SlideShare une entreprise Scribd logo
1  sur  26
ISO/IEC27001vs.
CCPAvs.NYShieldAct:
Whatarethe
similaritiesand
differences?
• Overview of current state of data
security/privacy
• Current trends driving adoption of
stronger data protection
standards/laws
• Data Protection in ISO/IEC 27001,
CCPA, and NY Shield Act
• Roundtable: Comparison of ISO/IEC
27001, CCPA and NY Shield Act
• Roundtable: Lessons to be applied
Agenda
Currentstateof
data
privacy/security
• Privacy of Personally Identifiable
Information (PII) and Patient Health
Information (PHI) is becoming a focus of
concern for governments, organizations, and
individuals around the globe.
• Cyberattacks are targeting data more than
any other resource.
• Ransomware and data breaches are making
headlines globally and on a recurring and
frequent basis.
DataProtectionEvolutions
Underway
• Block Chain driven data authenticity,
integrity, and protection
• Protective measures for cloud-hosted
data
• Fake news and deep fake detections are
being matured
• Artificial Intelligence is being used as
both a weapon and a defensive measure
Threeexamplesofsecurity
guidancefordataprotection.
ISO/IEC 27001
OverviewofData
Protection/Privacyin
ISO/IEC27001
ISO/IEC 27001 is:
• An international standard that “specifies the
requirements for establishing, implementing, maintaining
and continually improving an information security
management system within the context of the
organization”
• Focused on information security overall from governance
of an ISMS to secure development practices and more
• Not a mandatory/legislated standard with which an
organization must comply
• A standard against which an individual or an organization
can be certified
• A baseline for many other standards, frameworks and
even some legislations
ISO/IEC 27001 specifically references privacy and protection
of personally identifiable information in A.18.1.4:
• “Privacy and protection of personally identifiable
information shall be ensured as required in relevant
legislation and regulation where applicable” and
generally covers the topic in section A.18 Compliance
Implementing
ISO/IEC27001
• A.18 Compliance
• A.18.1 Compliance with legal
and contractual requirements
• Objective: To avoid breaches
of legal, statutory, regulatory or
contractual obligations related
to information security and of
any security
requirements.
A.18.1.1
Identification of applicable legislation
and contractual requirements
Control
All relevant legislative statutory, regulatory,
contractual require- ments and the
organization’s approach to meet these
requirements shall be explicitly identified,
documented and kept up to date for each
information system and the organization.
A.18.1.2 Intellectual property rights
Control
Appropriate procedures shall be implemented
to ensure compliance with legislative,
regulatory and contractual requirements
related to intellectual property rights and use
of proprietary soft- ware products.
A.18.1.3 Protection of records
Control
Records shall be protected from loss,
destruction, falsification, unauthorized access
and unauthorized release, in accordance with
legislatory, regulatory, contractual and business
requirements.
A.18.1.4
Privacy and protection of personally
identifiable information
Control
Privacy and protection of personally
identifiable information shall be ensured as
required in relevant legislation and regulation
where applicable.
A.18.1.5 Regulation of cryptographic controls
Control
Cryptographic controls shall be used in
compliance with all relevant agreements,
legislation and regulations.
Compliance
Requirements
for ISO/IEC
27001
Compliance with ISO/IEC 27001 is typically
voluntary unless otherwise required in
specific instances (e.g., in state lottery and
gaming, compliance with ISO/IEC 27001 is
often required).
Certification of an organization against
ISO/IEC 27001 is possible via a certified
and authorized certification and audit
entity.
“Gotchas”for ISO/IEC27001
Although only section A.18.1 specifically mentions privacy and protection of PII, the remainder of
this standard include vital security controls for protecting data in its many states. For example, A.17
covers business continuity, A.16 covers information security incident management, etc.
Adding ISO/IEC 27701:2019 to ISO/IEC 27001 will add privacy controls to your security compliance
toolkit – highly recommended given today’s privacy regulation landscape.
ISO/IEC 27002:2013 is often confused or conflated with ISO/IEC 27001 but 27002 is a set of best
practice guidance to help an organization implement 27001 and is not a standard against which an
organization can achieve certification (that is achieved against 27001).
California
Consumer
ProtectionAct
(CCPA)
OverviewofData
Protection/Privacyin
CCPA
• Inspired by the GDPR as a stronger privacy
legislation for residents of California.
• Emphasis on privacy rights for consumers.
• Excludes employee data, “publicly available
