Want to see how your organization compares to others in preparing for GDPR? In our report, Beyond GDPR: Data Residency Insights from Around the World, McAfee surveyed 800 senior business professionals from a range of industry sectors across eight countries around the world about their current approach to data protection, management, and residency.
Here are some of our findings:
- Where’s the data? 47% of organizations are completely confident that they know where their data is physically located.
- How well do you understand GDPR? 44% have a thorough understanding of the regulation and what it means to them.
- How long does it take to report a breach? It takes most organizations 11 days on average to report an incident. (The GDPR reporting deadline is 72 hours from becoming aware of the security breach.)
For an in-depth look at how McAfee can help you address GDPR compliance, download our solution guide “GDPR and Your Data Protection Transformation.”
An opportunity to change the way you secure data
Delivering personal data protection to EU residents continues to be a challenge and a priority as the business, technology, and threat landscapes evolve and become more complex. Where do you begin? As a first step, assess your data loss risks. Next, take an inventory of your attack surfaces and look at how you can better protect them. Finally, you’ll want to think about how your technology transformation plans could be integrated with a GDPR security investment to deliver personal data security.
- Step 1: Continuous Discovery and Assessment — Discover, classify, and inventory personal data.
- Step 2: Data Security — Protect personal data at rest and in motion on endpoints and in the cloud.
- Step 3: Application Security — Defend critical applications in the data center and cloud.
- Step 4: Cloud Data Security — Safeguard personal data that is uploaded to the cloud, that resides in the cloud, and that is downloaded from the cloud.
- Step 5: Breach and Detecton Response — Ensure that critical processes are in place to detect, investigate, and remediate breaches in a timely manner.