Enabling Data Governance Leveraging Critical Data Elements
|
|
- Rebecca Megan Blankenship
- 5 years ago
- Views:
Transcription
1 Adaptive Presentation at DAMA-NYC October 19 th, 2017 Enabling Data Governance Leveraging Critical Data Elements Jeff Goins, President, James Cerrato, Chief, Product Evangelist, Copyright 2017 Adaptive, Inc. All Rights Reserved. 1
2 Confidentiality & Disclosure Agreement This is an unpublished work, the copyright in which vests in Adaptive, Inc. ( Adaptive ). All rights reserved. The information contained herein is confidential and the property of Adaptive, Inc. and is supplied without liability for errors or commissions. No part may be reproduced, disclosed or used, except as authorized by contract or other written permission. The copyright and the foregoing restriction on reproduction and use extend to all media in which the information may be embodied. All product names used herein are for identification purposes only and may be trademarks of their respective companies. Copyright 2017 Adaptive, Inc. All Rights Reserved. 2
3 Agenda Why are Critical Data Elements needed to make Enterprise Data Modeling more effective? What are Critical Data Elements and how to identify them? How to use Critical Data Elements to validate data movements? How to use Critical Data Elements to guide Business Rule definition and implementation? Copyright 2017 Adaptive, Inc. All Rights Reserved. 3
4 What are the limits to getting value from an Enterprise Data Model? Enterprise Data Models are BIG and complex The work to get full value from them at the logical and physical level can be extremely time consuming Traceability, Lineage and Governance are used to achieve value from an Enterprise Data Model However, this can t be done all at once, but takes many separate projects Copyright 2017 Adaptive, Inc. All Rights Reserved. 4
5 Why are Critical Data Elements needed? The all-at-once enterprise approach doesn t deliver tangible value soon enough Addressing only one business area or one database misses important aspects Instead focus on specific data items across the enterprise according to how critical they are By focusing on Critical Data Elements you address the important data needs that might span multiple organizations across the enterprise You can provide rich model of business context (not practical to do for a whole enterprise data model) Copyright 2017 Adaptive, Inc. All Rights Reserved. 5
6 What are Critical Data Elements (CDEs)? There is an enormous proliferation of data For data management and data governance activities to be successful there must be a focus on data that is vital to the successful operation of an enterprise CDEs identify which data is most important and requires the most attention CDEs should be identified at the business level so that their business context and purpose is captured A CDE should be linked to the logical and physical data elements, analytics and reports that provide its design and implementation Copyright 2017 Adaptive, Inc. All Rights Reserved. 6
7 How to identify CDEs? Financial reporting e.g.comprehensive Capital Analysis and Review (CCAR), Sarbanes Oxley, Basel Committee on Banking Supervision (BCBS) Audit trail Evidence in case of enquiry personal or legal Analytics Evidence of aggregate performance Master Data, Product Privacy / Sensitive Personally identifiable information (PII), European Union s General Data Protection Regulation (GDPR) Usable for identify theft e.g. Health Insurance Portability and Accountability Act (HIPAA) Corporate Policy Adherence to standards Copyright 2017 Adaptive, Inc. All Rights Reserved. 7
8 Where to get CDEs from? CDEs are often common to an industry or jurisdiction So do not need to be developed from scratch Sources include: Submissions required by regulators Data subject to laws e.g. GDPR defines scope of Personally Identifiable Information) Industry vocabularies/ontologies e.g. FIBO for Finance Vendor-supplied models or sets of CDEs for an industry These can be incorporated as an extra level of traceability in an enterprise Copyright 2017 Adaptive, Inc. All Rights Reserved. 8
9 Business context for a CDE defines purpose Definition Using business terminology: how is it used, what are examples? Business processes Creating, reading, updating, deleting Business Applications How are CDEs used by business applications that deliver valuable outcomes? Business Constraints Quality Criteria, Rules, Policies, Standards and Regulations Strategic Finance Goals Objectives Measurements Key Performance Indicators Assessments Organization IT Accountability Process What are all the different accountable relationships? Performance e.g. Steward, Business Owner, Technical Owner, Consumer, Subject Matter Expert HR Strategy External Governance Project Copyright 2017 Adaptive, Inc. All Rights Reserved. 9
10 What is traceability and why is it an important aspect of data governance? Traceability The relationship from a technical data element (tables, columns, BI reports ) to the business element (business terms, business concepts) it implements Enables business users to navigate from a business element and discover where its data is stored or included in BI reports Enables technical users to navigate from a technical data element to discover its approved business purpose and constraints its usage Provides the link between business and technical metadata and eliminates labor intensive and error prone efforts to answer questions that would require contacting many different data owners and stewards Copyright 2017 Adaptive, Inc. All Rights Reserved. 10
