Enabling Data Governance Leveraging Critical Data Elements

Size: px
Start display at page:

Download "Enabling Data Governance Leveraging Critical Data Elements"

Transcription

1 Adaptive Presentation at DAMA-NYC October 19 th, 2017 Enabling Data Governance Leveraging Critical Data Elements Jeff Goins, President, James Cerrato, Chief, Product Evangelist, Copyright 2017 Adaptive, Inc. All Rights Reserved. 1

2 Confidentiality & Disclosure Agreement This is an unpublished work, the copyright in which vests in Adaptive, Inc. ( Adaptive ). All rights reserved. The information contained herein is confidential and the property of Adaptive, Inc. and is supplied without liability for errors or commissions. No part may be reproduced, disclosed or used, except as authorized by contract or other written permission. The copyright and the foregoing restriction on reproduction and use extend to all media in which the information may be embodied. All product names used herein are for identification purposes only and may be trademarks of their respective companies. Copyright 2017 Adaptive, Inc. All Rights Reserved. 2

3 Agenda Why are Critical Data Elements needed to make Enterprise Data Modeling more effective? What are Critical Data Elements and how to identify them? How to use Critical Data Elements to validate data movements? How to use Critical Data Elements to guide Business Rule definition and implementation? Copyright 2017 Adaptive, Inc. All Rights Reserved. 3

4 What are the limits to getting value from an Enterprise Data Model? Enterprise Data Models are BIG and complex The work to get full value from them at the logical and physical level can be extremely time consuming Traceability, Lineage and Governance are used to achieve value from an Enterprise Data Model However, this can t be done all at once, but takes many separate projects Copyright 2017 Adaptive, Inc. All Rights Reserved. 4

5 Why are Critical Data Elements needed? The all-at-once enterprise approach doesn t deliver tangible value soon enough Addressing only one business area or one database misses important aspects Instead focus on specific data items across the enterprise according to how critical they are By focusing on Critical Data Elements you address the important data needs that might span multiple organizations across the enterprise You can provide rich model of business context (not practical to do for a whole enterprise data model) Copyright 2017 Adaptive, Inc. All Rights Reserved. 5

6 What are Critical Data Elements (CDEs)? There is an enormous proliferation of data For data management and data governance activities to be successful there must be a focus on data that is vital to the successful operation of an enterprise CDEs identify which data is most important and requires the most attention CDEs should be identified at the business level so that their business context and purpose is captured A CDE should be linked to the logical and physical data elements, analytics and reports that provide its design and implementation Copyright 2017 Adaptive, Inc. All Rights Reserved. 6

7 How to identify CDEs? Financial reporting e.g.comprehensive Capital Analysis and Review (CCAR), Sarbanes Oxley, Basel Committee on Banking Supervision (BCBS) Audit trail Evidence in case of enquiry personal or legal Analytics Evidence of aggregate performance Master Data, Product Privacy / Sensitive Personally identifiable information (PII), European Union s General Data Protection Regulation (GDPR) Usable for identify theft e.g. Health Insurance Portability and Accountability Act (HIPAA) Corporate Policy Adherence to standards Copyright 2017 Adaptive, Inc. All Rights Reserved. 7

8 Where to get CDEs from? CDEs are often common to an industry or jurisdiction So do not need to be developed from scratch Sources include: Submissions required by regulators Data subject to laws e.g. GDPR defines scope of Personally Identifiable Information) Industry vocabularies/ontologies e.g. FIBO for Finance Vendor-supplied models or sets of CDEs for an industry These can be incorporated as an extra level of traceability in an enterprise Copyright 2017 Adaptive, Inc. All Rights Reserved. 8

9 Business context for a CDE defines purpose Definition Using business terminology: how is it used, what are examples? Business processes Creating, reading, updating, deleting Business Applications How are CDEs used by business applications that deliver valuable outcomes? Business Constraints Quality Criteria, Rules, Policies, Standards and Regulations Strategic Finance Goals Objectives Measurements Key Performance Indicators Assessments Organization IT Accountability Process What are all the different accountable relationships? Performance e.g. Steward, Business Owner, Technical Owner, Consumer, Subject Matter Expert HR Strategy External Governance Project Copyright 2017 Adaptive, Inc. All Rights Reserved. 9

10 What is traceability and why is it an important aspect of data governance? Traceability The relationship from a technical data element (tables, columns, BI reports ) to the business element (business terms, business concepts) it implements Enables business users to navigate from a business element and discover where its data is stored or included in BI reports Enables technical users to navigate from a technical data element to discover its approved business purpose and constraints its usage Provides the link between business and technical metadata and eliminates labor intensive and error prone efforts to answer questions that would require contacting many different data owners and stewards Copyright 2017 Adaptive, Inc. All Rights Reserved. 10

