November 6, 2017 By Adam Nelson 4 min read

An old friend once gave me some really valuable advice about reaching a goal. He said that you can’t get to where you’re going if you don’t know where you are. Over the years, I’ve found that to be true in a lot of situations. But I think it’s especially fitting in discussing GDPR readiness.

Know Where You Stand With GDPR Readiness

As Cindy Compert explained in our previous blog post, GDPR can be a very complicated regulation. That’s one of the reasons we developed the IBM Security GDPR framework. It’s a straightforward, privacy- and security-based approach to helping you achieve GDPR readiness. Just to refresh your memory, the framework comprises five phases that allow you to:

  • Assess your situation.
  • Design your approach.
  • Transform your practices.
  • Operate your program.
  • Conform with the necessary GDPR requirements.

So if you take my friend’s advice — and your goal is to achieve GDPR readiness — you need to start by figuring out where you are. And that brings us to Phase 1 in our framework, where you assess your situation. This is a good time to begin identifying and mapping how all your GDPR-related data is collected and used, where it’s stored and who can access it.

View IBM Security’s interactive guide to GDPR readiness

Cindy also explained in our last blog post that each of the framework’s five phases addresses both privacy and security issues. Here are the privacy requirements for the Assess phase:

  • Review existing privacy policies and statements and document how they compare with GDPR requirements.
  • Assess data subject rights to consent, use, access, correct, delete and transfer personal data.
  • Discover and classify personal data assets and affected systems.
  • Identify potential access risks.

And here are the security requirements:

  • Assess the current state of your security policies, identifying gaps, benchmarking maturity and establishing conformance road maps.
  • Identify potential vulnerabilities, supporting security and privacy by design.
  • Discover and classify personal data assets and affected systems in preparation for designing security controls.

Assessing Your Maturity Level

Once you have a clearer view of the potential privacy and security challenges you face, you can determine your organization’s maturity level for each of the required measures and see which issues you need to address in order to move forward. But how do you get there? A good place to start is with the GDPR readiness assessment from IBM. It can help you assess how your organization’s personal information is being collected and used, identify where it resides and track how it’s transferred — both internally and externally. More importantly, it can provide you with actionable feedback, and can assign one of the following five levels of GDPR maturity for each requirement, helping to determine whether:

  • You’ve yet to begin to address a specific requirement (Level 1).
  • You’ve taken minimal measures to address a requirement (Level 2).
  • You’ve identified necessary processes (Level 3).
  • You’re consistently measuring and controlling those processes (Level 4).
  • You’re continuously evaluating and improving those processes (Level 5).

So what can you do to increase your maturity levels? Let’s say all you know right now is that your organization is sharing GDPR-protected data with vendors — which means you have limited visibility into where that data will end up and how it will be handled once you’ve shared it. But by strengthening your vendor management processes — with data tracking, for instance — you’re moving in the right direction.

You can also formalize the team that’s responsible for these shares. Maybe call it the Risk-Compliance Group or the Third-party Audit Team. Then ask the team to develop a methodology for performing audits and to assemble and develop metrics to help understand the effectiveness of these audits for reporting purposes. For GDPR, that team can also help build the required technical and organizational measures (TOMs) for controllers to track processors (which is mandated by GDPR Chapter IV). These are just a few examples of how your organization can track and build your GDPR activities and maturity.

Navigating Your GDPR Journey

The better you understand where you are in your GDPR journey, the easier it will be for you to identify what you need to do next in order to reach your destination. And that’s where IBM can help you move forward. As I already mentioned, the GDPR readiness assessment from IBM can help you assess how personal information is collected and used, identify where it resides and track how it’s transferred both internally and externally.

In addition, IBM Security Guardium GDPR Accelerator can help you identify and address vulnerabilities, discover and classify GDPR-related personal data, and identify data access patterns and risks. And the Ten Essential Practices Assessment from IBM can help you assess your security capabilities and readiness, and develop a profile of your security governance and processes based on industry best practices.

I’m guessing that you’re probably thinking you’ve got a lot to learn about where you are in your GDPR journey. And if that’s the case, you’re probably right. But if you take the time and make the effort to fully understand where you are now, you’ll be improving your chances of ending up where you want to be.

Learn more about how IBM can help you navigate your journey to GDPR readiness with privacy and security solutions and within a broader perspective.

View IBM Security’s interactive guide to GDPR readiness

Notice: Clients are responsible for ensuring their own compliance with various laws and regulations, including GDPR. IBM does not provide legal advice and does not represent or warrant that its services or products will ensure that clients are in compliance with any law or regulation. Learn more about IBM’s own GDPR readiness journey and our GDPR capabilities and offerings to support your compliance journey here.

More from Data Protection

How secure are green data centers? Consider these 5 trends

4 min read - As organizations increasingly measure environmental impact towards their sustainability goals, many are focusing on their data centers.KPMG found that the majority of the top 100 companies measure and report on their sustainability efforts. Because data centers consume a large amount of energy, Gartner predicts that by 2027, three in four organizations will have implemented a data center sustainability program, which often includes implementing a green data center.“Responsibilities for sustainability are increasingly being passed down from CIOs to infrastructure and operations…

Why maintaining data cleanliness is essential to cybersecurity

3 min read - Data, in all its shapes and forms, is one of the most critical assets a business possesses. Not only does it provide organizations with critical information regarding their systems and processes, but it also fuels growth and enables better decision-making on all levels.However, like any other piece of company equipment, data can degrade over time and become less valuable if organizations aren’t careful. What’s even more dangerous is that neglecting data hygiene can expose organizations to a number of security…

Router reality check: 86% of default passwords have never been changed

4 min read - Misconfigurations remain a popular compromise point — and routers are leading the way.According to recent survey data, 86% of respondents have never changed their router admin password, and 52% have never adjusted any factory settings. This puts attackers in the perfect position to compromise enterprise networks. Why put the time and effort into creating phishing emails and stealing staff data when supposedly secure devices can be accessed using "admin" and "password" as credentials?It's time for a router reality check.Rising router risksRouters…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today