Determining Data Equity: Capture and Calculate Valuation at Risk

Size: px
Start display at page:

Download "Determining Data Equity: Capture and Calculate Valuation at Risk"

Transcription

1 Matthew Mikell- IBM Market Manager IOT North America April 15, 2015 Determining Data Equity: Capture and Calculate Valuation at Risk

2 Agenda Foundations of Capturing Equity Closing Gaps Between Financial and IT Worlds Trends Forcing Data Equity Analysis Costs of Data Ownership & Maintenance Practices for Data Equity Audit Managing Data Risks and Replacement

3 What s changing: The world of Big Data & Analytics is expanding quickly Data is the world s newest resource.. not all data is created equal Decision-making extends from few to many.. but new risks and abuses arise As data grows, so does potential data equity.. but managing the lifecycle

4 What s missing: Transparency between data and finance worlds Maintaining and delivering high quality services Delivering and monetizing high quality data Monitoring and reporting on financial health

5 Trends of valuation Valuation is the process of putting a price on a piece of property. The value of businesses, personal property, intellectual property (such as patents, trademarks, and copyrights), and real estate are all commonly determined through the practice of valuation.

6 Brand Equity: Value of the brand in the marketplace Millward Brown 2014 Forbes 2014 Interbrand 2014 Logos are property of their respective owners.

7 What are foundations of brand equity? Value of the brand is to make money.. A premium that accrues to a brand from customers who are willing to pay extra for it Logos Symbols Sound Designs Tag lines or slogans Trademarks Brand alliances

8 Value of the brand is to make money.. A premium that accrues to a brand from customers who are willing to pay extra for it Brand Value (brand equity) - The sum of all distinguishing qualities of a brand (image, loyalty), drawn from all relevant stakeholders, that results in personal commitment to and demand for the brand; these differentiating thoughts and feelings make the brand valued and valuable. Brand Audit - Assessment of the health of a brand, analysis of individual sources, and recommendations to further improve or leverage brand equity. Example use only. Brands are protected by their respective owners

9 Data Maybe Be Bigger Than The Brand! Tangible asset emerging over financial treatment of brands on the balance sheet of it s useful life.. -Intangible assets often now constitute up to 70% 80% of Fortune 500 companies overall market valuations -For companies like IBM, may be closer to 90% -For asset heavy businesses such as airlines, the figure will be closer to 60%. (The Economist Group

10 How is a valuation defined? *Valuation - The financial rigor of identifying and measuring the economic benefit ($) - brand value - that derives from brand ownership. In finance terms, is considered to be the net present value of the estimated future cash flows attributable to the Brand. Market share Price sensitivity Profitability Revenues Marketing investments Growth rate Cost to acquire new customers Cost to retain customers

11 Data equity: Closing gaps between IT and finance worlds Personnel & Mandates Budgets Staff Hardware (on/off premise) Compliance, PCI, HIPAA Third-party intrusion tests Risk Management Business losses Costs of insurance Impact on brand Cost (per record $194).. Profile & Benchmark Cost across peers Exposure of breach cost Staffing metrics Operations by country GAAP, ASC

12 Managing Growing Risk Vs. Data Investments

13 Data valuation against costs and (potential) revenues 2010 (Brand & Tabular) Systems of record (ERP, HR) Systems of engagement (CRM) Web traffic (search, etc) (Sentiment & Non-Tabular) Web traffic (search, etc) Social (Twitter, blogs) Machine data (telemetry) Human data (fit bit) Mobile Video Imagery 80+% of IT budget allocation 80+% of IT data allocation

14 Maintaining Data Value requires establishing Speed and Confidence.in every decision, interaction & process System of Record Systems of Engagement Big Data & Analytics Infrastructure Security Intelligence Enterprise Applications Mobile Commerce Call Center Social Business

15 Data Equity Accounting: Scenario #1 Grade it (Asset-based) 1. Calculate a data quality score on a scale of 0 to 10 1.Data duplication 2.Cold contacts 3.Repeat buyers 4.Uniqueness or proprietary quality 2. Determine specific values as proportion of data types and quality score 3. Use an adjustment or allowance for a geography 4. Forecast specific growth rates of data types 5. Apply Net Present Value Method

16 Data Equity Accounting: Scenario #2 Monetize it (Income-based) 1. Calculate a data quality score on a scale of 0 to Calculate a proprietary nature of data on a scale of 0 to Determine useful age 4. Calculate royalty rate 5. Use an adjustment or allowance for a geography 6. Determine specific revenues as proportion of different data types 7. Apply Net Present Value Method

17 Data Equity Accounting: Scenario #3 Compare it (Market-based) 1. Use valuations from current M&A activity of peers 2. Calculate a data quality score on a scale of 0 to 10 1.Data duplication 2.Cold contacts 3.Repeat buyers 4.Uniqueness or proprietary quality 3. Use an adjustment or allowance for a geography 4. Use an adjustment or allowance for market share

