Determining Data Equity: Capture and Calculate Valuation at Risk

Size: px
Start display at page:

Download "Determining Data Equity: Capture and Calculate Valuation at Risk"

Transcription

1 Matthew Mikell- IBM Market Manager IOT North America April 15, 2015 Determining Data Equity: Capture and Calculate Valuation at Risk

2 Agenda Foundations of Capturing Equity Closing Gaps Between Financial and IT Worlds Trends Forcing Data Equity Analysis Costs of Data Ownership & Maintenance Practices for Data Equity Audit Managing Data Risks and Replacement

3 What s changing: The world of Big Data & Analytics is expanding quickly Data is the world s newest resource.. not all data is created equal Decision-making extends from few to many.. but new risks and abuses arise As data grows, so does potential data equity.. but managing the lifecycle

4 What s missing: Transparency between data and finance worlds Maintaining and delivering high quality services Delivering and monetizing high quality data Monitoring and reporting on financial health

5 Trends of valuation Valuation is the process of putting a price on a piece of property. The value of businesses, personal property, intellectual property (such as patents, trademarks, and copyrights), and real estate are all commonly determined through the practice of valuation.

6 Brand Equity: Value of the brand in the marketplace Millward Brown 2014 Forbes 2014 Interbrand 2014 Logos are property of their respective owners.

7 What are foundations of brand equity? Value of the brand is to make money.. A premium that accrues to a brand from customers who are willing to pay extra for it Logos Symbols Sound Designs Tag lines or slogans Trademarks Brand alliances

8 Value of the brand is to make money.. A premium that accrues to a brand from customers who are willing to pay extra for it Brand Value (brand equity) - The sum of all distinguishing qualities of a brand (image, loyalty), drawn from all relevant stakeholders, that results in personal commitment to and demand for the brand; these differentiating thoughts and feelings make the brand valued and valuable. Brand Audit - Assessment of the health of a brand, analysis of individual sources, and recommendations to further improve or leverage brand equity. Example use only. Brands are protected by their respective owners

9 Data Maybe Be Bigger Than The Brand! Tangible asset emerging over financial treatment of brands on the balance sheet of it s useful life.. -Intangible assets often now constitute up to 70% 80% of Fortune 500 companies overall market valuations -For companies like IBM, may be closer to 90% -For asset heavy businesses such as airlines, the figure will be closer to 60%. (The Economist Group

10 How is a valuation defined? *Valuation - The financial rigor of identifying and measuring the economic benefit ($) - brand value - that derives from brand ownership. In finance terms, is considered to be the net present value of the estimated future cash flows attributable to the Brand. Market share Price sensitivity Profitability Revenues Marketing investments Growth rate Cost to acquire new customers Cost to retain customers

11 Data equity: Closing gaps between IT and finance worlds Personnel & Mandates Budgets Staff Hardware (on/off premise) Compliance, PCI, HIPAA Third-party intrusion tests Risk Management Business losses Costs of insurance Impact on brand Cost (per record $194).. Profile & Benchmark Cost across peers Exposure of breach cost Staffing metrics Operations by country GAAP, ASC

12 Managing Growing Risk Vs. Data Investments

13 Data valuation against costs and (potential) revenues 2010 (Brand & Tabular) Systems of record (ERP, HR) Systems of engagement (CRM) Web traffic (search, etc) (Sentiment & Non-Tabular) Web traffic (search, etc) Social (Twitter, blogs) Machine data (telemetry) Human data (fit bit) Mobile Video Imagery 80+% of IT budget allocation 80+% of IT data allocation

14 Maintaining Data Value requires establishing Speed and Confidence.in every decision, interaction & process System of Record Systems of Engagement Big Data & Analytics Infrastructure Security Intelligence Enterprise Applications Mobile Commerce Call Center Social Business

15 Data Equity Accounting: Scenario #1 Grade it (Asset-based) 1. Calculate a data quality score on a scale of 0 to 10 1.Data duplication 2.Cold contacts 3.Repeat buyers 4.Uniqueness or proprietary quality 2. Determine specific values as proportion of data types and quality score 3. Use an adjustment or allowance for a geography 4. Forecast specific growth rates of data types 5. Apply Net Present Value Method

16 Data Equity Accounting: Scenario #2 Monetize it (Income-based) 1. Calculate a data quality score on a scale of 0 to Calculate a proprietary nature of data on a scale of 0 to Determine useful age 4. Calculate royalty rate 5. Use an adjustment or allowance for a geography 6. Determine specific revenues as proportion of different data types 7. Apply Net Present Value Method

