Bringing Data Privacy and Cyber Security together for speed and agility, what is behind “cost per action“ a once-unimaginable metric, and a strong recommendation in Cyber to test, and not just trust, your defence.
‘Today, we have entered a new era of global privacy management. No longer will privacy be an isolated function that can be housed by just legal or compliance. There needs to be a connector somewhere — Privacy Operations — a new and separate group that will serve as the technical connector between the security and privacy teams.
Privacy Ops is much like DevSecOps, wherein security processes take place along with development sprints. And just as security practitioners had to become involved and affect the software life cycle, privacy practitioners today must understand the data life cycle and enforce protection controls throughout the data processing pipelines.
In Privacy Ops, we will see a merging of the security and privacy teams, in which the DPOs will leverage the security team’s expertise to implement and manage technology in order to simplify regulation adherence.’ Amit Ashbel hits several nails on their respective heads for Darkreading.com
Important to understand this next level of capabilities, here described through an example from Facebook, but valid across many players: ‘But this sort of data is so powerful that it produces results far more powerful than traditional advertising. For instance, Facebook offers the chance to pay not just for a certain audience size, but an actual business outcome, like a sale, an app download, or a newsletter subscription.
Once upon a time advertisers paid a “CPM” — cost per thousand views — for a marketing campaign. That was just the chance to get in front of people. Now Facebook offers a rate based on “CPA,” or “cost per action,” a once-unimaginable metric offered because the company is so confident in its understanding of people and their preferences that Facebook can essentially guarantee a certain number of people will do certain things.’ Jacob Ward for NBC News
No doubt you will have already taken some serious steps to enhance your cyber security. But, rather than crossing your fingers and hoping for the best, it is better to be proactive and use penetration testing to put your security through the wringer. Through the steps of a penetration test you can assess everything from the resilience of your on-site infrastructure to the validity of your policy on the loss or theft of company-owned devices.
Experts can take things further and give the physical security of your premises a once-over, ensuring that breaches cannot occur on-site or remotely.’ Via www.talk-business.co.uk