SlideShare a Scribd company logo
1 of 15
Download to read offline
ENTERPRISE DATA PRIVACY:
How Does Your Business Stack Up?
2
A recent survey examined the state of data
privacy in businesses. Results showed a
critical disconnect between companies’ data
privacy policies and protection of sensitive
data.
We’ve selected 10 questions from the survey
for you to answer. Keep track of your
responses, then see how your organization
compares to those in the study.
3
Regulated customer
data (credit cards,
health records, etc.)
Password or
authentication
credentials
Personal employee
info (SSNs, phone
numbers, etc.)
Intellectual
property
Accounting and
financial
Unregulated customer
data (emails, order
history, etc.)
Payroll Planning and
strategy documents
We do not
have sensitive
business data
What type of data is the most sensitive to your business?
(Select up to 3)
4
Does your IT organization
conduct regular SECURITY
audits to ensure compliance
with data security standards?
❏  Yes
❏  No
Does your IT organization
conduct regular PRIVACY
audits to ensure compliance
with data privacy standards?
❏  Yes
❏  No
5
How does your IT organization focus efforts to protect
data between external threats (hackers) and internal
threats (like careless employees)?
❏  More effort on internal threats
❏  More effort on external threats
❏  Same effort on both internal and external threats
6
Sales Marketing Owner/Partner Operations IT
Accounting Manufacturing Engineering Legal
Which departments are MOST likely to ignore
corporate data privacy policies? (Select up to 3)
7
Contractors Executives
Contributors/
front-line staff
Team
managers
What level of employee is most likely to
ignore data privacy policies?
8
Insufficient employee
awareness &
understanding of data
privacy policies
Lack budget to
purchase & implement
technology solutions
No process in place
to train or audit
employee behavior
Lack of executive
visibility or priority
into the problem
IT team doesn’t have
knowledge of laws
and requirements
Lack of data privacy
policies
Other We have no
challenges
Which of these challenges ensuring privacy of sensitive data
does your IT team face? (Select all that apply)
9
Access
Control
Log all data access Multi-factor
authentication
Encrypt data on
laptops
Encrypt data on
tablets and
smartphones
No technological
controls for data
privacy
What technological controls
does your organization
have in place to limit or
audit access to sensitive
data by authorized or
unauthorized parties?
(Select all that apply)
10
Which of these regional
data privacy challenges
does your business face?
(Select all that apply) Emerging rules and
regulations difficult to
track and implement
Requirements are
ambiguous, making it
difficult to determine
the correct course of
action
Technology vendors
not offering solutions
or guidance in
addressing regulations
Legal or compliance
team does not
communicate
requirements to IT
IT team lacks
compliance knowledge
to understand
requirements
Does not apply; we do
not have operations in
multiple countries.
11
How concerned are you about the privacy of sensitive
business data in the cloud?
Very concerned
Concerned
Not concerned
Does not apply; my company does not put any data in the cloud
12
In your opinion, which environment has
better data privacy controls?
Cloud On-premise
Now that you’ve taken the quiz, see how the experts
answered the same questions.
14
1.  Of the 99% of businesses which say they have sensitive data to
manage, 52% identified the most common types as credit cards
and health records. 46% selected password or other authentication
credentials, and 41% selected personal employee information such
as social security numbers.
2.  While almost half of organizations (47%) conduct regular privacy
audits, more (68%) conduct regular security audits.
3.  28% of companies focus efforts on protecting against internal
threats, like careless employees, that impact data privacy. 72% put
most of their efforts into protecting from external threats, like
hackers, that impact data security.
4.  48% of companies report that sales is the most likely to ignore data
privacy policies, followed by marketing (35%), owners or partners
(31%), and legal (6%).
5.  Individual contributors and front-line professionals are the most
likely to ignore data privacy policies (39%), closely followed by
executives (33%).
6.  93% of IT organizations face challenges ranging from insufficient
employee awareness (56%) and lack of budget to purchase
technology solutions (45%), to lack of process to audit behavior
(36%) and lack of executive visibility and priority (34%).
7.  63% of companies use some kind of technology approach to
ensure data privacy. The most common are basic access control
(58%) and logging data access (41%). 21% encrypt data on mobile
devices and 36% encrypt data on laptops.
8.  For global companies, 41% report facing difficulties tracking
emerging rules, 29% are challenged by ambiguity of requirements,
29% blame technology vendors for not offering solutions or
guidance to address regulations, and 17% say their IT teams lack
the ability to understand the requirements.
9.  87% of IT organizations are concerned about the privacy of cloud
data, including 32% who describe themselves as “very concerned”.
10.  65% of IT professionals still believe that their on-premises
environments have better privacy controls than the cloud, even
though the reputation of SaaS and public clouds has improved
dramatically in recent years.
SURVEY RESULTS
To learn more, download our research report:
The State of Data Privacy 2015