information”, de-identified and aggregate
information.
• Consumers may pursue civil action as “a
result of the business’ violation of the duty to
implement and maintain reasonable security
procedures and practices appropriate to the
nature of the information to protect the
personal information.”
ImplementingCCPA
Determine what
your organization
is: are you a
business, service
provider, or third
party?
Have a Privacy
Notice that
includes:
Categories of PI
collected, how is
collected and the
purpose of use.
Explains the user’s
rights under CCPA,
OR have separate
page for California
residents.
If selling PI,
provide a notice to
the user about on
the sale.
This must include
an option for the
user to “opt out”
of the sale of their
information.
Set up at least two
methods for users
to contact your
business if they
have privacy
concerns.
At minimum, have
a website or toll-
free number.
Much of CCPA
relies around
recognizing
”categories” of
data. Data
classification is
therefor your
friend.
Train staff: how do
they direct
consumers wishing
to exercising their
rights?
Compliance
Requirements
forCCPA
• Update contracts
• Specify organization’s definition under CCPA
• Service provider contracts: must prohibit retention, use and
disclosure of PI outside specific purposes of providing services.
• Web page updates:
• A section on website (Do Not Sell My Personal Information) that
allows users to opt-out of information sales. Section should be easy
to find from home page.
• User rights:
• The right to request a business delete information collected on the
consumer (exemptions may apply)
• The right to request what information is collected, processed, why,
and when PI is shared or disclosed
• The right to request, when PI is sold, the categories of PI sold and
categories to whom it was sold
• The right to request a business not sell their information (the right
to opt-out)
• The right not to be discriminated against for exercising privacy rights
“Gotchas”for
CCPA
• ALWAYS verify requests for data, per the law.
Unverified requests are a gold-mine for attackers.
• Very little advice for data protection implementation.
However, makes references to “unencrypted”
information as insecure.
• Exemptions for other laws: if your business is a
“covered entity” or “business associate” that deals
with protected health information under the Health
Insurance Portability and Accountability Act (HIPAA) it
may be exempt.
• Admittedly lots of confusion, even among industry
pros, on implementation.
• CCPA 2.0 is already on the ballot for November, 2020.
• If passed CCPA 2.0 will be in force in 2023.
NewYork (NY)
SHIELDAct
OverviewofData
Protection/Privacy
inNYSHIELDAct
• "Stop Hacks and Improve Electronic Data Security Act
(SHIELD Act)"
• The SHIELD Act requires "any person or business that
owns or licenses computerized data which includes private
information of a resident of New York [state]" to implement
the Act's Data Security Program.
• This applies to companies across the entire world,
regardless of whether they have any presence in New York or
even the United States.
• This bill broadens the scope of information covered under
the notification law and updates the notification
requirements when there has been a breach of data.
• It also broadens the definition of a data breach to include
an unauthorized person gaining access to information. It also
requires reasonable data security and provides standards
tailored to the size of a business.
Implementing
NYSHIELDAct
• Reasonable administrative safeguards, such as the following:
• designates one or more employees to coordinate the security program
• identifies reasonably foreseeable internal and external risks
• assesses the sufficiency of safeguards in place to control the identified risks
• trains and manages employees in the security program practices and procedures
• selects service providers capable of maintaining appropriate safeguards and
requires those safeguards by contract; and adjusts the security program in light of
business changes or new circumstances.
• Reasonable technical safeguards, such as the following:
• assesses risks in network and software design
• assesses risks in information processing, transmission, and storage
• detects, prevents, and responds to attacks or system failures
• regularly tests and monitors the effectiveness of key controls, systems, and
procedures.
• Reasonable physical safeguards, such as the following:
• assesses risks of information storage and disposal
• detects, prevents, and responds to intrusions
• protects against unauthorized access to or use of private information during or
after the collection, transportation, and destruction or disposal of information
within a reasonable amount of time after it is no longer needed for business
purposes by erasing electronic media so that the information cannot be read or
reconstructed.
ComplianceRequirements
forNYSHIELDAct
• The SHIELD Act requires organizations to adopt “reasonable” security
