Minister urges UK firms to prepare for no-deal Brexit
Failure to have the appropriate plans in place could mean that businesses could lose access to vital data flows if the UK leaves the EU without a deal, the minister warned in a statement marking International Data Protection Day, also known as International Data Privacy Day.
The call follows similar calls by the Information Commissioner’s Office (ICO), which has published guidance and a six step strategy for companies to follow that will help companies review their exchanges of personal data with other countries and take the necessary action.
“I understand that for businesses both big and small the current uncertainty around Brexit is damaging and of great concern. However, it is vital that they prepare for every eventuality and that includes the risk of a no-deal scenario,” said James.
“If no deal was to happen, there is a risk that personal data exchanges between the UK and Europe would be disrupted if businesses do not have plans in place. I urge companies to check the ICO guidance and make sure they are prepared.
“The UK government takes data protection extremely seriously and we have already introduced robust new laws through the Data Protection Act last year. We’ve given people more power and control over their data and also strengthened the powers of the ICO.”
Through the Withdrawal Agreement, James said the government has made plans to secure what is known as a “data adequacy decision” from the EU, which will ensure UK and EU firms can carry on exchanging personal data like they do now.
Examples of an international transfer include UK companies that receive customer information from the EU, such as names and addresses, to provide goods or services. If a deal is agreed then discussions on adequacy will begin with the aim of an adequacy decision being in place before the end of the transition period in December 2020.
Under EU rules, adequacy decisions can take place with third countries and therefore cannot be finalised until the UK leaves the EU. This means that if the UK leaves with no deal, and therefore no adequacy decision, businesses need to be prepared and follow the ICO guidance.
Launched by the Council of Europe in 2006, Data Protection/Privacy Day has become an important awareness event worldwide, providing individuals and businesses with the correct information to ensure data is consistently in safe hands, according to security industry representatives.
Peter Carlisle, vice-president of global sales of nCipher Security, said the day provides a chance to reflect on the scores of data breaches that hit businesses in 2018.
“Compared to this time last year, there’s an unprecedented awareness of the importance of data security, with business-to-business (B2B) customers and consumers alike demanding trust, integrity and control when it comes to how companies manage their data,” he said.
As sophisticated and well-funded threat actors adapt quickly to new security measures, trying to protect customer data has become an exhausting process, said Carlisle.
“But the best defence in cyber security is a proactive one, and the right mix of hardware such as hardware security modules (HSMs), software and internal education provides a firm foundation of protection. Encryption, digital signing and key generation are also increasingly important, as data that is fully encrypted is useless to hackers even if a data breach does occur,” he said.
With General Data Protection Regulation (GDPR) in full force and customers valuing data protection higher than ever before, in 2019 businesses must value transparency above all, said Carlisle. “Transparency in how their data is being collected and used and transparency when it comes to disclosing the scale and affected parties if a data breach does occur,” he said.
Tristan Liverpool, director of systems engineering at F5 Networks, said corporate cloud literacy is becoming an operational prerequisite as technological progress accelerates, with the explosive proliferation of applications, and their associated data, creating a vast new playing field for cyber criminals in the cloud.
“We urge businesses this Data Privacy Day to rethink where their priorities lie in an increasingly complex and shifting IT landscape. An immediate priority should be to secure all business applications. This will allow organisations to gain a tremendous return on investment and manage multi-cloud deployments with greater certainty,” he said.
David Higgins, director of customer development at security firm CyberArk, said data privacy is not just a corporate or individual issue that affects digital lives. “It can be a route to compromising citizen safety. This Data Privacy Day, organisations should encourage their entire workforce – not just IT teams – to re-evaluate how they secure and manage data,” he said.
Dan Turner, CEO at Deep Secure, said businesses should always assume cyber criminals are better at attacking than organisations are at detecting them.
“Indeed, most ‘detect and protect’ technologies, like data loss prevent systems, are not sophisticated enough to identify new exfiltration methods. Steganography, for example, whereby a cyber criminal can encode both the initial infection and then the information it wants to steal into the pixel data of images, is largely undetectable.
“In 2019, we must concede that detect and protect technologies are no longer enough to assure the privacy of data. Instead, developing new prevention solutions, like content threat removal that can completely remove any ‘hidden information’ from coming into or out of an organisation, is the critical next step for the cyber security industry.”
Chris Huggett, senior vice-president of Europe and India at Sungard Availability Services, said that in the past year a number of firms around the world have demonstrated a lack of care when protecting people’s data.
“In fact, some have gone as far to do the opposite, by selling data to third parties and breaching the EU’s data protection rules due to a lack of transparency, inadequate information and lack of valid consent regarding ads personalisation.
