SlideShare una empresa de Scribd logo
1 de 24
SACONSensitivity: Internal & Restricted
SACON International 2020
India | Bangalore | February 21 - 22 | Taj Yeshwantpur
Personal Data Discovery &
Mapping
#SACON
Ramkumar Narayanan
Wipro Limited
Practice Partner – Data Privacy
SACON 2020
Sensitivity: Internal & Restricted
1. Challenges in Building Data Map
2. Approach & Methodologies for Data Mapping
3. Tools & Technologies for Data Mapping
4. Sustenance of Data Mapping & Data Inventory
5. Case Studies
Agenda
SACON 2020
Sensitivity: Internal & Restricted
Challenges in Building Data
Map
SACON 2020
Sensitivity: Internal & Restricted
In a world of hyper connected ecosystem
✓ Personal data is generated and captured across
multiple channels.
✓ Personal data is proliferated across different
infrastructures and platforms.
Enterprise Storage Systems
Databases End Points
Cloud Unstructured
Data
✓ Personal data is being used and shared by many.
Organizations are unable to follow the footprint of data to apply required controls to protect personal data.
SACON 2020
Sensitivity: Internal & Restricted
The foundational step in data protection journey is to understand the
lifecycle of personal data
Understanding the flow of personal data in an enterprise is critical and is easier said than done.
SACON 2020
Sensitivity: Internal & Restricted
Need for data mapping and creating an inventory of personal data
• A data inventory is a record of the data flows and assets that an organization handles and a data map is a visual representation of the data
inventory. It is generated based on the same underlying data inventory, and the maps may contain varying degree of detail.
GDPR Requirements
Article 30 of GDPR requires data
controllers and data processors to build
and maintain a record of their data
processing activities.
01
Privacy Statements
To make privacy statements accurate
based on what the organization is doing
with the personal data.
Individual Rights Management
Data Privacy regulations gives individuals the ability
to request to correct, port, access and delete the
data organizations have about them.
02
04
Data Breach Preparation & Response
Having a data map can help respond more
appropriately to data breach and understand
what data may have been exposed.
05
Security
Understanding where the personal data
is located and flowing is the first step to
understand the security risks which
allows to implement appropriate
safeguards to be put in place.
03
Building a data inventory and map can help organizations proactively manage and protect personal data.
SACON 2020
Sensitivity: Internal & Restricted
However there are some challenges in building a data map
Challenges in
Building a Data
Map
Poor Information Available
Lack of Precision &
Expertise
Time Consuming
Outdated Quickly
Poor Information Available
Lack of knowledge available within the various business
teams in an enterprise about the data flows
Lack of Precision & Expertise
The accuracy of data mapping depends on how
comprehensive it is. It must account for things like
mobile devices and cloud based applications etc..
Time Consuming
Building data maps through an interview based
approach is time consuming.
Outdated Quickly
Data mapping patterns need to be constantly
updated, evaluated and verified for quality. If not it
becomes obsolete very quickly.
Need for an automated approach for data mapping & inventory
SACON 2020
Sensitivity: Internal & Restricted
Approach & Methodologies for
Data Mapping
SACON 2020
Sensitivity: Internal & Restricted
In order to build a data map and inventory, start with an understanding of
the 5W’s of personal data
“If you know the enemy and know yourself, you need not fear the result of a hundred battles.” – Sun Tzu, The Art of War
• are we?
(Controller or
Processor)
• are our data
subjects?
(Customers /
Employees etc.)
• are the categories
of recipients to
whom data will be
disclosed?
• do we keep their
personal data?
(Databases, File
Servers, Cloud
storage etc.)
• do we transfer their
personal data to?
(Jurisdictions)
• is personal data
under our control?
(purpose for which
data is collected and
stored)
• are we keeping the
personal data until?
(Retention Period)
• do we share
personal data with
others (Partners,
Regulators,
Governement
authorities etc.)
• data types are
involved in the
processing?
• jurisdictions are
involved in the
processing?
• technical security
measures and
organizational
security measures
do we have to
safeguard the
personal data?
WHO WHERE WHY WHEN WHAT
SACON 2020
Sensitivity: Internal & Restricted
There are 2 approaches to do data mapping in an enterprise
Top-Down Approach
QUESTIONNAIRE
INTERVIEWS
BUSINESS
PROCESS
DATA
ELEMENTS
DATA
DATA SOURCES
DATA
CLASSIFICATION
Bottom-Up Approach
DATA
ELEMENTS
DATA
DATA
DISCOVERY
SACON 2020
Sensitivity: Internal & Restricted
Leverage a combination of Top Down and Bottom Up approach for
building the data map and data inventory
Identify purpose of processing
(Example Customer Support,
Billing, Charge Calculation,
Marketing Research, Credit Check,
Goods & Services, Statistical
Analysis etc.
7 81 2 4 53 6
Identify Business Unit data
mapping owners from each of
the Business Units like Finance,
Consumer, Technology, Retail,
HR, Enterprise, Consumer
Operations etc.
Identify key stakeholders from each
business unit that have information
on the processing activities in each
purpose of processing
Capture information on the source
and location of personal data using
personal data discovery solutions,