11 Data Governance using CDEs and Traceability Business/ Semantic Layer Describes information in the business context: Business focused & Business friendly Conceptual/ Semantic Standardized Logical/ Design Layer Describes the design level artifacts: Business as well as technical focus Logical, design, structured Includes details esp. about relationships Standardized at Enterprise Level Conforming to standards at application level Physical/ Actual Layer Represents the actual structures holding & operating information: Technical focus Actual Detailed Enterprise Application Cstmr Cstmr_Id Cstmr_Nm (Business Concept) Operational System Model CDE Orders (Business Concept) Product Identifier Orders Quantity Cust_Id Cust_Name CDE Product Identifier Quantity Data Warehouse Model Business Concept Model Cust_Dim Cust_Key Cust_Name Top s Report Operational Data Stores Data Lake Data Warehouse Reports T R A C E A B I L I T Y

12 What is lineage and why is it an important aspect of data governance? Lineage The path that data takes from original source elements to its consumption in reports and/or analytics Each step in data movement may also involve a transformation or calculation Enables business users to find where data was sourced from that they are seeing in a BI or regulatory report Enables technical users tasked to change a data element to do an impact analysis and quickly identify where its data is used This is vital for enterprises that have regulatory compliance requirements that they have full control of financial/private data end-to-end through their systems Copyright 2017 Adaptive, Inc. All Rights Reserved. 12

13 Where can Lineage be found? Lineage can take many forms aside from the traditional ETL tools Anything that moves or processes data to produce an output or conclusion Programs (e.g. COBOL, Java, Python) that create or update data Bulk data loaders and copiers (e.g. FTP) Messaging systems and buses Calls to Web service/rest APIs Consuming external data feeds (e.g. company info, stock prices) Big data analytics Machine learning Copyright 2017 Adaptive, Inc. All Rights Reserved. 13

14 How and where is data stored? Likewise the data can take many forms Relational databases CSV NoSQL Graphs RDF XML, JSON, Parquet/Avro Unstructured and semi-structured data from documents to multimedia And stored in many ways and many locations/clouds Databases Data lakes Files File-based cloud storage (e.g. Amazon S3) Copyright 2017 Adaptive, Inc. All Rights Reserved. 14

15 Data Governance using CDEs and Lineage Business/ Semantic Layer Describes information in the business context: Business focused & Business friendly Conceptual/ Semantic Standardized Logical/ Design Layer Describes the design level artifacts: Business as well as technical focus Logical, design, structured Includes details esp. about relationships Standardized at Enterprise Level Conforming to standards at application level Enterprise Application (Business Concept) CDE Operational System Model Orders (Business Concept) Orders Product Identifier Quantity CDE Product Identifier Quantity Data Warehouse Model Business Concept Model Physical/ Actual Layer Represents the actual structures holding & operating information: Technical focus Actual Detailed Cstmr Cstmr_Id Cstmr_Nm JSON Cust_Id Cust_Name ETL Cust_Dim Cust_Key Cust_Name Top s Report Operational Data Stores Data Lake LINEAGE Data Warehouse Reports BI

16 How to use CDEs to validate semantic integrity of data movement? Before implementation As a physical design is being authored, the next step can be guided by the traceability from a business element to its physical elements After implementation Validate that straight-through physical data movements have source and targets that map to compatible business elements By following traceability from a CDE to its physical element, and then lineage to where it came from / is used, then traceability back to business element you can compare the business element to the CDE to see if they are compatible How does this relate to Data Quality? If data movements don t match the business intent then the quality of data in the target data elements will be degraded Copyright 2017 Adaptive, Inc. All Rights Reserved. 16

17 B U S I N E S S P H Y S I C A L T r a c e a b i l i t y Data Store Using traceability and lineage to validate semantic integrity of data movements Annual Hardware Revenue Annual Software Revenue YrHrdRev YrSftRev YrSoftRv Annual Product Revenue Annual Cost of Product Sales YrCostProd YrProdRev Data Lake used by used by Annual Total Revenue Annual Cost of Sales YrCostSales YrTotRev Lineage Data Warehouse CDE Annual Net Revenue YrNetRev Reports Copyright 2017 Adaptive, Inc. All Rights Reserved. 17

18 CDEs guide the definition and implementation of Rules Rules are defined and associated to CDEs at Enterprise/ Business Level Rules defined at business level will be applied and enforced at the physical implementation level Enables standardization, consistency and conformance More detailed and specific variations of rules can be applied at technical level Copyright 2017 Adaptive, Inc. All Rights Reserved. 18

19 Business Rule Definition & Management CDE CDE Business (Business Concept) (Business Concept) Concept Model Rule: cannot be empty Rule: must be numerical Operational System Model Cstmr Cstmr_Id Cstmr_Nm ETL Orders Product Identifier Quantity Cust_Id Cust_Name Data Warehouse Model ETL Cust_Dim Cust_Key Cust_Name Operational Data Stores Data Lake Data Warehouse E N F O R C E M E N T

20 Rule implementation guided by Traceability CDE CDE Business (Business Concept) (Business Concept) 1.CDE & Rule is selected for execution Concept Model Rule: Desc: cannot be empty. Expr: If IS NULL Then count() Rule: Desc: must be numerical Expr: If does not Contain Numbers Then count() 4. Query executed against database tables and results shown Operational System Model Data Warehouse Model Orders Product Identifier Quantity 2. Physical data elements determined using traceability link 3. Query generated using physical metadata captured by scanner Cstmr Cstmr_Id Cstmr_Nm ETL Cust_Id Cust_Name ETL Cust_Dim Cust_Key Cust_Name Schema: ODS Connection URL: :8021 Schema: EDW Connection URL: :8088 Schema: DTM Connection URL: :8988

