top of page

Case Study

GDPR

image 82.png

Introduction: The Imperative of Data Protection in the Digital Age

In today’s digital age, data protection has become a critical priority for businesses of all sizes. With vast amounts of personal and sensitive information being collected, stored, and processed, companies are increasingly responsible for safeguarding data against breaches and misuse. A proactive approach to data protection is essential not only to ensure compliance with regulatory requirements but also to build trust with customers and mitigate growing cybersecurity risks.

The General Data Protection Regulation (GDPR) stands as a comprehensive framework addressing the most pressing data security challenges. It harmonizes data privacy laws across Europe and sets strict requirements for organizations handling personal data. GDPR also addresses user concerns about privacy, giving individuals greater control over their information while demanding transparency from businesses.

With rapid technological advancements and data explosion, the regulation pushes companies to collect only necessary data and process it responsibly. Additionally, GDPR’s strict security requirements help businesses combat the growing risks from data breaches and cyber threats, mandating appropriate safeguards and imposing significant penalties for non-compliance.

By adhering to GDPR and taking proactive data protection measures, businesses can strengthen their cybersecurity posture, stay ahead of regulatory demands, and maintain the trust of their users in an increasingly interconnected world.

Problem Overview:

Navigating Regulatory Challenges & Privacy Demands

MGID, as a global native advertising platform, faces increasingly complex regulatory landscapes and rising user privacy expectations. As the company expands into new markets and adheres to industry-specific regulations, it must remain compliant with laws like GDPR, CCPA, and AdTech frameworks to avoid severe fines and operational risks. In this context, MGID confronts several key challenges:

Regulatory Compliance and Operational Pressure: Expanding into new markets brings stringent requirements from various international and industry-specific regulations, such as GDPR and AdTech frameworks. Non-compliance poses risks of hefty fines and reputational damage, while frequent vendor assessments and RFIs from enterprise clients, particularly in regulated sectors, add operational strain. This pressure highlights the need for streamlined compliance processes to support MGID’s growth and efficiency.

Users Demanding Adherence to Privacy Rights: Increasing user awareness about their privacy rights has placed additional pressure on MGID to protect personal data and respond swiftly to requests regarding data access, deletion, and consent management.

Failure to Meet Privacy Requirements of Large Enterprise Clients: Large enterprise clients demand rigorous security and privacy measures. MGID must provide verifiable evidence that its practices align with these stringent expectations, or risk losing valuable business opportunities.

Lack of Confidence in Data Breach Response: Before the implementation of GDPR compliance, MGID faced internal uncertainty about handling data breaches effectively, creating a fear of regulatory penalties and a lack of preparedness to act swiftly in case of an incident.

These challenges necessitate not just compliance with GDPR but also a comprehensive security strategy that builds real resilience against threats.

Key Results: 

Achieving GDPR Compliance with Confidence

Big4 Validation: Zero Non-Conformities

MGID's meticulous implementation of GDPR practices was validated through a rigorous external audit conducted by a Big4 firm, which confirmed zero non-conformities with GDPR standards. This validation demonstrated that MGID’s GDPR compliance was robust enough to withstand both user policy examinations and legal scrutiny. The absence of required corrective actions reinforced MGID’s reputation as a trusted partner in the industry, particularly as a member of Google's Authorized Buyer Program.

Compliance as a Competitive Advantage

As GDPR compliance becomes a prerequisite for collaboration with enterprise clients, MGID’s robust privacy framework removes a key barrier for partnerships. The company’s commitment to data privacy standards has enabled it to seamlessly address RFIs from potential customers on data protection, easing concerns that could otherwise be deal-breakers for Enterprise clients who prioritize compliance.

Streamlined Compliance and Reduced Operational Burden through DPF

Participation in the Data Privacy Framework (DPF) program enabled MGID to streamline EU-U.S. data transfers, ease contractual processes, and reduce the operational burden of vendor assessments. This proactive approach allowed MGID to maintain compliance more efficiently, swiftly meet client expectations, and reinforce their status as a reliable partner in the AdTech industry.

Efficient Data Rights Management

At the heart of MGID’s GDPR compliance efforts was the development of a robust internal infrastructure and processes for handling data subject requests. This mechanism enabled MGID to effectively uphold users' rights as mandated by the regulation, while significantly reducing the risk of substantial fines for any violations of those rights.