the entry point for personal data,
format in which data is stored, where
is it getting stored, countries in which
it is getting stored, locations from
which it is accessed and to whom it
is being disclosed, retention etc.
Manage the data inventory and
data mapping in a Privacy
Management Platform or a GRC
solution to keep it alive in an
ongoing manner.
Identify Business Processes such
as customer acquisition,
Provisioning & Welcome, Customer
service, Billing, Collection &
Retention, Terminate, Recruitment,
Hiring, Pre-On-boarding, Post-
joining, Retire / Exit etc.
Conduct data mapping interviews to
Identify the categories of data
subjects (Consumer, Enterprise
customer, Subscriber, Employees
etc.) and sub categories of personal
data (Recruitment data, account
data, call data, location data, device
data etc.) processed
Document data maps & Validate
data flow and sign off on the
personal data inventory.
SACON 2020
Sensitivity: Internal & Restricted
Tools & Techniques for Data
Mapping
SACON 2020
Sensitivity: Internal & Restricted
Data Flow Mapping Techniques
Inspect existing
documents
Observation
Questionnaire
Post-it Notes
Template drawings
Facilitation Workshops
Whiteboard – Freeform Diagrams
SACON 2020
Sensitivity: Internal & Restricted
Automate the discovery of personal data in the enterprise
Data Discovery throughout the enterprise is easier said than done.
Data
Discovery
Personal Data Discovery
• Personal Data Discovery solutions
searches for personal data across the
enterprise and cloud and correlates them
to the identities. It relies on data values
and context to find primary and related
or connected data.
Types of Data Sources
• Structured Data Sources (Oracle,
MySQL, MSSQL, Redshift etc.
• Semi-Structured Data Sources
(Cassandra, MongoDB etc.)
• Unstructured (Google Drive, OneDrive,
O365, SharePoint, Salesforce etc.
PII Data Discovery
• PII Data Discovery solutions helps you
find Personally Identifiable Information
(PII) on enterprise systems based on
data values and data patterns (regular
expressions).
Types of Data Sources
• Structured
• Unstructured
SACON 2020
Sensitivity: Internal & Restricted
PII Data Discovery – Approach & Methodology
Challenges in PII Data Discovery
1. False Positives – Time consuming to eliminate them.
2. Discovery Output – Discovery output is what type of data, but not whose data it is.
3. Continuous Compliance – Compliance requirements are continuous and hence one time scans not sufficient.
PII Data Discovery Tools
SACON 2020
Sensitivity: Internal & Restricted
Personal Data Discovery – Approach & Methodology
• Personal Data Discovery solution is pointed to examples of whatever identity data being discovered.
• System uses seed data as learning set to then scan other data sources, initially looking for learned data and then other nearby data with high correlation
back to identities. The system then reiterates on this, building a map of individual’s data across all kinds of data sources ranging from database to file
share, to mainframe to Hadoop to SAP to cloud etc.
Agentless
Any data type
Cloud
Mine Machine Manage
API
Reporting
Analysis
Machine Learning
driven correlation
Personal Data Discovery Tools
SACON 2020
Sensitivity: Internal & Restricted
Tools Used for Data Mapping
Usage
Storage
Transfer
Archival
RetentionCollection
Collection
Purge
A visual representation of the end-to-end data
flows of personal information processing
activities identified across the enterprise.
Data Mapping Tools
SACON 2020
Sensitivity: Internal & Restricted
Create a “Single Source of Truth” for Personal Information Processing
Business units
/ functions
Business
process
Contracts
Supplier / 3rd party
vendor
PII processing
activity records
PII
Country Contacts Assets
Comprehensive Privacy Reporting
GRC Platform /
Privacy Management
Platform
Privacy
Governance
Alerts &
Notifications
Workflows
Metrics &
Reporting
Privacy Incident
Management
Breach
Notifications
DPO Report System / App Report Top 100 DB Report BU / Function ReportPIA Report
Privacy impact
Assessment(s)
Vendor Privacy
Questionnaire
Data Discovery
Scanning Feeds
Privacy
audits
Inventory Framework
• A comprehensive, accurate
and sustainable source of
information regarding the PII
that an enterprise holds, with
details of its collection, use,
disclosure, retention and
disposal
• Demonstrate compliance to
wider Privacy legal and
regulatory requirements with
the data privacy inventory
SACON 2020
Sensitivity: Internal & Restricted
Sustenance of Data Mapping
& Data Inventory
SACON 2020
Sensitivity: Internal & Restricted
Keep Your Data Map & Data Inventory Current
Integrate & Automate PIA / DPIA
process into Data Inventory
PIA / DPIA Integration
Conduct periodic audits to
ensure data flows remain up to
date. Re-audit certain data
flows or applications on a
different time scale.
Automate Audits
Leverage data discovery solutions to
dynamically populate the inventory
based on discovery scan output.
Ongoing Data Discovery
Get attestation of records in
data inventory by the record
owner
Record Attestation
Feed the ongoing vendor
assessments into the
inventory
Ongoing Vendor
Assessments Leverage technology to
automate the data flow
maps dynamically.
Update Visual Maps
SACON 2020
Sensitivity: Internal & Restricted
Case Studies
SACON 2020
Sensitivity: Internal & Restricted
SACON 2020
Sensitivity: Internal & Restricted
SACONSensitivity: Internal & Restricted
SACON International 2020
India | Bangalore | February 21 - 22 | Taj Yeshwantpur
Thank You