More Related Content

What's hot

C7 defending the cloud with monitoring and auditing
C7   defending the cloud with monitoring and auditingC7   defending the cloud with monitoring and auditing
C7 defending the cloud with monitoring and auditingDr. Wilfred Lin (Ph.D.)
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 DaysDigital Guardian
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDEryk Budi Pratama
 
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingProtecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingIntralinks
 
The Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditThe Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditSBWebinars
 
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay CompliantCloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay CompliantBlancco
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uaeRishalHalid1
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance? Blancco
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
Operational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportOperational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportJames Konderla
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights ManagementRahul Neel Mani
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 
Crossing the Threshold: Clinical Portals from a Site Perspective
Crossing the Threshold: Clinical Portals from a Site Perspective Crossing the Threshold: Clinical Portals from a Site Perspective
Crossing the Threshold: Clinical Portals from a Site Perspective Intralinks
 

What's hot (20)

C7 defending the cloud with monitoring and auditing
C7   defending the cloud with monitoring and auditingC7   defending the cloud with monitoring and auditing
C7 defending the cloud with monitoring and auditing
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingProtecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File Sharing
 
The Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditThe Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance Audit
 
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay CompliantCloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Operational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportOperational CyberSecurity Final Case Report
Operational CyberSecurity Final Case Report
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights Management
 
Data security
Data securityData security
Data security
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
Crossing the Threshold: Clinical Portals from a Site Perspective
Crossing the Threshold: Clinical Portals from a Site Perspective Crossing the Threshold: Clinical Portals from a Site Perspective
Crossing the Threshold: Clinical Portals from a Site Perspective
 

Viewers also liked

The State of Employee Engagement
The State of Employee EngagementThe State of Employee Engagement
The State of Employee EngagementHoopla Software
 
CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security ChecklistDruva
 
Why You Need Enterprise Backup
Why You Need Enterprise BackupWhy You Need Enterprise Backup
Why You Need Enterprise BackupDruva
 
Advanced Laboratory Analytics — A Disruptive Solution for Health Systems
Advanced Laboratory Analytics — A Disruptive Solution for Health SystemsAdvanced Laboratory Analytics — A Disruptive Solution for Health Systems
Advanced Laboratory Analytics — A Disruptive Solution for Health SystemsViewics
 
How Sales Reps Can Leverage Social Media
How Sales Reps Can Leverage Social MediaHow Sales Reps Can Leverage Social Media
How Sales Reps Can Leverage Social MediaHeidi Willbanks O'Brien
 
Cyber Security and Data Privacy: Views on Article III Standing LIVE Webcast
Cyber Security and Data Privacy: Views on Article III Standing LIVE WebcastCyber Security and Data Privacy: Views on Article III Standing LIVE Webcast
Cyber Security and Data Privacy: Views on Article III Standing LIVE WebcastThomas LaPointe
 
The Growth of Corporate Data (infographic)
The Growth of Corporate Data (infographic)The Growth of Corporate Data (infographic)
The Growth of Corporate Data (infographic)Druva
 
Defining Data Protection in the Cloud 디지탈링스
Defining Data Protection in the Cloud 디지탈링스Defining Data Protection in the Cloud 디지탈링스
Defining Data Protection in the Cloud 디지탈링스FaclconStorKR
 
Evans Online Privacy Quiz
Evans Online Privacy QuizEvans Online Privacy Quiz
Evans Online Privacy QuizDr. Joel Evans
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Frank Dawson
 
GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersIT Governance Ltd
 
Personal Data Protection for your Church
Personal Data Protection for your ChurchPersonal Data Protection for your Church
Personal Data Protection for your ChurchBenjamin Ck Ang
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionDruva
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
Infographic e5 - Your finance, Anytime. Any place. Anywhere
Infographic e5 - Your finance, Anytime. Any place. AnywhereInfographic e5 - Your finance, Anytime. Any place. Anywhere
Infographic e5 - Your finance, Anytime. Any place. AnywhereAdvanced Business Solutions
 