17 Data Equity Accounting: Scenario #3 Compare it (Market-based) 1. Use valuations from current M&A activity of peers 2. Calculate a data quality score on a scale of 0 to 10 1.Data duplication 2.Cold contacts 3.Repeat buyers 4.Uniqueness or proprietary quality 3. Use an adjustment or allowance for a geography 4. Use an adjustment or allowance for market share

18 Data Equity Benchmarking: Privacy Investment The average surveyed Fortune 1000 company's privacy program has a budget of $2.4 million Roughly $1.9 million (80%)is spent internally, the other $500k (20%)is spent externally -Of internal spend, 50% is for salary and benefits of privacy program employees. The median budget is $1 million 12 percent of firms have budgets of more than $5 million annually Fortune 1000 companies sampled spend an approximate average of $76 per employee on privacy, or $204 per $1 million in revenue International Association of Privacy Professionals (IAPP) - Industry of Privacy Project: New Budget Benchmarking

19 Data Equity Benchmarking: Data Breach and Cyber Insurance Strong security posture, incident response plan and CISO appointment reduced the cost per record by $14.14, $12.77 and $6.59, respectively. Average breach cost to a company was $3.5 million Average cost paid for each lost or stolen record containing sensitive and confidential information increased more than 9% to $145 -Most costly are German and US firms on average ($195 and $201 per record respectively) -Least costly breaches are in Brazil and India ($70 and $5 per record respectively) All participating organizations experienced a data breach ranging from a low of approximately 2,415 to slightly more than 100,000 compromised records - Smallest number of breach records are Japanese and Italian companies (18,615 and 19,034 records, respectively). -Greatest number of exposed or compromised records USA and Saudi Arabia (29,087 and 28,690 records, respectively). Benchmark research sponsored by IBM Independently conducted by Ponemon Institute LLC May 2014

20 Intelligent Data vs Big Data: De-Risking Process Cut the noise Valuation of what data /metric carries predictive potential (ex. audits) Balance privacy, storage, investments accordingly to data valuations Maintenance - Staffing commensurate to data equity valuations and industry peers (privacy, legal) Data breach, security and disaster recovery (ex. stress testing) Double down- Monetize data/attributes that drive other revenue streams Build in KPIs to track data equity strategies (ex web bounce rates) Investments in new analytic talents and technologies

21 Actions Data quality initiatives must be operationalized across the organization, or high-valued assets, to assure the efficacy of the information. The politics and management needs of multiple data owners across the enterprise must be rationalized. Create or designate a champion from senior management with revenue or valuation goals Determine a long-term valuation and engagement model with stakeholders (legal, accounting, IT, investors)

22 Tools Data warehouse with capacity and reach into systems of engagement and systems of operation Business intelligence capability to query and calculate across a wide range of data types Process to review dark data and archival strategies Data quality software to ensure necessary revenue streams or equity valuations Analytics to forecast valuation growth against investments and risks

23 Thank

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9

More information

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Data Security: Fight Insider Threats & Protect Your Sensitive Data Data Security: Fight Insider Threats & Protect Your Sensitive Data Marco Ercolani Agenda Data is challenging to secure A look at security incidents Cost of a Data Breach Data Governance and Security Understand

More information

Valuation of Intellectual Property Mark Weston, CA, CBV Director, Advisory and Transaction Services

Valuation of Intellectual Property Mark Weston, CA, CBV Director, Advisory and Transaction Services 9:30 am 10:15 am Valuation of Intellectual Property Mark Weston, CA, CBV Director, Advisory and Transaction Services Agenda General Valuation Approaches Cost Based Valuation Methods Market Based Valuation

More information

The digital future for insurance.

