Kathy Hunter The Business Relevance of Data Governance Sponsored by the BCS & DAMA UK 21 June 2011 London CONFIDENCE IN DATA

Size: px
Start display at page:

Download "Kathy Hunter The Business Relevance of Data Governance Sponsored by the BCS & DAMA UK 21 June 2011 London CONFIDENCE IN DATA"

Transcription

1 Kathy Hunter The Business Relevance of Data Governance Sponsored by the BCS & DAMA UK 21 June 2011 London CONFIDENCE IN DATA

2 Topics to be Covered Explaining the Gap between the Business and IT The dangers that the Gap presents A bit about data governance Ways that data governance can resolve the Gap

3 Mind the Gap! Why do we always ask - Are you with the Business or IT? Why is there this divide in our companies? What can be done to remove this Gap?

4 What Causes the Split? Communication Issues Business people are from Earth; IT people are from Pluto! When communication breaks down, schisms form Differences over Goals Business goals are mainly commercial, whereas IT goals are internal Lack of Understanding of Roles Perception of each others roles cause issues and confusion The Business don t understand what IT do IT can t understand the information requirements of the Business There is a perception that this is unavoidable and, more importantly, unfixable

5 Is the Gap Dangerous?

6 The Overall Effects of the Gap The Gap between IT and the Business causes all manner of trouble It... Breaks the company into two large silos Creates an US vs THEM environment Reduces the company s ability to react Complicates information-related activites Lowers staff morale Costs the company money IT may be thought to be uncooperative The Business finds ways around IT resulting in quality issues CONFIDENCE IN DATA

7 The Data Suffers! The Business often can t explain their information needs Disappointment occurs when key information is missing Business goals aren t met Subsequent efforts to complete missing data is costly or even impossible Scrap and Re-work Quality issues could undermine confidence in the data Ability to make decisions hampered

8 IT Projects May Fail Many development projects fail because the business is not ultimately happy with the results Could be due to a lack of understanding between the business and IT Business needs software tools to do their jobs IT are working to a specification that may be flawed Organisations lose money invested into the development as many projects will need to be started again IT departments are frustrated because they felt they were building something of real value to the business

9 Impacts to Departmental Budgets Business areas are increasingly demanding more money in their budgets to pay for Shadow IT IT budgets are reduced to compensate for business area budget increases This could lead to a loss of individuals with key IT skills Information quality costs increase as central controls over data are lost

10 Closing the Gap

11 In Reality, the Crossovers are Increasing Customer, financial and marketing data being used across the enterprise Professionals in many functions increasingly need data knowledge & skills But yet, the Gap remains

12 What Can Be Done to Close the Gap? The trick is to get IT & the Business really talking! But how? Data Governance can be the key!

13 The Power of Data Governance

14 What is Data Governance? Data governance provides principles, processes and measures that control the creation, storage, usage, security and disposition of data and ensure the quality of key information within an organisation Data governance should reside within the business areas of an organisation, not IT, but should include IT in its operation Data governance activities can go a long way in breaking down the barriers between the Business and IT and closing that GAP!

15 Engaging Business & IT Stakeholders Data governance is not down to IT to manage, it s a business function, driven by business goals Instituting a data governance programme involves all the major information stakeholders Bring stakeholders together to discuss the principles and procedures that will be involved Include members of the IT department as they share in the responsibilities and accountabilities

16 Plotting the Information Flows Key information flows from data creation and/or capture through to usage, reporting and removal need to be mapped and understood These run through the whole of the business and will clarify information needs, enhancing IT project success Bringing IT into this process will give them an understanding of customer/supplier relationships within the company Providing clear guidance for new developments Defining parameters for the change controls that are central to data governance

17 Improving Information Quality Information quality programmes should involve all areas of the Business and IT Data quality problems are often a result of broken or poorly implemented business processes Solving information quality problems within a joint operation between the IT and Business will provide better, longer lasting results This will also aid communication between different areas of the organisation regarding information

18 Instituting Stewardship Assigning Information Stewards from the Business for key master data will naturally align these individuals with members of IT related to this data Communication will improve as the data definitions, controls and procedures evolve Working together to ensure the integrity and security of these data elements will enhance understanding of respective roles in the company Everybody Wins!

