Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Driving Real Data Protection

No description
by

GSO Communications

on 23 May 2016

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Driving Real Data Protection

The Operational Integration of Information Security
& Global Privacy Programs

Driving Real Data Protection
What is Data?
From a CSO's
Perspective
Creating Converged Opportunities
for
Where is the Data?
Data Flow
Mapping
Data Interrogation & Defense
Leveragability
From a CPO's
Perspective?
Compliance
Business
Sustainability
Privacy Centric Practices
Accountability




& Assurance
The “Single Face” of Data Protection: Messaging...
To Your
Troops
To the
Business
To Your
Executive Committee
To the Board
To the Market
Be a Leader
Incident
Response
CSO Perspective
The CPO Perspective
Integrated Response Operations
CPO
Perspective
NO MATTER WHAT

Policy
Standards
One Sheet of Music
Engineering
Training
Integrated Prioritization

of Programs & Projects
Progressive Outcomes from a Legal Perspective
Roland Cloutier
ADP Staff VP, CSO
May 23, 2016

Operational Effectiveness
The Future of International Data Privacy Frameworks
Recap on Safe Harbor and why it’s under attack
The minimum necessary to apply for BCR
The World of the Data Centric Approach
At the End of the Day...
A C(I)SO can not be successful without core
Privacy tenants
A CPO can not be successful without a strong Operational Data Protection Program
Standards, Compliance, and Cross Roads:

- Goals Will Be Different
- Results Focused Outcome
Recognizing the Differences
= Smart Business
Focus
Resources
Operations
SHARED
Data
Ownership
Data Stewards
Verification & Validation
= Controls Assurance
Privacy Engineering &
the SSDLC
Recap on Safe Harbor and why it's under
attack
BCR’s:
The what
and why
The minimum necessary to apply for BCR
Creating the Integrated Operation Platform
Business Operations
Protection
Data Defense
Threat Surface
Management
Full transcript