The digital future for insurance. Digital transformation can help you tame the perfect storm. The digital future for insurance. Following the 2008 financial crisis, the insurance sector has faced tighter regulation, which has made it harder

More information

2010 Data Breach Investigations Report

2010 Data Breach Investigations Report 2010 Data Breach Investigations Report Matthijs van de Wel Managing Principal Forensics EMEA 2010 Verizon. All Rights Reserved. PTE14626 07/10 PROPRIETARY STATEMENT This document and any attached materials

More information

Data Protection. Understanding the Effectiveness of a Data Protection Program. IIA: Almost Free Seminar. 21 June 2011

Data Protection. Understanding the Effectiveness of a Data Protection Program. IIA: Almost Free Seminar. 21 June 2011 Understanding the Effectiveness of a Data Protection Program IIA: Almost Free Seminar 21 June 2011 Agenda Data protection overview Case studies Ernst & Young s point of view Understanding the effectiveness

More information

The IBM data governance blueprint: Leveraging best practices and proven technologies

The IBM data governance blueprint: Leveraging best practices and proven technologies May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and

More information

2013 Letter from Our Chairman & CEO

2013 Letter from Our Chairman & CEO 2013 Letter from Our Chairman & CEO In fiscal 2013, we extended our track record of creating exceptional shareholder value. Pierre Nanterme Chairman & CEO Delivering in fiscal 2013 In fiscal 2013, Accenture

More information

The Business Case for Security Information Management

The Business Case for Security Information Management The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un

More information

Intellectual Property Valuation Techniques

Intellectual Property Valuation Techniques By Daryl Martin and David Drews* IPmetrics LLC INTRODUCTION Unlike many of the other assets found on a company s balance sheet, the intangible assets, such as patents, trademarks and copyrights, are among

More information

The Aberdeen Vault Navigating the Goldmine. A Member Benefit

The Aberdeen Vault Navigating the Goldmine. A Member Benefit The Aberdeen Vault Navigating the Goldmine A Member Benefit PUBLIC RESOURCES Values and Guiding Principles Standards of Practice (coming soon) NIGP Online Dictionary GoPro Magazine MEMBER RESOURCES NIGP

More information

Econ Pro Valuation Methods - General recap and pitfalls. October 1, 2010

Econ Pro Valuation Methods - General recap and pitfalls. October 1, 2010 Econ Pro Valuation Methods - General recap and pitfalls October 1, 2010 1 Agenda Valuation Dimensions & Applications Valuation Methods Market method Cost method Income method Income method for Intangible

More information

Chief Data Officer Center of Excellence. Develop an Enterprise CoE to Drive Business Decision Making and Growth

Chief Data Officer Center of Excellence. Develop an Enterprise CoE to Drive Business Decision Making and Growth Chief Data Officer Center of Excellence Develop an Enterprise CoE to Drive Business Decision Making and Growth CJ Nakamura & Vikram Anand Cerner Health Services September, 2015 hello who why what how q&a

More information

The digital future for retail, hospitality and travel.

The digital future for retail, hospitality and travel. Digital transformation resets customer expectations. The digital future for retail, hospitality and travel. Technology is fundamentally changing how retail, hospitality and travel businesses operate. Businesses

More information

IBM Business Analytics: Finance and Integrated Risk Management (FIRM) solution

IBM Business Analytics: Finance and Integrated Risk Management (FIRM) solution IBM Sales and Distribution Solution Brief Banking IBM Business Analytics: Finance and Integrated Risk Management (FIRM) solution Risk transparency across the enterprise 2 IBM Business Analytics: Finance

More information

2012 Letter from Our Chief Executive Officer

2012 Letter from Our Chief Executive Officer 2012 Letter from Our Chief Executive Officer Our strong performance in fiscal 2012 demonstrates that our growth strategy enabled us to further differentiate Accenture in the marketplace and deliver significant

More information

Web Protection for Your Business, Customers and Data

Web Protection for Your Business, Customers and Data WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision

More information

How to Maximize the Value When Selling Your Management Company

How to Maximize the Value When Selling Your Management Company WHITE PAPER How to Maximize the Value When Selling Your Management Company INSIDE THIS REPORT Rational for Selling Management Company Valuation Acquisition Deal Structure Tips to Optimize Your Exit Value

More information

Using a Multichannel Strategy to Deliver an Exceptional Customer Experience

Using a Multichannel Strategy to Deliver an Exceptional Customer Experience Using a Multichannel Strategy to Deliver an Exceptional Customer Experience 10 things to consider when building a multichannel strategy to improve the customer experience Jesús Hoyos CRM industry analyst,

More information

Third-Party Cybersecurity and Data Loss Prevention

Third-Party Cybersecurity and Data Loss Prevention Third-Party Cybersecurity and Data Loss Prevention SESSION ID: DSP-W04A Brad Keller Sr. Vice President Santa Fe Group Jonathan Dambrot, CISSP CEO, Co-Founder Prevalent Networks 3rd Party Risk Management