Swift Breach Response & Risk Mitigation

 

We ensured that MGID had the necessary processes and technical measures in place to handle potential data breaches. The company is now equipped to respond swiftly to breaches, minimizing their impact and reducing the likelihood of severe legal or financial repercussions. By embedding GDPR compliance into both its legal and technical infrastructure, MGID has safeguarded its business from risk while fostering greater trust with customers and partners—proving that privacy and security are central to its long-term success.

Adtech Company Criteo Hit
with 40$M Fine by French DPA

The investigation by the French DPA uncovered five infringements of the GDPR by Criteo:

Article 7.1 GDPR

Failure to demonstrate that the data subject gave its consent

Articles 12 and 13 GDPR

Failure to comply with the obligation of information and transparency 

Article 15.1 GDPR

Failure to respect the right of access​

Articles 7.3 & 17.1 GDPR

Failure to comply with the right to withdraw consent and erasure of data 

Article 26 GDPR

Failure to provide for an agreement between joint controllers

As a result, Criteo was issued a fine of USD 40 million, a decision the AdTech company is intending to appeal

Solution:
Building True Compliance

In the fast-evolving digital world, ensuring data privacy is not just a legal requirement but also a key element of building trust with clients and partners. 

Partnership

Chosen by Trusted Global and Local Brands

RTB.png
XANDR.png
XANDR-1.png
IMPROVE.png
HAVAS.png
DENTSU.png
WAVE.png
OMD.png
FERRERO.png
colgate-1.png
IKEA.png
Lavazza-Logo.png
colgate.png
AUSTRIA.png
XEVIO.png
wolksvagen.png
BNP_Paribas.png
HYUNDAI.png

Leading Media Brands Rely on MGID's Platform for Monetization and Ausience Development

netpoint.png
wetter.png
ilfatto.png
wprost.png
msn.png
opera.png
playmaker.png
italiaonline.png
flash.png
polska.png
newsweek.png
realpolitics.png
foot.png
wallstreet.png
record.png
finanzen.png
cnn.png

MGID, with Sekurno’s guidance, embarked on a comprehensive GDPR compliance journey that went far beyond ticking regulatory boxes. The goal was to build a robust, risk-managed security framework capable of protecting personal data, avoiding regulatory fines, and delivering transparency to all stakeholders.

