Path to GDPR Compliance
Accelerating the Path to GDPR ComplianceAccelerating the Path to GDPR Compliance
Accelerating the Path to GDPR Compliance
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
 
Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPR
 
Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPR
 

Mehr von Ragnar Heil

Cloud Summit: Protect Hybrid Active Directory from cyber threads, track attac...
Cloud Summit: Protect Hybrid Active Directory from cyber threads, track attac...Cloud Summit: Protect Hybrid Active Directory from cyber threads, track attac...
Cloud Summit: Protect Hybrid Active Directory from cyber threads, track attac...Ragnar Heil
 
BDS Frühjahrstagung Working Out Loud
BDS Frühjahrstagung Working Out Loud BDS Frühjahrstagung Working Out Loud
BDS Frühjahrstagung Working Out Loud Ragnar Heil
 
Trust in Tech Meetup bei Microsoft München zu GDPR / DSGVO: Email Archivieru...
Trust in Tech Meetup bei Microsoft München  zu GDPR / DSGVO: Email Archivieru...Trust in Tech Meetup bei Microsoft München  zu GDPR / DSGVO: Email Archivieru...
Trust in Tech Meetup bei Microsoft München zu GDPR / DSGVO: Email Archivieru...Ragnar Heil
 
Learntec: Working Out Loud mit Office 365 (Netmedianer, Microsoft)
Learntec: Working Out Loud mit Office 365 (Netmedianer, Microsoft)Learntec: Working Out Loud mit Office 365 (Netmedianer, Microsoft)
Learntec: Working Out Loud mit Office 365 (Netmedianer, Microsoft)Ragnar Heil
 
Wann nutze ich welches Office 365 Tool?
Wann nutze ich welches Office 365 Tool?Wann nutze ich welches Office 365 Tool?
Wann nutze ich welches Office 365 Tool?Ragnar Heil
 
5 1/2 ways to hack your productivity (using Sway, OfficeMix, Yammer & Delve) ...
5 1/2 ways to hack your productivity (using Sway, OfficeMix, Yammer & Delve) ...5 1/2 ways to hack your productivity (using Sway, OfficeMix, Yammer & Delve) ...
5 1/2 ways to hack your productivity (using Sway, OfficeMix, Yammer & Delve) ...Ragnar Heil
 
Responsive Organization - Agiles Unternehmen
Responsive Organization - Agiles UnternehmenResponsive Organization - Agiles Unternehmen
Responsive Organization - Agiles UnternehmenRagnar Heil
 
Synopsis Konferenz 2014-SharePoint Yammer Integration -Microsoft Enterprise S...
Synopsis Konferenz 2014-SharePoint Yammer Integration -Microsoft Enterprise S...Synopsis Konferenz 2014-SharePoint Yammer Integration -Microsoft Enterprise S...
Synopsis Konferenz 2014-SharePoint Yammer Integration -Microsoft Enterprise S...Ragnar Heil
 
SharePoint 2013 Social yammer queport integration
SharePoint 2013 Social   yammer queport integrationSharePoint 2013 Social   yammer queport integration
SharePoint 2013 Social yammer queport integrationRagnar Heil
 
Social Media-wie erhöht man die Interaktion mit den Lesern (am Bsp Microsoft)
Social Media-wie erhöht man die Interaktion mit den Lesern (am Bsp Microsoft)Social Media-wie erhöht man die Interaktion mit den Lesern (am Bsp Microsoft)
Social Media-wie erhöht man die Interaktion mit den Lesern (am Bsp Microsoft)Ragnar Heil
 

Mehr von Ragnar Heil (10)

Cloud Summit: Protect Hybrid Active Directory from cyber threads, track attac...
Cloud Summit: Protect Hybrid Active Directory from cyber threads, track attac...Cloud Summit: Protect Hybrid Active Directory from cyber threads, track attac...
Cloud Summit: Protect Hybrid Active Directory from cyber threads, track attac...
 