Small Business Owner Report Infographic - Spring 2014 Bank of America
Small Business Owner Report Infographic - Spring 2014 Bank of AmericaSmall Business Owner Report Infographic - Spring 2014 Bank of America
Small Business Owner Report Infographic - Spring 2014 Bank of AmericaGary Stockton (@expgstockton)
 

Viewers also liked (18)

The State of Employee Engagement
The State of Employee EngagementThe State of Employee Engagement
The State of Employee Engagement
 
CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security Checklist
 
Why You Need Enterprise Backup
Why You Need Enterprise BackupWhy You Need Enterprise Backup
Why You Need Enterprise Backup
 
Advanced Laboratory Analytics — A Disruptive Solution for Health Systems
Advanced Laboratory Analytics — A Disruptive Solution for Health SystemsAdvanced Laboratory Analytics — A Disruptive Solution for Health Systems
Advanced Laboratory Analytics — A Disruptive Solution for Health Systems
 
How Sales Reps Can Leverage Social Media
How Sales Reps Can Leverage Social MediaHow Sales Reps Can Leverage Social Media
How Sales Reps Can Leverage Social Media
 
Cyber Security and Data Privacy: Views on Article III Standing LIVE Webcast
Cyber Security and Data Privacy: Views on Article III Standing LIVE WebcastCyber Security and Data Privacy: Views on Article III Standing LIVE Webcast
Cyber Security and Data Privacy: Views on Article III Standing LIVE Webcast
 
The Growth of Corporate Data (infographic)
The Growth of Corporate Data (infographic)The Growth of Corporate Data (infographic)
The Growth of Corporate Data (infographic)
 
Defining Data Protection in the Cloud 디지탈링스
Defining Data Protection in the Cloud 디지탈링스Defining Data Protection in the Cloud 디지탈링스
Defining Data Protection in the Cloud 디지탈링스
 
Evans Online Privacy Quiz
Evans Online Privacy QuizEvans Online Privacy Quiz
Evans Online Privacy Quiz
 
랜섬웨어
랜섬웨어랜섬웨어
랜섬웨어
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
 
GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud Providers
 
Personal Data Protection for your Church
Personal Data Protection for your ChurchPersonal Data Protection for your Church
Personal Data Protection for your Church
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data Protection
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
Infographic e5 - Your finance, Anytime. Any place. Anywhere
Infographic e5 - Your finance, Anytime. Any place. AnywhereInfographic e5 - Your finance, Anytime. Any place. Anywhere
Infographic e5 - Your finance, Anytime. Any place. Anywhere
 
Small Business Owner Report Infographic - Spring 2014 Bank of America
Small Business Owner Report Infographic - Spring 2014 Bank of AmericaSmall Business Owner Report Infographic - Spring 2014 Bank of America
Small Business Owner Report Infographic - Spring 2014 Bank of America
 
Apps for Finance infographic_btc
Apps for Finance infographic_btcApps for Finance infographic_btc
Apps for Finance infographic_btc
 

Similar to Enterprise Data Privacy Quiz

The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceObservePoint
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2jmariani14
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowMapR Technologies
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOnRamp
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summarypatmisasi
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael Priyanka Aash
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessSirius
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskFiona Lew
 
CIO WaterCooler Focus: GDPR Jasmit Sagoo
CIO WaterCooler Focus: GDPR   Jasmit SagooCIO WaterCooler Focus: GDPR   Jasmit Sagoo
CIO WaterCooler Focus: GDPR Jasmit SagooAndrew Pryor
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009asundaram1
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgePerficient, Inc.
 
State of Data Governance in 2021
State of Data Governance in 2021State of Data Governance in 2021
State of Data Governance in 2021DATAVERSITY
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPR
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPRDigital Disruption and Consumer Trust - Resolving the Challenge of GDPR
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPRRichard Veryard
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage DetectionIJERA Editor
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfIDG
 

Similar to Enterprise Data Privacy Quiz (20)

The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2
 
Spo2 t17
Spo2 t17Spo2 t17
Spo2 t17
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
CIO WaterCooler Focus: GDPR Jasmit Sagoo
CIO WaterCooler Focus: GDPR   Jasmit SagooCIO WaterCooler Focus: GDPR   Jasmit Sagoo
CIO WaterCooler Focus: GDPR Jasmit Sagoo
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
State of Data Governance in 2021
State of Data Governance in 2021State of Data Governance in 2021
State of Data Governance in 2021
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPR
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPRDigital Disruption and Consumer Trust - Resolving the Challenge of GDPR
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPR
 