  • Data Protection Impact Assessment (DPIA):
    Conducting a Data Protection Impact Assessment (DPIA) was crucial for identifying high-risk data processing activities. The DPIA enabled us to assess the risks and determine appropriate mitigation strategies to ensure MGID’s practices did not expose them to unnecessary regulatory scrutiny.
  • Lawfulness of Processing Review:
    To comply with GDPR, we reviewed how MGID processed personal data, ensuring every activity was legally justified under GDPR principles, such as consent or legitimate interest. This critical analysis ensured that all data collection and processing were grounded in proper legal bases, eliminating potential vulnerabilities in the system.
  • Employee Awareness and Training:
    GDPR compliance isn’t just about systems and processes—it’s fundamentally about people. To ensure that every MGID employee understood their critical role in maintaining compliance, we delivered comprehensive GDPR awareness training. These sessions equipped staff with a clear understanding of key data protection terms and principles, while also emphasizing their responsibilities in addressing data subject rights and reporting potential data breaches. This approach ensured that every team member was not only informed but also actively engaged in maintaining ongoing compliance.
  • Data Flow Analysis:
    The foundation of any GDPR compliance initiative is understanding where personal data flows. We started by meticulously mapping how MGID collected, processed, stored, and shared personal data across its services. This step gave us a clear picture of MGID's data-handling processes and helped us pinpoint which data required the highest level of protection.
  • Data Breach Management:
    One of the most challenging aspects of GDPR is responding to data breaches. We implemented a robust breach management procedure, including internal protocols for quick detection, classification, and reporting. Should a breach occur, MGID is prepared to notify relevant authorities and affected individuals within the GDPR-mandated 72 hours, significantly reducing risks of penalties and ensuring swift, appropriate responses.
  • GDPR-Specific Policy Implementation:
    Compliance policies are the backbone of any privacy program. For MGID, we created a full set of GDPR-specific policies, including Records of Processing Activities (ROPA), Privacy and Cookie Notices, Data Subject Rights Policy, and a Personal Data Breach Notification Policy, and others. These policies ensured that MGID was fully compliant with GDPR requirements while streamlining internal operations.
  • Third-Party Assessment:
    A critical aspect of GDPR compliance for MGID was ensuring that all external vendors with access to its data adhered to the same high standards of data protection. We began by identifying all third-party vendors involved in data processing, a crucial step to secure MGID's data flow. To ensure compliance, we established legally binding contracts with every third party, explicitly outlining their obligations under GDPR. This proactive approach helped safeguard MGID's data from potential risks associated with third-party interactions, while also demonstrating MGID’s commitment to GDPR standards and data protection.
  • Compliance Statement:
    As there is currently no formal certification for GDPR, the final step in the implementation process involved the Data Protection Officer (DPO) preparing a detailed GDPR Compliance Statement. This document highlights the key elements of MGID’s data protection framework and demonstrates the company's adherence to GDPR. The statement serves as proof of MGID’s commitment to safeguarding personal data and provides assurance to clients and partners of their compliance with GDPR standards.
  • Will penetration testing disrupt my business operations?
    No, ethical hackers will work closely with you to ensure that testing does not impact your regular operations or service availability.
  • Why do we need penetration testing?
    Penetration testing shows you how an attacker would exploit your system — before they get the chance. It’s not just about checking a box. A proper pentest gives you a real-world view of your risks: where sensitive data could leak, what could take your platform offline, and which gaps might trigger a compliance failure. Whether you're scaling a digital health product, storing genomic data, or handling payments — penetration testing helps you: Catch vulnerabilities before they’re exploited Build trust with partners, investors, and customers Meet requirements for HIPAA, GDPR, ISO 27001, and more Ship faster by fixing the right things early We go beyond automated scans. Our engineers test like real attackers, then help you fix like product teams. Learn more about Pentesting here.
  • What’s the difference between vulnerability scanning and penetration testing?
    Vulnerability scanning is automated. It checks your systems for known issues, like outdated software or exposed services, and generates a list. Penetration testing is manual and strategic. A security expert actively simulates real attacks to exploit weaknesses and see what’s actually at risk - like accessing user data, bypassing authentication, or moving laterally inside your system. A good security program uses both; scans for ongoing hygiene, and pentests for risk validation and stakeholder assurance.
  • What is OWASP, and why is it important?
    OWASP (Open Web Application Security Project) is a nonprofit organization dedicated to improving the security of software. It’s best known for the OWASP Top 10 — a regularly updated list of the most critical web application security risks, such as broken access control, injection vulnerabilities, and security misconfigurations. At Sekurno, we use OWASP standards as a baseline in every application penetration test. It helps ensure your product isn’t just secure in theory — but resilient against the most common and dangerous real-world threats. Whether you're preparing for a compliance audit or just shipped a new release, aligning with OWASP is a smart and essential step in reducing application risk.
  • Do you offer a security attestation or badge we can share with clients?
