Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Business
    3. >Tighter data privacy regimes demand action: four considerations for cybersecurity
    Business

    Tighter Data Privacy Regimes Demand Action: Four Considerations for Cybersecurity

    Published by Gbaf News

    Posted on June 13, 2018

    7 min read

    Last updated: January 21, 2026

    Add as preferred source on Google
    This image illustrates the rise in oil prices, prompted by escalating tensions in the Middle East. The article discusses how Yemen's Houthi attacks on the UAE have contributed to a surge in Brent and WTI crude prices, nearing record highs.
    Oil prices rise due to Middle East tensions affecting supply - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

     By John Vladimir Slamecka, Region President, EMEA, AT&T

    The end of May ushered in the General Data Protection Regulation (GDPR).

    Companies now need to have stricter policies and processes related how they collect, use and store personal data.

    There will be heavy penalties for GDPR violations. The new law sets stricter requirements on for example user consent, information to be provided to the user and stricter requirements on implementation of data protection measures. Data controllers have to disclose personal data breaches to regulators within 72 hours of becoming aware of a personal data breach.

    International companies need to comply with the new regimeif they want to have access to the EU market of 500 million people.

    What you can do: four recommendations to reassess security readiness

    Now is the time to safeguard your business for the long term and reassess your security processes as part of data protection readiness. As part of your reassessment, try this four-point security checklist.

    1. Conduct a cyber security risk audit and assessment

    Anaudit helps determine your current cybersecurity investments. A risk assessment will evaluate your security infrastructure and controls relative to the cybersecurity threat from emerging technologies and new hacking techniques. This could include the Internet of Things, mobility and cloud security. A gap analysis can also help you understand where you are versus where you want to be.

    Two-thirds of organizations do not conduct regular cyber risk assessments[1].Regular reviews are crucial for the success of your business.

    1. Set up a threat alertplatform

    Every end-point, such as an IoT device or mobile device is a potential entry point.And each has different security implications. The key is to build an integrated threat-analytics platform for all end-points. This platform needs to have a built-in, always-on security approach.

    You can use threat analytics to study the ecosystem and ensure you are safe at all times.

    An automated system that detects and responds to threats is important for audit and compliance procedures. A feed-back loop between your internal cybersecurity operations is ideal. Combined with a flexible risk management strategy, it can evolve based on daily threat activity and response.

    1. Get support from your service providers

    To help protect sensitive data and apps that reside in your network, you need to work with your service providers. You should have full visibility of your network traffic and be able to authenticate legitimate users while blocking suspicious activity.

    Today, an increasing number of companies are using artificial intelligence (AI) technologies to support their customers. AI tools can detect anomalous behavior and zero-day attacks. It helps to overcome the challenge of limited security resources.

    1. Organize ongoing staff training

    People are still the weakest link in the cybersecurity chain. Cybersecurity attacks affected nearly 80% of organizations in the past year; but only 61% mandated security training for staff[2].

    Every member of your organization needs to be aware of new types of security threats. Building a security culture takes time and effort and this sort of ongoing conversation with a top down approach is essential.

    At the same time, threats are getting more sophisticated. From casual intruders to well-funded criminal organizations, hackers are increasingly using big data analytics to search for threat vectors. They are also using AI for social engineering attacks, such as phishing, to steal sensitive data and credentials. Daily cybersecurity events now number in the millions[3], and we should expect ransomware, malware and other attacks to continue to escalate. The focus has to be on changing user behavior and putting in place the right procedures to counter these attacks.

    [1]2017 AT&T Global State of Cybersecurity

    22017 AT&T Global State of Cybersecurity

    3AT&T Cybersecurity Insights Report: Mind the Gap: Cybersecurity’s Big Disconnect

     By John Vladimir Slamecka, Region President, EMEA, AT&T

    The end of May ushered in the General Data Protection Regulation (GDPR).

    Companies now need to have stricter policies and processes related how they collect, use and store personal data.

    There will be heavy penalties for GDPR violations. The new law sets stricter requirements on for example user consent, information to be provided to the user and stricter requirements on implementation of data protection measures. Data controllers have to disclose personal data breaches to regulators within 72 hours of becoming aware of a personal data breach.

    International companies need to comply with the new regimeif they want to have access to the EU market of 500 million people.

    What you can do: four recommendations to reassess security readiness

    Now is the time to safeguard your business for the long term and reassess your security processes as part of data protection readiness. As part of your reassessment, try this four-point security checklist.