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 

More from Druva

Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druvaDruva
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudDruva
 
Rethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlRethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlDruva
 
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Druva
 
20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druvaDruva
 
Interested in working at Druva?
Interested in working at Druva?Interested in working at Druva?
Interested in working at Druva?Druva
 
Black Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlBlack Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlDruva
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
Soundbytes from the Frontlines
Soundbytes from the FrontlinesSoundbytes from the Frontlines
Soundbytes from the FrontlinesDruva
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
AWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSAWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSDruva
 
Data in the Wild: Survival Guide
Data in the Wild: Survival GuideData in the Wild: Survival Guide
Data in the Wild: Survival GuideDruva
 
40 scary stats about data at risk
40 scary stats about data at risk40 scary stats about data at risk
40 scary stats about data at riskDruva
 
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva
 
inSync Cloud FAQ
inSync Cloud FAQinSync Cloud FAQ
inSync Cloud FAQDruva
 
inSync FAQ
inSync FAQinSync FAQ
inSync FAQDruva
 
The Challenges of Windows XP Migration (infographic)
The Challenges of Windows XP Migration (infographic)The Challenges of Windows XP Migration (infographic)
The Challenges of Windows XP Migration (infographic)Druva
 
How Endpoint Mobility Kills Bare Metal Restore (infographic)
How Endpoint Mobility Kills Bare Metal Restore (infographic)How Endpoint Mobility Kills Bare Metal Restore (infographic)
How Endpoint Mobility Kills Bare Metal Restore (infographic)Druva
 
Series C: The growth, innovation, and leadership of Druva
Series C: The growth, innovation, and leadership of DruvaSeries C: The growth, innovation, and leadership of Druva
Series C: The growth, innovation, and leadership of DruvaDruva
 

More from Druva (20)

Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
 
Rethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlRethink Server Backup and Regain Control
Rethink Server Backup and Regain Control
 
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
 
20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva
 
Interested in working at Druva?
Interested in working at Druva?Interested in working at Druva?
Interested in working at Druva?
 
Black Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlBlack Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data Sprawl
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
Soundbytes from the Frontlines
Soundbytes from the FrontlinesSoundbytes from the Frontlines
Soundbytes from the Frontlines
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
AWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSAWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWS
 
Data in the Wild: Survival Guide
Data in the Wild: Survival GuideData in the Wild: Survival Guide
Data in the Wild: Survival Guide
 
40 scary stats about data at risk
40 scary stats about data at risk40 scary stats about data at risk
40 scary stats about data at risk
 
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
 
inSync Cloud FAQ
inSync Cloud FAQinSync Cloud FAQ
inSync Cloud FAQ
 
inSync FAQ
inSync FAQinSync FAQ
inSync FAQ
 
The Challenges of Windows XP Migration (infographic)
The Challenges of Windows XP Migration (infographic)The Challenges of Windows XP Migration (infographic)
The Challenges of Windows XP Migration (infographic)
 
How Endpoint Mobility Kills Bare Metal Restore (infographic)
How Endpoint Mobility Kills Bare Metal Restore (infographic)How Endpoint Mobility Kills Bare Metal Restore (infographic)
How Endpoint Mobility Kills Bare Metal Restore (infographic)
 
Series C: The growth, innovation, and leadership of Druva
Series C: The growth, innovation, and leadership of DruvaSeries C: The growth, innovation, and leadership of Druva
Series C: The growth, innovation, and leadership of Druva
 

Recently uploaded

Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slidesvaideheekore1
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesVictoriaMetrics
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...OnePlan Solutions
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingShane Coughlan
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesKrzysztofKkol1
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jNeo4j
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingShane Coughlan
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfRTS corp
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdfAndrey Devyatkin
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptxVinzoCenzo
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogueitservices996
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxRTS corp
 

Recently uploaded (20)

Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 Updates
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogue
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
 