BDS Frühjahrstagung Working Out Loud
BDS Frühjahrstagung Working Out Loud BDS Frühjahrstagung Working Out Loud
BDS Frühjahrstagung Working Out Loud
 
Trust in Tech Meetup bei Microsoft München zu GDPR / DSGVO: Email Archivieru...
Trust in Tech Meetup bei Microsoft München  zu GDPR / DSGVO: Email Archivieru...Trust in Tech Meetup bei Microsoft München  zu GDPR / DSGVO: Email Archivieru...
Trust in Tech Meetup bei Microsoft München zu GDPR / DSGVO: Email Archivieru...
 
Learntec: Working Out Loud mit Office 365 (Netmedianer, Microsoft)
Learntec: Working Out Loud mit Office 365 (Netmedianer, Microsoft)Learntec: Working Out Loud mit Office 365 (Netmedianer, Microsoft)
Learntec: Working Out Loud mit Office 365 (Netmedianer, Microsoft)
 
Wann nutze ich welches Office 365 Tool?
Wann nutze ich welches Office 365 Tool?Wann nutze ich welches Office 365 Tool?
Wann nutze ich welches Office 365 Tool?
 
5 1/2 ways to hack your productivity (using Sway, OfficeMix, Yammer & Delve) ...
5 1/2 ways to hack your productivity (using Sway, OfficeMix, Yammer & Delve) ...5 1/2 ways to hack your productivity (using Sway, OfficeMix, Yammer & Delve) ...
5 1/2 ways to hack your productivity (using Sway, OfficeMix, Yammer & Delve) ...
 
Responsive Organization - Agiles Unternehmen
Responsive Organization - Agiles UnternehmenResponsive Organization - Agiles Unternehmen
Responsive Organization - Agiles Unternehmen
 
Synopsis Konferenz 2014-SharePoint Yammer Integration -Microsoft Enterprise S...
Synopsis Konferenz 2014-SharePoint Yammer Integration -Microsoft Enterprise S...Synopsis Konferenz 2014-SharePoint Yammer Integration -Microsoft Enterprise S...
Synopsis Konferenz 2014-SharePoint Yammer Integration -Microsoft Enterprise S...
 
SharePoint 2013 Social yammer queport integration
SharePoint 2013 Social   yammer queport integrationSharePoint 2013 Social   yammer queport integration
SharePoint 2013 Social yammer queport integration
 
Social Media-wie erhöht man die Interaktion mit den Lesern (am Bsp Microsoft)
Social Media-wie erhöht man die Interaktion mit den Lesern (am Bsp Microsoft)Social Media-wie erhöht man die Interaktion mit den Lesern (am Bsp Microsoft)
Social Media-wie erhöht man die Interaktion mit den Lesern (am Bsp Microsoft)
 

Kürzlich hochgeladen

KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfKelechi48
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 

Kürzlich hochgeladen (20)

KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 

GDPR Compliance Tools

  • 1. 1 •GDPR Auf der Zielgeraden zur DSGVO / GDPR Stephanus Schulte Partner Technical Architect, Microsoft Deutschland Twitter: @StephanusSch Email: stephanus.schulte@microsoft.com Ragnar Heil, MVP Microsoft Alliances Manager EMEA Twitter: @ragnarh Email: rheil@metalogix.com
  • 2. 2 Agenda GDPR Trivia Microsoft GDPR Resources Office 365 E5 Compliance Demos Metalogix Hybrid Solutions Q&A Privacy,Trust, and the General Data ProtectionRegulation 1 2 3 4 5 6
  • 3. 3
  • 4. 4 Which issues are GDPR related? A. Security B. Legal C. Compliance D. Risk E. Data
  • 5. 5 What is GDPR? A. General Data Protection Regulation B. General Data Protection Guideline C. General Data Protection Recommendation
  • 6. 6 What is the maximum data breach penalty, under the GDPR compliance directives? A. 20,000,000 euros or up to 4% of annual turnover, whichever is greater B. 10,000,000 euros or up to 2% of annual turnover, whichever is greater C. There is no maximum fine
  • 7. 7 A. Any organization that processes personal data B. All data controllers and processors established in the EU and organizations that target EU citizens C. Data controllers operating in the EU GDPR applies to which types of individuals or organizations:
  • 8. 8 A. Within 48 hours B. Within 12 hours C. Within 72 hours Within what period of time must an organization notify a supervising authority about a data breach?
  • 9. 9 A. The right to be forgotten B. The right of data portability C. The right to ignore GDPR D. Both A and B In May 2018, GDPR regulations will give EU residents and citizens more rights and control over their data. However, in what terms will they have more rights and control?
  • 10. 10 General Data Protection Regulation Who is affected? • Any organization handling a EU citizen’s data – regardless of size or location What is covered? • Personal Data • Data privacy and explicit consent • Governance and compliance GDPR impacts organizations worldwide
  • 11. 11
  • 12. 12 Impact of GDPR Non-compliance could lead to… 1. Fines of up to €20M or 4% of annual revenue 2. Class action lawsuits 3. Lengthy government audit 4. Customer dissatisfaction 5. Contract default / termination Changes the way organizations process, store, and protect data SOURCE: Ovum Report - Data privacy laws: Cutting the red tape of global IT decision makers think that they will be fined due to the GDPR 52%
  • 13. 13 What are the key changes to address the GDPR? Personal privacy Controls and notifications Transparent policies IT and training Organizations will need to: • Train privacy personnel & employee • Audit and update data policies • Employ a Data Protection Officer (if required) • Create & manage compliant vendor contracts Organizations will need to: • Protect personal data using appropriate security • Notify authorities of personal data breaches • Obtain appropriate consents for processing data • Keep records detailing data processing Individuals have the right to: • Access their personal data • Correct errors in their personal data • Erase their personal data • Object to processing of their personal data • Export personal data Organizations are required to: • Provide clear notice of data collection • Outline processing purposes and use cases • Define data retention and deletion policies
  • 14. 14
  • 15. 15 15 Microsoft Confidential – for internal only use by partners. Discover Identify what personal data you have and where it resides1 Manage Govern how personal data is used and accessed2 Protect Establish security controls to prevent, detect, and respond to vulnerabilities & data breaches3 Report Keep required documentation, manage data requests and breach notifications4 Step-by-Step GDPR Compliance
  • 16. 16 16 Microsoft Confidential – for internal only use by partners. In-scope: Any data that helps you identify a person • Name • Email address • Social media posts • Physical, physiological, or genetic information • Medical information • Location • Bank details • IP address • Cookies • Cultural identity Inventory: Identifying where personal data is collected and stored • Emails • Documents • Databases • Removable media • Metadata • Log files • Backups • Microsoft Azure Microsoft Azure Data Catalog • Enterprise Mobility + Security (EMS) Microsoft Cloud App Security • Dynamics 365 Audit Data & User Activity Reporting & Analytics • Office & Office 365 Data Loss Prevention Advanced Data Governance Office 365 eDiscovery • SQL Server and Azure SQL Database SQL Query Language 1 Discover Identifywhatpersonaldatacustomershave andwhere itresides 16 Example solutions