19 In Summary A Gap really does exist between the Business and IT This Gap causes problems within an organisation The Gap can be closed, or at least minimised Many aspects of a data governance programme can help to resolve the Gap. These include Engaging Business & IT Stakeholders Plotting the Information Flows Improving Information Quality Instituting Stewardship

20 Any Questions?

21 Kathy Hunter Data Governance Manager DQM Group CONFIDENCE IN DATA

How to Become a DATA GOVERNANCE EXPERT

How to Become a DATA GOVERNANCE EXPERT How to Become a DATA GOVERNANCE EXPERT You re already a data expert. You ve been working with enterprise data for years. You ve seen the good, the bad, and the downright ugly. And you ve watched the business

More information

INTRODUCTION TO DATA GOVERNANCE AND STEWARDSHIP

INTRODUCTION TO DATA GOVERNANCE AND STEWARDSHIP INTRODUCTION TO DATA GOVERNANCE AND STEWARDSHIP Best Practices to Improve the Quality of Your Customer Data Why Data Governance and Stewardship? 3 Devoting resources to data quality pays dividends 1: Assess

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

GOVERNANCE, RISK & COMPLIANCE CPD FOR MEMBERS IN COMMERCE & INDUSTRY AUGUST 2018

GOVERNANCE, RISK & COMPLIANCE CPD FOR MEMBERS IN COMMERCE & INDUSTRY AUGUST 2018 GOVERNANCE, RISK & COMPLIANCE CPD FOR MEMBERS IN COMMERCE & INDUSTRY AUGUST 2018 1 GRC - INTRODUCTION A growing regulatory environment, higher business complexity and increased focus on accountability

More information

THE ESSENCE OF DATA GOVERNANCE ARTICLE

THE ESSENCE OF DATA GOVERNANCE ARTICLE THE ESSENCE OF ARTICLE OVERVIEW The availability of timely and accurate data is an essential element of the everyday operations of many organizations. Equally, an inability to capitalize on data assets

More information

SERVICE OVERVIEW SERVICES CATALOGUE

SERVICE OVERVIEW SERVICES CATALOGUE SERVICE OVERVIEW SERVICES CATALOGUE February 2010 With a proven track record of 600 modernization projects to date, harness Micro Focus outstanding record and experience of delivering enterprise application

More information

Data governance and data quality: is it on your agenda or lurking in the shadows?

Data governance and data quality: is it on your agenda or lurking in the shadows? Data governance and data quality: is it on your agenda or lurking in the shadows? Associate Professor Anne Young Director Planning, Quality and Reporting The University of Newcastle Context Data governance

More information

IT GOVERNANCE AND CORPORATE STRATEGY

IT GOVERNANCE AND CORPORATE STRATEGY IT GOVERNANCE AND CORPORATE STRATEGY Lawrence Ribeiro October 2014 Agenda n What is IT governance? n What are the results of IT governance? n IT governance and Enterprise Architecture n IT governance solution

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

google SEO UpdatE the RiSE Of NOt provided and hummingbird october 2013

google SEO UpdatE the RiSE Of NOt provided and hummingbird october 2013 google SEO Update The Rise of Not Provided and Hummingbird October 2013 Lead contributors David Freeman Head of SEO Havas Media UK david.freeman@havasmedia.com Winston Burton VP, Director of SEO Havas

More information

TDWI Data Governance Fundamentals: Managing Data as an Asset

TDWI Data Governance Fundamentals: Managing Data as an Asset TDWI Data Governance Fundamentals: Managing Data as an Asset Training Details Training Time : 1 Day Capacity : 10 Prerequisites : There are no prerequisites for this course. About Training About Training

More information

What is ITIL. Contents

What is ITIL. Contents What is ITIL Contents What is ITIL and what are its origins?... 1 Services and Service Management... 2 Service Providers... 3 Stakeholders in Service Management... 3 Utility and Warranty... 4 Best Practices

More information

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway.