    Yes. Sekurno provides a third-party attestation letter confirming that penetration testing was performed by our expert team, along with a verifiable badge you can display on your website or share with clients. The badge links directly to a hosted attestation letter, which outlines the scope, methodology, and date of the engagement — without disclosing sensitive details. It’s designed to build trust with partners, customers, and regulators by showing you take security seriously and have engaged an independent, credible testing team. This is especially valuable during compliance reviews, fundraising, or enterprise sales processes. You can view an example here.
  • How do you ensure that testing is done securely and responsibly?
    We follow established security frameworks like OWASP and PTES to ensure every engagement is thorough, controlled, and safe. All testing is conducted in isolated, authorized environments to prevent data leakage, service disruption, or impact to production systems. Every step, from scoping to reporting is handled by experienced security engineers who understand the importance of minimizing risk while uncovering real vulnerabilities. We also coordinate closely with your team to define clear testing windows, communication channels, and rollback procedures if needed. Responsible testing isn’t just about finding issues, it’s about protecting your operations and earning trust along the way.
  • Can I conduct penetration testing internally?
    Yes — but with limitations. Internal teams can perform basic security checks and even formal tests if they have the right expertise. However, internal testing often lacks the objectivity and specialized tactics of a dedicated offensive security team. External penetration testers bring: Unbiased assessment — no internal blind spots or assumptions Up-to-date techniques — based on real-world attacker behavior Broader experience — from testing across industries and architectures Credibility for audits and clients — especially for compliance and due diligence At Sekurno, we often work alongside internal teams, offering deeper, adversarial testing that complements in-house efforts. For high-risk industries or regulated environments, external testing isn’t just helpful, it’s expected.
  • What are the different types of penetration tests?
    Penetration testing can be categorized by both the target and the level of access provided. Common target types include: Network Penetration Testing: Assesses internal and external network infrastructure for misconfigurations, insecure services, or vulnerabilities. Web Application Testing: Focuses on identifying security issues in web-based software, such as authentication flaws, injection vulnerabilities, and access control misconfigurations. Mobile Application Testing: Evaluates mobile apps for insecure storage, improper permissions, weak encryption, and backend API exposures. Social Engineering Testing: Simulates phishing, pretexting, or other tactics to test the human element of your security. Penetration tests are also categorized by the level of information shared: Black Box Testing: The tester has no prior knowledge of the systems, simulating an external attacker. White Box Testing: Full internal knowledge is provided, such as source code and architecture documentation, simulating an insider or well-informed adversary. Gray Box Testing: A hybrid approach where the tester has partial knowledge, offering a balance between realism and depth. Each type offers different insights, and together they form a complete picture of your organization's security posture.
  • What can I expect in the final report?
    Our detailed report provides an executive summary for management, technical findings, a threat model document, and a checklist of all tests performed.
  • How often should I conduct penetration testing?
    At a minimum, once per year — but frequency depends on your risk, product velocity, and regulatory needs. We recommend testing: Annually, as a baseline After major code or infrastructure changes Before launching new features or integrations During compliance audits (HIPAA, GDPR, MDR/IVDR, ISO 27001) If you’re onboarding enterprise clients or handling sensitive data For high-risk sectors like biotech, healthtech, or fintech, a combination of continuous testing and annual deep dives is ideal. Not sure what cadence is right? We’ll help you map your product roadmap to a realistic security schedule.
  • What is ‘white box’ and ‘black box’ testing?
    ‘White box’ testing is when the tester has knowledge of the internal structures or workings of the application. ‘Black box’ testing is done without any prior knowledge of the infrastructure.
  • Is penetration testing costly?
    The cost of penetration testing varies based on scope, complexity, and type. However, considering the potential loss from a security breach, it’s a worthy investment for businesses.
  • What makes Sekurno different from other cybersecurity firms?
    Sekurno offers a comprehensive approach to cybersecurity, combining advanced pen-testing, continuous security support, and AI-assisted processes. With a dedicated team for each client and a commitment to transparency, Sekurno ensures that businesses are protected beyond mere compliance.
  • How does Sekurno ensure transparency in its services?
    Sekurno believes in no hidden fees and provides regular updates to clients. Every project involves at least two engineers, ensuring an unbiased approach, and we adhere to standards with checklists for all tests performed.
  • How has Sekurno benefited its clients in the past?
    Sekurno helps high-risk, highly-regulated companies turn security from a cost center into a strategic asset. Our clients, including biotech, healthtech, fintech, enterprise SaaS and AI companies - rely on us to uncover critical risks, meet complex compliance standards, and strengthen trust with partners and regulators. We’ve helped clients: Identify and remediate high-severity vulnerabilities missed by previous auditors or automated tools Pass HIPAA, GDPR, MDR/IVDR, FDA, and ISO 27001 audits faster and with less friction Reduce breach exposure across cloud-native and AI-driven platforms Build security systems that scale with growth, funding, and regulatory scrutiny Over 90% of clients return for additional work, and no client has reported a breach after working with us since 2022. One CTO put it best: “We’d worked with top-tier firms before, but Sekurno’s depth, responsiveness, and risk prioritization were on another level.” It’s this commitment to impact, clarity, and real security outcomes that earned us the #1 Global Cybersecurity Provider position on Clutch - a reflection of the trust our clients place in us.