Más contenido relacionado

La actualidad más candente

How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...Ulf Mattsson
 
The emerging pci dss and nist standards
The emerging pci dss and nist standardsThe emerging pci dss and nist standards
The emerging pci dss and nist standardsUlf Mattsson
 
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Microsoft Österreich
 
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...Priyanka Aash
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
 
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...Micro Focus
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?Ulf Mattsson
 
How to secure your business on the cloud? practical approach from strategy to...
How to secure your business on the cloud? practical approach from strategy to...How to secure your business on the cloud? practical approach from strategy to...
How to secure your business on the cloud? practical approach from strategy to...Aladdin Dandis
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Martin Ruubel
 
Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Eryk Budi Pratama
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardYogeshIJTSRD
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm IJECEIAES
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Martin Ruubel
 
The day when role based access control disappears
The day when role based access control disappearsThe day when role based access control disappears
The day when role based access control disappearsUlf Mattsson
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Reducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesReducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesVISTA InfoSec
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud IdentityNetIQ
 
Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperMartin Ruubel
 

La actualidad más candente (20)

How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...
 
The emerging pci dss and nist standards
The emerging pci dss and nist standardsThe emerging pci dss and nist standards
The emerging pci dss and nist standards
 
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
 
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
How to secure your business on the cloud? practical approach from strategy to...
How to secure your business on the cloud? practical approach from strategy to...How to secure your business on the cloud? practical approach from strategy to...
How to secure your business on the cloud? practical approach from strategy to...
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...
 
Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption Standard
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
 
The day when role based access control disappears
The day when role based access control disappearsThe day when role based access control disappears
The day when role based access control disappears
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Reducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesReducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniques
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud Identity
 
Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime Whitepaper
 

Similar a (SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges faced, Methodologies & Tools employed​

Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Steven Meister
 
Unified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphUnified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphVaticle
 
From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011Castlebridge Associates
 
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...Stratio
 
DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?DevOps.com
 
Workable Enteprise Data Governance
Workable Enteprise Data GovernanceWorkable Enteprise Data Governance
Workable Enteprise Data GovernanceBhavendra Chavan
 
Fuel your Data-Driven Ambitions with Data Governance
Fuel your Data-Driven Ambitions with Data GovernanceFuel your Data-Driven Ambitions with Data Governance
Fuel your Data-Driven Ambitions with Data GovernancePedro Martins
 
