This month’s cybersecurity recap has a clear focus: the European Union’s General Data Protection Regulation (GDPR). Now in effect, GDPR has been a source of continuing difficulty and discussion for businesses around the world. But ready or not, the regulation has arrived and companies are now obligated to meet new data handling, disclosure and compliance standards. Here’s a look at some of the top GDPR stories published this May.

Shoring Up GDPR

While enterprises may not be fully prepared for GDPR, there’s no time like the present to gear up for potential compliance challenges. Cindy Compert, Distinguished Engineer and IBM Security’s chief technology officer (CTO) of data and security and privacy, suggests that companies can shore up their GDPR compliance outlook by considering the following:

  • Consult legal experts to determine their obligations
  • Create a cross-functional GDPR team
  • Review all privacy and customer consent policies
  • Ensure all compliance efforts can be tracked, audited and verified

WHOIS Worries

Pre-GDPR, the ICANN WHOIS database provided readily accessible information about registered domains, including owner contact information, availability and registered company. Under current interpretations of GDPR, however, access to this database will be significantly restricted for both security professionals and automated processes associated with security, making it harder for security researchers to track threat origins and discover causal links.

Privacy Problems

Even with GDPR now in force, many companies struggle to secure critical data. In fact, nearly one-quarter of all internal work folders are accessible by all employees within an organization — and almost half of companies surveyed had 1,000 or more sensitive files open to everyone on staff.

What’s more, many “ghost” users, employees who leave the company or move to a new department with different responsibilities, can still access critical files. Under GDPR compliance rules, this is a problem. Enterprises need to know who has access and demonstrate that this access meets new privacy expectations.

Addressing Insider Threats

In addition to “ghost” users, more traditional insider threats remain a critical concern for organizations. Under GDPR, however, the stakes are much higher. If staff maliciously or accidentally expose consumer information, the disclosure requirements alone could cripple corporate finances, to say nothing of assessed penalties and fines.

As a result, it’s critical to evaluate two key areas:

  • Consumer identity and access management (CIAM) solutions: CIAM tools are used to collect basic consumer information. Under GDPR, express consent is required to collect this data, along with clear descriptions of how this data will be used. In addition, consumers must have the ability to “opt out” at any time.
  • Insider threat controls: Because personal data can be found across applications, unstructured sources such as files and structured sources such as databases, insider threat controls are essential to limit the chance of a breach and ensure anyone accessing this information meets GDPR expectations. Companies must have tools in place to ensure the right people have access to personal data and remove any access that doesn’t meet GDPR compliance requirements.

Positive Outlook

Despite insider threat worries, privacy concerns and issues with WHOIS, IBM Security and the IBM Institute for Business Value’s new report, The End of the Beginning: Unleashing the Transformational Power of GDPR, found that the majority of business leaders see the new regulation as an opportunity for innovation. Eighty-three percent of business leaders agree that security and privacy are now key business differentiators and companies on the leading edge of GDPR believe it will create new opportunities for data-led business models and data monetization.

This dovetails with the findings of the IBM Cybersecurity and Privacy Research survey, conducted by The Harris Poll on behalf of IBM, which reported that 75 percent of consumers would not buy products from companies they don’t trust to properly secure their data.

Put simply? While complex and time-consuming, the shift to GDPR may drive long-term business benefits as public privacy perception shifts.

Read the full study: The End of the Beginning — Unleashing the Transformational Power of GDPR

Getting Your House in Order

Indeed, many companies see GDPR as a benefit rather than a burden. Why? Because you can’t protect what you don’t know. Companies can’t defend critical data if they don’t know where it’s located or assure regulators that systems are secure when they aren’t sure if applications are patched or hardware has been updated — and the GDPR provides ample incentive to clean house.

The result is a need for improved cybersecurity strategy. This starts with auditing corporate networks to determine what’s working, what isn’t and what needs to change.

For enterprises, GDPR offers a chance to take stock of current data-handling practices and implement changes that enhance both overall compliance and long-term ROI. While some regulations, such as the approach to WHOIS data, are still a work in progress, the GDPR compliance show puts subpar practices on notice and has the cybersecurity world watching to see what happens next.

Still on your GDPR journey? Get more actionable insights from the IBM Professionals

More from CISO

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

On holiday: Most important policies for reduced staff

4 min read - On Christmas Eve, 2023, the Ohio State Lottery had to shut down some of its systems because of a cyberattack. Around the same time, the Dark Web had a “Leaksmas” event, where cyber criminals shared stolen information for free as a holiday gift. In fact, the month of December 2023 saw more than 2 billion records breached and 1,351 disclosed security incidents, according to research from IT Governance — an increase of 332% and 187%, respectively, over the month of…

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today