SlideShare una empresa de Scribd logo
1 de 18
Securing
Your Data
Lessons Learned from Ashley Madison
John Q Martin
Sales Engineer
Twitter: @SQLServerMonkey
Email: jmartin@sqlsentry.com
Blog: http://blogs.sqlsentry.com/author/JohnMartin/
Thank you to our sponsors
Introduce Yourself
• John Q Martin
Working with data in many forms
for more than a decade as a
consultant and numerous
operational IT roles and industries.
Agenda
Current landscape
Important Concepts
Compliance
CurrentLandscape
Criminal, State Sponsored, Vigilante, Corporate Espionage
Mobile, Dynamic, Agile workforce
Data Everywhere
Sharp focus on privacy
HighProfileDataBreaches
TalkTalk
Ashley Madison
Sony
Starwood Hotels
WhatisaDataBreach?
“a breach of security leading to the accidental or
unlawful destruction, loss, alteration,
unauthorised disclosure of, or access to, personal
data transmitted, stored or otherwise processed
in connection with the provision of a public
electronic communications service”
Personal data breach definition – UK Information Commissioner's office.
TheWork-Anywhereculture
Education
•What are you working on
•Simple precautions
Think Privacy
•Privacy screen filters for devices
•Select the right location
Workingwithdata
Where does it reside
•Are there limitations on where it can be sent
•How do you transport it
Protective Markings
•Tag your visualizations & data
Compliance
Understand if you need to comply
•Industry Standards
•Legislation Based
Understand how data is classified
•What can be stored, retained, and displayed
•What were the capture T&C’s
Compliance|UKDPA
Eight Key Data Protection Principles
• Used fairly and lawfully.
• Used for limited, specifically stated
purposes.
• Used in a way that is adequate,
relevant and not excessive
• Not transferred outside the
European Economic Area without
adequate protection
• Accurate
• Kept for no longer than is
absolutely necessary.
• Handled according to people’s data
protection rights
• Kept safe and Secure
Compliance|UKDPA
Eight Key Data Protection Principles
• Used fairly and lawfully.
• Used for limited, specifically stated
purposes.
• Used in a way that is adequate,
relevant and not excessive
• Not transferred outside the
European Economic Area without
adequate protection
• Accurate
• Kept for no longer than is
absolutely necessary.
• Handled according to people’s data
protection rights
• Kept safe and Secure
Compliance|UKDPA
“any set of information relating to individuals to
the extent that, although the information is not
processed by means of equipment operating
automatically in response to instructions given
for that purpose, the set is structured, either by
reference to individuals or by reference to criteria
relating to individuals, in such a way that specific
information relating to a particular individual is
readily accessible.”
What type of information is protected by the Data Protection Act? – UK Information Commissioner's office.
Controlling,Processing,Sharing
Do you have a duty of care
•What are you working on
•Simple precautions
Who else can see the data
•Shoulder Surfing
•Granted access via sharing
Summary
Appropriate options
Protective Markings
Understand compliance requirements
Selective Sharing
Questions?
Thank You!
Securing your Data, Reporting Recommended Practices

Más contenido relacionado

La actualidad más candente

Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summit
administrator_confidis
 

La actualidad más candente (20)

Information Sharing and Protection
Information Sharing and ProtectionInformation Sharing and Protection
Information Sharing and Protection
 
Cloud computing - When is Deletion Deletion?
Cloud computing - When is Deletion Deletion?Cloud computing - When is Deletion Deletion?
Cloud computing - When is Deletion Deletion?
 
Privacy Discusssion GM667 Saint Mary's University of MN
Privacy Discusssion GM667  Saint Mary's University of MNPrivacy Discusssion GM667  Saint Mary's University of MN
Privacy Discusssion GM667 Saint Mary's University of MN
 
The Future Matters - Mike Maiorana
The Future Matters - Mike MaioranaThe Future Matters - Mike Maiorana
The Future Matters - Mike Maiorana
 
Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summit
 
Managing Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebManaging Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social Web
 
Federal and Private Sector Joint Venture Partnership for Data Innovation - Av...
Federal and Private Sector Joint Venture Partnership for Data Innovation - Av...Federal and Private Sector Joint Venture Partnership for Data Innovation - Av...
Federal and Private Sector Joint Venture Partnership for Data Innovation - Av...
 
David Smith gfke 2014
David Smith gfke 2014David Smith gfke 2014
David Smith gfke 2014
 
Employee monitoring updated
Employee monitoring updatedEmployee monitoring updated
Employee monitoring updated
 
Security overview at Lancaster University
Security overview at Lancaster UniversitySecurity overview at Lancaster University
Security overview at Lancaster University
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
What are health-y data and why are they tricky to publish?
What are health-y data and why are they tricky to publish?What are health-y data and why are they tricky to publish?
What are health-y data and why are they tricky to publish?
 