21 Different types of rules Constraints - Such as the ones shown on previous slide Calculations - e.g. profit = income costs within a context Quality - e.g. customer name is the same across different databases for same customer id. name is the same as used in a company registry. There are typically 8 dimensions of quality Inferences - e.g. a creditor is any entity which the company has a net negative balance with across all business transactions Classifications - e.g. a good customer is one that earned the company > $100k in net revenue in the previous financial year Copyright 2017 Adaptive, Inc. All Rights Reserved. 21

22 Conclusion Projects often fail due to having too large a scope Critical Data Elements provide a focus o Cut the volume o Allow in-depth management o Biggest business benefit in shortest time o Accelerates data and report rationalization Criteria will be organization-dependent CDEs can be used with Traceability and lineage to validate semantic integrity of data movements CDEs provide business context for definition and implementation of rules Copyright 2017 Adaptive, Inc. All Rights Reserved. 22

23 Thank you Jeff Goins, President, James Cerrato, Chief, Product Evangelist, Copyright 2017 Adaptive, Inc. All Rights Reserved. 23

Importance of the Data Management process in setting up the GDPR within a company CREOBIS

Importance of the Data Management process in setting up the GDPR within a company CREOBIS Importance of the Data Management process in setting up the GDPR within a company CREOBIS 1 Alain Cieslik Personal Data is the oil of the digital world 2 Alain Cieslik Personal information comes in different

More information

REGULATORY REPORTING FOR FINANCIAL SERVICES

REGULATORY REPORTING FOR FINANCIAL SERVICES REGULATORY REPORTING FOR FINANCIAL SERVICES Gordon Hughes, Global Sales Director, Intel Corporation Sinan Baskan, Solutions Director, Financial Services, MarkLogic Corporation Many regulators and regulations

More information

Data Stewardship Core by Maria C Villar and Dave Wells

Data Stewardship Core by Maria C Villar and Dave Wells Data Stewardship Core by Maria C Villar and Dave Wells All rights reserved. Reproduction in whole or part prohibited except by written permission. Product and company names mentioned herein may be trademarks

More information

Accelerate GDPR compliance with the Microsoft Cloud

Accelerate GDPR compliance with the Microsoft Cloud Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Accelerate GDPR compliance with

More information

ASG WHITE PAPER DATA INTELLIGENCE. ASG s Enterprise Data Intelligence Solutions: Data Lineage Diving Deeper

ASG WHITE PAPER DATA INTELLIGENCE. ASG s Enterprise Data Intelligence Solutions: Data Lineage Diving Deeper THE NEED Knowing where data came from, how it moves through systems, and how it changes, is the most critical and most difficult task in any data management project. If that process known as tracing data

More information

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow Managing Privacy Risk & Compliance in Financial Services Brett Hamilton Advisory Solutions Consultant ServiceNow 1 Speaker Introduction INSERT PHOTO Name: Brett Hamilton Title: Advisory Solutions Consultant

More information

PROCEDURE POLICY DEFINITIONS AD DATA GOVERNANCE PROCEDURE. Administration (AD) APPROVED: President and CEO

PROCEDURE POLICY DEFINITIONS AD DATA GOVERNANCE PROCEDURE. Administration (AD) APPROVED: President and CEO Section: Subject: Administration (AD) Data Governance AD.3.3.1 DATA GOVERNANCE PROCEDURE Legislation: Alberta Evidence Act (RSA 2000 ca-18); Copyright Act, R.S.C., 1985, c.c-42; Electronic Transactions

More information

The Emerging Data Lake IT Strategy

The Emerging Data Lake IT Strategy The Emerging Data Lake IT Strategy An Evolving Approach for Dealing with Big Data & Changing Environments bit.ly/datalake SPEAKERS: Thomas Kelly, Practice Director Cognizant Technology Solutions Sean Martin,

More information

Effective Risk Data Aggregation & Risk Reporting

Effective Risk Data Aggregation & Risk Reporting Effective Risk Data Aggregation & Risk Reporting Presented by: Ilia Bolotine Head, Adastra Business Consulting (Canada) 1 The Evolving Regulatory Landscape in Risk Management A significant lesson learned

More information

Understanding my data and getting value from it

Understanding my data and getting value from it Understanding my data and getting value from it Creating Value With GDPR: Practical Steps 20 th February 2017 Gregory Campbell Governance, Regulatory and Legal Consultant, IBM Analytics gcampbell@uk.ibm.com

More information

Solving the Enterprise Data Dilemma

Solving the Enterprise Data Dilemma Solving the Enterprise Data Dilemma Harmonizing Data Management and Data Governance to Accelerate Actionable Insights Learn More at erwin.com Is Our Company Realizing Value from Our Data? If your business

More information

Information Lifecycle Management for Business Data. An Oracle White Paper September 2005

Information Lifecycle Management for Business Data. An Oracle White Paper September 2005 Information Lifecycle Management for Business Data An Oracle White Paper September 2005 Information Lifecycle Management for Business Data Introduction... 3 Regulatory Requirements... 3 What is ILM?...

