Integrated solution helps organizations gain visibility, take action and assume control over personally identifiable information under management
MOUNTAIN VIEW, Calif. – Veritas Technologies, the leader in information management, today unveiled an integrated solution that will help organizations directly address the forthcoming General Data Protection Regulation (GDPR). This solution gives enterprises around the world the ability to understand what personally identifiable information (PII) they hold on European Union (EU) residents and access that information quickly when requested by employees or consumers. It also provides a systematic way for organizations to protect PII from breach, loss or damage. These elements are critical mandates required by the new regulation.
The solution comes at a time when many businesses around the world either don’t know how to prepare for the new regulation or are underestimating the effort needed to become compliant. New research commissioned by Veritas shows that less than a third (31 percent) of organizations meet the minimum GDPR requirements today, despite the fact that the regulations take effect in just over a year’s time.
With maximum fines set at the greater amount of €20 million or four percent of annual turnover, the penalties for non-compliance are severe. Also, this is not just an issue for companies based in the EU. It applies to any business around the world that interacts with EU residents and holds their personal data.
With this in mind, Veritas has launched 360 Data Management for GDPR. It includes an array of comprehensive advisory services and integrated software technologies. These not only help companies jump-start their compliance journey, but help maintain compliance at every turn moving forward.
Key components of the 360 Data Management for GDPR Solution include:
- Providing expert guidance where and when it’s needed the most: Veritas has established a new advisory service designed to educate and transfer knowledge to global legal, compliance, and privacy teams as to how the solution can help meet the GDPR challenge. This expert team is chartered to facilitate GDPR workshops, conduct GDPR-readiness assessments, and implement core GDPR-specific technologies.
- Locating data for GDPR compliance: New regulations mandate that businesses must locate PII within a very short time frame. Veritas metadata analytics provides accurate data maps so companies can easily determine where personal and sensitive information is stored, who has access to it, and how long it is being retained. Companies can then take action on the data if required.
- Searching data for GDPR compliance: With GDPR, European residents have a right to obtain a personal copy of the data companies hold on them. Veritas machine learning technology can easily uncover directly and indirectly identifiable personal data to ensure individuals’ rights are met, including “right to be forgotten” requests. Additionally, Veritas’ easy-to-use eDiscovery tools help companies search, analyze, and produce relevant data to quickly satisfy requests pertaining to all regulatory and legal matters.
- Minimizing data for GDPR compliance: Under GDPR regulations, companies will need to retain regulated information. However, they also need to delete non-essential data on a regular basis. Through Veritas personal data classification offerings, companies can set policies that helps businesses retain the right information and delete the rest, helping to adhere to strict compliance guidelines.
- Protecting data for GDPR compliance:With GDPR, companies must have the right tools in place to protect data from loss, damage or breach. Veritas unified data protection delivers an end-to-end audit trail that demonstrates data protection and resiliency protocols are being met. Additionally, these data protection offerings are infrastructure agnostic, and work across on-premise, cloud and hybrid environments, giving businesses added flexibility to address compliance regulations.
- Monitoring data for GDPR compliance: When the GDPR takes effect, data controllers and data processors are required to file a data breach notification within 72 hours of an incident. Veritas predictive threat analytics helps companies automatically identify anomalous behavior and facilitates single-click investigations.
“This is not just an issue for EU companies,” said Carla Arend, senior program director at IDC. “This regulation impacts any organization that holds data concerning individual EU data subjects. This can be anything from a shopping history to employee records. It is imperative that companies immediately begin deploying solutions that will help them understand exactly what information they hold and let them manage that data in a compliant manner.”
“360 Data Management for GDPR plays a key role in helping companies accelerate their digital transformation strategies,” said Mike Palmer, executive vice president and chief product officer at Veritas. “At a time when data is your most critical business asset, giving companies capabilities that let them understand and gain valuable insights about their information provides advantages that go well beyond compliance. It can spur product and service development, as well as help them build loyalty as consumers begin to accept organizations as trusted custodians of their PII. This is an important transformational step towards a nimbler and digitally-driven operation.”
Learn more about Veritas GDPR solutions here.
Whether you’re looking to hire a business continuity expert, or you’re training to become one, this guide will help you determine the qualifications and experience that are required
Before we get into certifications or BCM specific qualifications, let’s review the important non-BCM skills that make an effective BCM professional.
- Business function experience or technical IT experience. This is a must. Business Continuity is about business, and without basic business function knowledge and experience, guiding departments and interfacing with IT areas will be challenging.
- Project management experience. You do not necessarily need a certified project manager, but you do need someone who is familiar with project management concepts and project organization. In the end, BCM is a program and requires organizational skills.
- Interpersonal skills. Effective BCM programs must work with multiple levels of an organization, so the ability to communicate across all levels, as well as to understand and address concerns and pushback are necessary for success.
- Flexibility and adaptability. Organizational needs change over time, and a demonstrated ability to be flexible in both process and problem solving will help identify solutions to BCM issues surrounding implementation, documentation, and governance.
Got data? But more to the point, got the RIGHT data, and now? Low-friction and fast access to data are top priorities for data/analytics and marketing professionals in 2017. Here’s the picture of priorities: It’s a high or critical priority for 70% of marketing pros to increase their use of data and analytics for marketing measurement and customer insights – their fourth highest priority. Data and analytics pros’ highest priority – at 60% of data and analytics pros – is implementing or expanding their complete view of the customer across channels, and over 50% are providing self-service data preparation tools to business users. Firms are stepping up the pace.
What can help with these priorities? Data preparation tools. To accelerate time-to-insights and therefore time-to-actions, business end users and analysts who today wrangle data in spreadsheets or other traditional tools need direct access to data and a significant power assist. Data preparation tools can provide this power, but they must balance features and functions to support different roles and use cases and enable appropriate manageability, security, and governance in today's enterprises — while at the same time delivering speed-to-value.
The concept of cyber threat intelligence is really not much different from other areas of the intelligence field. In national security, intelligence gathering techniques seek to detect potential situations and draw conclusions that enable people to take action before anything serious occurs. Similarly, cyber threat intelligence is only one tool in the security arsenal. Used well, it can warn companies that the bad guys are active inside their network and what they are looking for. It points out unusual patterns to look for in systems and other valuable data. But it won’t stop an attack. That takes human intervention and the deployment of the right technology tools to block or at least mitigate an attack.
But as time goes on, the potential threat vectors are multiplying: servers, desktops, laptops, mobile devices, and now the Internet of Things (IoT), which could open enterprises to attacks via innocuous objects such as thermostats and a myriad of other devices that contain sensors and processors.
“Every device large or small becomes a source for cyber threat intelligence,” said Peter Tran, senior director of Worldwide Advanced Cyber Defense at RSA Security. “With the Internet of Things (IoT) projected to grow to over 50 billion connected devices by 2020, there is a real challenge ahead in terms of structuring effective threat analysis across massive volumes of smart connected devices.”
(TNS) — Communities across Ohio on Wednesday will be testing tornado sirens as part of a drill for the Emergency Alert System.
The sounding of the sirens, which is set for 9:50 a.m., is part of Severe Weather Awareness Week, which runs through March 25, according to the Ohio Emergency Management Agency.
The testing comes on the eve of Ohio’s tornado season, which runs April 1 through July 30.