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway. Aalborg Universitet Vision for IT Audit 2020 Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication from Aalborg University Citation

More information

Cyber Security in Real Estate

Cyber Security in Real Estate Cyber Security in Real Estate Protecting against a very real risk Mark Brown Executive Director, Cyber Security & Resilience The question is not if your company will be breached, or even when. It has already

More information

Where's the Beef from Enterprise Structured Content

Where's the Beef from Enterprise Structured Content Simply XML August 2017 Newsletter: Where's the Beef for Enterprise Structured Content Creating Great Structured Content-- Beta Participants Wanted Simply XML Tips and Tricks! August 2017 Simply XML August

More information

Best Practices in Data Governance

Best Practices in Data Governance Best Practices in Data Governance July 22, 2011 Miami Presented by Malcolm Chisholm Ph.D. mchisholm@refdataportal.com Telephone 732-687-9283 Fax 407-264-6809 www.refdataportal.com www.bizrulesengine.com

More information

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. Course Outline CISM - Certified Information Security Manager 20 Nov 2017 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Healthcare IT Modernization and the Adoption of Hybrid Cloud

Healthcare IT Modernization and the Adoption of Hybrid Cloud Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

SABSA. Title / definition. Type. Owner. Brief history and description SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA )

SABSA. Title / definition. Type. Owner. Brief history and description SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA ) SABSA Title / definition SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA ) SABSA is a framework for developing risk-driven enterprise information security and information assurance architectures

More information

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar Course Outline CISM - Certified Information Security Manager 22 Mar 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Tips for Effective Patch Management. A Wanstor Guide

Tips for Effective Patch Management. A Wanstor Guide Tips for Effective Patch Management A Wanstor Guide 1 Contents + INTRODUCTION + UNDERSTAND YOUR NETWORK + ASSESS THE PATCH STATUS + TRY USING A SINGLE SOURCE FOR PATCHES + MAKE SURE YOU CAN ROLL BACK +

More information

Maintaining & Increasing Stakeholder Confidence in IT Architecture

Maintaining & Increasing Stakeholder Confidence in IT Architecture Maintaining & Increasing Stakeholder Confidence in IT Architecture Eoin Woods eoin@artechra.com www.eoinwoods.info 1 Content Defining IT Architecture IT Architecture & Requirements Identifying Stakeholders

More information

Strategy & Planning: Data Governance & Data Quality

Strategy & Planning: Data Governance & Data Quality Strategy & Planning: Data Governance & Data Quality April 30, 2017 In the era of big data and data science, most commercial and nonprofit organizations realize the potential power of data in accelerating

More information

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT Dalton Cervo Author, Consultant, Data Management Expert March 2016 This presentation contains extracts from books that are: Copyright 2011 John Wiley & Sons,

More information

COMP6471 WINTER User-Centered Design

COMP6471 WINTER User-Centered Design COMP6471 WINTER 2003 User-Centered Design Instructor: Shahriar Ameri, Ph.D. Student: Pedro Maroun Eid, ID# 5041872. Date of Submission: Monday, March 10, 2003. (Week 9) Outline Outline... 2 ABSTRACT...3

More information

Applying Archival Science to Digital Curation: Advocacy for the Archivist s Role in Implementing and Managing Trusted Digital Repositories

Applying Archival Science to Digital Curation: Advocacy for the Archivist s Role in Implementing and Managing Trusted Digital Repositories Purdue University Purdue e-pubs Libraries Faculty and Staff Presentations Purdue Libraries 2015 Applying Archival Science to Digital Curation: Advocacy for the Archivist s Role in Implementing and Managing

More information

Protecting information across government

Protecting information across government Report by the Comptroller and Auditor General Cabinet Office Protecting information across government HC 625 SESSION 2016-17 14 SEPTEMBER 2016 4 Key facts Protecting information across government Key facts

More information

Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data

Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data an eprentise white paper tel: 407.591.4950 toll-free: 1.888.943.5363 web: www.eprentise.com Author: Helene Abrams www.eprentise.com

More information

ISSC is invited to consider the attached report and to support the proposal to change the priority order for the migration UEA web services.

