23
DATA PROTECTION FOR PUBLIC SERVICE INDUSTRY IN THE ERA OF BIG DATA Clas Neumann Senior Vice President, SAP

DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

DATA PROTECTION FOR

PUBLIC SERVICE INDUSTRY

IN THE ERA OF BIG DATA

Clas NeumannSenior Vice President, SAP

Page 2: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

2

Digitalization

changes everything faster than ever

Page 3: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

SECURITY RISK ALL TIME HIGH

$2.8 trillionGDP increase from online data flows

521.000 PBof data storage capacity to be

shipped by 2020

50 billiondevices connected by 2020

65%of companies surveyed experienced more

advanced persistent threats and attacks

Sheer number and

Sophistication of attacks

.

Dramatic increase in the

Value of data

Exponential Volume

of data

Increasing Vulnerability

of endpointsSecurity

risk

Source: Gemalto, Breach Level Index (BLI).

Page 4: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

INCREASING COST OF CYBERCRIME

Source: Accenture & Ponemon Institute, “The Cost of Cybercrime”, 2019

Page 5: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

WORLD’S BIGGEST BREACHES

Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

select losses greater than 30,000 data records

Page 6: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

Secure Data Protection with

Regulatory Compliance and

Frameworks数据保护合规与最佳实践

Page 7: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

GLOBAL CYBERSECURITY REGULATIONSChinaCyber Security Law,

KoreaData localization laws for

certain industries

Russia1. Federal Law on CII Security

2.Draft Sovereign Internet Law

IndiaDraft Personal Data Protection

Bill

AustraliaCII Security Act

IndonesiaInformation and

Electronic

Transaction Law

VietnamCyber Security Law

BrazilBrazilian General

Data Protection Act

U.S.1.Cybersecurity

Information Sharing

Act

2.CLOUD Act

EU1. GDPR

2.Cybersec

urity Act

Saudi ArabiaEssential Cybersecurity Controls

Policy

UAEData

Protection

Law

Singapore Cyber Security Bill

South AfricaCybercrimes and

Cybersecurity Bill

Page 8: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

THE EU GDPR

The General

Data

Protection

Regulation

(GDPR) gives

Individuals

Control and

Protection of

Personal

Data

Page 9: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

THE CHINA CYBERSECURITY LAW

Secto

rial R

ule

s Insurance Industry Implementation

Banking Industry Implementation

Civil Aviation Industry Implementation

Other Pipelined Sectorial Implementation

Securities and Fund Industry Implementation

Internet Vehicle Industry Implementation

• Preserve National Security/Cyber Sovereignty

• Protect Societal Public Interest and Lawful Rights

• Foster Strong Local Industries

Ho

rizo

nta

l Ru

les

Cybersecurity

Review

Cross-border

Data Flow

Cloud Computing

Regulation

Standardization

& Certification

Data Protection/

Privacy

Cyber Security Law- The Umbrella Law of China Cyber Security Policy

Page 10: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

PERSONAL INFORMATION PROTECTION

Came into force 1st

May2018Came into force 16th

April 2019

Personal Information

Protection Specification

(PISS 1.0)

Guideline on Personal

Information Security

Protection

(MPS Guideline)

Draft released on 2nd

Feb 2019Timeline

Personal Information

Protection Law

First draft to be released in 2020

Ensure transparency and industry participation in creation and drafting of privacy and personal data

protection measures for China

Advocacy

Guideline

Personal Information

Protection Specification

(PISS 2.0)

Page 11: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

DATA PROTECTION FRAMEWORK

Data management and operational

governance

Protect the business, establish economies of scale,

mitigate compliance risk and build trust into the

foundation of your operations

Foundation for data protection and privacy

Ensure your systems meet data protection and

privacy standards

Visibility on your data privacy landscape

Uncover any risk exposure and areas to improve people’s experience in your

current data protection and privacy systems, processes and governance

Increase trust with your customer

Empower user transparency & control to build trust

Optimize

Governance

Modernize

Systems

Continuous

Assessment

Trusted

Relationships

Best Practice in the Journey to Protect Data and Privacy

Page 12: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

12

Safeguards Cybersecurity with Technology and Solutions运用科技与解决方案保护网络安全

Page 13: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

TECHNOLOGY SOLUTION FOR SECURITY

Continuous

Assessment

Analytics and Operations

Governance, Risks and Compliance

Control

Application Security

Endpoint Security

Data and Platform Security

AI/MLIoT Analytics

Intelligent

Technology

Identity and Access Management

Page 14: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

Picture Credit | UCB, Brussels. Used with permission.