More information

Getting personal with your customers and GDPR

Getting personal with your customers and GDPR Getting personal with your customers and GDPR A practical approach to a secure, governed 360 degree customer view Darren Brunt Presales Director UK&I, Talend Colm Moynihan Partner Presales Manager EMEA,

More information

FINANCIAL REGULATORY REPORTING ACROSS AN EVOLVING SCHEMA

FINANCIAL REGULATORY REPORTING ACROSS AN EVOLVING SCHEMA FINANCIAL REGULATORY REPORTING ACROSS AN EVOLVING SCHEMA MODELDR & MARKLOGIC - DATA POINT MODELING MARKLOGIC WHITE PAPER JUNE 2015 CHRIS ATKINSON Contents Regulatory Satisfaction is Increasingly Difficult

More information

Informatica Enterprise Information Catalog

Informatica Enterprise Information Catalog Data Sheet Informatica Enterprise Information Catalog Benefits Automatically catalog and classify all types of data across the enterprise using an AI-powered catalog Identify domains and entities with

More information

Enterprise Data Catalog for Microsoft Azure Tutorial

Enterprise Data Catalog for Microsoft Azure Tutorial Enterprise Data Catalog for Microsoft Azure Tutorial VERSION 10.2 JANUARY 2018 Page 1 of 45 Contents Tutorial Objectives... 4 Enterprise Data Catalog Overview... 5 Overview... 5 Objectives... 5 Enterprise

More information

Distributed Hybrid MDM, aka Virtual MDM Optional Add-on, for WhamTech SmartData Fabric

Distributed Hybrid MDM, aka Virtual MDM Optional Add-on, for WhamTech SmartData Fabric Distributed Hybrid MDM, aka Virtual MDM Optional Add-on, for WhamTech SmartData Fabric Revision 2.1 Page 1 of 17 www.whamtech.com (972) 991-5700 info@whamtech.com August 2018 Contents Introduction... 3

More information

The types of personal information we collect and hold

The types of personal information we collect and hold Privacy Policy Modified 22 October, 2018 Our privacy obligations Matriks IT takes privacy seriously and cares about personal information. 'Personal information' means information or an opinion about an

More information

The Role of Metadata in a Data Governance Strategy

The Role of Metadata in a Data Governance Strategy The Role of Metadata in a Data Governance Strategy Prepared by: David Loshin President, Knowledge Integrity, Inc. (301) 754-6350 loshin@knowledge- integrity.com Sponsored by: Knowledge Integrity, Inc.

More information

CipherCloud CASB+ Connector for ServiceNow

CipherCloud CASB+ Connector for ServiceNow ServiceNow CASB+ Connector CipherCloud CASB+ Connector for ServiceNow The CipherCloud CASB+ Connector for ServiceNow enables the full suite of CipherCloud CASB+ capabilities, in addition to field-level

More information

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready?

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready? European Union (EU) General Data Protection Regulation (GDPR) Do you handle EU residents personal data? The GDPR update is coming May 25, 2018. Are you ready? What do you need to do? Governance and Accountability

More information

The Data Catalog The Key to Managing Data, Big and Small. April Reeve May

The Data Catalog The Key to Managing Data, Big and Small. April Reeve May The Data Catalog The Key to Managing Data, Big and Small April Reeve May 18 2017 April Reeve Thirty years doing data oriented stuff Data Management disciplines Data Integration, Data Governance, Data Modeling,

More information

How Insurers are Realising the Promise of Big Data

How Insurers are Realising the Promise of Big Data How Insurers are Realising the Promise of Big Data Jason Hunter, CTO Asia-Pacific, MarkLogic A Big Data Challenge: Pushing the Limits of What's Possible The Art of the Possible Multiple Government Agencies

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques

More information

Virtuoso Infotech Pvt. Ltd.

Virtuoso Infotech Pvt. Ltd. Virtuoso Infotech Pvt. Ltd. About Virtuoso Infotech Fastest growing IT firm; Offers the flexibility of a small firm and robustness of over 30 years experience collectively within the leadership team Technology

More information

01.0 Policy Responsibilities and Oversight

01.0 Policy Responsibilities and Oversight Number 1.0 Policy Owner Information Security and Technology Policy Policy Responsibility & Oversight Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 1. Policy Responsibilities

More information

APPLYING KNOWLEDGE BASED AI TO MODERN DATA MANAGEMENT. Mani Keeran, CFA Gi Kim, CFA Preeti Sharma

APPLYING KNOWLEDGE BASED AI TO MODERN DATA MANAGEMENT. Mani Keeran, CFA Gi Kim, CFA Preeti Sharma APPLYING KNOWLEDGE BASED AI TO MODERN DATA MANAGEMENT Mani Keeran, CFA Gi Kim, CFA Preeti Sharma 2 What we are going to discuss During last two decades, majority of information assets have been digitized

More information

Data Management Glossary

Data Management Glossary Data Management Glossary A Access path: The route through a system by which data is found, accessed and retrieved Agile methodology: An approach to software development which takes incremental, iterative

More information

DATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK)

DATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK) DATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK) Release 2.2 August 2013. This document was created in collaboration of the leading experts and educators in the field and members of the Certified Data Steward