ISSC is invited to consider the attached report and to support the proposal to change the priority order for the migration UEA web services. ISC11D005 Title: UEA Website Migration Author: Jonathan Richardson, Assistant Director, Corporate Information Services Date: 1 st November 2011 Circulation: ISSC 10 November 2011 Agenda: ISC11A001 Version:

More information

Solving the Enterprise Data Dilemma

Solving the Enterprise Data Dilemma Solving the Enterprise Data Dilemma Harmonizing Data Management and Data Governance to Accelerate Actionable Insights Learn More at erwin.com Is Our Company Realizing Value from Our Data? If your business

More information

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning.

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning. AIPM Association for International PMOs Expert Practitioner Foundation www.pmolearning.co.uk PMO The Leading Standard and Certification for PMO Professionals Today Understand the Value of High-Performing

More information

Mortality, Mayhem and You: Risk Management in Digital Health

Mortality, Mayhem and You: Risk Management in Digital Health Mortality, Mayhem and You: Risk Management in Digital Health Session #155, February 22, 2017 Todd Cooper, Exec. Director, Trusted Solutions Foundry Nicholas J. Mankovich, VP & CISO, BD Philip Raymond,

More information

Symantec Data Center Migration Service

Symantec Data Center Migration Service Avoid unplanned downtime to critical business applications while controlling your costs and schedule The Symantec Data Center Migration Service helps you manage the risks and complexity of a migration

More information

Data Governance. Mark Plessinger / Julie Evans December /7/2017

Data Governance. Mark Plessinger / Julie Evans December /7/2017 Data Governance Mark Plessinger / Julie Evans December 2017 12/7/2017 Agenda Introductions (15) Background (30) Definitions Fundamentals Roadmap (15) Break (15) Framework (60) Foundation Disciplines Engagements

More information

Planning and Implementing ITIL in ICT Organisations

Planning and Implementing ITIL in ICT Organisations CCPM Solutions Experts in ICT Performance Supporting Your Business Planning and Implementing ITIL in ICT Organisations June 2012, Addis Ababa Content 1. Quick ITIL (Overview) 2. Case study (How not to

More information

IS Audit and Assurance Guideline 2002 Organisational Independence

IS Audit and Assurance Guideline 2002 Organisational Independence IS Audit and Assurance Guideline 2002 Organisational Independence The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards

More information

Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives,

Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives, Virtualization Q&A with an industry leader Virtualization is rapidly becoming a fact of life for agency executives, as the basis for data center consolidation and cloud computing and, increasingly, as

More information

Keeping the lid on storage

Keeping the lid on storage Keeping the lid on storage Drive significant cost savings through innovation and efficiency Publication date: December 2011 Optimising storage performance & costs through innovation As the compute power

More information

Datacenter Care HEWLETT PACKARD ENTERPRISE. Key drivers of an exceptional NPS score

Datacenter Care HEWLETT PACKARD ENTERPRISE. Key drivers of an exceptional NPS score Datacenter Care The things I love about Datacenter Care is the a la carte nature of the offering. The contract is really flexible and the services delivered correspond exactly to what we bought. The contract

More information

Data Stewardship Core by Maria C Villar and Dave Wells

Data Stewardship Core by Maria C Villar and Dave Wells Data Stewardship Core by Maria C Villar and Dave Wells All rights reserved. Reproduction in whole or part prohibited except by written permission. Product and company names mentioned herein may be trademarks

More information

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016 Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data

More information

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN Improving Data Governance in Your Organization Faire Co Regional Manger, Information Management Software, ASEAN Topics The Innovation Imperative and Innovating with Information What Is Data Governance?