  • 17. 17 17 Microsoft Confidential – for internal only use by partners. Data governance: Defining policies, roles and responsibilities for the management and use of personal data • At rest • In process • In transit • Storing • Recovery • Archiving • Retaining • Disposal Data classification: Organizing and labeling data to ensure proper handling • Types • Sensitivity • Context / use • Ownership • Custodians • Administrators • Users • Microsoft Azure Azure Active Directory Azure Role-Based Access Control (RBAC) • Enterprise Mobility + Security (EMS) Azure Information Protection • Dynamics 365 Security Concepts • Office & Office 365 Advanced Data Governance Journaling (Exchange Online) • Windows & Windows Server Microsoft Data Classification Toolkit 2 Manage Assist customersingoverninghowpersonaldataisused andaccessed 17 Example solutions
  • 18. 18 18 Microsoft Confidential – for internal only use by partners. Preventing data attacks: Protecting data • Physical datacenter protection • Network security • Storage security • Compute security • Identity management • Access control • Encryption • Risk mitigation Detecting & responding to breaches: Monitoring for and detecting system intrusions • System monitoring • Breach identification • Calculating impact • Planned response • Disaster recovery • Notifying DPA & customers • Microsoft Azure Azure Key Vault • Enterprise Mobility + Security (EMS) Azure Active Directory Premium Microsoft Intune • Office & Office 365 Advanced Threat Protection Threat Intelligence • SQL Server and Azure SQL Database Transparent data encryption Always Encrypted • Windows & Windows Server Windows Hello Credential Guard 3 Protect Establishsecuritycontrolstoprevent,detect,andrespond tovulnerabilitiesanddatabreaches 18 Example solutions
  • 19. 19 19 Microsoft Confidential – for internal only use by partners. Record-keeping: Enterprises will need to record the: • Purposes of processing • Classifications of personal data • Third-parties with access to the data • Organizational and technical security measures • Data retention times Reporting tools: Implement reporting capabilities • Cloud services (processor) documentation • Audit logs • Breach notifications • Handling Data Subject Requests • Governance reporting • Compliance reviews • Microsoft Trust Center Service Trust Portal • Microsoft Azure Azure Auditing & Logging Microsoft Azure Monitor • Enterprise Mobility + Security (EMS) Azure Information Protection • Dynamics 365 Reporting & Analytics • Office & Office 365 Service Assurance Office 365 Audit Logs Customer Lockbox 4 Report Keeprequireddocumentation,managedatarequestsand breachnotifications 19 Example solutions
  • 20. 20 Presentation Notes (see footer) Compliance Manager + Advanced Data Governance
  • 21. 21 PROCESS: • Develop processes that reinforce compliance activities • Develop breach detection and response plan Solving for GDPR Compliance PEOPLE: • Assign a DPO • Train staff on GDPR requirements and new processes TECHNOLOGY: • Leverage technology to automate processes, build redundancies, and reduce human reliance • Audit processes Build a compliance program that focuses on resiliency PEOPLE PROCESS TECHNOLOGY
  • 22. 22 How We Can Help Manage Track personal data and apply governance Four Steps to GDPR Compliance Readiness Discover & Locate Find personal data stored in SharePoint repositories Protect Protect personal data from damage, loss, or breach Audit & Report Prove compliance and conduct regular audits
  • 23. 23 ControlPoint Set and automatically enforce defined governance policies that provide guardrails for normal and compliant business behavior. Locate person-specific records on demand and govern personal information as required. Manage Sensitive Content Manager Scan data stored in SP on-prem / online, SP hybrid, or OneDrive for Business for sensitive information in minutes using predetermined search terms or customized searches. Locate How Our Products Align
  • 24. 24 ControlPoint Gain visibility into who has accessed personal information and sensitive content over any period of time and show consistent, effective processes through regular audit. Audit ControlPoint Monitor user behavior to detect and automatically react to unusual activity, helping to protect against potential breaches and support compliance with the GDPR requirement to report breaches within 72 hours. Protect How Our Products Align
  • 25. 25 Discover and scan SharePoint enPrem
  • 26. 26 Graph of scans and files found
  • 27. 27 Audit and list of files and actions taken by a user
  • 29. 29 Upcoming Feature Releases • GDPR Dashboard A visualization for the end-user on the level of internal GDPR compliance in their environment • GDPR Value: Gain transparency into internal GDPR compliance activities and full environmental content coverage in a singular view • Redaction Capability Ability to surgically remove sensitive information from documents • GDPR Value: “Right to be forgotten” requires data controllers to have the ability to erase personal data on demand, even within documents in which that data is shared with other unique users who are not making the same demand, or may still serve a business purpose.
  • 30. 30 •GDPR Which questions do you have? Ragnar Heil, MVP Microsoft Alliances Manager EMEA Twitter: @ragnarh Email: rheil@metalogix.com
  • 31. 31 THANK YOU, SPONSORS! SHAREPOINT SATURDAY NORTH GERMANY 2018
  • 32. 32