More information

CONSULTING IMAGE PLACEHOLDER

CONSULTING IMAGE PLACEHOLDER CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization

More information

Governance, Risk, and Compliance (GRC) White Paper

Governance, Risk, and Compliance (GRC) White Paper Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:

More information

Credit Research & Risk Measurement

Credit Research & Risk Measurement Credit Research & RISK MEASUREMENT Credit Research & Risk Measurement Leverage the market standard in credit analysis and utilize the latest risk management technology to improve the efficiency of your

More information

FINANCIAL REPORTING COUNCIL FRC STUDY: ACCOUNTING FOR ACQUISITIONS

FINANCIAL REPORTING COUNCIL FRC STUDY: ACCOUNTING FOR ACQUISITIONS FINANCIAL REPORTING COUNCIL FRC STUDY: ACCOUNTING FOR ACQUISITIONS JANUARY 2010 Contents Page One Introduction 1 Two Summary of results 3 Three Review of compliance by area 3.1 Business review commentary

More information

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security Securing business data CNS White Paper Cloud for Enterprise Effective Management of Data Security Jeff Finch, Head of Business Development, CNS Mosaic 2nd July 2015 Contents 1 Non-Disclosure Statement...

More information

Summary. U.S. Retail Cyber Monday Report 2014

Summary. U.S. Retail Cyber Monday Report 2014 U.S. Retail Report 2014 IBM DIGITAL ANALYTICS BENCHMARK 2 Summary Heading back to work, consumers clicked their way to the best deals on which remained the busiest online shopping day of the holiday season.

More information

IBM Software A Journey to Adaptive MDM

IBM Software A Journey to Adaptive MDM IBM Software A Journey to Adaptive MDM What is Master Data? Why is it Important? A Journey to Adaptive MDM Contents 2 MDM Business Drivers and Business Value 4 MDM is a Journey 7 IBM MDM Portfolio An Adaptive

More information

Learning Objectives: Quick answer key: Question # Multiple Choice True/False

Learning Objectives: Quick answer key: Question # Multiple Choice True/False 0 Learning Objectives: 11.1 Describe the advantages and disadvantages of the most common forms of business ownership. 11.2 Identify the stakeholders of a business and describe why they are important. 11.3

More information

How do you transform risk into high performance? An Overview of Moody s Analytics

How do you transform risk into high performance? An Overview of Moody s Analytics How do you transform risk into high performance? An Overview of Moody s Analytics Essential insight serving global financial markets Moody s Analytics offers award-winning solutions and best practices

More information

A Benchmark Study of Multinational Organizations

A Benchmark Study of Multinational Organizations A Benchmark Study of Multinational Organizations Research Report Independently Conducted by Ponemon Institute LLC January 2011 The True Cost of Compliance Benchmark Study of Multinational Organizations

More information

Is Your Company Ready for a Big Data Breach?

Is Your Company Ready for a Big Data Breach? Is Your Company Ready for a Big Data Breach? The Second Annual Study on Data Breach Preparedness Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication

More information

IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE. Copyright 2012, SAS Institute Inc. All rights reserved.

IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE. Copyright 2012, SAS Institute Inc. All rights reserved. IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE ABOUT THE PRESENTER Marc has been with SAS for 10 years and leads the information management practice for canada. Marc s area of specialty

More information

INTELLECTUAL PROPERTY VALUATIONS

INTELLECTUAL PROPERTY VALUATIONS INTELLECTUAL PROPERTY VALUATIONS WISE, BLACKMAN LLP Canada ctremblay@wiseblackman.com AGENDA Intangible asset categories When is a valuation required? Components of fair market value Fair value for financial

More information

Chapter 4 Valuation Methods in Intellectual Asset-Based. Management Evaluation Finance

Chapter 4 Valuation Methods in Intellectual Asset-Based. Management Evaluation Finance Chapter 4 Valuation Methods in Intellectual Asset-Based Management Evaluation Finance (Supplemental Discussion) This chapter explains one way of thinking for valuation methods in intellectual asset-based

More information

Zak Khan Director, Advanced Cyber Defence

Zak Khan Director, Advanced Cyber Defence Securing your data, intellectual property and intangible assets from cybercrime Zak Khan Director, Advanced Cyber Defence Agenda (16 + optional video) Introduction (2) Context Global Trends Strategic Impacts

More information

The transformation of IT Risk Management. kpmg.com

The transformation of IT Risk Management. kpmg.com The transformation of IT Risk Management kpmg.com The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help

More information

Privilege Gone Wild: The State of Privileged Account Management in 2015

Privilege Gone Wild: The State of Privileged Account Management in 2015 Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...