Data protection act
Data protection actData protection act
Data protection act
 
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
 
Do law enforcement agencies have an obligation to communicate?
Do law enforcement agencies have an obligation to communicate?Do law enforcement agencies have an obligation to communicate?
Do law enforcement agencies have an obligation to communicate?
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision Making
 
The GDPR Armageddon – One year on
The GDPR Armageddon – One year onThe GDPR Armageddon – One year on
The GDPR Armageddon – One year on
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 

Similar a Securing your Data, Reporting Recommended Practices

Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)
brentcarey
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
Rodonoghue72
 

Similar a Securing your Data, Reporting Recommended Practices (20)

Secure Lab at the UK Data Service
Secure Lab at the UK Data ServiceSecure Lab at the UK Data Service
Secure Lab at the UK Data Service
 
Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Functional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentFunctional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environment
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
The Cloud Security Rules
The Cloud Security RulesThe Cloud Security Rules
The Cloud Security Rules
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
 
Get you and your business GDPR ready
Get you and your business GDPR readyGet you and your business GDPR ready
Get you and your business GDPR ready
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
 

Más de John Martin

Más de John Martin (9)

Tips for managing a VLDB
Tips for managing a VLDBTips for managing a VLDB
Tips for managing a VLDB
 
Always On Availability Group Maintenance Operations
Always On Availability Group Maintenance OperationsAlways On Availability Group Maintenance Operations
Always On Availability Group Maintenance Operations
 
Always On, Multi-Site Design Considerations
Always On, Multi-Site Design ConsiderationsAlways On, Multi-Site Design Considerations
Always On, Multi-Site Design Considerations
 
Building and configuring sql server; Some Recommended Practices.
Building and configuring sql server; Some Recommended Practices.Building and configuring sql server; Some Recommended Practices.
Building and configuring sql server; Some Recommended Practices.
 
Monitoring sql server
Monitoring sql serverMonitoring sql server
Monitoring sql server
 
Microsoft Azure, My First IaaS
Microsoft Azure, My First IaaSMicrosoft Azure, My First IaaS
Microsoft Azure, My First IaaS
 
SQL Server 2016 AlwaysOn Availability Groups New Features
SQL Server 2016 AlwaysOn Availability Groups New FeaturesSQL Server 2016 AlwaysOn Availability Groups New Features
SQL Server 2016 AlwaysOn Availability Groups New Features
 
SQL Server 2016 New Features and Enhancements
SQL Server 2016 New Features and EnhancementsSQL Server 2016 New Features and Enhancements
SQL Server 2016 New Features and Enhancements
 
Upgrading & Migrating SQL Sever - Southampton SQL Server user group 05/02/2014
Upgrading & Migrating SQL Sever - Southampton SQL Server user group 05/02/2014Upgrading & Migrating SQL Sever - Southampton SQL Server user group 05/02/2014
Upgrading & Migrating SQL Sever - Southampton SQL Server user group 05/02/2014
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Securing your Data, Reporting Recommended Practices

  • 1. Securing Your Data Lessons Learned from Ashley Madison John Q Martin Sales Engineer Twitter: @SQLServerMonkey Email: jmartin@sqlsentry.com Blog: http://blogs.sqlsentry.com/author/JohnMartin/
  • 2. Thank you to our sponsors
  • 3. Introduce Yourself • John Q Martin Working with data in many forms for more than a decade as a consultant and numerous operational IT roles and industries.
  • 5. CurrentLandscape Criminal, State Sponsored, Vigilante, Corporate Espionage Mobile, Dynamic, Agile workforce Data Everywhere Sharp focus on privacy
  • 7. WhatisaDataBreach? “a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed in connection with the provision of a public electronic communications service” Personal data breach definition – UK Information Commissioner's office.
  • 8. TheWork-Anywhereculture Education •What are you working on •Simple precautions Think Privacy •Privacy screen filters for devices •Select the right location
  • 9. Workingwithdata Where does it reside •Are there limitations on where it can be sent •How do you transport it Protective Markings •Tag your visualizations & data
  • 10. Compliance Understand if you need to comply •Industry Standards •Legislation Based Understand how data is classified •What can be stored, retained, and displayed •What were the capture T&C’s
  • 11. Compliance|UKDPA Eight Key Data Protection Principles • Used fairly and lawfully. • Used for limited, specifically stated purposes. • Used in a way that is adequate, relevant and not excessive • Not transferred outside the European Economic Area without adequate protection • Accurate • Kept for no longer than is absolutely necessary. • Handled according to people’s data protection rights • Kept safe and Secure
  • 12. Compliance|UKDPA Eight Key Data Protection Principles • Used fairly and lawfully. • Used for limited, specifically stated purposes. • Used in a way that is adequate, relevant and not excessive • Not transferred outside the European Economic Area without adequate protection • Accurate • Kept for no longer than is absolutely necessary. • Handled according to people’s data protection rights • Kept safe and Secure
  • 13. Compliance|UKDPA “any set of information relating to individuals to the extent that, although the information is not processed by means of equipment operating automatically in response to instructions given for that purpose, the set is structured, either by reference to individuals or by reference to criteria relating to individuals, in such a way that specific information relating to a particular individual is readily accessible.” What type of information is protected by the Data Protection Act? – UK Information Commissioner's office.
  • 14. Controlling,Processing,Sharing Do you have a duty of care •What are you working on •Simple precautions Who else can see the data •Shoulder Surfing •Granted access via sharing
  • 15. Summary Appropriate options Protective Markings Understand compliance requirements Selective Sharing

Notas del editor

  1. Ref: https://ico.org.uk/for-organisations/guide-to-pecr/communications-networks-and-services/security-breaches/
  2. Ref: https://ico.org.uk/for-organisations/guide-to-data-protection/key-definitions/
  3. Important to remember that when you share a PowerBI Dashboard that those you share it with will have the same rights as you when viewing the Dashboard. Be careful what you share with others as they might not have access for a reason.