11 Data Governance using CDEs and Traceability Business/ Semantic Layer Describes information in the business context: Business focused & Business friendly Conceptual/ Semantic Standardized Logical/ Design Layer Describes the design level artifacts: Business as well as technical focus Logical, design, structured Includes details esp. about relationships Standardized at Enterprise Level Conforming to standards at application level Physical/ Actual Layer Represents the actual structures holding & operating information: Technical focus Actual Detailed Enterprise Application Cstmr Cstmr_Id Cstmr_Nm (Business Concept) Operational System Model CDE Orders (Business Concept) Product Identifier Orders Quantity Cust_Id Cust_Name CDE Product Identifier Quantity Data Warehouse Model Business Concept Model Cust_Dim Cust_Key Cust_Name Top s Report Operational Data Stores Data Lake Data Warehouse Reports T R A C E A B I L I T Y
12 What is lineage and why is it an important aspect of data governance? Lineage The path that data takes from original source elements to its consumption in reports and/or analytics Each step in data movement may also involve a transformation or calculation Enables business users to find where data was sourced from that they are seeing in a BI or regulatory report Enables technical users tasked to change a data element to do an impact analysis and quickly identify where its data is used This is vital for enterprises that have regulatory compliance requirements that they have full control of financial/private data end-to-end through their systems Copyright 2017 Adaptive, Inc. All Rights Reserved. 12
13 Where can Lineage be found? Lineage can take many forms aside from the traditional ETL tools Anything that moves or processes data to produce an output or conclusion Programs (e.g. COBOL, Java, Python) that create or update data Bulk data loaders and copiers (e.g. FTP) Messaging systems and buses Calls to Web service/rest APIs Consuming external data feeds (e.g. company info, stock prices) Big data analytics Machine learning Copyright 2017 Adaptive, Inc. All Rights Reserved. 13
14 How and where is data stored? Likewise the data can take many forms Relational databases CSV NoSQL Graphs RDF XML, JSON, Parquet/Avro Unstructured and semi-structured data from documents to multimedia And stored in many ways and many locations/clouds Databases Data lakes Files File-based cloud storage (e.g. Amazon S3) Copyright 2017 Adaptive, Inc. All Rights Reserved. 14
15 Data Governance using CDEs and Lineage Business/ Semantic Layer Describes information in the business context: Business focused & Business friendly Conceptual/ Semantic Standardized Logical/ Design Layer Describes the design level artifacts: Business as well as technical focus Logical, design, structured Includes details esp. about relationships Standardized at Enterprise Level Conforming to standards at application level Enterprise Application (Business Concept) CDE Operational System Model Orders (Business Concept) Orders Product Identifier Quantity CDE Product Identifier Quantity Data Warehouse Model Business Concept Model Physical/ Actual Layer Represents the actual structures holding & operating information: Technical focus Actual Detailed Cstmr Cstmr_Id Cstmr_Nm JSON Cust_Id Cust_Name ETL Cust_Dim Cust_Key Cust_Name Top s Report Operational Data Stores Data Lake LINEAGE Data Warehouse Reports BI
16 How to use CDEs to validate semantic integrity of data movement? Before implementation As a physical design is being authored, the next step can be guided by the traceability from a business element to its physical elements After implementation Validate that straight-through physical data movements have source and targets that map to compatible business elements By following traceability from a CDE to its physical element, and then lineage to where it came from / is used, then traceability back to business element you can compare the business element to the CDE to see if they are compatible How does this relate to Data Quality? If data movements don t match the business intent then the quality of data in the target data elements will be degraded Copyright 2017 Adaptive, Inc. All Rights Reserved. 16
17 B U S I N E S S P H Y S I C A L T r a c e a b i l i t y Data Store Using traceability and lineage to validate semantic integrity of data movements Annual Hardware Revenue Annual Software Revenue YrHrdRev YrSftRev YrSoftRv Annual Product Revenue Annual Cost of Product Sales YrCostProd YrProdRev Data Lake used by used by Annual Total Revenue Annual Cost of Sales YrCostSales YrTotRev Lineage Data Warehouse CDE Annual Net Revenue YrNetRev Reports Copyright 2017 Adaptive, Inc. All Rights Reserved. 17
18 CDEs guide the definition and implementation of Rules Rules are defined and associated to CDEs at Enterprise/ Business Level Rules defined at business level will be applied and enforced at the physical implementation level Enables standardization, consistency and conformance More detailed and specific variations of rules can be applied at technical level Copyright 2017 Adaptive, Inc. All Rights Reserved. 18
19 Business Rule Definition & Management CDE CDE Business (Business Concept) (Business Concept) Concept Model Rule: cannot be empty Rule: must be numerical Operational System Model Cstmr Cstmr_Id Cstmr_Nm ETL Orders Product Identifier Quantity Cust_Id Cust_Name Data Warehouse Model ETL Cust_Dim Cust_Key Cust_Name Operational Data Stores Data Lake Data Warehouse E N F O R C E M E N T
20 Rule implementation guided by Traceability CDE CDE Business (Business Concept) (Business Concept) 1.CDE & Rule is selected for execution Concept Model Rule: Desc: cannot be empty. Expr: If IS NULL Then count() Rule: Desc: must be numerical Expr: If does not Contain Numbers Then count() 4. Query executed against database tables and results shown Operational System Model Data Warehouse Model Orders Product Identifier Quantity 2. Physical data elements determined using traceability link 3. Query generated using physical metadata captured by scanner Cstmr Cstmr_Id Cstmr_Nm ETL Cust_Id Cust_Name ETL Cust_Dim Cust_Key Cust_Name Schema: ODS Connection URL: :8021 Schema: EDW Connection URL: :8088 Schema: DTM Connection URL: :8988
21 Different types of rules Constraints - Such as the ones shown on previous slide Calculations - e.g. profit = income costs within a context Quality - e.g. customer name is the same across different databases for same customer id. name is the same as used in a company registry. There are typically 8 dimensions of quality Inferences - e.g. a creditor is any entity which the company has a net negative balance with across all business transactions Classifications - e.g. a good customer is one that earned the company > $100k in net revenue in the previous financial year Copyright 2017 Adaptive, Inc. All Rights Reserved. 21
22 Conclusion Projects often fail due to having too large a scope Critical Data Elements provide a focus o Cut the volume o Allow in-depth management o Biggest business benefit in shortest time o Accelerates data and report rationalization Criteria will be organization-dependent CDEs can be used with Traceability and lineage to validate semantic integrity of data movements CDEs provide business context for definition and implementation of rules Copyright 2017 Adaptive, Inc. All Rights Reserved. 22
23 Thank you Jeff Goins, President, James Cerrato, Chief, Product Evangelist, Copyright 2017 Adaptive, Inc. All Rights Reserved. 23
Importance of the Data Management process in setting up the GDPR within a company CREOBIS
Importance of the Data Management process in setting up the GDPR within a company CREOBIS 1 Alain Cieslik Personal Data is the oil of the digital world 2 Alain Cieslik Personal information comes in different
More informationREGULATORY REPORTING FOR FINANCIAL SERVICES
REGULATORY REPORTING FOR FINANCIAL SERVICES Gordon Hughes, Global Sales Director, Intel Corporation Sinan Baskan, Solutions Director, Financial Services, MarkLogic Corporation Many regulators and regulations
More informationData Stewardship Core by Maria C Villar and Dave Wells
Data Stewardship Core by Maria C Villar and Dave Wells All rights reserved. Reproduction in whole or part prohibited except by written permission. Product and company names mentioned herein may be trademarks
More informationAccelerate GDPR compliance with the Microsoft Cloud
Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Accelerate GDPR compliance with
More informationASG WHITE PAPER DATA INTELLIGENCE. ASG s Enterprise Data Intelligence Solutions: Data Lineage Diving Deeper
THE NEED Knowing where data came from, how it moves through systems, and how it changes, is the most critical and most difficult task in any data management project. If that process known as tracing data
More informationManaging Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow
Managing Privacy Risk & Compliance in Financial Services Brett Hamilton Advisory Solutions Consultant ServiceNow 1 Speaker Introduction INSERT PHOTO Name: Brett Hamilton Title: Advisory Solutions Consultant
More informationPROCEDURE POLICY DEFINITIONS AD DATA GOVERNANCE PROCEDURE. Administration (AD) APPROVED: President and CEO
Section: Subject: Administration (AD) Data Governance AD.3.3.1 DATA GOVERNANCE PROCEDURE Legislation: Alberta Evidence Act (RSA 2000 ca-18); Copyright Act, R.S.C., 1985, c.c-42; Electronic Transactions
More informationThe Emerging Data Lake IT Strategy
The Emerging Data Lake IT Strategy An Evolving Approach for Dealing with Big Data & Changing Environments bit.ly/datalake SPEAKERS: Thomas Kelly, Practice Director Cognizant Technology Solutions Sean Martin,
More informationEffective Risk Data Aggregation & Risk Reporting
Effective Risk Data Aggregation & Risk Reporting Presented by: Ilia Bolotine Head, Adastra Business Consulting (Canada) 1 The Evolving Regulatory Landscape in Risk Management A significant lesson learned
More informationUnderstanding my data and getting value from it
Understanding my data and getting value from it Creating Value With GDPR: Practical Steps 20 th February 2017 Gregory Campbell Governance, Regulatory and Legal Consultant, IBM Analytics gcampbell@uk.ibm.com
More informationSolving the Enterprise Data Dilemma
Solving the Enterprise Data Dilemma Harmonizing Data Management and Data Governance to Accelerate Actionable Insights Learn More at erwin.com Is Our Company Realizing Value from Our Data? If your business
More informationInformation Lifecycle Management for Business Data. An Oracle White Paper September 2005
Information Lifecycle Management for Business Data An Oracle White Paper September 2005 Information Lifecycle Management for Business Data Introduction... 3 Regulatory Requirements... 3 What is ILM?...
More informationGetting personal with your customers and GDPR
Getting personal with your customers and GDPR A practical approach to a secure, governed 360 degree customer view Darren Brunt Presales Director UK&I, Talend Colm Moynihan Partner Presales Manager EMEA,
More informationFINANCIAL REGULATORY REPORTING ACROSS AN EVOLVING SCHEMA
FINANCIAL REGULATORY REPORTING ACROSS AN EVOLVING SCHEMA MODELDR & MARKLOGIC - DATA POINT MODELING MARKLOGIC WHITE PAPER JUNE 2015 CHRIS ATKINSON Contents Regulatory Satisfaction is Increasingly Difficult
More informationInformatica Enterprise Information Catalog
Data Sheet Informatica Enterprise Information Catalog Benefits Automatically catalog and classify all types of data across the enterprise using an AI-powered catalog Identify domains and entities with
More informationEnterprise Data Catalog for Microsoft Azure Tutorial
Enterprise Data Catalog for Microsoft Azure Tutorial VERSION 10.2 JANUARY 2018 Page 1 of 45 Contents Tutorial Objectives... 4 Enterprise Data Catalog Overview... 5 Overview... 5 Objectives... 5 Enterprise
More informationDistributed Hybrid MDM, aka Virtual MDM Optional Add-on, for WhamTech SmartData Fabric
Distributed Hybrid MDM, aka Virtual MDM Optional Add-on, for WhamTech SmartData Fabric Revision 2.1 Page 1 of 17 www.whamtech.com (972) 991-5700 info@whamtech.com August 2018 Contents Introduction... 3
More informationThe types of personal information we collect and hold
Privacy Policy Modified 22 October, 2018 Our privacy obligations Matriks IT takes privacy seriously and cares about personal information. 'Personal information' means information or an opinion about an
More informationThe Role of Metadata in a Data Governance Strategy
The Role of Metadata in a Data Governance Strategy Prepared by: David Loshin President, Knowledge Integrity, Inc. (301) 754-6350 loshin@knowledge- integrity.com Sponsored by: Knowledge Integrity, Inc.
More informationCipherCloud CASB+ Connector for ServiceNow
ServiceNow CASB+ Connector CipherCloud CASB+ Connector for ServiceNow The CipherCloud CASB+ Connector for ServiceNow enables the full suite of CipherCloud CASB+ capabilities, in addition to field-level
More informationDo you handle EU residents personal data? The GDPR update is coming May 25, Are you ready?
European Union (EU) General Data Protection Regulation (GDPR) Do you handle EU residents personal data? The GDPR update is coming May 25, 2018. Are you ready? What do you need to do? Governance and Accountability
More informationThe Data Catalog The Key to Managing Data, Big and Small. April Reeve May
The Data Catalog The Key to Managing Data, Big and Small April Reeve May 18 2017 April Reeve Thirty years doing data oriented stuff Data Management disciplines Data Integration, Data Governance, Data Modeling,
More informationHow Insurers are Realising the Promise of Big Data
How Insurers are Realising the Promise of Big Data Jason Hunter, CTO Asia-Pacific, MarkLogic A Big Data Challenge: Pushing the Limits of What's Possible The Art of the Possible Multiple Government Agencies
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques
More informationVirtuoso Infotech Pvt. Ltd.
Virtuoso Infotech Pvt. Ltd. About Virtuoso Infotech Fastest growing IT firm; Offers the flexibility of a small firm and robustness of over 30 years experience collectively within the leadership team Technology
More information01.0 Policy Responsibilities and Oversight
Number 1.0 Policy Owner Information Security and Technology Policy Policy Responsibility & Oversight Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 1. Policy Responsibilities
More informationAPPLYING KNOWLEDGE BASED AI TO MODERN DATA MANAGEMENT. Mani Keeran, CFA Gi Kim, CFA Preeti Sharma
APPLYING KNOWLEDGE BASED AI TO MODERN DATA MANAGEMENT Mani Keeran, CFA Gi Kim, CFA Preeti Sharma 2 What we are going to discuss During last two decades, majority of information assets have been digitized
More informationData Management Glossary
Data Management Glossary A Access path: The route through a system by which data is found, accessed and retrieved Agile methodology: An approach to software development which takes incremental, iterative
More informationDATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK)
DATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK) Release 2.2 August 2013. This document was created in collaboration of the leading experts and educators in the field and members of the Certified Data Steward
More informationData Governance: Data Usage Labeling and Enforcement in Adobe Cloud Platform
Data Governance: Data Usage Labeling and Enforcement in Adobe Cloud Platform Contents What is data governance? Why data governance? Data governance roles. The Adobe Cloud Platform advantage. A framework
More informationApril 17, Ronald Layne Manager, Data Quality and Data Governance
Ensuring the highest quality data is delivered throughout the university providing valuable information serving individual and organizational need April 17, 2015 Ronald Layne Manager, Data Quality and
More informationEmergency Compliance DG Special Case DAMA INDIANA
1 Emergency Compliance DG Special Case DAMA INDIANA Agenda 2 Overview of full-blown data governance (DG) program Emergency compliance with a specific regulation We'll use GDPR as an example What is GDPR
More informationWHITE PAPER. The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help
WHITE PAPER The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help ii Contents Personal Data Defined... 1 Why the GDPR Is Such a Big Deal... 2 Are You Ready?...
More informationBuilding a Data Strategy for a Digital World
Building a Data Strategy for a Digital World Jason Hunter, CTO, APAC Data Challenge: Pushing the Limits of What's Possible The Art of the Possible Multiple Government Agencies Data Hub 100 s of Service
More informationOracle Warehouse Builder 10g Release 2 Integrating Packaged Applications Data
Oracle Warehouse Builder 10g Release 2 Integrating Packaged Applications Data June 2006 Note: This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality,
More informationFinancial Dataspaces: Challenges, Approaches and Trends
Financial Dataspaces: Challenges, Approaches and Trends Finance and Economics on the Semantic Web (FEOSW), ESWC 27 th May, 2012 Seán O Riain ebusiness Copyright 2009. All rights reserved. Motivation Changing
More informationImproving Your Business with Oracle Data Integration See How Oracle Enterprise Metadata Management Can Help You
Improving Your Business with Oracle Data Integration See How Oracle Enterprise Metadata Management Can Help You Özgür Yiğit Oracle Data Integration, Senior Manager, ECEMEA Safe Harbor Statement The following
More informationAVOIDING SILOED DATA AND SILOED DATA MANAGEMENT
AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT Dalton Cervo Author, Consultant, Data Management Expert March 2016 This presentation contains extracts from books that are: Copyright 2011 John Wiley & Sons,
More informationBest practices for building a Hadoop Data Lake Solution CHARLOTTE HADOOP USER GROUP
Best practices for building a Hadoop Data Lake Solution CHARLOTTE HADOOP USER GROUP 07.29.2015 LANDING STAGING DW Let s start with something basic Is Data Lake a new concept? What is the closest we can
More informationMetaMatrix Enterprise Data Services Platform
MetaMatrix Enterprise Data Services Platform MetaMatrix Overview Agenda Background What it does Where it fits How it works Demo Q/A 2 Product Review: Problem Data Challenges Difficult to implement new
More informationLuncheon Webinar Series June 3rd, Deep Dive MetaData Workbench Sponsored By:
Luncheon Webinar Series June 3rd, 2010 Deep Dive MetaData Workbench Sponsored By: 1 Deep Dive MetaData Workbench Questions and suggestions regarding presentation topics? - send to editor@dsxchange.com
More informationRealizing the Full Potential of MDM 1
Realizing the Full Potential of MDM SOLUTION MDM Augmented with Data Virtualization INDUSTRY Applicable to all Industries EBSITE www.denodo.com PRODUCT OVERVIE The Denodo Platform offers the broadest access
More informationDelivering information you can trust June IBM InfoSphere Information Server: Simplify integration with unified metadata