More information

Data Governance: Data Usage Labeling and Enforcement in Adobe Cloud Platform

Data Governance: Data Usage Labeling and Enforcement in Adobe Cloud Platform Data Governance: Data Usage Labeling and Enforcement in Adobe Cloud Platform Contents What is data governance? Why data governance? Data governance roles. The Adobe Cloud Platform advantage. A framework

More information

April 17, Ronald Layne Manager, Data Quality and Data Governance

April 17, Ronald Layne Manager, Data Quality and Data Governance Ensuring the highest quality data is delivered throughout the university providing valuable information serving individual and organizational need April 17, 2015 Ronald Layne Manager, Data Quality and

More information

Emergency Compliance DG Special Case DAMA INDIANA

Emergency Compliance DG Special Case DAMA INDIANA 1 Emergency Compliance DG Special Case DAMA INDIANA Agenda 2 Overview of full-blown data governance (DG) program Emergency compliance with a specific regulation We'll use GDPR as an example What is GDPR

More information

WHITE PAPER. The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help

WHITE PAPER. The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help WHITE PAPER The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help ii Contents Personal Data Defined... 1 Why the GDPR Is Such a Big Deal... 2 Are You Ready?...

More information

Building a Data Strategy for a Digital World

Building a Data Strategy for a Digital World Building a Data Strategy for a Digital World Jason Hunter, CTO, APAC Data Challenge: Pushing the Limits of What's Possible The Art of the Possible Multiple Government Agencies Data Hub 100 s of Service

More information

Oracle Warehouse Builder 10g Release 2 Integrating Packaged Applications Data

Oracle Warehouse Builder 10g Release 2 Integrating Packaged Applications Data Oracle Warehouse Builder 10g Release 2 Integrating Packaged Applications Data June 2006 Note: This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality,

More information

Financial Dataspaces: Challenges, Approaches and Trends

Financial Dataspaces: Challenges, Approaches and Trends Financial Dataspaces: Challenges, Approaches and Trends Finance and Economics on the Semantic Web (FEOSW), ESWC 27 th May, 2012 Seán O Riain ebusiness Copyright 2009. All rights reserved. Motivation Changing

More information

Improving Your Business with Oracle Data Integration See How Oracle Enterprise Metadata Management Can Help You

Improving Your Business with Oracle Data Integration See How Oracle Enterprise Metadata Management Can Help You Improving Your Business with Oracle Data Integration See How Oracle Enterprise Metadata Management Can Help You Özgür Yiğit Oracle Data Integration, Senior Manager, ECEMEA Safe Harbor Statement The following

More information

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT Dalton Cervo Author, Consultant, Data Management Expert March 2016 This presentation contains extracts from books that are: Copyright 2011 John Wiley & Sons,

More information

Best practices for building a Hadoop Data Lake Solution CHARLOTTE HADOOP USER GROUP

Best practices for building a Hadoop Data Lake Solution CHARLOTTE HADOOP USER GROUP Best practices for building a Hadoop Data Lake Solution CHARLOTTE HADOOP USER GROUP 07.29.2015 LANDING STAGING DW Let s start with something basic Is Data Lake a new concept? What is the closest we can

More information

MetaMatrix Enterprise Data Services Platform

MetaMatrix Enterprise Data Services Platform MetaMatrix Enterprise Data Services Platform MetaMatrix Overview Agenda Background What it does Where it fits How it works Demo Q/A 2 Product Review: Problem Data Challenges Difficult to implement new

More information

Luncheon Webinar Series June 3rd, Deep Dive MetaData Workbench Sponsored By:

Luncheon Webinar Series June 3rd, Deep Dive MetaData Workbench Sponsored By: Luncheon Webinar Series June 3rd, 2010 Deep Dive MetaData Workbench Sponsored By: 1 Deep Dive MetaData Workbench Questions and suggestions regarding presentation topics? - send to editor@dsxchange.com

More information

Realizing the Full Potential of MDM 1

Realizing the Full Potential of MDM 1 Realizing the Full Potential of MDM SOLUTION MDM Augmented with Data Virtualization INDUSTRY Applicable to all Industries EBSITE www.denodo.com PRODUCT OVERVIE The Denodo Platform offers the broadest access

More information

Delivering information you can trust June IBM InfoSphere Information Server: Simplify integration with unified metadata

Delivering information you can trust June IBM InfoSphere Information Server: Simplify integration with unified metadata June 2008 IBM InfoSphere Information Server: Simplify integration with unified metadata Page 2 Contents 2 The information integration and collaboration challenge 3 Streamlining development with IBM InfoSphere

More information

Making the Impossible Possible

Making the Impossible Possible Making the Impossible Possible Find and Eliminate Data Errors with Automated Discovery and Data Lineage Introduction Organizations have long struggled to identify and take advantage of opportunities for

More information

TDWI Data Modeling. Data Analysis and Design for BI and Data Warehousing Systems

TDWI Data Modeling. Data Analysis and Design for BI and Data Warehousing Systems Data Analysis and Design for BI and Data Warehousing Systems Previews of TDWI course books offer an opportunity to see the quality of our material and help you to select the courses that best fit your

More information

Risk Management in Electronic Banking: Concepts and Best Practices

Risk Management in Electronic Banking: Concepts and Best Practices Risk Management in Electronic Banking: Concepts and Best Practices Jayaram Kondabagil BICENTENNIAL B1CBNTENNIAL John Wiley & Sons (Asia) Pte Ltd. Contents List of Figures xiii List of Tables xv Preface

More information

Oracle Database Vault

Oracle Database Vault An Oracle White Paper July 2009 Oracle Database Vault Introduction... 3 Oracle Database Vault... 3 Oracle Database Vault and Regulations... 4 Oracle Database Vault Realms... 5 Oracle Database Vault Command

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

GDPR: A QUICK OVERVIEW

GDPR: A QUICK OVERVIEW GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance

More information

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE PREPARATION FOR GDPR IS ESSENTIAL The EU GDPR imposes interrelated obligations for organizations handling

More information

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman

More information

Performing a Vendor Security Review TCTC 2017 FALL EVENT PRESENTER: KATIE MCINTOSH

Performing a Vendor Security Review TCTC 2017 FALL EVENT PRESENTER: KATIE MCINTOSH Performing a Vendor Security Review TCTC 2017 FALL EVENT PRESENTER: KATIE MCINTOSH 1 Speaker Bio Katie McIntosh, CISM, CRISC, CISA, CIA, CRMA, is the Cyber Security Specialist for Central Hudson Gas &

More information

The Financial Industry Business Ontology

The Financial Industry Business Ontology The Financial Industry Business Ontology Ontology Summit 2013: Ontology Evaluation Across the Ontology Lifecycle David Newman Strategic Planning Manager, Senior Vice President, Enterprise Architecture

More information

MAPR DATA GOVERNANCE WITHOUT COMPROMISE

MAPR DATA GOVERNANCE WITHOUT COMPROMISE MAPR TECHNOLOGIES, INC. WHITE PAPER JANUARY 2018 MAPR DATA GOVERNANCE TABLE OF CONTENTS EXECUTIVE SUMMARY 3 BACKGROUND 4 MAPR DATA GOVERNANCE 5 CONCLUSION 7 EXECUTIVE SUMMARY The MapR DataOps Governance

More information

SAS 70 Audit Concepts. and Benefits JAYACHANDRAN.B,CISA,CISM. August 2010

SAS 70 Audit Concepts. and Benefits JAYACHANDRAN.B,CISA,CISM. August 2010 JAYACHANDRAN.B,CISA,CISM jb@esecurityaudit.com August 2010 SAS 70 Audit Concepts and Benefits Agenda Compliance requirements Overview Business Environment IT Governance and Compliance Management Vendor

More information

IBM Security Guardium Analyzer

IBM Security Guardium Analyzer IBM Guardium Analyzer Highlights Assess security & compliance risk associated with GDPR data Find GDPR data across onpremises and cloud databases Scan for database vulnerabilities Leverage next-generation

More information

Five Ways that Privacy Shield is Different from Safe Harbor and Five Simple Steps Companies Can Take to Prepare for Certification

Five Ways that Privacy Shield is Different from Safe Harbor and Five Simple Steps Companies Can Take to Prepare for Certification July 2016 Follow @Paul_Hastings Five Ways that Privacy Shield is Different from Safe Harbor and Five Simple Steps Companies Can Take to Prepare for Certification By Paul Hastings Global Privacy and Cybersecurity

More information

OpenText Buys Guidance Software

OpenText Buys Guidance Software OpenText Buys Guidance Software September 14, 2017 NASDAQ: OTEX TSX: OTEX Safe Harbor Statement Certain statements in this presentation, including statements regarding OpenText's plans, objectives, expectations

More information

Workday s Robust Privacy Program

Workday s Robust Privacy Program Workday s Robust Privacy Program Workday s Robust Privacy Program Introduction Workday is a leading provider of enterprise cloud applications for human resources and finance. Founded in 2005 by Dave Duffield

More information

Best Practices in Enterprise Data Governance

Best Practices in Enterprise Data Governance Best Practices in Enterprise Data Governance Scott Gidley and Nancy Rausch, SAS WHITE PAPER SAS White Paper Table of Contents Introduction.... 1 Data Governance Use Case and Challenges.... 1 Collaboration

More information

Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009

Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009 Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009 Privacy Policy Intent: We recognize that privacy is an important issue, so we design and operate our services with

More information

Luncheon Webinar Series April 25th, Governance for ETL Presented by Beate Porst Sponsored By:

Luncheon Webinar Series April 25th, Governance for ETL Presented by Beate Porst Sponsored By: Luncheon Webinar Series April 25th, 2014 Governance for ETL Presented by Beate Porst Sponsored By: 1 Governance for ETL Questions and suggestions regarding presentation topics? - send to editor@dsxchange.com

More information

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V WHITE PAPER 4 Ways to Weave Security and Storage Into 1

More information

Data Governance for the Connected Enterprise

Data Governance for the Connected Enterprise Data Governance for the Connected Enterprise Irene Polikoff and Jack Spivak, TopQuadrant Inc. November 3, 2016 Copyright 2016 TopQuadrant Inc. Slide 1 Data Governance for the Connected Enterprise Today

More information

Achieving regulatory compliance by improving data quality

Achieving regulatory compliance by improving data quality Achieving regulatory compliance by improving data quality This White Paper outlines some of the techniques used by a Tier 1 global bank to implement a regulatory metrics platform (RegMetrics) to obtain

More information

PERSPECTIVE. Effective Data Governance. Abstract

PERSPECTIVE. Effective Data Governance. Abstract PERSPECTIVE Effective Governance Abstract governance is no more just another item that is good to talk about and nice to have, for global data management organizations. This PoV looks into why data governance

More information

NPP & Blockchain Have you thought about the data? Ken Krupa, CTO, MarkLogic

NPP & Blockchain Have you thought about the data? Ken Krupa, CTO, MarkLogic NPP & Blockchain Have you thought about the data? Ken Krupa, CTO, MarkLogic Hello SLIDE: 2 14 COPYRIGHT November 2017 MARKLOGIC CORPORATION. ALL RIGHTS RESERVED. A QUICK LOOK New Payments Platform Open

More information

Informatica Axon Data Governance 5.2. Release Guide

Informatica Axon Data Governance 5.2. Release Guide Informatica Axon Data Governance 5.2 Release Guide Informatica Axon Data Governance Release Guide 5.2 March 2018 Copyright Informatica LLC 2015, 2018 This software and documentation are provided only under

More information

Information Management Fundamentals by Dave Wells

Information Management Fundamentals by Dave Wells Information Management Fundamentals by Dave Wells All rights reserved. Reproduction in whole or part prohibited except by written permission. Product and company names mentioned herein may be trademarks

More information

CONSOLIDATING RISK MANAGEMENT AND REGULATORY COMPLIANCE APPLICATIONS USING A UNIFIED DATA PLATFORM

CONSOLIDATING RISK MANAGEMENT AND REGULATORY COMPLIANCE APPLICATIONS USING A UNIFIED DATA PLATFORM CONSOLIDATING RISK MANAGEMENT AND REGULATORY COMPLIANCE APPLICATIONS USING A UNIFIED PLATFORM Executive Summary Financial institutions have implemented and continue to implement many disparate applications

More information

Enterprise Data Management - Data Lineage

Enterprise Data Management - Data Lineage Enterprise Data Management - Data Lineage 2 Enterprise Data Management - Data Lineage Data Lineage has been a hot topic in data management for a while now. This is especially true in the financial sector.

More information

GDPR: An Opportunity to Transform Your Security Operations

GDPR: An Opportunity to Transform Your Security Operations GDPR: An Opportunity to Transform Your Security Operations McAfee SIEM solutions improve breach detection and response Is your security operations GDPR ready? General Data Protection Regulation (GDPR)

More information

GDPR compliance. GDPR preparedness with OpenText InfoArchive. White paper

GDPR compliance. GDPR preparedness with OpenText InfoArchive. White paper White paper GDPR preparedness with OpenText InfoArchive The new EU privacy law, GDPR, will be in effect in less than a year. OpenText has the solutions to help you prepare and comply to this new law. Contents

More information

Ten Innovative Financial Services Applications Powered by Data Virtualization

Ten Innovative Financial Services Applications Powered by Data Virtualization Ten Innovative Financial Services Applications Powered by Data Virtualization DATA IS THE NEW ALPHA In an industry driven to deliver alpha, where might financial services firms find opportunities when

More information

The Need In today s fast-paced world, the growing demand to support a variety of applications across the data center and help ensure the compliance an

The Need In today s fast-paced world, the growing demand to support a variety of applications across the data center and help ensure the compliance an Solution Overview Cisco ACI and AlgoSec Solution: Enhanced Security Policy Visibility and Change, Risk, and Compliance Management With the integration of AlgoSec into the Cisco Application Centric Infrastructure

More information

Recommendations on How to Tackle the D in GDPR. White Paper

Recommendations on How to Tackle the D in GDPR. White Paper Recommendations on How to Tackle the D in GDPR White Paper ABOUT INFORMATICA Digital transformation changes expectations: better service, faster delivery, with less cost. Businesses must transform to stay

More information

General Data Protection Regulation (GDPR) and the Implications for IT Service Management

General Data Protection Regulation (GDPR) and the Implications for IT Service Management General Data Protection Regulation (GDPR) and the Implications for IT Service Management August 2018 WHITE PAPER GDPR: What is it? The EU General Data Protection Regulation (GDPR) replaces the Data Protection

More information

Migrate from Netezza Workload Migration

Migrate from Netezza Workload Migration Migrate from Netezza Automated Big Data Open Netezza Source Workload Migration CASE SOLUTION STUDY BRIEF Automated Netezza Workload Migration To achieve greater scalability and tighter integration with

More information

Automated Netezza to Cloud Migration

Automated Netezza to Cloud Migration Automated Netezza to Cloud Migration CASE STUDY Client Overview Our client is a government-sponsored enterprise* that provides financial products and services to increase the availability and affordability

More information

Compliance of Panda Products with General Data Protection Regulation (GDPR) Panda Security

Compliance of Panda Products with General Data Protection Regulation (GDPR) Panda Security Panda Security Compliance of Panda Products with General Data Protection Regulation (GDPR) 1 Contents 1.1. SCOPE OF THIS DOCUMENT... 3 1.2. GENERAL DATA PROTECTION REGULATION: OBJECTIVES... 3 1.3. STORED

More information

SOLUTION OVERVIEW: DATA CATALOGS FOR RISK AND COMPLIANCE

SOLUTION OVERVIEW: DATA CATALOGS FOR RISK AND COMPLIANCE SOLUTION OVERVIEW: DATA CATALOGS FOR RISK AND COMPLIANCE Introduction As governments increasingly recognize the importance of data and the potential for its misuse, the amount of compliance rules and regulations

More information

<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager. https://www.2passeasy.