  • What certifications do Sekurno's experts hold?
    Our team comprises experts with some of the most challenging certifications in the cybersecurity domain. This ensures that our clients receive top-notch service from knowledgeable professionals. Offensive Security / Red Teaming OSCP – Offensive Security Certified Professional OSWE – Offensive Security Web Expert OSEP – Offensive Security Experienced Penetration Tester OSWP – Offensive Security Wireless Professional OSWA – Offensive Security Web Assessor eCPTXv2 – eLearnSecurity Certified Penetration Tester eXtreme eWPTXv2 – eLearnSecurity Web Penetration Tester eXtreme eWPT – eLearnSecurity Web Penetration Tester eCPPT – eLearnSecurity Certified Professional Penetration Tester eJPT – eLearnSecurity Junior Penetration Tester eMAPT – eLearnSecurity Mobile Application Penetration Tester CRTO – Certified Red Team Operator CRTP – Certified Red Team Professional CRTE – Certified Red Team Expert CPSA – CREST Practitioner Security Analyst CRT – CREST Registered Tester Cloud & DevSecOps AWS Certified Security – Specialty Certified DevSecOps Professional (by Practical DevSecOps) CCSK – Certificate of Cloud Security Knowledge (Cloud Security Alliance) Defensive Security / Security Operations CySA+ – CompTIA Cybersecurity Analyst+ Governance, Risk & Compliance (GRC) CIPM – Certified Information Privacy Manager (IAPP) CIPP/E – Certified Information Privacy Professional / Europe (IAPP) ISO/IEC 27001 Lead Auditor
  • What does "security beyond compliance" mean?
    While many firms focus on meeting the minimum security standards set by regulations, Sekurno goes beyond that. We aim to reduce risks to the highest extent possible, ensuring that businesses are not just compliant but also genuinely secure.
  • How does Sekurno's AI-assisted process enhance cybersecurity?
    Our AI-assisted processes help in creating more accurate threat models, generating detailed reports, and formulating security policies. This ensures a faster response time and more efficient threat detection and mitigation.
  • How do I get started with Sekurno’s Application Security Services?
    To get started, you can schedule a consultation with our team. We will conduct an initial assessment of your current security posture, integrate a dedicated security expert into your team, and provide continuous support throughout the SDLC.
  • How does integrating security early (Shift-Left) benefit my business?
    Integrating security early, or shifting left, helps in early detection of vulnerabilities, reducing the cost and time required for remediation. It also improves the overall security posture of the application, leading to fewer security incidents and compliance issues.
  • What stages of the SDLC does Sekurno cover?
    Sekurno covers all stages of the SDLC, including: Requirements Analysis Architectural Design Software Development Testing Deployment Maintenance
  • What is Application Security?
    Application security involves integrating security practices into the software development lifecycle (SDLC) to protect applications from vulnerabilities and threats. It includes measures such as secure coding practices, threat modeling, security testing, and continuous monitoring.
  • Why is Secure SDLC important?
    Secure SDLC is crucial because it helps identify and mitigate security vulnerabilities early in the development process, reducing the cost and time required to fix issues. It also enhances the overall security and quality of the application, ensuring compliance with industry standards and regulations.
  • What tools and methodologies does Sekurno use?
    Sekurno uses industry-recognized tools and methodologies, such as Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Software Composition Analysis (SCA), and frameworks like OWASP ASVS and NIST CSF to ensure comprehensive security coverage.
  • How does Sekurno ensure compliance with industry standards?
    Sekurno ensures compliance by integrating security best practices and regulatory requirements into the SDLC. We use frameworks such as ISO/IEC 27001 and NIST CSF to guide our security measures and maintain alignment with industry standards.
  • Can Sekurno integrate with our existing development tools and workflows?
    Yes, Sekurno can integrate with your existing development tools and workflows. We work closely with your team to ensure seamless integration of security practices into your current processes, enhancing your overall security posture without disrupting productivity.

Conclusion:
Safeguarding the Future of AdTech with GDPR

MGID’s journey toward GDPR compliance, guided by Sekurno, reflects the company’s forward-thinking approach to data privacy in the ever-evolving AdTech industry. With a team of dedicated experts, MGID tackled this complex process with efficiency, maintaining strong organization, swift task execution, and seamless communication at every stage. This collaborative effort underscored their commitment not only to regulatory alignment but also to building a resilient and future-proof data protection framework.

By establishing comprehensive, GDPR-compliant systems and adopting best practices, MGID strengthened its operational capabilities, simplifying EU-U.S. data transfers, reducing the burden of vendor assessments, and enhancing client trust. Their proactive stance on compliance has empowered MGID to swiftly address regulatory requirements and client RFIs, positioning them as a preferred partner for enterprise clients who prioritize robust data privacy measures.

MGID’s achievement extends beyond compliance; it has cultivated a culture of accountability and transparency, aligning the company with the highest standards in data protection. This commitment to continuous improvement in security practices reinforces MGID’s credibility and stability in a highly competitive market, setting the stage for sustainable growth and long-term success in the digital age.

cybernova-sign
USAID-Identity

© 2024 Sekurno. All rights reserved.

bottom of page