June 2008 IBM InfoSphere Information Server: Simplify integration with unified metadata Page 2 Contents 2 The information integration and collaboration challenge 3 Streamlining development with IBM InfoSphere
More informationMaking the Impossible Possible
Making the Impossible Possible Find and Eliminate Data Errors with Automated Discovery and Data Lineage Introduction Organizations have long struggled to identify and take advantage of opportunities for
More informationTDWI Data Modeling. Data Analysis and Design for BI and Data Warehousing Systems
Data Analysis and Design for BI and Data Warehousing Systems Previews of TDWI course books offer an opportunity to see the quality of our material and help you to select the courses that best fit your
More informationRisk Management in Electronic Banking: Concepts and Best Practices
Risk Management in Electronic Banking: Concepts and Best Practices Jayaram Kondabagil BICENTENNIAL B1CBNTENNIAL John Wiley & Sons (Asia) Pte Ltd. Contents List of Figures xiii List of Tables xv Preface
More informationOracle Database Vault
An Oracle White Paper July 2009 Oracle Database Vault Introduction... 3 Oracle Database Vault... 3 Oracle Database Vault and Regulations... 4 Oracle Database Vault Realms... 5 Oracle Database Vault Command
More informationSecure Messaging Mobile App Privacy Policy. Privacy Policy Highlights
Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review
More informationGDPR: A QUICK OVERVIEW
GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance
More informationSOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE
HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE PREPARATION FOR GDPR IS ESSENTIAL The EU GDPR imposes interrelated obligations for organizations handling
More informationPCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1
PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman
More informationPerforming a Vendor Security Review TCTC 2017 FALL EVENT PRESENTER: KATIE MCINTOSH
Performing a Vendor Security Review TCTC 2017 FALL EVENT PRESENTER: KATIE MCINTOSH 1 Speaker Bio Katie McIntosh, CISM, CRISC, CISA, CIA, CRMA, is the Cyber Security Specialist for Central Hudson Gas &
More informationThe Financial Industry Business Ontology
The Financial Industry Business Ontology Ontology Summit 2013: Ontology Evaluation Across the Ontology Lifecycle David Newman Strategic Planning Manager, Senior Vice President, Enterprise Architecture
More informationMAPR DATA GOVERNANCE WITHOUT COMPROMISE
MAPR TECHNOLOGIES, INC. WHITE PAPER JANUARY 2018 MAPR DATA GOVERNANCE TABLE OF CONTENTS EXECUTIVE SUMMARY 3 BACKGROUND 4 MAPR DATA GOVERNANCE 5 CONCLUSION 7 EXECUTIVE SUMMARY The MapR DataOps Governance
More informationSAS 70 Audit Concepts. and Benefits JAYACHANDRAN.B,CISA,CISM. August 2010
JAYACHANDRAN.B,CISA,CISM jb@esecurityaudit.com August 2010 SAS 70 Audit Concepts and Benefits Agenda Compliance requirements Overview Business Environment IT Governance and Compliance Management Vendor
More informationIBM Security Guardium Analyzer
IBM Guardium Analyzer Highlights Assess security & compliance risk associated with GDPR data Find GDPR data across onpremises and cloud databases Scan for database vulnerabilities Leverage next-generation
More informationFive Ways that Privacy Shield is Different from Safe Harbor and Five Simple Steps Companies Can Take to Prepare for Certification
July 2016 Follow @Paul_Hastings Five Ways that Privacy Shield is Different from Safe Harbor and Five Simple Steps Companies Can Take to Prepare for Certification By Paul Hastings Global Privacy and Cybersecurity
More informationOpenText Buys Guidance Software
OpenText Buys Guidance Software September 14, 2017 NASDAQ: OTEX TSX: OTEX Safe Harbor Statement Certain statements in this presentation, including statements regarding OpenText's plans, objectives, expectations
More informationWorkday s Robust Privacy Program
Workday s Robust Privacy Program Workday s Robust Privacy Program Introduction Workday is a leading provider of enterprise cloud applications for human resources and finance. Founded in 2005 by Dave Duffield
More informationBest Practices in Enterprise Data Governance
Best Practices in Enterprise Data Governance Scott Gidley and Nancy Rausch, SAS WHITE PAPER SAS White Paper Table of Contents Introduction.... 1 Data Governance Use Case and Challenges.... 1 Collaboration
More informationHousecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009
Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009 Privacy Policy Intent: We recognize that privacy is an important issue, so we design and operate our services with
More informationLuncheon Webinar Series April 25th, Governance for ETL Presented by Beate Porst Sponsored By:
Luncheon Webinar Series April 25th, 2014 Governance for ETL Presented by Beate Porst Sponsored By: 1 Governance for ETL Questions and suggestions regarding presentation topics? - send to editor@dsxchange.com
More informationATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V
ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V WHITE PAPER 4 Ways to Weave Security and Storage Into 1
More informationData Governance for the Connected Enterprise
