GDPR. Is It Time to Panic? Maybe
Senior executives across the EU and around the world need to be asking: Is our organization ready to meet the new GDPR data privacy mandates? Time is short. The risks are large.
The May 25th, 2018 deadline to be General Data Protection Regulation (GDPR) compliant is less than 30 days away. Many organizations here in the EU and across the globe are in various stages of addressing this complex data privacy regulation. My company, Italian-based Gruppo Daman, delivers security and compliance solutions and training. We see many companies who have not yet come to grips with what they really need to do to become GDPR-compliant. The risks are in fact quite large: all data breaches must be disclosed, risk of reputational damage is high, and violations can result in expensive fines – up to 4% of world-wide revenue (turnover). It is not too late, but time is indeed running short. https://www.eugdpr.org/
Reducing Time, Cost, Effort and Risk is Critical
Given the complexity of the task of becoming GDPR-compliant and the looming deadline, our experience with a leading data protection and compliance solution from Teleran is most relevant. Why? Because Teleran’s solution addresses 5 critical GDPR requirements. And, from our experience implementing the Teleran solution at a large insurance company and a government agency, it significantly speeds time-to-compliance while minimizing implementation costs, effort and risk versus other solutions. Teleran’s data protection and compliance solution, with a deep focus on structured data, delivers integrated sensitive data discovery, audit and controls that enable organizations to address these key GDPR data protection requirements.
Five Critical GDPR Data Protection Requirements
Teleran’s Automation and Integration Reduces Time-to-Compliance, Cost and Risks
Our clients chose to work with Teleran’s solution because it offers an automated and integrated process for discovering, protecting and auditing PII. Its discovery process identifies sensitive data and automatically creates the required data protection policies that prevent non-compliant access and use of PII. It also automatically creates real-time alerts of attempted or suspicious behavior and audits and reports on sensitive access. Process automation from discovery to granular controls creation minimizes risks due to human error, reduces time and effort to implement the controls and maximizes system effectiveness over time. Teleran’s network-based agent architecture allows for rapid installations and enables it to scale across the enterprise supporting large data volumes and heterogeneous data platforms.
No One Size Fits All. So Flexibility and Integration are Really Important
What we have learned from our work with helping organizations become GDPR-compliant is that technology solutions need to quickly and easily adapt to the unique data and business processes within an organization and geography. We also learned early on that no one solution meets all the requirements. Teleran offers a flexible system that quickly adjusts to specific client requirements as well as offers rapid, clean integration with client security infrastructure components such as SIEM, User/Entity Behavior Analysis and threat detection. Again, it is about achieving GDPR compliance quickly and efficiently.
Risk Assessment and Prioritization
A key step in managing the GDPR process is identifying, assessing and weighting your organization’s GDPR risks. Being able to quickly assess where PII exists, how is it used and by whom – capabilities where Teleran’s solutions excels – helps determine the higher risks areas and establish implementation and remediation priorities. While the clock is ticking, companies should take advantage of technologies like Teleran’s that offer automation, integration and streamlined implementation to reduce the risk, cost and efforts to meet the GDPR May 25th deadline.
CEO Cyber Academy Italia
CEO Gruppo Daman
Chris is VP Marketing and a co-founder of Teleran. He has over 30 years’ experience in helping companies manage, leverage and protect their business-critical information. Chris can be reached at email@example.com.