Why Your Data Really Matters

Similar documents
Introduction to ISO/IEC 27001:2005

Advent IM Ltd ISO/IEC 27001:2013 vs

Checklist for Applying ISO 27000, PCI DSS v2 & NIST to Address HIPAA & HITECH Mandates. Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP)

General Data Protection Regulation (GDPR) The impact of doing business in Asia

INFORMATION SECURITY NO MORE THE CINDERELLA?

POSITION DESCRIPTION

BSI BIM Solutions. Copyright 2016 BSI. All rights reserved.

SAMPLE REPORT. Business Continuity Gap Analysis Report. Prepared for XYZ Business by CSC Business Continuity Services Date: xx/xx/xxxx

Mission Statement & Company Overview

ISO Gap Analysis Excerpt from sample report

Certified Information Security Manager (CISM) Course Overview

THE CYBER SECURITY PLAYBOOKECTOR SHOULD KNOW BEFPRE, DURING & AFTER WHAT EVERY DIRECTOR SHOULD KNOW BEFORE, DURING AND AFTER AN ATTACK

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

Information Security Management Systems Standards ISO/IEC Global Opportunity for the Business Community

CABINET PLANNING SYSTEM PROCUREMENT

Green IT (ICT) (Accredited by British Computer Society)

BHBIA New Data Protection Rules. Pharma Company Perspective. Guy Murray Director, Market Research & Analytics, GC&BI MR Operations and Compliance, MSD

WELCOME ISO/IEC 27001:2017 Information Briefing

Corporate Information Security Policy

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

M&A Cyber Security Due Diligence

Integrated Assurance Across the Three Lines of #CW2017

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Criteria for selecting methods in user-centred design

Data Governance. Mark Plessinger / Julie Evans December /7/2017

Domino s Pizza Enterprises Ltd. The Business Partner. Code of Practice

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

Why you should adopt the NIST Cybersecurity Framework

Metadata for Data Discovery: The NERC Data Catalogue Service. Steve Donegan

Enabling efficiency through Data Governance: a phased approach

Canada Life Cyber Security Statement 2018

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

Irish Compliance Scheme

PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER

Meeting the Challenges of Enhancing Power Sector Resilience

NERC Staff Organization Chart Budget 2019

CyberSecurity. Penetration Testing. Penetration Testing. Contact one of our specialists for more information CYBERSECURITY SERVICE DATASHEET

in South Africa WE ARE A LEADING BUSINESS LAW FIRM PRACTICE OVERVIEW ABOUT CLIFFE DEKKER HOFMEYR with a strong national presence in

Mailroom Outsourcing. Business Solutions

POSITION DESCRIPTION

UK-led international standards for BIM

Data ownership within governance: getting it right

EU Code of Conduct on Data Centre Energy Efficiency. Endorser Guidelines and Registration Form. Version 3.1.0

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

What Auditors Want. John Mitchell. PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, MIIA, CISA, QiCA, CFE

EIT Health UK-Ireland Privacy Policy

NERC Staff Organization Chart Budget 2019

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Cyber Crime Seminar 8 December 2015

Navigating through the Risks and Challenges of implementing Green IT Projects

Data Governance Industrial Internet & Big Data

Ervia Risk Management. Elaine O Donoghue IPA Governance Forum Briefing 10 th November 2017

Importance of the Data Management process in setting up the GDPR within a company CREOBIS

PROTECTING NATIONAL CRITICAL INFRASTRUCTURE AGAINST CYBER ATTACKS BEST PRACTICES RELATED TO TECHNOLOGY AND STANDARDS FROM EUROPE BANGKOK

2 The IBM Data Governance Unified Process

In this issue: The WEEE Recast

The Confluence of Physical and Cyber Security Management

Cybersecurity Considerations for GDPR

Incident Response. Tony Drewitt Head of Consultancy IT Governance Ltd

Enterprise resilience and the role of Standards

Quick Wins with Data Loss Prevention How to Make DLP Work for You

REPORT 2015/186 INTERNAL AUDIT DIVISION

Annexure 08 (Profile of the Project Team)

Master Information Security Policy & Procedures [Organization / Project Name]

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy

Kathy Hunter The Business Relevance of Data Governance Sponsored by the BCS & DAMA UK 21 June 2011 London CONFIDENCE IN DATA

Cyber Risks in the Boardroom Conference

Nick Rozanski Andy Longshaw Eoin Woods. Sold! How to Describe, Explain and Justify your Architecture

Session 5311 Critical Testing Programs for Security Operations

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

Building digital societies in Asia: Making transportation smarter

General Data Protection Regulation (GDPR)

Domino s Pizza Enterprises Ltd. The Business Partner. Code of Practice

B13: The Case for Integration Converting the BCM Silo into an Enterprise Risk Foundation

Australian Standard. Records Management. Part 2: Guidelines AS ISO ISO TR

Kansas City s Metropolitan Emergency Information System (MEIS)

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services

BCM s Role in Effective Risk Management: A Risk Manager s Point of View

INSPIRE status report

Version 1/2018. GDPR Processor Security Controls

Revision of standards ISO 9001:2015 and ISO 14001:2015

Data Sheet The PCI DSS

Subcontractor Approval Form

CEF e-invoicing. Presentation to the European Multi- Stakeholder Forum on e-invoicing. DIGIT Directorate-General for Informatics.

