The GDPR: Ready for the wakeup call from your Data Privacy Officer?

From tracking health, booking travel, shopping online and sharing sensitive information with cloud providers; personal data seems to be the most exchanged form of currency today. As a result, the European Union has decided to formalize and set new standards to protect this data, and the new General Data Protection Regulation (GDPR) will come into effect across all EU states on 25th May 2018. It’s important to point out that GDPR compliance will not be relevant only for organizations within Europe. It will be relevant for any organization or entity globally that provides goods and services to Europe, or even simply processes data belonging to European citizens.

Lots of organizations are preparing for it, but many are unlikely to be fully compliant by May 2018. Industry analysts that I have spoken to expect non-compliant organizations that are involved in a breach to face high fines, particularly in the early days. This penalty will set benchmarks for data privacy violations, ensuring the regulation is properly adopted and adhered to.

As machine data is everywhere, it will play a key role in compliance with several articles in the GDPR regulation. To help you understand how machine data can be used, we have created a whitepaper on how it can support your GDPR compliance programme. To keep it practical for those responsible for security or compliance, we identified three common scenarios that an organization may face today. For each scenario, Splunk’s Data Privacy Officer shines a light on a lawyer’s perspective, and gives insight into what it will all mean under the new GDPR. The whitepaper also maps out in these scenarios how Splunk and machine data can be used for your advantage.

Download our GDPR Whitepaper: "How Machine Data Supports GDPR Compliance"

If you’re interested in learning more, we will host a webinar with Splunk’s Data Privacy Officer and more Splunk experts, where we will go through “A Day in a Life of a GDPR Breach”. We will explore a breach investigation and response scenario as it would be after the GDPR deadline and ultimately you can decide if you are ready for that wakeup call in the middle of the night when a breach occurs. Feel free to share this webinar with your extended GDPR Team or your Data Privacy Officer.

Sign up for our webinar: "A Day in the Life of a GDPR Breach"

In addition to this, be sure to join us at .conf later this month to learn how to protect your machine data should it contain personal information, and to apply data obfuscation techniques.

All the best,

Matthias

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.