Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementCybersecurity News

Preparing for the GDPR: What Security Needs to Know Now

By Red Curry
europe-flag-enews
January 4, 2018

The famous countdown clock in Times Square has just ushered in 2018, but there’s another clock that’s ticking – the one that marks the coming of the European Union’s General Data Protection Regulation (GDPR). This new set of stringent rules governing data protection massively impacts organizations around the world.

However, despite a two-year ramp-up time, a recent IDC survey of small and mid-sized European companies found that 22 percent of respondents didn’t even know what GDPR was. Of the companies that were aware of it, one in five had not begun preparing for it. And the Compliance, Governance and Oversight Council reported that only six percent of 132 compliance officer respondents worldwide feel their organizations are currently GDPR compliant.

Below is an overview of the regulation, along with what companies can do to make sure they are prepared for the May 25 effective date.

 

What the GDPR Requires

The GDPR’s official site calls it “the most important change in data privacy regulation in 20 years.” The goal of the GDPR is to unify data security, retention and governance legislation across EU member states to protect its population’s data. All companies with more than 250 employees that process the personal data of people residing in the EU, regardless of the company’s location, must comply.

Personal, banking, health and credit card information are examples of the sensitive data that this regulation requires greater oversight for regarding how it is stored and transferred. Most organizations will need to appoint a Data Privacy Officer who reports to a regional authority, as well. EU residents have new rights, including data portability, the right to be forgotten (erasure) and to be notified within 72 hours of the discovery of a data breach.

The EU has set up significant fines for non-compliance to encourage companies to comply. Organizations can be fined up to four percent of annual global revenue or €20 million – whichever is greater. It’s important to understand that these rules apply to both controllers and processors, which means clouds will not be exempt.

An unintended consequence of GDPR is that a hacktivist will be able to add insult to injury by not only breaching your network and stealing data, with all those associated financial and reputation costs, but also making you susceptible to additional fines imposed by the new regulation.

 

Are You Prepared?

To prepare for GDPR, general guidelines include:

  • Determine your role and responsibilities as an IT security leader under GDPR;
  • Appoint a Data Protection Officer (DPO) to lead the task force to address GDPR compliance challenges; 
  • Review personal data processing operations and evaluate cross-border data flow compliance; 
  • Establish and maintain an internal framework for accountability; 
  • Institute a comprehensive central business registration and documentation of data processing activities; and
  • Get legal advice when implementing processes related to GDPR.

In addition, here are three security-specific tasks to complete.

 

1. Take cybersecurity seriously and invest in a front-to-back, complete security infrastructure.

  • Consider using Endpoint Detection and Response (EDR), an emerging technology. It is a category of tools and solutions that focus on detecting, investigating and mitigating suspicious activities and issues on hosts and endpoints. 
  • Consider using Network Behavior Anomaly Detection (NBAD) – the real-time monitoring of a network for any unusual activity, trends or events. 
  • Look at cloud, app and database behavior to detect anomalies that can indicate threats and compromise.
  • Reduce the attack surface with patching and configuration control. 
  • Segment networks and reduce single points of failure.
  • Reduce access scope and rights.
  • Build resilience so teams and products can recover quickly from incidents.
  • Move away from fetishizing “the wall;” the perimeter no longer exists.

 

 2. Educate employees on best practices as it relates to cybersecurity and privacy.

  • Understand that hackers are targeting you constantly.
  • Make sure your software is up to date.
  • Look out for suspicious emails and calls to obtain your information (phishing).
  • Use caution when clicking links online and in emails.
  • Choose strong passwords and password management practices and solutions.
  • Keep sensitive data secure and off your laptops and mobile devices.
  • Don’t leave your devices unattended.
  • Always back up your data in case of a ransomware attack.
  • Make sure your antivirus is up to date.

 

3. Enable the very basic security mechanisms and protocols for all individuals with access to the network, such as firewalls and antivirus software, at the user level.

The GDPR is coming, and no one can afford to ignore it. Use the information above to ensure that your organization has the people, technology and processes in place. These steps will help with compliance, but even more importantly, they will create a stronger data defense system that both your organization and its customers will benefit from.

KEYWORDS: cyber security legislation data breach data privacy GDPR international security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Red Curry is a cybersecurity strategist and evangelist at SSH Communications Security. Previously, Red held leadership positions in corporate marketing, product marketing and business development at Mettler Toledo Thornton Inc., RSA, the security division of Dell/EMC, and Boundless Spatial an open source geospatial tech software startup. He graduated with honors from The University of Massachusetts Lowell.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • gdpr-enews

    The GDPR and Privacy: What Security Leaders Need to Know

    See More
  • Rendered coding

    What Every Business Needs To Know About Multi-Factor Authentication

    See More
  • SEC0919-Edu2-Feat-slide1_900px

    What Do You Need to Know About the California Consumer Privacy Act?

    See More

Related Products

See More Products
  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

See More Products

Events

View AllSubmit An Event
  • January 16, 2025

    Preparing for the 2025 Threat Landscape

    ON DEMAND: In 2024, businesses faced a barrage of critical events with far-reaching impacts. From record-breaking storms and costly infrastructure failures to contentious election cycles and sophisticated cyberattacks, companies are navigating an increasingly complicated threat landscape.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing