Cybersecurity, Privacy and Data Protection. Jay Taylor Director Global Standards, Code and Environment Jay.Taylor@schneider-electric.



Similar documents
Green Data Centers. Jay Taylor Director Global Standards, Codes and Environment (512)

COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY,

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

Securing the Cloud Infrastructure

Identifying and Managing Third Party Data Security Risk

National Cyber Security Policy -2013

Big Data, Big Risk, Big Rewards. Hussein Syed

The problem of cloud data governance

Cloud Security Trust Cisco to Protect Your Data

Richard Gadsden Information Security Office Office of the CIO Information Services

Bellevue University Cybersecurity Programs & Courses

RE: ITI Comments on Korea s Proposed Bill for the Development of Cloud Computing and Protection of Users

Partnership for Cyber Resilience

Federal Aviation Administration

Securing the Microsoft Cloud

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Securing the Microsoft Cloud

Remote Management Services Portfolio Overview

Logging In: Auditing Cybersecurity in an Unsecure World

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

Enterprise Data Protection

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

Data Breach Response Planning: Laying the Right Foundation

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

McAfee Security Architectures for the Public Sector

A. Background. In this Communication we can read:

General HIPAA Implementation FAQ

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Cyber Security - What Would a Breach Really Mean for your Business?

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Microsoft s cybersecurity commitment

ICAICT704A Direct ICT in a supply chain

Cloud Computing Security Considerations

REGULATION OF TELERADIOLOGISTS AND TELERADIOLOGY PROVIDERS IN THE EU.

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

Testimony of Patrick D. Gallagher, Ph.D. Deputy Director

UK technical non-paper: e-commerce

How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI

Release: 2. ICA70111 Graduate Certificate in Information Technology and Strategic Management

IBM Software Integrated Service Management: Visibility. Control. Automation.

Cybersecurity: Mission integration to protect your assets

Your Device is Our Opportunity

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

BSA GLOBAL CYBERSECURITY FRAMEWORK

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

IBM Software A Journey to Adaptive MDM

NSW Government. Cloud Services Policy and Guidelines

HIPAA/HITECH Compliance Using VMware vcloud Air

Smart Grid Security: A Look to the Future

Privilege Gone Wild: The State of Privileged Account Management in 2015

Data Protection Act Bring your own device (BYOD)

HEALTH CARE AND CYBER SECURITY:

THE BLUENOSE SECURITY FRAMEWORK

Cybersecurity Risk Assessment in Smart Grids

Cloud security architecture

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014

RETHINKING CYBER SECURITY Changing the Business Conversation

Security of smart grid communication protocols

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

ISSA Guidelines on Master Data Management in Social Security

Music Recording Studio Security Program Security Assessment Version 1.1

April 28, Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC

Update On Smart Grid Cyber Security

Into the cybersecurity breach

Security in Smart Grid / IoT. Nenad Andrejević Comtrade Solutions Engineering

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Cloud Computing in a Government Context

AT&T Cybersecurity Policy Overview

National Institute of Standards and Technology Smart Grid Cybersecurity

Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager

Cybersecurity Framework Security Policy Mapping Table

The Benefits of ICT. June 2007 GP.C.PDF.07.E

Transcription:

Cybersecurity, Privacy and Data Protection Jay Taylor Director Global Standards, Code and Environment Jay.Taylor@schneider-electric.com

Executive Summary ICT Enables Personal Productivity Telecom/ICT Is A Policy Focus for Governments Allows Governments to do More With Less Facilitates Resource Efficiency In The Economy Recent Global Regulations and Legislation Practices are Evolving and May Become Disruptive to Business Practices and Supply Chain 2

Affecting Data Across Business Segments Cybersecurity Privacy Data Security Cloud Computing Smart Cities (Grid) Healthcare (EMR) Smart Transport Energy Industry Big Data Internet of Things Data Center/ICT Market Place 3

Affecting Data Across Business Segments Cybersecurity Privacy Data Security Supply Chain Cloud Computing Smart Cities (Grid) Healthcare (EMR) Smart Transport Energy Industry Big Data Internet of Things Data Center/ICT Marketplace 4

Localization Barriers to Trade Defined as: Local content requirements, i.e., requirements to purchase domesticallymanufactured goods or domestically-supplied services Subsidies or other preferences that are only received if producers use local goods, locally- owned service providers, or domestically-owned or developed IP, or IP that is first registered in that country; Requirements to provide services using local facilities or infrastructure; Measures to force the transfer of technology, IP or Licensing Requirements to comply with country- or region-specific or design-based standards that create unnecessary obstacles to trade Unjustified requirements to conduct or carry out duplicative conformity assessment procedures in-country. Requirements to restrict supply chain to exclude countries Requirements to restrict information flow outside of a country or group of countries 5

Policy Venn Security National Infrastructure Protection Plans Critical Infrastructure at Greatest Risk Cybersecurity Equipment Restrictions And Testing Requirements Privacy, Data Protection Incident, Individual Control of Vulnerability Personal Information Reporting Cloud Cloud Privacy Privacy Unified Requirements Supply Chain Across Boundaries Restrictions Cross Border, Data Transport, Location Restrictions Required Local IP, Encryption Licensing Import Licensing Restrictions Forced Localization Local Content Local Content Purchasing Requirements Ban of Foreign Products 6

Treat Vector Action Plan Identify Identify New Regulatory Efforts Early, Work with Industry Groups to Mitigate, Identify to BU Address Upon Implementation, Identify Criterion, Enroll BU Resources For Corrective Action, Use SPoT to Schedule/Track Through Next Generation Assessment Evaluate Language, Review Interpretations, Engage Outside Council: Inform BU 7

Business Impacts Formalized Vulnerability/Incident Reporting to Competent Authorities Drive Common Format, Content, and Common Timing Law Enforcement Accommodation Supply Chain Sourcing Restrictions Restrictions Based On Locations (Business Types) Business and Certification Costs, Supply Chain Complexity Regional/National Critical Infrastructure & Architecture Requirements Changes to Reference Architectures, Related Product Platforms Restrictions on End Use Customer Data Movement and Housing Potentially Limits Remote Infrastructure Management Follow the Sun Personally Identifiable Information; Warranty Registration, Customer Relationship Management 8

Going Forward Globally Anticipate More, Creative Localization Regulations Listed as: Cybersecurity, Privacy, and Data Protection More National Security Exceptions for: IT/Telecom Government Equipment Purchases Expanding to National Critical Infrastructure Energy, Utility Grid Telecom/Internet May Lead to Supply Chain Restrictions Types Of Companies Components Manufacturers 9