PowerProtectYourData

Data Protection
Data Protection in an interconnected world: Are we really in control of our data?
Dell Technologies India
So here we start #PowerProtectYourData #crowdchat by asking the first question. #PowerProtectYourData https://www.crowdchat.net/s/55w3u
https://www.crowdchat.net/s/55w3u

Akhil Verma
(1/4) In current scenario, regulatory and reputational risk are the main concern which require strong data protection framework for an organization. #PowerProtectYourData
Akhil Verma
@DellEMCIndia(2/4) Organization use a giant tech ecosystem with partners sharing data to build better digital experiences. #PowerProtectYourData
Akhil Verma
(3/4) As data exchanges hands and lives in multiple places, the risk of data privacy breaches increases. This calls for an even more robust and thorough data privacy framework. #PowerProtectYourData
Akhil Verma
(4/4) A strong data protection framework can empower organization to restrain harmful data practices, and limit data exploitation. #PowerProtectYourData
Jyotish B
Is there any Framework/guidelines for Data security for large scale adoption?
Fal Ghancha
(1/4) The biggest concern today with organisation is Data visibility. #PowerProtectYourData
Fal Ghancha
(2/4) The organisation has been building the ecosystem, processes since ages, in today’s ever-changing world, it is very difficult to maintain and keep the data repository up to date. #PowerProtectYourData
Jyotish B
Where is the main scare of vulnerability?
Fal Ghancha
(3/4) Hence following high level concerns: data visibility, control over unstructured data across organisation, ever changing process and dynamic data requirements. #PowerProtectYourData
Fal Ghancha
(4/4) Hence to overcome above challenges, organisation strongly needs data protection framework which will give organisation view and right decisions can be taken using this framework. #PowerProtectYourData
Avnish Mehta
(1/3) According to the National Cyber Security Alliance, 60% of small and mid-sized businesses that are hacked go out of business within six months. #PowerProtectYourData
Avnish Mehta
(2/3) Data is the fuel that drives world’s economic engine today. It is used by organizations to identify & know their market, customers, partners, competition and the opportunities to define their business model, create IP & strategize to grow & thrive. #PowerProte
Avnish Mehta
(3/3) Leakage or lose of data can be a death knell for a company by harming its customers, the partners and loss of IP and opportunities. It will further lead to more losses by losing access to data in future making business untenable. #PowerProtectYourData
S J Sudhakar
1/6The Massive Growth of Data: Data has grown exponentially over the last decade, yet poor security practices continue to put organizations at risk of a data breach. Because of the veracity and volume of data in our technology-driven world. #PowerProtectYourData
S J Sudhakar
2/6Maintaining Data Privacy: It becomes overwhelming to handle millions and possibly even billions of data records. Personal Identifiable Information is one of the biggest concerns in data privacy. #PowerProtectYourData
S J Sudhakar
3/6Number of Open Vulnerabilities & new threats: Rapid increase in vulnerabilities has led to a record-breaking number of public data breaches as well. It becomes critical to have an established patch management process or template in place. #PowerProtectYourData
S J Sudhakar
4/6Lack of data protection solutions for emerging technologies:IoT vendors don’t proactively release security vulnerability patches for connected devices, yet the number of devices sold grows at an unimaginable pace. #PowerProtectYourData
S J Sudhakar
5/6Human Error Creates a Level of Complexity: Many security analysts claim that human error is the biggest challenge in data privacy and security. It’s up to your team of security experts to create a security awareness that helps empower your employees. #PowerProtectYourData
S J Sudhakar
6/6 Ensuring compliance with regulations like GDPR:In order to ensure compliance, businesses must implement appropriate technical measures.This should include:
• Detailed record of data processing operations
• Data protection policies & procedures #PowerProtectYourData
Saloni Vijay
(1/5) Transformation of business and compliance with the latest regulations are the top concerns in this interconnected world. Any important data leakage can ruin the organization image and could be used as a weapon by competitor. #PowerProtectYourData
Jyotish B
There's is 60%probability of and industry being shut on being hacked.
Saloni Vijay
(2/5) To improve & maintain brand value & to strengthen business, it is very important to have controls over data privacy protections. Organization can be heavily penalized for non-compliance laws & regulations & against data protection & security laws. #PowerProtec
Saloni Vijay
(3/5) Data if not handled properly can be used against business & organization. Customer Data could be used by competitor to do various promotion to attract them. Employee data could be misused, & critical information could be available to the outer world. #PowerPro
Jyotish B
What is the concern when placing crucial data on cloud?
Saloni Vijay
(4/5) Customer trust can be broken with the organization if their important information like Aadhar number or bank details could be leaked. Data protection is directly related to customer trust and proportionate to increase customer base and revenue. #PowerProtectYo
Saloni Vijay
(5/5) Data is flowing freely and if an organization can demonstrate that they care about the privacy of their customer’s personal data which they collect, and process can have significant advantage over competitors. #PowerProtectYourData
S J Sudhakar
@jyotishsb The draft is available you can refer to that https://shorturl.at/noJY7
https://shorturl.at/noJY7
https://www.prsindia.org/sites/default/files/bill_files/Draft%20Personal%20Data%20Protection%20Bill%2C%202018%20Draft%20Text.pdf
Avnish Mehta
@jyotishsb You can look at: Cyber security capability maturity model (C2M2) and National Institute of Standards and Technology cyber security framework (NIST CSF) as a start.
Dell Technologies India
We ask the second question now. #PowerProtectYourData https://www.crowdchat.net/s/25w4o
https://www.crowdchat.net/s/25w4o