More information

Human Capital Financial Statements

Human Capital Financial Statements Presents: Human Capital Financial Statements April 19, 2011 About Human Capital Management Institute The Human Capital Management Institute (HCMI) was founded on the belief that organizations can and must,

More information

Social Business Analytics

Social Business Analytics IBM Software Business Analytics Social Analytics Social Business Analytics Gaining business value from social media 2 Social Business Analytics Contents 2 Overview 3 Analytics as a competitive advantage

More information

ORACLE SOCIAL ENGAGEMENT AND MONITORING CLOUD SERVICE

ORACLE SOCIAL ENGAGEMENT AND MONITORING CLOUD SERVICE ORACLE SOCIAL ENGAGEMENT AND MONITORING CLOUD SERVICE KEY FEATURES Global social media, web, and news feed data Market-leading listening quality Automatic categorization Configurable dashboards, drill-down

More information

The Big Deal about Big Data. Mike Skinner, CPA CISA CITP HORNE LLP

The Big Deal about Big Data. Mike Skinner, CPA CISA CITP HORNE LLP The Big Deal about Big Data Mike Skinner, CPA CISA CITP HORNE LLP Mike Skinner, CPA CISA CITP Senior Manager, IT Assurance & Risk Services HORNE LLP Focus areas: IT security & risk assessment IT governance,

More information

Optimizing government and insurance claims management with IBM Case Manager

Optimizing government and insurance claims management with IBM Case Manager Enterprise Content Management Optimizing government and insurance claims management with IBM Case Manager Apply advanced case management capabilities from IBM to help ensure successful outcomes Highlights

More information

The Challenge for HR Professionals:

The Challenge for HR Professionals: The Challenge for HR Professionals: Using workforce analytics to support business strategy and fact-based decision-making 2015 National EMSI Conference September 23, 2015 Welcome Lindsay Scott Principal,

More information

ByteMobile Insight. Subscriber-Centric Analytics for Mobile Operators

ByteMobile Insight. Subscriber-Centric Analytics for Mobile Operators Subscriber-Centric Analytics for Mobile Operators ByteMobile Insight is a subscriber-centric analytics platform that provides mobile network operators with a comprehensive understanding of mobile data

More information

Using Predictive Analytics to Increase Profitability Part II

Using Predictive Analytics to Increase Profitability Part II Using Predictive Analytics to Increase Profitability Part II Jay Roy Chief Strategy Officer Practical Intelligence for Ensuring Profitability Fall 2011 Dallas, TX Table of Contents A Brief Review of Part

More information

Professional Practice Goodwill/ Celebrity Goodwill

Professional Practice Goodwill/ Celebrity Goodwill 2012 Arizona Family Law Institute: For Better or For Worse Professional Practice Goodwill/ Celebrity Goodwill Charles A. Wilhoite, CPA/ABV/CFF, CMA, ASA, CFM Managing Director Willamette Management Associates

More information

Using Predictive Analytics to Increase Profitability Part III

Using Predictive Analytics to Increase Profitability Part III Using Predictive Analytics to Increase Profitability Part III Jay Roy Chief Strategy Officer Practical Intelligence for Ensuring Profitability Fall 2011 Dallas, TX Table of Contents A Brief Review of Part

More information

Perceptions about Self-Encrypting Drives: A Study of IT Practitioners

Perceptions about Self-Encrypting Drives: A Study of IT Practitioners Perceptions about Self-Encrypting Drives: A Study of IT Practitioners Executive Summary Sponsored by Trusted Computing Group Independently conducted by Ponemon Institute LLC Publication Date: April 2011

More information

Financial applications for brand valuation

Financial applications for brand valuation Financial applications for brand valuation Delivering value beyond the number Creating and managing brand value TM $ $ $ $$ $ $ $ $ $ Interbrand Pg. 2 Financial applications for brand valuation Delivering

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

Smart Machines Lead to Smarter Service: Remote Intelligence Signals Profitable Resolution

Smart Machines Lead to Smarter Service: Remote Intelligence Signals Profitable Resolution Smart Machines Lead to Smarter Service: Remote Intelligence Signals Profitable Resolution The emergence of machine-to-machine (M2M) enabled equipment is driving a large growth of Field Service-based data