More information

Metadata Management as a Key Component to Data Governance, Data Stewardship, and Data Quality Management. Wednesday, July 20 th 2016

Metadata Management as a Key Component to Data Governance, Data Stewardship, and Data Quality Management. Wednesday, July 20 th 2016 Metadata Management as a Key Component to Data Governance, Data Stewardship, and Data Quality Management Wednesday, July 20 th 2016 Confidential, Datasource Consulting, LLC 2 Multi-Domain Master Data Management

More information

Cisco Collaboration Optimization Services: Tune-Up for Peak Performance

Cisco Collaboration Optimization Services: Tune-Up for Peak Performance Cisco Collaboration Optimization Services: Tune-Up for Peak Performance What You Will Learn More than 200,000 enterprises around the world have deployed Cisco Collaboration Solutions. If you are one of

More information

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE Business has always looked to squeeze the maximum possible benefit out of IT resources at the lowest possible cost but measuring return

More information

Data Governance Quick Start

Data Governance Quick Start Service Offering Data Governance Quick Start Congratulations! You ve been named the Data Governance Leader Now What? Benefits Accelerate the initiation of your Data Governance program with an industry

More information

HOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT

HOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT HOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT ARE YOU REALLY READY TO EXECUTE A GLOBAL IOT STRATEGY? Increased demand driven by long-term trends of the Internet of Things, WLAN, connected LED

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunications costs Research firm IDC 1 has estimated that a VoIP system can reduce telephony-related expenses by 30%. Voice over Internet Protocol (VoIP) has become a viable solution

More information

Achieving effective risk management and continuous compliance with Deloitte and SAP

Achieving effective risk management and continuous compliance with Deloitte and SAP Achieving effective risk management and continuous compliance with Deloitte and SAP 2 Deloitte and SAP: collaborating to make GRC work for you Meeting Governance, Risk and Compliance (GRC) requirements

More information

The Role of Data Profiling In Health Analytics

The Role of Data Profiling In Health Analytics WHITE PAPER 10101000101010101010101010010000101001 10101000101101101000100000101010010010 The Role of Data Profiling In Health Analytics 101101010001010101010101010100100001010 101101010001011011010001000001010100100

More information

BT Locate Affordable, local, secure data centres

BT Locate Affordable, local, secure data centres BT Locate Affordable, local, secure data centres We invest heavily in developing products and technologies that will provide you with the very best solutions for your company. Email clientreception@bt.com

More information

Enabling efficiency through Data Governance: a phased approach

Enabling efficiency through Data Governance: a phased approach Enabling efficiency through Data Governance: a phased approach Transform your process efficiency, decision-making, and customer engagement by improving data accuracy An Experian white paper Enabling efficiency

More information

Understanding Managed Services

Understanding Managed Services Understanding Managed Services The buzzword relating to IT Support is Managed Services, and every day more and more businesses are jumping on the bandwagon. But what does managed services actually mean

More information

THE CYBERSECURITY LITERACY CONFIDENCE GAP

THE CYBERSECURITY LITERACY CONFIDENCE GAP CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

Security Awareness Training Courses

Security Awareness Training Courses Security Awareness Training Courses Trusted Advisor for All Your Information Security Needs ZERODAYLAB Security Awareness Training Courses 75% of large organisations were subject to a staff-related security

More information

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government Florida Government Finance Officers Association Staying Secure when Transforming to a Digital Government Agenda Plante Moran Introductions Technology Pressures and Challenges Facing Government Technology

More information

Customer Experience, User Experience - and the Business Analyst

Customer Experience, User Experience - and the Business Analyst Customer Experience, User Experience - and the Business Analyst Professional roles around the Business Analyst and their relationship to the business analyst Authors: Thomas Geis and Knut Polkehn, UXQB

More information

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE 31st Annual SoCal ISSA Security Symposium Wendy T. Wu Vice President Agenda + CISO: Then and Now + Who are the Stakeholders and What Do They Care About?

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security

More information

COLUMN. Designing intranet homepages that help employees do their jobs. Too many homepages are stuffed with generic information MARCH 2013

COLUMN. Designing intranet homepages that help employees do their jobs. Too many homepages are stuffed with generic information MARCH 2013 KM COLUMN MARCH 2013 Designing intranet homepages that help employees do their jobs How useful is your organisation s intranet? More specifically, how useful is the intranet s homepage that hotly contested

More information

UKEF UK Export Finance. Transformation with the Microsoft Cloud

UKEF UK Export Finance. Transformation with the Microsoft Cloud UKEF UK Export Finance Transformation with the Microsoft Cloud the customer overview Customer UKEF Website www.gov.uk/uk-export-finance Number of employees UKEF s fixed deadline had major financial implications,

More information

Living With Agility

Living With Agility Living With Agility Tales from the Battlefield Who AM I? Daniel Laird - Head of Software 15+ Years Experience Started as a Software developer in Research with Philips Semiconductors Joined Ericsson Senior

More information

DATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK)

DATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK) DATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK) Release 2.2 August 2013. This document was created in collaboration of the leading experts and educators in the field and members of the Certified Data Steward

More information

Contents. viii. List of figures. List of tables. OGC s foreword. 3 The ITIL Service Management Lifecycle core of practice 17

Contents. viii. List of figures. List of tables. OGC s foreword. 3 The ITIL Service Management Lifecycle core of practice 17 iii Contents List of figures List of tables OGC s foreword Chief Architect s foreword Preface vi viii ix x xi 2.7 ITIL conformance or compliance practice adaptation 13 2.8 Getting started Service Lifecycle

More information

SD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast

SD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast SD-WAN Enabling the Enterprise to Overcome Barriers to Digital Transformation An IDC InfoBrief Sponsored by Comcast SD-WAN Is Emerging as an Important Driver of Business Results The increasing need for

More information

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives SECURING THE UK S DIGITAL PROSPERITY Enabling the joint delivery of the National Cyber Security Strategy's objectives 02 November 2016 2 SECURING THE UK S DIGITAL PROSPERITY SECURING THE UK S DIGITAL PROSPERITY

More information

Implementing BCM Frameworks. Monday 19 November Aidan O Brien Head of Resilience and Security National Australia Group Europe

Implementing BCM Frameworks. Monday 19 November Aidan O Brien Head of Resilience and Security National Australia Group Europe Implementing BCM Frameworks Monday 19 November 2012 Aidan O Brien Head of Resilience and Security National Australia Group Europe Murphy s Law 1. If anything can go wrong, it will 2. If there is a possibility

More information

Getting Started with IT Service Management

Getting Started with IT Service Management Getting Started with IT Service Management SMSG 4 th February 2014 BCS Bedford Branch Ian Connelly Over 15 years experience working in IT, latterly within Service Operations for Telcos, ISPs & the insurance

More information

9 TH SOUTHERN INDIA INFORMATION TECHNOLOGY FAIR (SIITF) THEME : EMERGING TECHNOLOGIES TO CREATE NEWER MARKETS

9 TH SOUTHERN INDIA INFORMATION TECHNOLOGY FAIR (SIITF) THEME : EMERGING TECHNOLOGIES TO CREATE NEWER MARKETS 9 TH SOUTHERN INDIA INFORMATION TECHNOLOGY FAIR (SIITF) THEME : EMERGING TECHNOLOGIES TO CREATE NEWER MARKETS INTRODUCTION Today s business environment is global and highly-interconnected, increasing an

More information

Breakdown of Some Common Website Components and Their Costs.

