This is your problem now.
72-hour breach reporting requirements mean a lot more pressure will be placed on you to guarantee the company’s market position. Especially since it’s currently unlikely that you even know when a breach has occurred.
That means you need to know who controls and who processes your data, where it is, and what protects it. You’ll have to co-operate extensively with your organisation’s IT leadership to discover the true scope of this.
To address specific cloud vulnerabilities, you’ll likely need to enlist the aid of a Cloud Security Access Broker.
You need to know how to protect personal data. And who might try to steal it.
It’s impossible to keep any data 100% safe online – but now you’ll have the spotlight (and hopefully the budget) to do the job properly.
We recommend a suite of traditional security platforms – alongside strong end-user behavioural analytics. Run together these will help you detect and prevent breaches with a much greater level of success.
Develop a close relationship with your DPO.
Your company’s Data Protection Officer – whether internal or external – will be your biggest ally in protecting the company. And staying on the right side of the law.
They’ll also provide an invaluable resource when it comes to training and coaching your end users to follow the correct protocols. (Though this will remain your responsibility.)
External sources
Thank you to all of the external sources below in helping to put this research together