practices, policies and procedures to safeguard sensitive data in three
critical ways: administrative safeguards, technical safeguards and physical
safeguards.
• Taking into account differing sizes and resources of businesses, the
SHIELD Act emphasizes that the programs should be reasonable. At a
minimum, requires ongoing monitoring of the implemented policies and
procedures, regular risk assessment of the business’s technical
infrastructure and physical premises, training personnel, reasonable
vendor due diligence, as well as designating an individual responsible for
the required policies, practices, assessment and maintenance.
• Small business exemptions do exist, however, still require a security
program that is modifiable and scaled in accordance with: Size and
complexity of the business, Nature and scope of activities, and the
sensitivity of the personal information collected
• You are automatically considered compliant if your business is
regulated by and compliant with the Health Information Portability and
Accountability Act (HIPAA), Health Information Technology for Economic
and Clinical Health Act (HITECH), the Gramm-Leach Bliley Act, New York’s
Cybersecurity Requirements for Financial Services Companies, and any
other federal or New York cybersecurity legislation.
“Gotchas”forNY
SHIELDAct
• Similar to the CCPA and the GDPR, the SHIELD Act
expands liability to any organization that collects private
information of New York residents, regardless of where it
was collected. This means that an organization does not
necessarily have to conduct business in New York in order to
come under the purview of the SHIELD Act
• New York’s data and privacy laws require that in the event
of a breach, the business must notify any and all New York
residents whose private information may have been
compromised. Now, with the expanded definitions of breach
and private information, there is the potential for more
events that will trigger New York’s breach notification
requirements. Further, with these laws applying to any
business that has New York residents’ information regardless
of where the business is located, such breach notifications
will apply to far more businesses and any breaches they may
experience.
• “Private information” is a subset of personal information –
under the SHIELD Act, private information has been
expanded to include any account information, biometric data
(like iris scans, fingerprints, voiceprints, images, etc.) used to
authenticate someone’s identity, and usernames or emails in
combination with passwords, security questions or
passcodes.
Round Table
Commonalities
• Similar to the CCPA and the GDPR, the NY SHIELD Act
expands liability to any organization that collects private
information of New York residents, regardless of where it
was collected. This means that an organization does not
necessarily have to conduct business in New York in order
to come under the purview of the NY SHIELD Act.
• At a minimum, the NY SHIELD Act requires ongoing
monitoring of the implemented policies and procedures,
regular risk assessment of the business’s technical
infrastructure and physical premises, training personnel,
reasonable vendor due diligence, as well as designating an
individual responsible for the required policies, practices,
assessment and maintenance. CCPA is similar in these
requirements and ISO/IEC 27001 would have similar
requirements as well.
Differences • Whereas CCPA and the NY SHIELD Act require compliance
from the entities to which they apply, ISO/IEC 27001 is not a
mandatory standard.
• CCPA and NY SHIELD Act focus on protecting the data of the
person while ISO/IEC 27001 focuses on protecting all types
of critical data, infrastructure, applications and the
organization itself.
Takeaways
• One standard/legislation can be used to support compliance with another
• When implementing compliance with a standard or legislation, it is
important to maintain evidence of your compliance and to self-audit as well
• No one security standard or legislation should ever be relied upon as your
only elements in your security program
• Designate a Privacy Officer or security team to manage your privacy/data
protection (note that a Privacy Officer is required in many cases!)
• Complete an organizational risk assessment and ensure you have also
classified your data as part of this exercise prior to implementing any security
or privacy controls
ISO/IEC 27001
Training Courses
• ISO/IEC 27001 Introduction
1 Day Course
• ISO/IEC 27001 Foundation
2 Days Course
• ISO/IEC 27001 Lead Implementer
5 Days Course
• ISO/IEC 27001 Lead Auditor
5 Days Course
Exam and certification fees are included in the training price.
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
www.pecb.com/events
THANK YOU
?
bloom@victoriamcintosh.com linkedin.com/in/victoriamcintosh/
asenglish@hotmail.com
derekrs@gmail.com
linkedin.com/in/englishtony
linkedin.com/in/derek-stephenson-90628b113