Breakdown of Some Common Website Components and Their Costs. Breakdown of Some Common Website Components and Their Costs. Breakdown of Some Common Website Components and Their Costs. The cost of a website can vary dramatically based on the specific components included.

More information

Nick Rozanski Andy Longshaw Eoin Woods. Sold! How to Describe, Explain and Justify your Architecture

Nick Rozanski Andy Longshaw Eoin Woods. Sold! How to Describe, Explain and Justify your Architecture Nick Rozanski Andy Longshaw Eoin Woods Sold! How to Describe, Explain and Justify your Architecture Objectives of Today If you are an architect who has to produce an Architectural Description, then this

More information

Cloud. Cloud. Digital Customer Experience. Cyber Security. Digital Employee Experience. IP Solutions. Digital Insight. Payments. Internet of Things

Cloud. Cloud. Digital Customer Experience. Cyber Security. Digital Employee Experience. IP Solutions. Digital Insight. Payments. Internet of Things Cloud Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Digital transformation in the

More information

Innovation Infrastructure Partnership

Innovation Infrastructure Partnership Innovation Infrastructure Partnership Vision The Innovation Infrastructure Partnership s vision is to support the creation, adoption and commercialisation of new technologies, helping UK companies to gain

More information

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals 2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals Sponsored by Contents Introduction....3 Key Takeaways from the 2017 Report:....3 Security

More information

Strategy & Technology

Strategy & Technology Strategy & Technology Marine Terminal Management Training Program September 12, 2013 The Positive and Pervasive Role of IT Enhancing Management and Operational Efficiencies What is IT Strategy? Why do

More information

Business Advantage Through Structured Skills Development

Business Advantage Through Structured Skills Development Business Advantage Through Structured Skills Development Business Advantage through Structured Skills Development BCS Career Developer is a powerful browser-based solution to help you define, manage and

More information

Contents. List of figures. List of tables. 5 Managing people through service transitions 197. Preface. Acknowledgements.

Contents. List of figures. List of tables. 5 Managing people through service transitions 197. Preface. Acknowledgements. Contents List of figures List of tables Foreword Preface Acknowledgements v vii viii 1 Introduction 1 1.1 Overview 3 1.2 Context 6 1.3 ITIL in relation to other publications in the Best Management Practice

More information

POSITION DESCRIPTION

POSITION DESCRIPTION POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose

More information

Managed IT Services Eliminating technology pains for SMBs

Managed IT Services Eliminating technology pains for SMBs Managed IT Services Eliminating technology pains for SMBs Business growth is often slowed by a lack of proper IT infrastructure. But, having a complete IT department is not a viable solution for most SMBs.

More information

The Problem with Privileged Users

The Problem with Privileged Users Flash Point Paper Enforce Access Control The Problem with Privileged Users Four Steps to Reducing Breach Risk: What You Don t Know CAN Hurt You Today s users need easy anytime, anywhere access to information

More information

Carine Jacquel Teaching and Learning Consultant (Computing)

Carine Jacquel Teaching and Learning Consultant (Computing) Learning Unlimited: BYOD and Learn Anywhere, Anytime, Any place Carine Jacquel Teaching and Learning Consultant (Computing) Carine.Jacquel@babcockinternational.com Aim of the session BYOD (Bring Your Own

More information

Data Governance Central to Data Management Success

Data Governance Central to Data Management Success Data Governance Central to Data Success International Anne Marie Smith, Ph.D. DAMA International DMBOK Editorial Review Board Primary Contributor EWSolutions, Inc Principal Consultant and Director of Education

More information

IBM Resiliency Services:

IBM Resiliency Services: IBM Resiliency Services: Always there, in an always-on world How did we get here? Two IT professionals are experiencing frequent business interruptions that are beyond what a traditional disaster recovery

More information

If you are looking for the book Logo design guide in pdf format, then you've come to the loyal site. We furnish full option of this book in PDF, txt,