“GDPR was the main discussion point on last year’s Data Privacy Day and the failure of huge organisations to comply by the rules means that this year should focus on the lessons learned,” he said.
Data Privacy Day is a great opportunity to expose unknown risks that organisations face, said Huggett, but moving forward it is vital that business leaders embed privacy into every operation.“This is the only sustainable way to ensure compliance on an ongoing basis. GDPR has simply set the bar higher for all of us and it is going to stay there for the foreseeable future.”
Industry: Cyber Security News
- Information Security Risk Consultant, London. ISO 27005
REFCH7901 Information Security Risk Consultant, London. ISO 27005 Information Security Risk consultant needed for a London based client. The ability to achieve SC security clearance will be required. ISO 27005 Risk Assessment experience is essential. The role will cover, Risk identification, Assessment and Advisory consulting. This is a client facing role, single client- not multiple. Experience working with multiple teams and internal stakeholders is essential. The information Security Risk Consultant should ideally have a breath of information Security and IT technology based security experience. Prior experience within the public sector is desirable, but not essential. Broad knowledge across Security IT transformation, Cloud is also key. Broad experience across GRC, iso27001, NIST is key. Ongoing support and training provided. Apply today for more information, all details kept in confidence.
- Google Cloud platform Security Engineer, Contract, inside IR35
- United Kingdom
REF CH7897 Google Cloud platform Security Engineer, Contract, Inside IR35 Looking for a Google Cloud platform Security Engineer will define, document, design, implement, harden and generally improve the security capability of a Google Cloud Platform. The ability to configure, and deploy the following Google Cloud Platform security solutioons is essential; Command Security Centre, Cluster Security, APIGEE, GCP Cloud Armor Hands on technical expertise security experience with Terraform, Kubernetes Security, Container (Docker) security, Secret Manager is essential as is experience securing Google Kubernetes Engine Workloads. It is essential that you have a proven track record of securing a GCP environment and expertise in automating that with Terraform. Scripting experience with the above where appropriate is a key ability. You will be highly technical and have the ability to engage with stakeholders to ultimately deliver a secure and hardened Google Cloud Platform.
- Security Analyst, London. Financial Services. End user.
CH7885. Security Analyst, London. Financial Services. End user. Immediate role. £55,000 Security Analyst needed to monitor and manage a security suite of tools within Financial Servicecs end user . The Security Analyst will be responsible monitoring, configuring, fine tuning, incident management and generally improving the security tool capability. Specific experience with CyberArk, Tripwire Log Center and Tripwire Enterprise is highly desirable). Current experience with Vulnerability management and penetration testing is highly desirable. Specifically the ability to effectively manage 3rd party pen tests. You will be working within a specialist security team reporting to the CISO. Experience working within a regulated end user environment within financial services is highly desirable. This role will run a hyrbid working schedule, partly remote, partly office based in London (once permitted) This is an exclusive role to DCL Search & Selection. https://calendly.com/chris-holt/call-with-chris-holt-dcl-search
- IAM Consultant- Identity Governance
- United Kingdom
- Upto £80,000 plus benefits
Identity and Access Management Consutlant is required for this established business who put their employees first. the role entails • Develop and maintain IAM services. • Further develop IAM tool integration with Service Now to provide automated JML processes and application access requests and fulfilment. • Provide guidance over Role Based Access in terms of Location based Roles, Application Roles and Business Roles and act as SME over any future RBAC project. • Work closely with our other Technology teams on integrating IAM services with Technology and business systems to increase efficiency through automation around areas such as JML processes, application access request fulfilment and attestation. • Work with the Governance Risk & Compliance (GRC) team to provide application access attestations and toxic combination alerting and reporting. • Involvement with Identity Management initiatives such as Single Sign On (SSO) and Privileged Access Management (PAM), to ensure security and business processes are in line with industry best practice. • Assist in ensuring that all IAM capabilities are mapped to internal processes, policies, and standards. Develop metrics to measure and improve the alignment. • Complete monthly review and report on sensitive group access, i.e., service accounts, admin accounts, etc. validating I&O processes are effective. • Provide information to both internal and external Auditors in response to findings. • Collate audit evidence for AAF audit and control reviews, taking responsibility for identifying service and process improvements to ensure compliance with our controls and standards. We are looking for someone with Hands on technical experience with the IAM tools, you need to have been involved in the integration of the IAM solution into 3rd party software like Servicenow, You will have worked with an IAM tools that are focused into Identity Goveranance, like RSA, CA Identity Suite, Fischer Identity, Hid Global, IBM IGL, Net IQ Identity Goverance, Omada, Ping or Oracle Post covid, this role will invovle a mix of home and office work, the business have a number of office spread across the UK so locaton is flexible for this position