General Data Protection Regulation (GDPR) , Standards, Regulations & Compliance

Data Governance Best Practices in the GDPR Era

Matt Lock of Varonis on the Need to Have a Baseline for Data Access Behavior
Matt Lock, U.K. technical director, Varonis

Organizations that must comply with the EU's General Data Protection Regulation are now compelled to ensure they're handling personally identifiable information in a legal manner.

See Also: Wipro, AWS Team Up to Address Compliance in the Cloud Era

GDPR requires organizations "to make sure that they're aware of the data they hold and that they have a governance model in terms of access and control and accountability. And it's ... a very hard task to do," says Matt Lock of Varonis.

In a video interview at the recent Infosecurity Europe conference in London, Lock discusses:

  • Privacy by design;
  • Data governance essentials;
  • Using data context, access and visibility to create a baseline for behavior and better identify and respond to anomalous events.

Lock, the U.K. technical director for Varonis, has 17 years of experience in the field of network security. Specializing in risk assessment, risk management, policy compliance, security reviews and managing network behavior anomaly systems, Lock now leads Varonis' sales engineering team in the U.K., Ireland and Middle East.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.