Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default...

24

Transcript of Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default...

Page 1: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,
Page 2: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

Protecting the everyday.

Ken ChengRegional Sales Manager (S.E.A.)

Page 3: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

Opt for certified solutions

UL 2900-2-3 SC Omnicast

CSPN ANSSISynergis Cloud Link

On premise

Cloud solutions

Privacy & analytics

ISO 27001ISMS

FBI CJISCloud archives

DHS approvedSecurity Center

EuroPriSe certifiedPrivacy Protector

CPNI approvedIntrusion Detector

Microsoft GoldCloud platform

More info on genetec.com/trust

Page 4: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

Collaboration

People need to connect and share

Complexity

Overwhelming volume of data

Inefficiency

Unable to tap into productivity

Security

Threats are evolving

WHO WE ARE

Common challenges and trendsorganizations face today?

Understanding

A need for greater intelligence

Page 5: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

A platform with several core modules augmented through a portfolio of devices, add-ons, and plugins.

Securi ty Center

Synergis™

IP Access Control System (ACS)

Omnicast™

IP Video Management System (VMS)

AutoVu™

Automatic License Plate Recognition (ALPR)

Identification

Visualization Efficiency

Protection

Web Client

CommunicationsManagement

VideoAnalytics

PrivacyProtection

IntrusionMonitoring

Dynamic

Graphical Maps

Mobile

A D D -ONS

Page 6: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,
Page 7: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

The growing risks of our interconnected world

Page 8: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

The growing risks of our interconnected world

• It took 1 minute for a thief to steal a Mercedes, using the wireless signal from the victim’s car key. All he needed was a relay device.

A fake toaster was put online with an open web port on an unsecure network. It took less than 1 hour for hackers to compromise it.

Page 9: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

Bank of Chile’s cyber heist

$10M stolen, and Bank’s shares down

A ransomware used as a distraction to a series of fraudulent transactions to accounts abroad

9,000 computers disconnected across the country

Page 10: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

Cape Breton school breach

Violation of privacy laws and severe reputational damage

Footage of children in a Canadian primary school ended up on a Russian website, putting student safety at risk

All children entering or exiting the school

Page 11: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

Trends of 2018

Massive data breaches

Government bans and political tensions

Supply chain risk management is a hot topic

Regulations are quickly rising around the globe

Page 12: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

Records compromised in first half of 2018

18,525,816records lost or s tolen every day

Source: breachlevelindex.com

771,909records every hour

12,865records every minute

214records every second

H1 2018

Page 13: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

Estimated global cost of cybercrime

$5.8T

Page 14: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

SMBs go out of business after a cyber attack

60%

Source: US National Cyber Security Alliance

Page 15: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

Privacy matters

Page 16: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

Data protection laws

Fines up to 4% of worldwide revenues or 20 Million Euros

General Data Protection Regulation (GDPR)

Requiring periodic audits and data protection specialists

India’s privacy frameworkPersonal certification required for financial services companies

New York cybersecurity requirements

Consumer privacy law with an array of new rights

California’s data privacy law

Regulating the adequate use of personal data

Brazilian LGPD

Transparency, data minimization & lawful processing

Several laws for privacy rights

Page 17: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

Protecting personal data by design and by default

This includes, for example, a person's name, date of birth, telephone number, email, social security number, license plate number, photos or videos.

GDPR’s main goal is to unify and strengthen the data protection of individuals. Personal data is defined as information that can identify a person, directly or indirectly, by reference to one or more factors specific to them.

Page 18: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

Built-in privacy features

Share evidence while protecting privacy

Genetec Clearance allows you gather and share reliable evidence that protects everyone’s privacy.

You get to decide who sees what

Embedded authorization capabilities allow you to restrict the scope of activity within your system.

Automate privacy protection for video surveillance

KiwiVision Privacy Protector protects the identity of anyone captured in live and recorded video.

Page 19: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

What we recommend

Page 20: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

Untrusted devices causing controversy and getting banned around the globe

• Spying on African union

City-wide projects

French Police body-worn cameras

US Government banning devices

ANZ bans Chinese vendors for 5G

BREAKING: Japan to ban vendor

Page 21: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

Recommended approach

Follow cybersecurity and IT best practices

Ask the right questions

Choose security vendors you can trust

Invest in cybersecurity to prevent significant costs and liability

Page 22: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

Takeaways

There’s no silver bullet to cybersecurity

It’s a shared responsibility, and we play a central role

Threats are ever evolving and no one is ever fully secured

The human aspect is essential, and you cannot buy trust

We should start with the zero trust assumption

It’s not only about your devices or video feeds

Page 23: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

Genetec Trust Center

Genetec.com/Trust

Page 24: Protecting the everyday. · 2019. 12. 10. · Protecting personal data by design and by default This includes, for example, a person's name, date of birth, telephone number, email,

© Genetec Inc., 2019. Genetec, Genetec Clearance, Omnicast, Sy nergis, AutoVu, Federation, Stratocast, Sipelia, City wise, the Genetec Logo, the Mobius Strip Logo, the Genetec

Clearance Logo, the Omnicast Logo, the Sy nergis Logo, the AutoVu Logo, and the Stratocast Logo are trademarks of Genetec Inc., and may be registered or pending registration

in sev eral jurisdictions. Other trademarks used in this document may be trademarks of the manuf acturers or v endors of the res pectiv e products.

Thank you