Akhil Verma
(1/4) Cloud service provider should assure that there are controls to prevent data loss or manipulation, what will happen if there is a data breach/ data hacking incident and where will the data be stored. #PowerProtectYourData
Akhil Verma
(2/4) Also, how will the security of interfaces be assured and will the access to the data be by authorized personnel only with full audit trail availability. #PowerProtectYourData
Akhil Verma
(3/4) Based on the above-mentioned queries, the vetting of potential Cloud Service Providers needs to be diligent and robust agreements should be implemented. #PowerProtectYourData
Akhil Verma
(4/4) This will ensure whether appropriate controls, checks and balances are in place and also to assure data confidentiality, data integrity & data availability. #PowerProtectYourData
Avnish Mehta
(1/3) We work very closely with our cloud partner and with third-party security solution providers to allow seamless access to data while ensuring its confidentiality, integrity, and availability. #PowerProtectYourData
Avnish Mehta
(2/3) We use the layered security architecture (OSI model) focused on prevention, detection and response. #PowerProtectYourData
Avnish Mehta
(3/3) We follow the best industry practices as prevalent in the industry; On the other hand, the threats are also getting more and more sophisticated. #PowerProtectYourData
Fal Ghancha
(1/3) Data threats are increasing day by day and with the onsite of cloud age it is becoming more challenging to have complete view on data movement. #PowerProtectYourData
Fal Ghancha
(2/3) Organisations now a days are investing heavily for complete visibility on the projects like Data Classification, Data Lake, Data Governance etc. #PowerProtectYourData
Fal Ghancha
(3/3) However, the journey continues, there is no destination for complete visibility, organisations need to continue investing in technologies and governance to keep everything up to date. #PowerProtectYourData
Saloni Vijay
(1/5) Most of the data threats are the outcome of non-effective tools used by the organization to protect data. Our organization is using all effective tools & techniques to overcome data threats. #PowerProtectYourData
Saloni Vijay
(2/5) To block unauthorized access to our system, we are using strong firewall & up to date anti-virus software. This proactively measures potential threats. It also scans the emails to ensure no malicious attachment or web links affect our network/systems. #PowerProtectYour
Vivek Ahuja
True, these tools are quite useful, but at the end we have to ensure users are well aware and trained to not fall prey to phishers and be very careful what they are clicking on !
Saloni Vijay
(3/5) Our major task force works from field. We have enabled multi-factor authorization to ensure only approved users & devices can access our network. DLP to prevent users from sending sensitive information or critical information outside our network. #PowerProtectYourData
S J Sudhakar
1/3 While cloud service provider will secure the cloud, the customer has to secure data inside the cloud which is outside the purview of the cloud provider. One must perform a detailed risk & control assessment covering the entire data life cycle. #PowerProtectYourData
S J Sudhakar
2/3 With the data present in cloud, the risk of cyber espionage, malware, etc. looms large on the organizations. Organization like us, therefore, have established strategies to eliminate risks associated with data related to human intervention. #PowerProtectYourData
S J Sudhakar
3/3 In my opinion security has to be viewed as a shared responsibility model. Securing the control plane also ensures that misconfigurations are managed. #PowerProtectYourData
Jyotish B
Agree with Saloni
Jyotish B
Most of the data threats are the outcome of non-effective tools used by the organization to protect data.
Saloni Vijay
(4/5) Encryption of email communication and authentication of sender’s identity to mitigates phishing & data loss risks by clearly verifying message origin so recipients can identify legitimate versus phishing emails. #PowerProtectYourData
Saloni Vijay
(5/5) Managing detection services that detect potential security issues and protect from them. #PowerProtectYourData
Jyotish B
@sjsudhakar @DellEMCIndia It should be joint responsibility of Cloud service provider and customer for Data protection.
Dipesh Thakar
Preserving & Preventing data is joint activity of cloud service providers & our individual organization, every cloud provider has standard rule configure to protect data, but every organization has different level of security requirement.
Dipesh Thakar
so organization has to share their security requirement properly & periodically review the same trough different tools & Technics.
S J Sudhakar
@jyotishsb Absolutely, Cloud service provider can provide security to infra level , however we as a user must know how to design and implement it with optimal protection