Contenu connexe

Tendances

ISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowPECB
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.IGN MANTRA
 
Compliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_enCompliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_enBalázs Antók
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...PECB
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data GovernanceDATUM LLC
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
Legal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services SectorLegal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services SectorMSpadea
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by SripathiPrajwal Panchmahalkar
 
Data protection and data integrity
 Data protection and data integrity Data protection and data integrity
Data protection and data integrityAxon Lawyers
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.IGN MANTRA
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?PECB
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgEric Vanderburg
 
Migration approachquestionnaire checklist
Migration approachquestionnaire checklistMigration approachquestionnaire checklist
Migration approachquestionnaire checklistNandeep Nagarkar
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? PECB
 
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowPECB
 

Tendances (20)

ISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to know
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
 
Compliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_enCompliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_en
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Legal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services SectorLegal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services Sector
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by Sripathi
 
Data protection and data integrity
 Data protection and data integrity Data protection and data integrity
Data protection and data integrity
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
 
Migration approachquestionnaire checklist
Migration approachquestionnaire checklistMigration approachquestionnaire checklist
Migration approachquestionnaire checklist
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
GDPR Workshop
GDPR WorkshopGDPR Workshop
GDPR Workshop
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Pindad iso27000 2016 smki
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
 

Similaire à ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Differences?

HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance Raffa Learning Community
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA ComplianceRaffa Learning Community
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 
It industry regulations
It industry regulationsIt industry regulations
It industry regulationsNicholas Davis
 
It Industry Regulations
It Industry RegulationsIt Industry Regulations
It Industry RegulationsNicholas Davis
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issuesJagdeepSingh394
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security ProgramRaymond Cunningham
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislationUlf Mattsson
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT AssessmentRachel Caldwell
 

Similaire à ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Differences? (20)

HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Is it time for an IT Assessment?
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
It industry regulations
It industry regulationsIt industry regulations
It industry regulations
 
It Industry Regulations
It Industry RegulationsIt Industry Regulations
It Industry Regulations
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment
 
2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment
 

Plus de PECB

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemPECB
 

Plus de PECB (20)

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management system
 

Dernier

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 

Dernier (20)

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 

ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Differences?