A new approach to Cyber Security

Avanade s Approach to Client Data Protection

THE INTELLIGENCE-LED APPROACH

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT

Energy Code Compliance in the US: A View From The Trenches

Information Security Exchange

IT Audit Process. Prof. Mike Romeu. January 30, IT Audit Process. Prof. Mike Romeu

Cyber Security is it a boardroom issue?

Toward Horizon 2020: INSPIRE, PSI and other EU policies on data sharing and standardization

REPORT 2015/149 INTERNAL AUDIT DIVISION

Cybersecurity Auditing in an Unsecure World

Uptime and Proactive Support Services

Introduction. When it comes to GDPR compliance, is OK for now enough? Minds made for protecting financial services

SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT

Transcription:

Why Your Data Really Matters Governance and the Benefits of a Common Operating Picture John Pepper Director, OceanWise Ltd 1

Is This You? 2

Is This You? 3

Is This You? 4

The Impact of Poor Data Management On average, organisations waste 15-20% of budgets dealing with inaccuracies and other data issues In UK in 2013, 0.18% of online orders could not be delivered because of poor address data that s 1.4 million orders The US economy loses $3.1 trillion a year because poor data quality Millions of UK National Health Service patient records sold to insurance firms because nobody was responsible at top level

An Important Asset? The data and information an organisation holds is: One of its most important assets Critical to its day to day operations 6

Data Anarchy? Even so in many organisations today there is: No defined system or formal accountability for data No responsibility for data as a cross-functional business asset No data policy or system for escalating data issues upwards No process for maintaining data used in decision-making No or weak rules associated with controlling sensitive data Source: http://tdan.com/its-all-in-the-data-data-anarchy-vs-governance/20781 7

The Data Challenge 2.5 QUINTILLION GRAINS OF SAND ON EARTH 7.5 QUINTILLION BYTES OF NEW DATA CREATED EVERY DAY 90% OF ALL DATA HAS BEEN CREATED IN THE LAST 2 YEARS AVERAGE BUSINESS DATA VOLUMES DOUBLE EVERY 1.2 YEARS

The Data Challenge A system of governance allows organisations to take back control of their data Constant vigilance and established processes are required to maintain order Data governance is a business responsibility Data is NOT an IT function alone; IT provides the tools Source: sciphilos.info 9

Data Governance Data Governance is the execution and enforcement of authority over the management of data and data-related resources Data Anarchy is defined as no governance at all Organisations that cannot execute and enforce authority over the management of data are most likely in a semi-anarchic state Data Governance needs to be communicated and involves internal and external stakeholders 10

Data as a Business Process Database Management Data Quality Lifecycle Management Adapted from the DAMA DMBOK Framework by OceanWise Extract, Transform & Load Governance Architecture & Design Data Receipt & Assessment Annex SL used in latest of ISO 9001, 14001 & 45001: Clause 1: Scope Clause 2: References Clause 3: Definitions Clause 4: Context Clause 5: Leadership Clause 6: Planning Clause 7: Support Clause 8: Operation Clause 9: Performance Clause 10: Improvement 11

Data Silos / Stovepipes Sales Operations Despatch Finance 12

The Data Governance Solution CUSTOMER DATA Sales Operations PRODUCT DATA FINANCE DATA Despatch Finance EMPLOYEE DATA 13

Data Governance in Context Information Infrastructures underpin Business Processes Open or Agreed Data Formats & Protocols 14

Data Sharing & Exchange We have many UK environmental data centres: Met Office British Atmospheric Data Centre British Oceanographic Data Centre etc. And lots of initiatives and legislation regarding when and how data should be made available (e.g. INSPIRE, OfWAT, MEDIN, Open Data) We are rich in data initiatives

Port Information Infrastructure OceanWise, 2011 16

Data Governance and Infrastructure Common Operating Picture (COP) Plan the Exercise Exercise the Plan Record Keeping 17

COP for UK Emergency Services 18

Example Port COP Application Data entry and recordkeeping matches procedures Common data and map interface Defensible decision making 19

Data Management Principles DATA

Main Messages Data and information is one of an organisations most valuable assets and is critical to most business functions A system of governance ensures that data is controlled, maintained and used effectively across all business functions Treating data as a business management function (as with QHSE) can bring many benefits: Critical data on hand when and where it is needed More cost effective operational planning and management Compliance and exchange data more easily with regulators Establish a Common Operating Picture in times of emergency Ensure record keeping and reporting is fit for purpose 21

Thank You For more information: Register on our IMarEST Marine Data Management Course or e-mail: john.pepper@oceanwise.eu Proud to be helping to improve data sharing and management 22