More information

Information security due diligence

Information security due diligence web applications and websites W A T S O N H A L L Watson Hall Ltd London 020 7183 3710 Edinburgh 0131 510 2001 info@watsonhall.com www.watsonhall.com Identifying information security risk for web applications

More information

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT TELERAN SOLUTION BRIEF Building Better Intelligence APPLICATION COMPLIANCE AUDIT & ENFORCEMENT For Exadata and Oracle 11g Data Warehouse Environments BUILDING BETTER INTELLIGENCE WITH BI/DW COMPLIANCE

More information

Strategies for assessing cloud security

Strategies for assessing cloud security IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary

More information

Practice Bulletin No. 2

Practice Bulletin No. 2 Practice Bulletin No. 2 INTERNATIONAL GLOSSARY OF BUSINESS VALUATION TERMS To enhance and sustain the quality of business valuations for the benefit of the profession and its clientele, the below identified

More information

Talent & Organization. Change Management. Driving successful change and creating a more agile organization

Talent & Organization. Change Management. Driving successful change and creating a more agile organization Talent & Organization Change Management Driving successful change and creating a more agile organization 2 Organizations in both the private and public sectors face unprecedented challenges in today s

More information

An Overview of icims

An Overview of icims An Overview of icims January 2015 FORWARD LOOKING INFORMATION This document contains statements that constitute forward- looking statements, including but not limited to icims outlook for icims financial

More information

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:

More information

IP Valuation. WIPO Workshop on Innovation, Intellectual Asset Management and Successful Technology Licensing: Wealth Creation in the Arab Region

IP Valuation. WIPO Workshop on Innovation, Intellectual Asset Management and Successful Technology Licensing: Wealth Creation in the Arab Region IP Valuation WIPO Workshop on Innovation, Intellectual Asset Management and Successful Technology Licensing: Wealth Creation in the Arab Region Muscat, Oman, December 12 and 13, 2011 Topics Intangibles

More information

Transforming Trading Operations. Using Analytics to Drive Trading Strategy

Transforming Trading Operations. Using Analytics to Drive Trading Strategy Transforming Trading Operations Using Analytics to Drive Trading Strategy 2 The term analytics seems to be everywhere these days across every industry and in just about every facet of technology. Commodity

More information

KPIs and Improving Profitability with Business Intelligence SCOTT RANDALL ADVANCED LEGAL WWW.ADVANCEDLEGAL.COM

KPIs and Improving Profitability with Business Intelligence SCOTT RANDALL ADVANCED LEGAL WWW.ADVANCEDLEGAL.COM KPIs and Improving Profitability with Business Intelligence SCOTT RANDALL ADVANCED LEGAL WWW.ADVANCEDLEGAL.COM The Business of Law Has Changed Law Firm Growth is Flat Realized Rates are Declining Competition

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com SURVEY Impact of Training: Functional Excellence Leads to Operational Productivity Cushing Anderson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

Webinar: Digital Media M&A at the Halfway Mark

Webinar: Digital Media M&A at the Halfway Mark Webinar: Digital M&A at the Halfway Mark JEANNE DIXON DATTILO Sr. Valuation Analyst JED WILLIAMS Vice President, Consulting LEM LLOYD CRO, Fixya August 7, 2013 Today s Agenda INTRODUCTION TO: LOCAL MEDIA

More information

The Challenge of Big Data Benchmarking Large-Scale Data Management Insights from Benchmark Research

The Challenge of Big Data Benchmarking Large-Scale Data Management Insights from Benchmark Research Benchmarking Large-Scale Data Management Insights from Presentation Confidentiality Statement The materials in this presentation are protected under the confidential agreement and/or are copyrighted materials

More information

Accenture Human Capital Management Solutions. Transforming people and process to achieve high performance

Accenture Human Capital Management Solutions. Transforming people and process to achieve high performance Accenture Human Capital Management Solutions Transforming people and process to achieve high performance The sophistication of our products and services requires the expertise of a special and talented

More information

Data Sheet: PCI DSS Compliant ecommerce Hosting

Data Sheet: PCI DSS Compliant ecommerce Hosting Where every interaction matters. Data Sheet: PCI DSS Compliant ecommerce Hosting PCI Compliant Infrastructure Multiple ecommerce Platforms Maximum Speed and Reliability Every millisecond and every transaction

More information

Shaping. Business Strategy. Through. Competitive Intelligence. Strategic Use of. Intellectual Property Information