  • 1.
  • 2. ISO/IEC27001vs. CCPAvs.NYShieldAct: Whatarethe similaritiesand differences? • Overview of current state of data security/privacy • Current trends driving adoption of stronger data protection standards/laws • Data Protection in ISO/IEC 27001, CCPA, and NY Shield Act • Roundtable: Comparison of ISO/IEC 27001, CCPA and NY Shield Act • Roundtable: Lessons to be applied Agenda
  • 3. Currentstateof data privacy/security • Privacy of Personally Identifiable Information (PII) and Patient Health Information (PHI) is becoming a focus of concern for governments, organizations, and individuals around the globe. • Cyberattacks are targeting data more than any other resource. • Ransomware and data breaches are making headlines globally and on a recurring and frequent basis.
  • 4. DataProtectionEvolutions Underway • Block Chain driven data authenticity, integrity, and protection • Protective measures for cloud-hosted data • Fake news and deep fake detections are being matured • Artificial Intelligence is being used as both a weapon and a defensive measure
  • 7. OverviewofData Protection/Privacyin ISO/IEC27001 ISO/IEC 27001 is: • An international standard that “specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization” • Focused on information security overall from governance of an ISMS to secure development practices and more • Not a mandatory/legislated standard with which an organization must comply • A standard against which an individual or an organization can be certified • A baseline for many other standards, frameworks and even some legislations ISO/IEC 27001 specifically references privacy and protection of personally identifiable information in A.18.1.4: • “Privacy and protection of personally identifiable information shall be ensured as required in relevant legislation and regulation where applicable” and generally covers the topic in section A.18 Compliance
  • 8. Implementing ISO/IEC27001 • A.18 Compliance • A.18.1 Compliance with legal and contractual requirements • Objective: To avoid breaches of legal, statutory, regulatory or contractual obligations related to information security and of any security requirements. A.18.1.1 Identification of applicable legislation and contractual requirements Control All relevant legislative statutory, regulatory, contractual require- ments and the organization’s approach to meet these requirements shall be explicitly identified, documented and kept up to date for each information system and the organization. A.18.1.2 Intellectual property rights Control Appropriate procedures shall be implemented to ensure compliance with legislative, regulatory and contractual requirements related to intellectual property rights and use of proprietary soft- ware products. A.18.1.3 Protection of records Control Records shall be protected from loss, destruction, falsification, unauthorized access and unauthorized release, in accordance with legislatory, regulatory, contractual and business requirements. A.18.1.4 Privacy and protection of personally identifiable information Control Privacy and protection of personally identifiable information shall be ensured as required in relevant legislation and regulation where applicable. A.18.1.5 Regulation of cryptographic controls Control Cryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations.
  • 9. Compliance Requirements for ISO/IEC 27001 Compliance with ISO/IEC 27001 is typically voluntary unless otherwise required in specific instances (e.g., in state lottery and gaming, compliance with ISO/IEC 27001 is often required). Certification of an organization against ISO/IEC 27001 is possible via a certified and authorized certification and audit entity.
  • 10. “Gotchas”for ISO/IEC27001 Although only section A.18.1 specifically mentions privacy and protection of PII, the remainder of this standard include vital security controls for protecting data in its many states. For example, A.17 covers business continuity, A.16 covers information security incident management, etc. Adding ISO/IEC 27701:2019 to ISO/IEC 27001 will add privacy controls to your security compliance toolkit – highly recommended given today’s privacy regulation landscape. ISO/IEC 27002:2013 is often confused or conflated with ISO/IEC 27001 but 27002 is a set of best practice guidance to help an organization implement 27001 and is not a standard against which an organization can achieve certification (that is achieved against 27001).
  • 12. OverviewofData Protection/Privacyin CCPA • Inspired by the GDPR as a stronger privacy legislation for residents of California. • Emphasis on privacy rights for consumers. • Excludes employee data, “publicly available information”, de-identified and aggregate information. • Consumers may pursue civil action as “a result of the business’ violation of the duty to implement and maintain reasonable security procedures and practices appropriate to the nature of the information to protect the personal information.”
  • 13. ImplementingCCPA Determine what your organization is: are you a business, service provider, or third party? Have a Privacy Notice that includes: Categories of PI collected, how is collected and the purpose of use. Explains the user’s rights under CCPA, OR have separate page for California residents. If selling PI, provide a notice to the user about on the sale. This must include an option for the user to “opt out” of the sale of their information. Set up at least two methods for users to contact your business if they have privacy concerns. At minimum, have a website or toll- free number. Much of CCPA relies around recognizing ”categories” of data. Data classification is therefor your friend. Train staff: how do they direct consumers wishing to exercising their rights?
  • 14. Compliance Requirements forCCPA • Update contracts • Specify organization’s definition under CCPA • Service provider contracts: must prohibit retention, use and disclosure of PI outside specific purposes of providing services. • Web page updates: • A section on website (Do Not Sell My Personal Information) that allows users to opt-out of information sales. Section should be easy to find from home page. • User rights: • The right to request a business delete information collected on the consumer (exemptions may apply) • The right to request what information is collected, processed, why, and when PI is shared or disclosed • The right to request, when PI is sold, the categories of PI sold and categories to whom it was sold • The right to request a business not sell their information (the right to opt-out) • The right not to be discriminated against for exercising privacy rights
  • 15. “Gotchas”for CCPA • ALWAYS verify requests for data, per the law. Unverified requests are a gold-mine for attackers. • Very little advice for data protection implementation. However, makes references to “unencrypted” information as insecure. • Exemptions for other laws: if your business is a “covered entity” or “business associate” that deals with protected health information under the Health Insurance Portability and Accountability Act (HIPAA) it may be exempt. • Admittedly lots of confusion, even among industry pros, on implementation. • CCPA 2.0 is already on the ballot for November, 2020. • If passed CCPA 2.0 will be in force in 2023.