<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager. https://www.2passeasy. Exam Questions CISM Certified Information Security Manager https://www.2passeasy.com/dumps/cism/ 1.Senior management commitment and support for information security can BEST be obtained through presentations

More information

Good analytics needs good data and that needs good metadata

Good analytics needs good data and that needs good metadata Good analytics needs good data and that needs good metadata 28 th February 2018 Mandy Chessell CBE FREng CEng FBCS Distinguished Engineer, Master Inventor Analytics Chief Data Office mandy_chessell@uk.ibm.com

More information

Best Practices in Securing a Multicloud World

Best Practices in Securing a Multicloud World Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers

More information

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT MANAGING THE DIGITAL FIRM, 12 TH EDITION Chapter 6 FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT VIDEO CASES Case 1: Maruti Suzuki Business Intelligence and Enterprise Databases

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

PRINCIPLES AND FUNCTIONAL REQUIREMENTS

PRINCIPLES AND FUNCTIONAL REQUIREMENTS INTERNATIONAL COUNCIL ON ARCHIVES PRINCIPLES AND FUNCTIONAL REQUIREMENTS FOR RECORDS IN ELECTRONIC OFFICE ENVIRONMENTS RECORDKEEPING REQUIREMENTS FOR BUSINESS SYSTEMS THAT DO NOT MANAGE RECORDS OCTOBER

More information

Data Center Management and Automation Strategic Briefing

Data Center Management and Automation Strategic Briefing Data Center and Automation Strategic Briefing Contents Why is Data Center and Automation (DCMA) so important? 2 The Solution Pathway: Data Center and Automation 2 Identifying and Addressing the Challenges

More information

InfoSphere Master Data Management Reference Data Management Hub Version 10 Release 0. User s Guide GI

InfoSphere Master Data Management Reference Data Management Hub Version 10 Release 0. User s Guide GI InfoSphere Master Data Management Reference Data Management Hub Version 10 Release 0 User s Guide GI13-2637-00 InfoSphere Master Data Management Reference Data Management Hub Version 10 Release 0 User

More information

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory Audience: NDCBF IT Security Team Last Reviewed/Updated: March 2018 Contact: Henry Draughon hdraughon@processdeliveysystems.com Overview... 2 Sensitive Data Inventory and Classification... 3 Applicable

More information

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015 Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually

More information

Introduction to AWS GoldBase

Introduction to AWS GoldBase Introduction to AWS GoldBase A Solution to Automate Security, Compliance, and Governance in AWS October 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document

More information

Managing the Emerging Semantic Risks

Managing the Emerging Semantic Risks The New Information Security Agenda: Managing the Emerging Semantic Risks Dr Robert Garigue Vice President for information integrity and Chief Security Executive Bell Canada Page 1 Abstract Today all modern

More information

IBM Advantage: IBM Watson Compare and Comply Element Classification

IBM Advantage: IBM Watson Compare and Comply Element Classification IBM Advantage: IBM Watson Compare and Comply Element Classification Executive overview... 1 Introducing Watson Compare and Comply... 2 Definitions... 3 Element Classification insights... 4 Sample use cases...

More information

SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY

SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY THE INTERSECTION OF COMPLIANCE AND DIGITAL DATA Organizations of all sizes and shapes must comply with government and industry regulations.

More information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

ISO INTERNATIONAL STANDARD. Geographic information Quality principles. Information géographique Principes qualité. First edition

ISO INTERNATIONAL STANDARD. Geographic information Quality principles. Information géographique Principes qualité. First edition INTERNATIONAL STANDARD ISO 19113 First edition 2002-12-01 Geographic information Quality principles Information géographique Principes qualité Reference number ISO 2002 Provläsningsexemplar / Preview PDF

More information

Hortonworks DataPlane Service

Hortonworks DataPlane Service Data Steward Studio Administration () docs.hortonworks.com : Data Steward Studio Administration Copyright 2016-2017 Hortonworks, Inc. All rights reserved. Please visit the Hortonworks Data Platform page

More information

2017 RIMS CYBER SURVEY

2017 RIMS CYBER SURVEY 2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the

More information

QUARK AUTHOR THE SMART CONTENT TOOL. INFO SHEET Quark Author

QUARK AUTHOR THE SMART CONTENT TOOL. INFO SHEET Quark Author QUARK AUTHOR THE SMART CONTENT TOOL Quark Author is Web-based software that, together with Quark Publishing Platform, enables business and IT leaders to streamline and automate high-value customer communications

More information