    1. Conduct a cyber security risk audit and assessment

    Anaudit helps determine your current cybersecurity investments. A risk assessment will evaluate your security infrastructure and controls relative to the cybersecurity threat from emerging technologies and new hacking techniques. This could include the Internet of Things, mobility and cloud security. A gap analysis can also help you understand where you are versus where you want to be.

    Two-thirds of organizations do not conduct regular cyber risk assessments[1].Regular reviews are crucial for the success of your business.

    1. Set up a threat alertplatform

    Every end-point, such as an IoT device or mobile device is a potential entry point.And each has different security implications. The key is to build an integrated threat-analytics platform for all end-points. This platform needs to have a built-in, always-on security approach.

    You can use threat analytics to study the ecosystem and ensure you are safe at all times.

    An automated system that detects and responds to threats is important for audit and compliance procedures. A feed-back loop between your internal cybersecurity operations is ideal. Combined with a flexible risk management strategy, it can evolve based on daily threat activity and response.

    1. Get support from your service providers

    To help protect sensitive data and apps that reside in your network, you need to work with your service providers. You should have full visibility of your network traffic and be able to authenticate legitimate users while blocking suspicious activity.

    Today, an increasing number of companies are using artificial intelligence (AI) technologies to support their customers. AI tools can detect anomalous behavior and zero-day attacks. It helps to overcome the challenge of limited security resources.

    1. Organize ongoing staff training

    People are still the weakest link in the cybersecurity chain. Cybersecurity attacks affected nearly 80% of organizations in the past year; but only 61% mandated security training for staff[2].

    Every member of your organization needs to be aware of new types of security threats. Building a security culture takes time and effort and this sort of ongoing conversation with a top down approach is essential.

    At the same time, threats are getting more sophisticated. From casual intruders to well-funded criminal organizations, hackers are increasingly using big data analytics to search for threat vectors. They are also using AI for social engineering attacks, such as phishing, to steal sensitive data and credentials. Daily cybersecurity events now number in the millions[3], and we should expect ransomware, malware and other attacks to continue to escalate. The focus has to be on changing user behavior and putting in place the right procedures to counter these attacks.

    [1]2017 AT&T Global State of Cybersecurity

    22017 AT&T Global State of Cybersecurity

    3AT&T Cybersecurity Insights Report: Mind the Gap: Cybersecurity’s Big Disconnect

    More from Business

    Explore more articles in the Business category

    Image for Submit Your Entry for Years of Excellence Awards 2026
    Submit Your Entry for Years of Excellence Awards 2026
    Image for Nominations Open for Travel & Hospitality Awards 2026
    Nominations Open for Travel & Hospitality Awards 2026
    Image for Submit Your Entry Today for Telecom Awards 2026
    Submit Your Entry Today for Telecom Awards 2026
    Image for Submit Your Entries for The Next 100 Global Awards 2026
    Submit Your Entries for the Next 100 Global Awards 2026
    Image for Submit Your Entry: Public Sector & Governance Excellence Awards 2026
    Submit Your Entry: Public Sector & Governance Excellence Awards 2026
    Image for Nominations Invited for Real Estate Development Awards 2026
    Nominations Invited for Real Estate Development Awards 2026
    Image for Submit Your Entry: Process & Product Awards 2026
    Submit Your Entry: Process & Product Awards 2026
    Image for Call for Entries: HR & Recruitment Awards 2026
    Call for Entries: HR & Recruitment Awards 2026
    Image for Submit Your Nominations Today for Education & Training Awards 2026
    Submit Your Nominations Today for Education & Training Awards 2026
    Image for Join the Corporate Governance Awards 2026: Showcase Your Organisation’s Leadership
    Join the Corporate Governance Awards 2026: Showcase Your Organisation’s Leadership
    Image for Submit Your Entry Today for Business Awards 2026
    Submit Your Entry Today for Business Awards 2026
    Image for Decentralized Masters’ ‘family culture’ building trust instead of hierarchy
    Decentralized Masters’ ‘family Culture’ Building Trust Instead of Hierarchy
    View All Business Posts
    Previous Business PostBusiness Use of Voice Technology to Triple in Next 12 Months According to Pindrop’s Latest Survey
    Next Business PostYounger Entrepreneurs Choose Social Impact as Their Top Business Priority