If you are looking for the book Logo design guide in pdf format, then you've come to the loyal site. We furnish full option of this book in PDF, txt, Logo Design Guide If you are looking for the book Logo design guide in pdf format, then you've come to the loyal site. We furnish full option of this book in PDF, txt, epub, DjVu, doc formats. You may

More information

Making Security Agile

Making Security Agile Making Security Agile 2017 - INVITING SECURITY INTO DEVOPS SURVEY 1 CEOs are caught between a rock and a hard place. On one hand, there is tremendous pressure to digitally transform their companies. As

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT REALISING THE USER INTERFACE

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT REALISING THE USER INTERFACE BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT REALISING THE USER INTERFACE Friday 1 st April 2016 - Morning Answer any THREE questions

More information

How To Build or Buy An Integrated Security Stack

How To Build or Buy An Integrated Security Stack SESSION ID: PDIL-W03 How To Build or Buy An Integrated Security Stack Jay Leek CISO Blackstone Haddon Bennett CISO Change Healthcare Defining the problem 1. Technology decisions not reducing threat 2.

More information

The Ultimate Guide for Content Marketers. by SEMrush

The Ultimate Guide for Content Marketers. by SEMrush The Ultimate Guide for Content Marketers by SEMrush Table of content Introduction Who is this guide for? 1 2 3 4 5 Content Analysis Content Audit Optimization of Existing Content Content Creation Gap Analysis

More information

State of Cloud Survey GERMANY FINDINGS

State of Cloud Survey GERMANY FINDINGS 2011 State of Cloud Survey GERMANY FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff

More information

Which Side Are You On?

Which Side Are You On? 12/9/2015 ARE YOU THE NEXT CYBER WARRIOR? Maria S. Thompson State Chief Risk/Security Officer Which Side Are You On? 8/17/2015 2 Information Technology 2 1 Cyber Professionals Deficiency Statistics Cybersecurity

More information

ALIGNING CYBERSECURITY AND MISSION PLANNING WITH ADVANCED ANALYTICS AND HUMAN INSIGHT

ALIGNING CYBERSECURITY AND MISSION PLANNING WITH ADVANCED ANALYTICS AND HUMAN INSIGHT THOUGHT PIECE ALIGNING CYBERSECURITY AND MISSION PLANNING WITH ADVANCED ANALYTICS AND HUMAN INSIGHT Brad Stone Vice President Stone_Brad@bah.com Brian Hogbin Distinguished Technologist Hogbin_Brian@bah.com

More information

Case Study: myaccount

Case Study: myaccount Case Study: myaccount mygovscot myaccount is the simple and secure sign-in service to access online public services provided by eligible public bodies in Scotland. It is the agreed national approach for

More information

Cyber Risk A Corporate Directors' Briefing Webcast Q&A Summary

Cyber Risk A Corporate Directors' Briefing Webcast Q&A Summary Cyber Risk A Corporate Directors' Briefing Webcast Q&A Summary Cyber experts from Marsh & McLennan Companies and WomenCorporateDirectors hosted an engaging webcast on August 16 th entitled Cyber Risk A

More information

Why Your Data Really Matters

Why Your Data Really Matters Why Your Data Really Matters Governance and the Benefits of a Common Operating Picture John Pepper Director, OceanWise Ltd 1 Is This You? 2 Is This You? 3 Is This You? 4 The Impact of Poor Data Management

More information

An Executive Overview of ITIL v3

An Executive Overview of ITIL v3 An Executive Overview of ITIL v3 Abdullah Abonamah, PhD itsmf Gulf President ITIL V3 Launch Meet the Authors Monday 11 th June, 2007 What is ITIL? ITIL = IT Infrastructure Library A comprehensive and consistent

More information

The Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation. ISACA All Rights Reserved.

The Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation. ISACA All Rights Reserved. The Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation Tichaona Zororo CIA, CISA, CISM, CRISC, CRMA, CGEIT, COBIT 5 Certified Assessor B.Sc. Honours Information Systems,

More information