Data Governance for the Connected Enterprise Irene Polikoff and Jack Spivak, TopQuadrant Inc. November 3, 2016 Copyright 2016 TopQuadrant Inc. Slide 1 Data Governance for the Connected Enterprise Today
More informationAchieving regulatory compliance by improving data quality
Achieving regulatory compliance by improving data quality This White Paper outlines some of the techniques used by a Tier 1 global bank to implement a regulatory metrics platform (RegMetrics) to obtain
More informationPERSPECTIVE. Effective Data Governance. Abstract
PERSPECTIVE Effective Governance Abstract governance is no more just another item that is good to talk about and nice to have, for global data management organizations. This PoV looks into why data governance
More informationNPP & Blockchain Have you thought about the data? Ken Krupa, CTO, MarkLogic
NPP & Blockchain Have you thought about the data? Ken Krupa, CTO, MarkLogic Hello SLIDE: 2 14 COPYRIGHT November 2017 MARKLOGIC CORPORATION. ALL RIGHTS RESERVED. A QUICK LOOK New Payments Platform Open
More informationInformatica Axon Data Governance 5.2. Release Guide
Informatica Axon Data Governance 5.2 Release Guide Informatica Axon Data Governance Release Guide 5.2 March 2018 Copyright Informatica LLC 2015, 2018 This software and documentation are provided only under
More informationInformation Management Fundamentals by Dave Wells
Information Management Fundamentals by Dave Wells All rights reserved. Reproduction in whole or part prohibited except by written permission. Product and company names mentioned herein may be trademarks
More informationCONSOLIDATING RISK MANAGEMENT AND REGULATORY COMPLIANCE APPLICATIONS USING A UNIFIED DATA PLATFORM
CONSOLIDATING RISK MANAGEMENT AND REGULATORY COMPLIANCE APPLICATIONS USING A UNIFIED PLATFORM Executive Summary Financial institutions have implemented and continue to implement many disparate applications
More informationEnterprise Data Management - Data Lineage
Enterprise Data Management - Data Lineage 2 Enterprise Data Management - Data Lineage Data Lineage has been a hot topic in data management for a while now. This is especially true in the financial sector.
More informationGDPR: An Opportunity to Transform Your Security Operations
GDPR: An Opportunity to Transform Your Security Operations McAfee SIEM solutions improve breach detection and response Is your security operations GDPR ready? General Data Protection Regulation (GDPR)
More informationGDPR compliance. GDPR preparedness with OpenText InfoArchive. White paper
White paper GDPR preparedness with OpenText InfoArchive The new EU privacy law, GDPR, will be in effect in less than a year. OpenText has the solutions to help you prepare and comply to this new law. Contents
More informationTen Innovative Financial Services Applications Powered by Data Virtualization
Ten Innovative Financial Services Applications Powered by Data Virtualization DATA IS THE NEW ALPHA In an industry driven to deliver alpha, where might financial services firms find opportunities when
More informationThe Need In today s fast-paced world, the growing demand to support a variety of applications across the data center and help ensure the compliance an
Solution Overview Cisco ACI and AlgoSec Solution: Enhanced Security Policy Visibility and Change, Risk, and Compliance Management With the integration of AlgoSec into the Cisco Application Centric Infrastructure
More informationRecommendations on How to Tackle the D in GDPR. White Paper
Recommendations on How to Tackle the D in GDPR White Paper ABOUT INFORMATICA Digital transformation changes expectations: better service, faster delivery, with less cost. Businesses must transform to stay
More informationGeneral Data Protection Regulation (GDPR) and the Implications for IT Service Management
General Data Protection Regulation (GDPR) and the Implications for IT Service Management August 2018 WHITE PAPER GDPR: What is it? The EU General Data Protection Regulation (GDPR) replaces the Data Protection
More informationMigrate from Netezza Workload Migration
Migrate from Netezza Automated Big Data Open Netezza Source Workload Migration CASE SOLUTION STUDY BRIEF Automated Netezza Workload Migration To achieve greater scalability and tighter integration with
More informationAutomated Netezza to Cloud Migration
Automated Netezza to Cloud Migration CASE STUDY Client Overview Our client is a government-sponsored enterprise* that provides financial products and services to increase the availability and affordability
More informationCompliance of Panda Products with General Data Protection Regulation (GDPR) Panda Security
Panda Security Compliance of Panda Products with General Data Protection Regulation (GDPR) 1 Contents 1.1. SCOPE OF THIS DOCUMENT... 3 1.2. GENERAL DATA PROTECTION REGULATION: OBJECTIVES... 3 1.3. STORED
More informationSOLUTION OVERVIEW: DATA CATALOGS FOR RISK AND COMPLIANCE
SOLUTION OVERVIEW: DATA CATALOGS FOR RISK AND COMPLIANCE Introduction As governments increasingly recognize the importance of data and the potential for its misuse, the amount of compliance rules and regulations
More information<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager. https://www.2passeasy.
