GDPR Countdown

When did your company become aware of the General Data Protection Regulation and the need to do something about it?

GDPR has been a running story in DataIQ since it launched in 2011, through the 3,000-plus amendments and four years it took to become law and now in the final few months running up to enforcement.

With the first GDPR Impact research in 2016, 46.0% of businesses said they were very aware of the new data protection law. One year later, however, this figure was stuck at nearly the same level (50.0%).

Yet the last 12 months seem to have been decisive with a dramatic rise in this number to 84.3%.

Compliance is hard won and Never Certain

If this had not happened so close to the enforcement regime starting, it would have been a cause for concern. Companies need to look deeply into their data-driven processes, data management and data governance policies.

What they find is not always easy to resolve, which may explain that only 25.4% describe themselves as very prepared for GDPR.

Compliance is hard won and never certain, so it is understandable if 61.0% describe themselves as somewhat prepared.

With much guidance still pending and legal opinion either conflicting or so risk averse as to make existing business practices often look impossible to bring into line, it is better to adopt a cautious view.

But that is only if the Regulation is viewed from a purely compliance point of view. It certainly merits a legally-oriented perspective at the outset of any programme. Unless those strictures are closely considered and mapped against the operating model of the business, it will be difficult to spot the gaps in which risk might arise.

Ticking the box of compliance should not be the end-point, however. Whatever the letter of the law, GDPR is also a major opportunity to reset the relationship with customers and get ahead of any concerns they might have about data sharing, security and control.

This is why maturity in the adoption of data and analytics becomes a strong indicator of whether the underlying culture of an organisation has evolved or if it is just trying to stay within the parameters set out by the Regulation. In this perspective, there seems to be a positive correlation between preparing for GDPR and data ratification of the business.

Back in 2016, just 39% described themselves as in the upper two quintiles of maturity (Managed and Optimised). This year, the number has risen to 62.7%, meaning the majority of UK companies are putting data and analytics at the heart of how they operate. That is likely to mean they will realise commercial benefits from their compliance efforts, not just risk mitigation.

“It comes down to knowing how and where to focus training and measurement, rather than system fixes.”

So how can your company find out whether it is heading towards both compliance and value-adding data maturity? One way is to carry out a capability audit, like DQM GRC’s RADAR.

As technical director Peter Galdies explains, “this involves a real inspection of practice and process to understand the business thinking and highlight where business process needs to be re-engineered. Often, this comes down to knowing how and where to focus training and measurement, rather than system fixes.”

While it is tempting to believe that organisations only need to assess their compliance with GDPR once, the reality is very different, he warns.

“The law itself requires that the organisation be capable of continually demonstrating its compliance, and if you are the kind of organisation that needs a Data Protection Officer, then a key part of that role is to audit or assess that compliance.”

In fact, when it comes to implementation, the GDPR river runs very deep indeed. The cultural and system changes expected by the legislators cannot be fixed by technology or training alone and require a process of continual self-inspection. This is inherent in the expected behaviours of “privacy by design” and “data protection by default” which the regulators demand of organisations under the GDPR regime.

“To effectively understand your organisation’s ability to comply both today and, importantly, in the future, a robust assessment process (like our GDPR Radar) has to examine not only if you have the right controls, but also if you have the right management systems in place around those controls to ensure they will still be working for you going forwards,” says Galdies.

“That means measuring the maturity of your compliance processes, not just ticking boxes.”

Evidence gained from a data audit of this type provides a powerful basis on which to explain to the board what more might need to be done, above and beyond any box-ticking for compliance purposes.

It is also a useful demonstration of accountability to prove that you are reaching for compliance, too. And hitting two birds with one stone is always a real sign of advanced abilities.

To contact the GDPR Advisory Board please visit:  www.gdpr-board.co.uk

DataIQ

You Might Also Read:

GDPR - Questions & Answers:

« AI And Blockchain In A Disruptive World
Six Steps to Protect Customer Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

QA Systems

QA Systems

QA Systems provides software testing solutions for safety and business critical sectors and software safety and security standards.

CipherPoint Software

CipherPoint Software

CipherPoint Software provides data-centric auditing and protection solutions for securing unstructured information

Conceptivity

Conceptivity

Conceptivity provide risk management solutions in the areas of Supply Chain Security, Cyber Security and Critical Infrastructure Protection.

Komodo Consulting

Komodo Consulting

Komodo Consulting specializes in Penetration Testing and Red-Team Excercises, Cyber Threat Intelligence, Incident Response and Application Security.

SEWORKS

SEWORKS

SEWORKS provides offensive and defensive app security that ensures mobile and web apps are safe from dangerous hacking threats.

Calian Group

Calian Group

Calian is a diverse Canadian company offering professional services in areas including IT Consulting, Cyber Security and IT Products.

Block Armour

Block Armour

Block Armour is a Mumbai and Singapore based venture focused on harnessing emerging technologies to counter growing Cybersecurity challenges in bold new ways.

Port53 Technologies

Port53 Technologies

Port53 Technologies is focused on delivering enterprise-grade, cloud-delivered security solutions that are easy to deploy, simple to manage and extremely effective.

Ascend Technologies

Ascend Technologies

Ascend Technologies offers a full suite of managed IT services including: Cloud & Infrastructure Management, Cybersecurity Management, Service Desk Management, Application Management , Data Management

Nominet

Nominet

Nominet's cyber division offers network detection and response services to governments and enterprises worldwide.

Quside

Quside

Quside, a spin-off from The Institute of Photonic Sciences in Barcelona, designs and manufactures innovative quantum technologies for a wide range of applications including cyber security.

Intigriti

Intigriti

Intigriti helps companies protect themselves from cybercrime. Our community of ethical hackers provides continuous, realistic security testing to protect our customer’s assets and brand.

Cyber Unit

Cyber Unit

Cyber Unit offer next level protection from cyber attacks in packages and pricing options that are accessible to smaller organizations.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.

HP Wolf Security

HP Wolf Security

HP Wolf Security protects your organization and devices from cyberattacks no matter where, when or how you work.