Dark Data Revelation and its Potential Benefits
Dark Data Revelation and its Potential BenefitsDark Data Revelation and its Potential Benefits
Dark Data Revelation and its Potential BenefitsPromptCloud
 
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?Albert Hoitingh
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceKim Cook
 
data collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptxdata collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptxSourabhkumar729579
 
Simplify your analytics strategy
Simplify your analytics strategySimplify your analytics strategy
Simplify your analytics strategyPriya Malhotra
 
Deliver Data Governance with a “Yes”
Deliver Data Governance with a “Yes”Deliver Data Governance with a “Yes”
Deliver Data Governance with a “Yes”Jean-Michel Franco
 
Delivering data governance with a Yes
Delivering data governance with a YesDelivering data governance with a Yes
Delivering data governance with a YesJean-Michel Franco
 
DataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
DataOps - Big Data and AI World London - March 2020 - Harvinder AtwalDataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
DataOps - Big Data and AI World London - March 2020 - Harvinder AtwalHarvinder Atwal
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
Discovering Big Data in the Fog: Why Catalogs Matter
 Discovering Big Data in the Fog: Why Catalogs Matter Discovering Big Data in the Fog: Why Catalogs Matter
Discovering Big Data in the Fog: Why Catalogs MatterEric Kavanagh
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
 
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
KASHTECH AND DENODO: ROI and Economic Value of Data VirtualizationKASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
KASHTECH AND DENODO: ROI and Economic Value of Data VirtualizationDenodo
 

Similar a (SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges faced, Methodologies & Tools employed​ (20)

Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
 
Unified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphUnified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge Graph
 
From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
 
DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?
 
Workable Enteprise Data Governance
Workable Enteprise Data GovernanceWorkable Enteprise Data Governance
Workable Enteprise Data Governance
 
Fuel your Data-Driven Ambitions with Data Governance
Fuel your Data-Driven Ambitions with Data GovernanceFuel your Data-Driven Ambitions with Data Governance
Fuel your Data-Driven Ambitions with Data Governance
 
Dark Data Revelation and its Potential Benefits
Dark Data Revelation and its Potential BenefitsDark Data Revelation and its Potential Benefits
Dark Data Revelation and its Potential Benefits
 
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
data collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptxdata collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptx
 
Simplify your analytics strategy
Simplify your analytics strategySimplify your analytics strategy
Simplify your analytics strategy
 
Deliver Data Governance with a “Yes”
Deliver Data Governance with a “Yes”Deliver Data Governance with a “Yes”
Deliver Data Governance with a “Yes”
 
Delivering data governance with a Yes
Delivering data governance with a YesDelivering data governance with a Yes
Delivering data governance with a Yes
 
DataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
DataOps - Big Data and AI World London - March 2020 - Harvinder AtwalDataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
DataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Discovering Big Data in the Fog: Why Catalogs Matter
 Discovering Big Data in the Fog: Why Catalogs Matter Discovering Big Data in the Fog: Why Catalogs Matter
Discovering Big Data in the Fog: Why Catalogs Matter
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
 
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
KASHTECH AND DENODO: ROI and Economic Value of Data VirtualizationKASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
 

Más de Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

Más de Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Último

React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 

Último (20)

React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 

(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges faced, Methodologies & Tools employed​

