November 6, 2017 By Adam Nelson 4 min read

An old friend once gave me some really valuable advice about reaching a goal. He said that you can’t get to where you’re going if you don’t know where you are. Over the years, I’ve found that to be true in a lot of situations. But I think it’s especially fitting in discussing GDPR readiness.

Know Where You Stand With GDPR Readiness

As Cindy Compert explained in our previous blog post, GDPR can be a very complicated regulation. That’s one of the reasons we developed the IBM Security GDPR framework. It’s a straightforward, privacy- and security-based approach to helping you achieve GDPR readiness. Just to refresh your memory, the framework comprises five phases that allow you to:

  • Assess your situation.
  • Design your approach.
  • Transform your practices.
  • Operate your program.
  • Conform with the necessary GDPR requirements.

So if you take my friend’s advice — and your goal is to achieve GDPR readiness — you need to start by figuring out where you are. And that brings us to Phase 1 in our framework, where you assess your situation. This is a good time to begin identifying and mapping how all your GDPR-related data is collected and used, where it’s stored and who can access it.

View IBM Security’s interactive guide to GDPR readiness

Cindy also explained in our last blog post that each of the framework’s five phases addresses both privacy and security issues. Here are the privacy requirements for the Assess phase:

  • Review existing privacy policies and statements and document how they compare with GDPR requirements.
  • Assess data subject rights to consent, use, access, correct, delete and transfer personal data.
  • Discover and classify personal data assets and affected systems.
  • Identify potential access risks.

And here are the security requirements:

  • Assess the current state of your security policies, identifying gaps, benchmarking maturity and establishing conformance road maps.
  • Identify potential vulnerabilities, supporting security and privacy by design.
  • Discover and classify personal data assets and affected systems in preparation for designing security controls.

Assessing Your Maturity Level

Once you have a clearer view of the potential privacy and security challenges you face, you can determine your organization’s maturity level for each of the required measures and see which issues you need to address in order to move forward. But how do you get there? A good place to start is with the GDPR readiness assessment from IBM. It can help you assess how your organization’s personal information is being collected and used, identify where it resides and track how it’s transferred — both internally and externally. More importantly, it can provide you with actionable feedback, and can assign one of the following five levels of GDPR maturity for each requirement, helping to determine whether:

  • You’ve yet to begin to address a specific requirement (Level 1).
  • You’ve taken minimal measures to address a requirement (Level 2).
  • You’ve identified necessary processes (Level 3).
  • You’re consistently measuring and controlling those processes (Level 4).
  • You’re continuously evaluating and improving those processes (Level 5).

So what can you do to increase your maturity levels? Let’s say all you know right now is that your organization is sharing GDPR-protected data with vendors — which means you have limited visibility into where that data will end up and how it will be handled once you’ve shared it. But by strengthening your vendor management processes — with data tracking, for instance — you’re moving in the right direction.

You can also formalize the team that’s responsible for these shares. Maybe call it the Risk-Compliance Group or the Third-party Audit Team. Then ask the team to develop a methodology for performing audits and to assemble and develop metrics to help understand the effectiveness of these audits for reporting purposes. For GDPR, that team can also help build the required technical and organizational measures (TOMs) for controllers to track processors (which is mandated by GDPR Chapter IV). These are just a few examples of how your organization can track and build your GDPR activities and maturity.

Navigating Your GDPR Journey

The better you understand where you are in your GDPR journey, the easier it will be for you to identify what you need to do next in order to reach your destination. And that’s where IBM can help you move forward. As I already mentioned, the GDPR readiness assessment from IBM can help you assess how personal information is collected and used, identify where it resides and track how it’s transferred both internally and externally.

In addition, IBM Security Guardium GDPR Accelerator can help you identify and address vulnerabilities, discover and classify GDPR-related personal data, and identify data access patterns and risks. And the Ten Essential Practices Assessment from IBM can help you assess your security capabilities and readiness, and develop a profile of your security governance and processes based on industry best practices.

I’m guessing that you’re probably thinking you’ve got a lot to learn about where you are in your GDPR journey. And if that’s the case, you’re probably right. But if you take the time and make the effort to fully understand where you are now, you’ll be improving your chances of ending up where you want to be.

Learn more about how IBM can help you navigate your journey to GDPR readiness with privacy and security solutions and within a broader perspective.

View IBM Security’s interactive guide to GDPR readiness

Notice: Clients are responsible for ensuring their own compliance with various laws and regulations, including GDPR. IBM does not provide legal advice and does not represent or warrant that its services or products will ensure that clients are in compliance with any law or regulation. Learn more about IBM’s own GDPR readiness journey and our GDPR capabilities and offerings to support your compliance journey here.

More from Data Protection

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

3 Strategies to overcome data security challenges in 2024

3 min read - There are over 17 billion internet-connected devices in the world — and experts expect that number will surge to almost 30 billion by 2030.This rapidly growing digital ecosystem makes it increasingly challenging to protect people’s privacy. Attackers only need to be right once to seize databases of personally identifiable information (PII), including payment card information, addresses, phone numbers and Social Security numbers.In addition to the ever-present cybersecurity threats, data security teams must consider the growing list of data compliance laws…

How data residency impacts security and compliance

3 min read - Every piece of your organization’s data is stored in a physical location. Even data stored in a cloud environment lives in a physical location on the virtual server. However, the data may not be in the location you expect, especially if your company uses multiple cloud providers. The data you are trying to protect may be stored literally across the world from where you sit right now or even in multiple locations at the same time. And if you don’t…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today