Exam Questions CISM Certified Information Security Manager https://www.2passeasy.com/dumps/cism/ 1.Senior management commitment and support for information security can BEST be obtained through presentations
More informationGood analytics needs good data and that needs good metadata
Good analytics needs good data and that needs good metadata 28 th February 2018 Mandy Chessell CBE FREng CEng FBCS Distinguished Engineer, Master Inventor Analytics Chief Data Office mandy_chessell@uk.ibm.com
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationManagement Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT
MANAGING THE DIGITAL FIRM, 12 TH EDITION Chapter 6 FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT VIDEO CASES Case 1: Maruti Suzuki Business Intelligence and Enterprise Databases
More information2 The IBM Data Governance Unified Process
2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.
More informationPRINCIPLES AND FUNCTIONAL REQUIREMENTS
INTERNATIONAL COUNCIL ON ARCHIVES PRINCIPLES AND FUNCTIONAL REQUIREMENTS FOR RECORDS IN ELECTRONIC OFFICE ENVIRONMENTS RECORDKEEPING REQUIREMENTS FOR BUSINESS SYSTEMS THAT DO NOT MANAGE RECORDS OCTOBER
More informationData Center Management and Automation Strategic Briefing
Data Center and Automation Strategic Briefing Contents Why is Data Center and Automation (DCMA) so important? 2 The Solution Pathway: Data Center and Automation 2 Identifying and Addressing the Challenges
More informationInfoSphere Master Data Management Reference Data Management Hub Version 10 Release 0. User s Guide GI
InfoSphere Master Data Management Reference Data Management Hub Version 10 Release 0 User s Guide GI13-2637-00 InfoSphere Master Data Management Reference Data Management Hub Version 10 Release 0 User
More informationData Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory
Audience: NDCBF IT Security Team Last Reviewed/Updated: March 2018 Contact: Henry Draughon hdraughon@processdeliveysystems.com Overview... 2 Sensitive Data Inventory and Classification... 3 Applicable
More informationCloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015
Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually
More informationIntroduction to AWS GoldBase
Introduction to AWS GoldBase A Solution to Automate Security, Compliance, and Governance in AWS October 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document
More informationManaging the Emerging Semantic Risks
The New Information Security Agenda: Managing the Emerging Semantic Risks Dr Robert Garigue Vice President for information integrity and Chief Security Executive Bell Canada Page 1 Abstract Today all modern
More informationIBM Advantage: IBM Watson Compare and Comply Element Classification
IBM Advantage: IBM Watson Compare and Comply Element Classification Executive overview... 1 Introducing Watson Compare and Comply... 2 Definitions... 3 Element Classification insights... 4 Sample use cases...
More informationSQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY
SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY THE INTERSECTION OF COMPLIANCE AND DIGITAL DATA Organizations of all sizes and shapes must comply with government and industry regulations.
More informationNew York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines
New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities
More informationISO INTERNATIONAL STANDARD. Geographic information Quality principles. Information géographique Principes qualité. First edition
INTERNATIONAL STANDARD ISO 19113 First edition 2002-12-01 Geographic information Quality principles Information géographique Principes qualité Reference number ISO 2002 Provläsningsexemplar / Preview PDF
More informationHortonworks DataPlane Service
Data Steward Studio Administration () docs.hortonworks.com : Data Steward Studio Administration Copyright 2016-2017 Hortonworks, Inc. All rights reserved. Please visit the Hortonworks Data Platform page
More information2017 RIMS CYBER SURVEY
2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the
More informationQUARK AUTHOR THE SMART CONTENT TOOL. INFO SHEET Quark Author
QUARK AUTHOR THE SMART CONTENT TOOL Quark Author is Web-based software that, together with Quark Publishing Platform, enables business and IT leaders to streamline and automate high-value customer communications
More information