  • 1. SACONSensitivity: Internal & Restricted SACON International 2020 India | Bangalore | February 21 - 22 | Taj Yeshwantpur Personal Data Discovery & Mapping #SACON Ramkumar Narayanan Wipro Limited Practice Partner – Data Privacy
  • 2. SACON 2020 Sensitivity: Internal & Restricted 1. Challenges in Building Data Map 2. Approach & Methodologies for Data Mapping 3. Tools & Technologies for Data Mapping 4. Sustenance of Data Mapping & Data Inventory 5. Case Studies Agenda
  • 3. SACON 2020 Sensitivity: Internal & Restricted Challenges in Building Data Map
  • 4. SACON 2020 Sensitivity: Internal & Restricted In a world of hyper connected ecosystem ✓ Personal data is generated and captured across multiple channels. ✓ Personal data is proliferated across different infrastructures and platforms. Enterprise Storage Systems Databases End Points Cloud Unstructured Data ✓ Personal data is being used and shared by many. Organizations are unable to follow the footprint of data to apply required controls to protect personal data.
  • 5. SACON 2020 Sensitivity: Internal & Restricted The foundational step in data protection journey is to understand the lifecycle of personal data Understanding the flow of personal data in an enterprise is critical and is easier said than done.
  • 6. SACON 2020 Sensitivity: Internal & Restricted Need for data mapping and creating an inventory of personal data • A data inventory is a record of the data flows and assets that an organization handles and a data map is a visual representation of the data inventory. It is generated based on the same underlying data inventory, and the maps may contain varying degree of detail. GDPR Requirements Article 30 of GDPR requires data controllers and data processors to build and maintain a record of their data processing activities. 01 Privacy Statements To make privacy statements accurate based on what the organization is doing with the personal data. Individual Rights Management Data Privacy regulations gives individuals the ability to request to correct, port, access and delete the data organizations have about them. 02 04 Data Breach Preparation & Response Having a data map can help respond more appropriately to data breach and understand what data may have been exposed. 05 Security Understanding where the personal data is located and flowing is the first step to understand the security risks which allows to implement appropriate safeguards to be put in place. 03 Building a data inventory and map can help organizations proactively manage and protect personal data.
  • 7. SACON 2020 Sensitivity: Internal & Restricted However there are some challenges in building a data map Challenges in Building a Data Map Poor Information Available Lack of Precision & Expertise Time Consuming Outdated Quickly Poor Information Available Lack of knowledge available within the various business teams in an enterprise about the data flows Lack of Precision & Expertise The accuracy of data mapping depends on how comprehensive it is. It must account for things like mobile devices and cloud based applications etc.. Time Consuming Building data maps through an interview based approach is time consuming. Outdated Quickly Data mapping patterns need to be constantly updated, evaluated and verified for quality. If not it becomes obsolete very quickly. Need for an automated approach for data mapping & inventory
  • 8. SACON 2020 Sensitivity: Internal & Restricted Approach & Methodologies for Data Mapping
  • 9. SACON 2020 Sensitivity: Internal & Restricted In order to build a data map and inventory, start with an understanding of the 5W’s of personal data “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” – Sun Tzu, The Art of War • are we? (Controller or Processor) • are our data subjects? (Customers / Employees etc.) • are the categories of recipients to whom data will be disclosed? • do we keep their personal data? (Databases, File Servers, Cloud storage etc.) • do we transfer their personal data to? (Jurisdictions) • is personal data under our control? (purpose for which data is collected and stored) • are we keeping the personal data until? (Retention Period) • do we share personal data with others (Partners, Regulators, Governement authorities etc.) • data types are involved in the processing? • jurisdictions are involved in the processing? • technical security measures and organizational security measures do we have to safeguard the personal data? WHO WHERE WHY WHEN WHAT
  • 10. SACON 2020 Sensitivity: Internal & Restricted There are 2 approaches to do data mapping in an enterprise Top-Down Approach QUESTIONNAIRE INTERVIEWS BUSINESS PROCESS DATA ELEMENTS DATA DATA SOURCES DATA CLASSIFICATION Bottom-Up Approach DATA ELEMENTS DATA DATA DISCOVERY
  • 11. SACON 2020 Sensitivity: Internal & Restricted Leverage a combination of Top Down and Bottom Up approach for building the data map and data inventory Identify purpose of processing (Example Customer Support, Billing, Charge Calculation, Marketing Research, Credit Check, Goods & Services, Statistical Analysis etc. 7 81 2 4 53 6 Identify Business Unit data mapping owners from each of the Business Units like Finance, Consumer, Technology, Retail, HR, Enterprise, Consumer Operations etc. Identify key stakeholders from each business unit that have information on the processing activities in each purpose of processing Capture information on the source and location of personal data using personal data discovery solutions, the entry point for personal data, format in which data is stored, where is it getting stored, countries in which it is getting stored, locations from which it is accessed and to whom it is being disclosed, retention etc. Manage the data inventory and data mapping in a Privacy Management Platform or a GRC solution to keep it alive in an ongoing manner. Identify Business Processes such as customer acquisition, Provisioning & Welcome, Customer service, Billing, Collection & Retention, Terminate, Recruitment, Hiring, Pre-On-boarding, Post- joining, Retire / Exit etc. Conduct data mapping interviews to Identify the categories of data subjects (Consumer, Enterprise customer, Subscriber, Employees etc.) and sub categories of personal data (Recruitment data, account data, call data, location data, device data etc.) processed Document data maps & Validate data flow and sign off on the personal data inventory.
  • 12. SACON 2020 Sensitivity: Internal & Restricted Tools & Techniques for Data Mapping
  • 13. SACON 2020 Sensitivity: Internal & Restricted Data Flow Mapping Techniques Inspect existing documents Observation Questionnaire Post-it Notes Template drawings Facilitation Workshops Whiteboard – Freeform Diagrams
  • 14. SACON 2020 Sensitivity: Internal & Restricted Automate the discovery of personal data in the enterprise Data Discovery throughout the enterprise is easier said than done. Data Discovery Personal Data Discovery • Personal Data Discovery solutions searches for personal data across the enterprise and cloud and correlates them to the identities. It relies on data values and context to find primary and related or connected data. Types of Data Sources • Structured Data Sources (Oracle, MySQL, MSSQL, Redshift etc. • Semi-Structured Data Sources (Cassandra, MongoDB etc.) • Unstructured (Google Drive, OneDrive, O365, SharePoint, Salesforce etc. PII Data Discovery • PII Data Discovery solutions helps you find Personally Identifiable Information (PII) on enterprise systems based on data values and data patterns (regular expressions). Types of Data Sources • Structured • Unstructured
  • 15. SACON 2020 Sensitivity: Internal & Restricted PII Data Discovery – Approach & Methodology Challenges in PII Data Discovery 1. False Positives – Time consuming to eliminate them. 2. Discovery Output – Discovery output is what type of data, but not whose data it is. 3. Continuous Compliance – Compliance requirements are continuous and hence one time scans not sufficient. PII Data Discovery Tools
  • 16. SACON 2020 Sensitivity: Internal & Restricted Personal Data Discovery – Approach & Methodology • Personal Data Discovery solution is pointed to examples of whatever identity data being discovered. • System uses seed data as learning set to then scan other data sources, initially looking for learned data and then other nearby data with high correlation back to identities. The system then reiterates on this, building a map of individual’s data across all kinds of data sources ranging from database to file share, to mainframe to Hadoop to SAP to cloud etc. Agentless Any data type Cloud Mine Machine Manage API Reporting Analysis Machine Learning driven correlation Personal Data Discovery Tools
  • 17. SACON 2020 Sensitivity: Internal & Restricted Tools Used for Data Mapping Usage Storage Transfer Archival RetentionCollection Collection Purge A visual representation of the end-to-end data flows of personal information processing activities identified across the enterprise. Data Mapping Tools
  • 18. SACON 2020 Sensitivity: Internal & Restricted Create a “Single Source of Truth” for Personal Information Processing Business units / functions Business process Contracts Supplier / 3rd party vendor PII processing activity records PII Country Contacts Assets Comprehensive Privacy Reporting GRC Platform / Privacy Management Platform Privacy Governance Alerts & Notifications Workflows Metrics & Reporting Privacy Incident Management Breach Notifications DPO Report System / App Report Top 100 DB Report BU / Function ReportPIA Report Privacy impact Assessment(s) Vendor Privacy Questionnaire Data Discovery Scanning Feeds Privacy audits Inventory Framework • A comprehensive, accurate and sustainable source of information regarding the PII that an enterprise holds, with details of its collection, use, disclosure, retention and disposal • Demonstrate compliance to wider Privacy legal and regulatory requirements with the data privacy inventory
  • 19. SACON 2020 Sensitivity: Internal & Restricted Sustenance of Data Mapping & Data Inventory
  • 20. SACON 2020 Sensitivity: Internal & Restricted Keep Your Data Map & Data Inventory Current Integrate & Automate PIA / DPIA process into Data Inventory PIA / DPIA Integration Conduct periodic audits to ensure data flows remain up to date. Re-audit certain data flows or applications on a different time scale. Automate Audits Leverage data discovery solutions to dynamically populate the inventory based on discovery scan output. Ongoing Data Discovery Get attestation of records in data inventory by the record owner Record Attestation Feed the ongoing vendor assessments into the inventory Ongoing Vendor Assessments Leverage technology to automate the data flow maps dynamically. Update Visual Maps
  • 21. SACON 2020 Sensitivity: Internal & Restricted Case Studies
  • 24. SACONSensitivity: Internal & Restricted SACON International 2020 India | Bangalore | February 21 - 22 | Taj Yeshwantpur Thank You