You are on page 1of 6

The GDPR countdown

is in its final stages


Four months to go
Are you ready?
GDPR will soon impact everything from your people to processes and technology.
With just four months until GDPR launches, how ready are you?

Plan your time. Know where to focus. GDPR = better business Explore four steps to better information
visibility and protection to help make
Deploy the right technology now. Remember, any technologies you deploy to support GDPR your business more competitive
Our Symantec GDPR Planner helps you understand: compliance now will help you improve your overall security
stance when the new regulations come into effect. So get
oo Your readiness as an organisation out in front of the changes now to build a better, more
oo The risks you could be exposed to competitive business.
oo Practical, actionable steps you can take right
now to help prepare your organisation for GDPR.
Step 01
Prepare
If you can’t see your data you can’t protect it.

Better business concept


If you know the data you have, who uses it and how,
you can more effectively support competitive advantage.
What are the biggest compliance
Readiness test
implications for your data security Do you know where all your data resides in order to assess
and privacy? Do you have full visibility whether it’s compliant with GDPR? This will also help you
over the personal data you possess, understand whether a breach or misuse of data could occur. However, Symantec can help you expedite
the process using the following steps:
both structured and unstructured, Immediate GDPR project oo Find complex, sensitive data in structured or unstructured
irrespective of where it is? Data Discovery & Risk Assessment environments with Symantec Data Loss Prevention.
Identify what is personal data and where it is in your cloud/ oo Extend this visibility to legitimate and shadow cloud apps
on-premise environments. This should involve working with by integrating Symantec CloudSOC, our Cloud Access
all departments to understand what data they use, store, Security Broker (CASB) solution with DLP.
share and transact.
oo Perform a GDPR specific risk assessment using
Symantec Control Compliance Suite (CCS).
This helps you identify, prioritise and manage
the most significant risk and track improvements.
oo Prepare for the latest threats with Symantec
Threat Intelligence.
Step 02
Protect
If data is left on unsecured systems, or simply exposed Factors to consider – and how Symantec can help you
by accident, it is at risk of non-compliance. keep data safe:
oo Identify personal data and stop it being sent to the wrong
Better business concept
person with DLP, CASB and Secure Web Gateway (SWG).
Retain the value of your data in-house. Losing control of data
oo Enable only the right people to access your data
Is your data adequately protected risks fines, damage to brand reputation, and lost revenue.
systems with Symantec Validation & ID Protection
against both internal and external Readiness test (VIP), CASB and SWG.
attack and misuse? Can you protect your IT systems from both internal and oo Prevent malware being used to take over your data
external attacks? Can you make sure authorised people systems by protecting endpoints, servers, networks
can access the data they need – from employees to and gateways from advance attacks with Symantec
contractors and suppliers – while keeping data from Endpoint Protection (SEP), Symantec Advanced Threat
falling into the wrong hands? And if it did, could you Protection (ATP) and SWG.
render the data unusable?
oo Make breached data unintelligible and useless to thieves
Immediate GDPR project with tokenisation technology, such as Symantec Cloud
Data Protection, and Symantec Information Centric
Data Protection Audit
Encryption (ICE).
Now that you know where all your data is, you must evaluate
oo Reduce system vulnerability by using patch
whether the right technologies and processes are in place
management with Symantec IT Management Suite.
to help you control access to your data systems.
Step 03
Detect
Readiness test
Can you rely upon your existing, traditional cyber defences
to pinpoint an attack in real-time and protect your personal
data assets? Can those systems ‘learn’ from past attacks
to better protect your organisation in future?
Would you be able to detect advanced
Immediate GDPR project
and stealthy threats that are active in
Cyber Security Tech Review
your environment? Could you detect
Evaluate your current cyber security estate to establish
and assess the scale of a data breach whether the technologies you have in place provide an Here’s how Symantec can help you to be proactive
as it’s taking place? integrated, real-time defence, purpose-built for the era in defending against advanced threats:
of advanced persistent threats. In other words, those oo Monitor for and pinpoint advanced threats before they
complex malwares that are designed to evade traditional exfiltrate data using advanced detection techniques such
Data breaches must be declared. Failure to comply can signature-based security. Identify all vulnerabilities and as machine learning, sandboxing, user behaviour analysis
lead to significant fines – up to 4% annual worldwide gaps. Work with an expert partner who will help you to and traffic correlations between endpoint and websites.
turnover or €20 million, whichever is higher. create a holistic, integrated approach.
oo Build unified protection against advanced threats.
Symantec Managed Security Services (MSS), Symantec
Better business concept CCS (as deployed in the PREPARE phase), Symantec
Allowing advanced malware to live on your systems Security Analytics, Symantec Advanced Threat Protection,
risks valuable data being exfiltrated and competitive Secure Web Gateway with Content Analysis and Malware
advantage eroded. Analysis delivering improved visibility and forensics.
Step 04
Respond
You must notify the authorities (and sometimes Immediate GDPR project
affected individuals) promptly, and at least within Incident Response Plan
72 hours of a breach.
Put the technology and escalation processes in place to stop
According to Article 34.3 (a), if you experience a breach a breach, mitigate the impacts, and report it. Your report
that is likely to result in a ‘high risk’ to the rights of the to authorities must include likely consequences of the
Can you respond quickly to incidents, individuals, you are not obliged to report it if the data breach and the action you will take to mitigate adverse
mitigate the impact and the future risk? was encrypted. consequences to the data subjects.
Could you afford to pay up to 4% annual Better business concept Possible actions and how Symantec can support you:
worldwide turnover or €20 million for Being able to respond quickly in the event of a breach oo Automatically identify, quarantine and remove the source
failure to report an incident? prevents undue loss of data and builds brand trust. of the responsible breach with Symantec Advanced
Threat Protection and malware remediation. Then tell
Readiness test
responders what action to take.
Can you stop a breach quickly following its detection?
Assess the systems and data that have been compromised oo Gather the insights you need in order to understand
and report on how you can remedy the situation? the full context of a breach before, during and after
it happened. Symantec Security Analytics gives you
the forensic information to understand how the breach
occurred, what data was affected and what you need to
do to resolve the situation. Symantec Incident Response
Services can provide help to contain, remediate and
inform people about an incident quickly.
Next
Actions
Even with just four months to go, it’s not too late to prepare
for GDPR. Even if you’re not completely ready by 25th May
2018 there’s still time to make your plans.
Don’t waste another minute, our experts are on hand right
now to support you through the first steps of your journey –
you don’t have to do it alone.

For more ideas and support


Click here
The materials contained in this presentation are not intended to provide,
and do not constitute or comprise, legal advice on any particular matter
and are provided for general information purposes only.
You should not act or refrain from acting on the basis of any material
contained in this presentation, without seeking appropriate legal or
other professional advice.

© 2018 Symantec Corporation

You might also like