What are your biggest challenges in handling consumer data with respect to data privacy and security and what tools and processes help you manage these?


1.7k views10 Comments

Senior Director of IT in Software, 10,001+ employees
Biggest concerns are clients data leak. We use a combination of controls to reduce the risk.
IT Operating Unit Director in Education, 10,001+ employees
The number of applications that have access to the data is a concern. Using tool for managing and securing our known APIs has been one improvement that has helped reduce our exposure. 
Computer Science Lecturer in Education, 51 - 200 employees
Main challenges in handling consumers data are data security threats coming mainly from human behaviours. In order to address these concerns we are focused on:
Limiting the Data Collected
Protect the Data Collected
Use a Strong Authentication Process
Implement a Privacy Policy.
Director of IT in Manufacturing, Self-employed
When first looking at this challenge, the major hurdle was identifying all of the locations of the data in question and then ensuring all of the appropriate best-in-class protection mechanisms were in place (least privilege, database encryption, etc.).  We implemented processes to categorize our data and used some SaaS tools to help develop a repeatable process for handling the data appropriately. 
CIO in Services (non-Government), 1,001 - 5,000 employees
Restricting the data to only those who need access.  This can be an Administrative burden.  Our main concern is data leak or where someone inadvertently sends the data to the wrong person.  The downsides of data leaks are well documented and the reputation of the firm will be at risk if we get it wrong.
Director of IT in Healthcare and Biotech, 11 - 50 employees
Keeping track of the changing/varying regulations by country/state.  Keeping track of where that data is in our eco-system.
CTO in Healthcare and Biotech, 51 - 200 employees
Moving agile can be challenging while respecting customer data, and having the whole team on board with the importance of small but significant exposure.
VP of IT in Software, 11 - 50 employees
Third-party dependencies is a big challenge
Director in Software, 10,001+ employees
Handling consumer data presents multitude of challenges with regards to privacy & security. A strong data classification and data handling policy with effective controls is required. Some practical challenges related to collection of consumer data, classifying and limiting personal data collection, securing data, implementation of effective controls in line with regulatory requirements etc.    
VP of IT, Self-employed
IMHO, the biggest challenge is knowing which data you need to accord with what level of protection. There are many tools and processes that can be used to secure the data once you know what needs to be protected.

My preference is to follow a zero trust approach I call MAZE, mission-critical assurance using zero-trust enforcement. MAZE combines zero trust enforcement while implementing a Defence-in-Depth approach to cybersecurity design.

I would begin by identifying and categorising the data into security classes based upon how much security control needs to be applied to the data. I would then divide the computing infrastructure into zones based upon the need to make the data available and the security class they belong to. Finally, I would build conduits between each zone using micro-segments and incorporate data security controls for each conduit. I prefer this approach since it helps me scale from hundreds to thousands of computing infrastructure assets.
1

Content you might like

Cyber Security36%

Cloud Computing/Cloud Migration49%

Artificial Intelligence (AI) and Machine Learning (ML)71%

IoT (Internet of Things)30%

Digital Transformation:31%

WFH/Remote Work16%

Legacy Systems Modernization11%

Data Management9%


158 PARTICIPANTS

1.5k views

CTO in Software, 201 - 500 employees
Without a doubt - Technical Debt! It's a ball and chain that creates an ever increasing drag on any organization, stifles innovation, and prevents transformation.
Read More Comments
42.2k views131 Upvotes319 Comments