  • 17. OverviewofData Protection/Privacy inNYSHIELDAct • "Stop Hacks and Improve Electronic Data Security Act (SHIELD Act)" • The SHIELD Act requires "any person or business that owns or licenses computerized data which includes private information of a resident of New York [state]" to implement the Act's Data Security Program. • This applies to companies across the entire world, regardless of whether they have any presence in New York or even the United States. • This bill broadens the scope of information covered under the notification law and updates the notification requirements when there has been a breach of data. • It also broadens the definition of a data breach to include an unauthorized person gaining access to information. It also requires reasonable data security and provides standards tailored to the size of a business.
  • 18. Implementing NYSHIELDAct • Reasonable administrative safeguards, such as the following: • designates one or more employees to coordinate the security program • identifies reasonably foreseeable internal and external risks • assesses the sufficiency of safeguards in place to control the identified risks • trains and manages employees in the security program practices and procedures • selects service providers capable of maintaining appropriate safeguards and requires those safeguards by contract; and adjusts the security program in light of business changes or new circumstances. • Reasonable technical safeguards, such as the following: • assesses risks in network and software design • assesses risks in information processing, transmission, and storage • detects, prevents, and responds to attacks or system failures • regularly tests and monitors the effectiveness of key controls, systems, and procedures. • Reasonable physical safeguards, such as the following: • assesses risks of information storage and disposal • detects, prevents, and responds to intrusions • protects against unauthorized access to or use of private information during or after the collection, transportation, and destruction or disposal of information within a reasonable amount of time after it is no longer needed for business purposes by erasing electronic media so that the information cannot be read or reconstructed.
  • 19. ComplianceRequirements forNYSHIELDAct • The SHIELD Act requires organizations to adopt “reasonable” security practices, policies and procedures to safeguard sensitive data in three critical ways: administrative safeguards, technical safeguards and physical safeguards. • Taking into account differing sizes and resources of businesses, the SHIELD Act emphasizes that the programs should be reasonable. At a minimum, requires ongoing monitoring of the implemented policies and procedures, regular risk assessment of the business’s technical infrastructure and physical premises, training personnel, reasonable vendor due diligence, as well as designating an individual responsible for the required policies, practices, assessment and maintenance. • Small business exemptions do exist, however, still require a security program that is modifiable and scaled in accordance with: Size and complexity of the business, Nature and scope of activities, and the sensitivity of the personal information collected • You are automatically considered compliant if your business is regulated by and compliant with the Health Information Portability and Accountability Act (HIPAA), Health Information Technology for Economic and Clinical Health Act (HITECH), the Gramm-Leach Bliley Act, New York’s Cybersecurity Requirements for Financial Services Companies, and any other federal or New York cybersecurity legislation.
  • 20. “Gotchas”forNY SHIELDAct • Similar to the CCPA and the GDPR, the SHIELD Act expands liability to any organization that collects private information of New York residents, regardless of where it was collected. This means that an organization does not necessarily have to conduct business in New York in order to come under the purview of the SHIELD Act • New York’s data and privacy laws require that in the event of a breach, the business must notify any and all New York residents whose private information may have been compromised. Now, with the expanded definitions of breach and private information, there is the potential for more events that will trigger New York’s breach notification requirements. Further, with these laws applying to any business that has New York residents’ information regardless of where the business is located, such breach notifications will apply to far more businesses and any breaches they may experience. • “Private information” is a subset of personal information – under the SHIELD Act, private information has been expanded to include any account information, biometric data (like iris scans, fingerprints, voiceprints, images, etc.) used to authenticate someone’s identity, and usernames or emails in combination with passwords, security questions or passcodes.
  • 22. Commonalities • Similar to the CCPA and the GDPR, the NY SHIELD Act expands liability to any organization that collects private information of New York residents, regardless of where it was collected. This means that an organization does not necessarily have to conduct business in New York in order to come under the purview of the NY SHIELD Act. • At a minimum, the NY SHIELD Act requires ongoing monitoring of the implemented policies and procedures, regular risk assessment of the business’s technical infrastructure and physical premises, training personnel, reasonable vendor due diligence, as well as designating an individual responsible for the required policies, practices, assessment and maintenance. CCPA is similar in these requirements and ISO/IEC 27001 would have similar requirements as well.
  • 23. Differences • Whereas CCPA and the NY SHIELD Act require compliance from the entities to which they apply, ISO/IEC 27001 is not a mandatory standard. • CCPA and NY SHIELD Act focus on protecting the data of the person while ISO/IEC 27001 focuses on protecting all types of critical data, infrastructure, applications and the organization itself.
  • 24. Takeaways • One standard/legislation can be used to support compliance with another • When implementing compliance with a standard or legislation, it is important to maintain evidence of your compliance and to self-audit as well • No one security standard or legislation should ever be relied upon as your only elements in your security program • Designate a Privacy Officer or security team to manage your privacy/data protection (note that a Privacy Officer is required in many cases!) • Complete an organizational risk assessment and ensure you have also classified your data as part of this exercise prior to implementing any security or privacy controls
  • 25. ISO/IEC 27001 Training Courses • ISO/IEC 27001 Introduction 1 Day Course • ISO/IEC 27001 Foundation 2 Days Course • ISO/IEC 27001 Lead Implementer 5 Days Course • ISO/IEC 27001 Lead Auditor 5 Days Course Exam and certification fees are included in the training price. https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001 www.pecb.com/events

Notes de l'éditeur

  1. a
  2. A “business” makes over 25 million in annual revenue, OR processes data for over 50,000 consumers/devices, OR derives 50% of revenue from the sale of customer data.
  3. Data requests must be fulfilled in 45 days. Discriminated against: ex. charged more or refused services, providing poorer quality of goods