Shaping. Business Strategy. Through. Competitive Intelligence. Strategic Use of. Intellectual Property Information Shaping This project is funded by the EU Business Strategy Through Competitive Intelligence Strategic Use of Intellectual Property Information Strategic Planning Process Business Strategy Definition This

More information

Enterprise Data Management for SAP. Gaining competitive advantage with holistic enterprise data management across the data lifecycle

Enterprise Data Management for SAP. Gaining competitive advantage with holistic enterprise data management across the data lifecycle Enterprise Data Management for SAP Gaining competitive advantage with holistic enterprise data management across the data lifecycle By having industry data management best practices, from strategy through

More information

Valuation Practice. ICM Advisors. Intellectual Property & Intangible Assets. Leverage the intangible assets INTELLECTUAL CAPITAL MANAGEMENT

Valuation Practice. ICM Advisors. Intellectual Property & Intangible Assets. Leverage the intangible assets INTELLECTUAL CAPITAL MANAGEMENT Valuation Practice Intellectual Property & Intangible Assets ICM Advisors INTELLECTUAL CAPITAL MANAGEMENT Leverage the intangible assets Business needs drive IP Valuation Intellectual Property (IP) and

More information

Risk Considerations for Internal Audit

Risk Considerations for Internal Audit Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013

More information

The economics of IT risk and reputation

The economics of IT risk and reputation Global Technology Services Research Report Risk Management The economics of IT risk and reputation What business continuity and IT security really mean to your organization Findings from the IBM Global

More information

IBM Tealeaf CX. A leading information source for online Customer Experience Management. Highlights

IBM Tealeaf CX. A leading information source for online Customer Experience Management. Highlights IBM Tealeaf CX A leading information source for online Customer Experience Management Highlights Passively captures network traffic without impacting site performance. Provides breakthrough visibility

More information

International Glossary of Business Valuation Terms*

International Glossary of Business Valuation Terms* 40 Statement on Standards for Valuation Services No. 1 APPENDIX B International Glossary of Business Valuation Terms* To enhance and sustain the quality of business valuations for the benefit of the profession

More information

Promotion Collaboration

Promotion Collaboration IBM Software Industry Solutions Promotion Collaboration Five steps to success Promotion Collaboration The game changes when trading partners truly collaborate on promotions Retailers and manufacturers

More information

Exceptional Customer Experience AND Credit Risk Management: How to Achieve Both

Exceptional Customer Experience AND Credit Risk Management: How to Achieve Both Exceptional Customer Experience AND Credit Risk Management: How to Achieve Both Lynn Brunner Experian and the marks used herein are service marks or registered trademarks of Experian Information Solutions,

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

Information Security & Privacy Solutions Enabling Information Governance

Information Security & Privacy Solutions Enabling Information Governance Information Security & Privacy Solutions Enabling Information Governance LYNDA KEITANY IM SALES SPECIALIST July 11, 2012 What s at Stake? Damage to company reputation Brand equity damage; negative publicity

More information

IBM Solution for Pharmaceutical Track & Trace

IBM Solution for Pharmaceutical Track & Trace Secure and responsive supply chains IBM Solution for Pharmaceutical Track & Trace The underlying problem: Complexity in the pharmaceutical supply chain At its core, the pharmaceutical industry is about

More information

UNLOCKING VALUE IN OPERATIONAL ASSETS

UNLOCKING VALUE IN OPERATIONAL ASSETS UNLOCKING VALUE IN OPERATIONAL ASSETS Can asset monetization benefit your company? By Bill Miller and Rich Wightman, ISG Directors www.isg-one.com INTRODUCTION Asset monetization is a business transaction

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

YARDI Investment ManagementTM

YARDI Investment ManagementTM YARDI Investment ManagementTM A solution that fully automates the real estate asset and investment management lifecycle and helps drive investor value. Investment Management Key Benefits Structure, scale

More information

Meeting the Needs of Private Equity in the Finance Organization

Meeting the Needs of Private Equity in the Finance Organization Meeting the Needs of Private Equity in the Finance Organization When there is a change in a company s ownership, significant changes are generally required in its finance organization. This is especially

More information

Solve your toughest challenges with data mining

Solve your toughest challenges with data mining IBM Software IBM SPSS Modeler Solve your toughest challenges with data mining Use predictive intelligence to make good decisions faster Solve your toughest challenges with data mining Imagine if you could