Enterprise Data Privacy Quiz

  • 1. ENTERPRISE DATA PRIVACY: How Does Your Business Stack Up?
  • 2. 2 A recent survey examined the state of data privacy in businesses. Results showed a critical disconnect between companies’ data privacy policies and protection of sensitive data. We’ve selected 10 questions from the survey for you to answer. Keep track of your responses, then see how your organization compares to those in the study.
  • 3. 3 Regulated customer data (credit cards, health records, etc.) Password or authentication credentials Personal employee info (SSNs, phone numbers, etc.) Intellectual property Accounting and financial Unregulated customer data (emails, order history, etc.) Payroll Planning and strategy documents We do not have sensitive business data What type of data is the most sensitive to your business? (Select up to 3)
  • 4. 4 Does your IT organization conduct regular SECURITY audits to ensure compliance with data security standards? ❏  Yes ❏  No Does your IT organization conduct regular PRIVACY audits to ensure compliance with data privacy standards? ❏  Yes ❏  No
  • 5. 5 How does your IT organization focus efforts to protect data between external threats (hackers) and internal threats (like careless employees)? ❏  More effort on internal threats ❏  More effort on external threats ❏  Same effort on both internal and external threats
  • 6. 6 Sales Marketing Owner/Partner Operations IT Accounting Manufacturing Engineering Legal Which departments are MOST likely to ignore corporate data privacy policies? (Select up to 3)
  • 7. 7 Contractors Executives Contributors/ front-line staff Team managers What level of employee is most likely to ignore data privacy policies?
  • 8. 8 Insufficient employee awareness & understanding of data privacy policies Lack budget to purchase & implement technology solutions No process in place to train or audit employee behavior Lack of executive visibility or priority into the problem IT team doesn’t have knowledge of laws and requirements Lack of data privacy policies Other We have no challenges Which of these challenges ensuring privacy of sensitive data does your IT team face? (Select all that apply)
  • 9. 9 Access Control Log all data access Multi-factor authentication Encrypt data on laptops Encrypt data on tablets and smartphones No technological controls for data privacy What technological controls does your organization have in place to limit or audit access to sensitive data by authorized or unauthorized parties? (Select all that apply)
  • 10. 10 Which of these regional data privacy challenges does your business face? (Select all that apply) Emerging rules and regulations difficult to track and implement Requirements are ambiguous, making it difficult to determine the correct course of action Technology vendors not offering solutions or guidance in addressing regulations Legal or compliance team does not communicate requirements to IT IT team lacks compliance knowledge to understand requirements Does not apply; we do not have operations in multiple countries.
  • 11. 11 How concerned are you about the privacy of sensitive business data in the cloud? Very concerned Concerned Not concerned Does not apply; my company does not put any data in the cloud
  • 12. 12 In your opinion, which environment has better data privacy controls? Cloud On-premise
  • 13. Now that you’ve taken the quiz, see how the experts answered the same questions.
  • 14. 14 1.  Of the 99% of businesses which say they have sensitive data to manage, 52% identified the most common types as credit cards and health records. 46% selected password or other authentication credentials, and 41% selected personal employee information such as social security numbers. 2.  While almost half of organizations (47%) conduct regular privacy audits, more (68%) conduct regular security audits. 3.  28% of companies focus efforts on protecting against internal threats, like careless employees, that impact data privacy. 72% put most of their efforts into protecting from external threats, like hackers, that impact data security. 4.  48% of companies report that sales is the most likely to ignore data privacy policies, followed by marketing (35%), owners or partners (31%), and legal (6%). 5.  Individual contributors and front-line professionals are the most likely to ignore data privacy policies (39%), closely followed by executives (33%). 6.  93% of IT organizations face challenges ranging from insufficient employee awareness (56%) and lack of budget to purchase technology solutions (45%), to lack of process to audit behavior (36%) and lack of executive visibility and priority (34%). 7.  63% of companies use some kind of technology approach to ensure data privacy. The most common are basic access control (58%) and logging data access (41%). 21% encrypt data on mobile devices and 36% encrypt data on laptops. 8.  For global companies, 41% report facing difficulties tracking emerging rules, 29% are challenged by ambiguity of requirements, 29% blame technology vendors for not offering solutions or guidance to address regulations, and 17% say their IT teams lack the ability to understand the requirements. 9.  87% of IT organizations are concerned about the privacy of cloud data, including 32% who describe themselves as “very concerned”. 10.  65% of IT professionals still believe that their on-premises environments have better privacy controls than the cloud, even though the reputation of SaaS and public clouds has improved dramatically in recent years. SURVEY RESULTS
  • 15. To learn more, download our research report: The State of Data Privacy 2015