“Without data protection, you cannot scale an

IoT deployment into production. But with the

security system in place that we and SAP

developed, we can detect any intrusion and

receive an alarm in real time.”Patrick Duverger, CIO, City of Antibes

200Miles of water pipeline

2,000Sensors

15,000Data points per hour

How Can IoT Help Turn a Famous

Resort Town into a Smarter City?

Page 15: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

Picture Credit | UCB, Brussels. Used with permission.

How Is a Biopharma Company

Keeping Data and Systems Safe for

Staff, the Business, and Customers?

“We have a lot of users on our SAP systems, so

maintaining security is a top priority. SAP provided us

with detailed reports on how to reduce the number of

users by giving required authorizations. We now have a

solid security strategy in place to protect our users, our

business, and our customers.”Nevenka Voutchkova-Kadurina, IT SAP Security and Authorizations Lead, UCB S.A.

55% Security setting improvement 70% manual effort reduced to

verify security compliance

Page 16: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

SECURITY CORNERSTONES AT SAP

Security incorporated

into applications,

delivering ultimate

protection for content

and transactions

End-to-end secure

cloud operations,

defense of customer

data and business

operations

Defendable

Application

Zero

Knowledge

Zero

Vulnerability

Security

by Default

Intelligent

Infrastructure

Protection

Perceptive

Data Shield

Security

by Default

Security

Shielded

Ecosystem

Security

Culture

Secure

Environments

Business

Continuity

Security-aware staff, end-to-end physical security of

assets, and a comprehensive business continuity

framework

Transparency

Page 17: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

DOUBLE EDGE SWORD OF TECHNOLOGY

Machine Learning in Prediction vs. Manipulation

GIBBONPANDAImages by Jakubovitz, Giryes (2018)

Event Streams

…and more

Numerical

Spatial

Graph

Text

Image

Training Classification

Data PredictionModel

Page 18: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

Trust and Trusted

Data is the

Ultimate Shield

数字时代基于信任

Page 19: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

Picture Credit | UCB, Brussels. Used with permission.

Make Security a Top-Tier Responsibility

charter-of-trust.com

We can’t expect people to

actively support the digital

transformation if we cannot

TRUST in the security of data

and networked systems.

Source: Chart of Trust (2019)

Page 20: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

COLLABORATION FOR BETTER SECURITY

Compliance Best Practice

CCSL Working GroupsIndustry Security

Consortium

Technology

Know-how

Domain

Expertise

Technical Committees

(E.g. TC260)

Technical Standards

Industry Standards

EnterprisesGovernments

Institutes

Viability

Business

Sustainability

Compliance

Feasibility

Technology

BE READY FOR

• Secure Data

• Secure Business

• Secure Government

Page 21: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

SECURE

DIGITAL

TRANS-

FORMATION

保障安全的

数字化转型

INVEST IN REGULATORY COMPLIANCE AND

DEVELOP BEST PRACTICE FRAMEWORKS

投入网络安全合规,探索最佳业务实践

APPLY TECHNOLOGY AND SECURITY SOLUTION

ADVANCEMENT

运用科技与网络安全方案的最新发展

BUILD TRUSTED DIGITAL ECONOMY

建立可信任的数字经济

Page 22: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

22

让世界运转更卓越让人们生活更美好

Help the World Run Better

Improve People’s Life

Page 23: DATA PROTECTION FOR PUBLIC SERVICE …...Information Sharing Act 2.CLOUD Act EU 1. GDPR 2.Cybersec urity Act Saudi Arabia Essential Cybersecurity Controls Policy UAE Data Protection

THANKS