More information

Moody s Analytics Solutions for the Asset Manager

Moody s Analytics Solutions for the Asset Manager ASSET MANAGER Moody s Analytics Solutions for the Asset Manager Moody s Analytics Solutions for the Asset Manager COVERING YOUR ENTIRE WORKFLOW Moody s is the leader in analyzing and monitoring credit

More information

EMC ADVERTISING ANALYTICS SERVICE FOR MEDIA & ENTERTAINMENT

EMC ADVERTISING ANALYTICS SERVICE FOR MEDIA & ENTERTAINMENT EMC ADVERTISING ANALYTICS SERVICE FOR MEDIA & ENTERTAINMENT Leveraging analytics for actionable insight ESSENTIALS Put your Big Data to work for you Pick the best-fit, priority business opportunity and

More information

INVESTOR PRESENTATION. Third Quarter 2014

INVESTOR PRESENTATION. Third Quarter 2014 INVESTOR PRESENTATION Third Quarter 2014 Note to Investors Certain non-gaap financial information regarding operating results may be discussed during this presentation. Reconciliations of the differences

More information

A Benchmark Study of Multinational Organizations. Research Report. Independently Conducted by Ponemon Institute LLC

A Benchmark Study of Multinational Organizations. Research Report. Independently Conducted by Ponemon Institute LLC A Benchmark Study of Multinational Organizations Research Report Independently Conducted by Ponemon Institute LLC January 2011 $5,838,781 DIFFERENCE Compliance Cost $3,529,570 Non-Compliance Cost $9,368,351

More information

How to Deliver Measurable Business Value with the Enterprise CMDB

How to Deliver Measurable Business Value with the Enterprise CMDB How to Deliver Measurable Business Value with the Enterprise CMDB James Moore jdmoore@us.ibm.com Product Manager, Business Service, Netcool/Impact 2010 IBM Corporation Agenda What is a CMDB? What are CMDB

More information

Privilege Gone Wild: The State of Privileged Account Management in 2015

Privilege Gone Wild: The State of Privileged Account Management in 2015 Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...

More information

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Exercising Your Enterprise Cyber Response Crisis Management Capabilities Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.

More information

Why Finance Should Automate Management & Regulatory Reporting Processes

Why Finance Should Automate Management & Regulatory Reporting Processes May 25, 2016 Why Finance Should Automate Management & Regulatory Reporting Processes connecting senior-level financial executives since 1931 CPE Credits Today s webcast is worth 1 Continuing Professional

More information

Information Governance

Information Governance WHITE PAPER Information Governance Irrelevant, overhead or central to survival? Setting the information governance agenda Table of Contents Introduction... 1 Defining the importance of information governance...

More information

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:

More information

INVESTOR PRESENTATION. First Quarter 2014

INVESTOR PRESENTATION. First Quarter 2014 INVESTOR PRESENTATION First Quarter 2014 Note to Investors Certain non-gaap financial information regarding operating results may be discussed during this presentation. Reconciliations of the differences

More information

Data Governance for Financial Institutions

Data Governance for Financial Institutions Financial Services the way we see it Data Governance for Financial Institutions Drivers and metrics to help banks, insurance companies and investment firms build and sustain data governance Table of Contents

More information

and Security in the Era of Cloud

and Security in the Era of Cloud Re-imagine i Enterprise Mobility and Security in the Era of Cloud Brendan Hannigan General Manager, IBM Security Systems Leverage Cloud as a growth engine for business Exploit Mobile to build customer

More information

10 Steps to a Multichannel Strategy and an Exceptional Customer Experience

10 Steps to a Multichannel Strategy and an Exceptional Customer Experience 10 Steps to a Multichannel Strategy and an Exceptional Customer Experience Jesús Hoyos CRM industry analyst and advisor Brad Herrington Principal Solutions Architect Interactive Intelligence, Inc. Contents

More information

Middle East I.T. Security Business Survey

Middle East I.T. Security Business Survey Middle East I.T. Security Business Survey A quiet security revolution gathering pace A report by GISEC Powered by GISEC Analytics Partner Middle East I.T. Security Business Survey About the report: The

More information

IBM Software Master data management vision and value: Part 1

IBM Software Master data management vision and value: Part 1 IBM Software Master data management vision and value: Part 1 Develop an 1 2 3 4 5 Introduction Where does MDM fit into business strategy? Four value drivers From big picture to Resources Introduction Who

More information