18 Data Equity Benchmarking: Privacy Investment The average surveyed Fortune 1000 company's privacy program has a budget of $2.4 million Roughly $1.9 million (80%)is spent internally, the other $500k (20%)is spent externally -Of internal spend, 50% is for salary and benefits of privacy program employees. The median budget is $1 million 12 percent of firms have budgets of more than $5 million annually Fortune 1000 companies sampled spend an approximate average of $76 per employee on privacy, or $204 per $1 million in revenue International Association of Privacy Professionals (IAPP) - Industry of Privacy Project: New Budget Benchmarking

19 Data Equity Benchmarking: Data Breach and Cyber Insurance Strong security posture, incident response plan and CISO appointment reduced the cost per record by $14.14, $12.77 and $6.59, respectively. Average breach cost to a company was $3.5 million Average cost paid for each lost or stolen record containing sensitive and confidential information increased more than 9% to $145 -Most costly are German and US firms on average ($195 and $201 per record respectively) -Least costly breaches are in Brazil and India ($70 and $5 per record respectively) All participating organizations experienced a data breach ranging from a low of approximately 2,415 to slightly more than 100,000 compromised records - Smallest number of breach records are Japanese and Italian companies (18,615 and 19,034 records, respectively). -Greatest number of exposed or compromised records USA and Saudi Arabia (29,087 and 28,690 records, respectively). Benchmark research sponsored by IBM Independently conducted by Ponemon Institute LLC May 2014

20 Intelligent Data vs Big Data: De-Risking Process Cut the noise Valuation of what data /metric carries predictive potential (ex. audits) Balance privacy, storage, investments accordingly to data valuations Maintenance - Staffing commensurate to data equity valuations and industry peers (privacy, legal) Data breach, security and disaster recovery (ex. stress testing) Double down- Monetize data/attributes that drive other revenue streams Build in KPIs to track data equity strategies (ex web bounce rates) Investments in new analytic talents and technologies

21 Actions Data quality initiatives must be operationalized across the organization, or high-valued assets, to assure the efficacy of the information. The politics and management needs of multiple data owners across the enterprise must be rationalized. Create or designate a champion from senior management with revenue or valuation goals Determine a long-term valuation and engagement model with stakeholders (legal, accounting, IT, investors)

22 Tools Data warehouse with capacity and reach into systems of engagement and systems of operation Business intelligence capability to query and calculate across a wide range of data types Process to review dark data and archival strategies Data quality software to ensure necessary revenue streams or equity valuations Analytics to forecast valuation growth against investments and risks

23 Thank

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Data Security: Fight Insider Threats & Protect Your Sensitive Data Data Security: Fight Insider Threats & Protect Your Sensitive Data Marco Ercolani Agenda Data is challenging to secure A look at security incidents Cost of a Data Breach Data Governance and Security Understand

More information

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9

More information

2010 Data Breach Investigations Report

2010 Data Breach Investigations Report 2010 Data Breach Investigations Report Matthijs van de Wel Managing Principal Forensics EMEA 2010 Verizon. All Rights Reserved. PTE14626 07/10 PROPRIETARY STATEMENT This document and any attached materials

More information

How To Transform Insurance Through Digital Transformation

How To Transform Insurance Through Digital Transformation Digital transformation can help you tame the perfect storm. The digital future for insurance. Following the 2008 financial crisis, the insurance sector has faced tighter regulation, which has made it harder

More information

How To Protect Your Data From Theft

How To Protect Your Data From Theft Understanding the Effectiveness of a Data Protection Program IIA: Almost Free Seminar 21 June 2011 Agenda Data protection overview Case studies Ernst & Young s point of view Understanding the effectiveness

More information

The Business Case for Security Information Management

The Business Case for Security Information Management The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un

More information

Valuation of Intellectual Property Mark Weston, CA, CBV Director, Advisory and Transaction Services

Valuation of Intellectual Property Mark Weston, CA, CBV Director, Advisory and Transaction Services 9:30 am 10:15 am Valuation of Intellectual Property Mark Weston, CA, CBV Director, Advisory and Transaction Services Agenda General Valuation Approaches Cost Based Valuation Methods Market Based Valuation

More information

The IBM data governance blueprint: Leveraging best practices and proven technologies

The IBM data governance blueprint: Leveraging best practices and proven technologies May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and

More information

Web Protection for Your Business, Customers and Data

Web Protection for Your Business, Customers and Data WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision

More information

Third-Party Cybersecurity and Data Loss Prevention

Third-Party Cybersecurity and Data Loss Prevention Third-Party Cybersecurity and Data Loss Prevention SESSION ID: DSP-W04A Brad Keller Sr. Vice President Santa Fe Group Jonathan Dambrot, CISSP CEO, Co-Founder Prevalent Networks 3rd Party Risk Management

More information

The Aberdeen Vault Navigating the Goldmine. A Member Benefit

The Aberdeen Vault Navigating the Goldmine. A Member Benefit The Aberdeen Vault Navigating the Goldmine A Member Benefit PUBLIC RESOURCES Values and Guiding Principles Standards of Practice (coming soon) NIGP Online Dictionary GoPro Magazine MEMBER RESOURCES NIGP

More information

Econ Pro Valuation Methods - General recap and pitfalls. October 1, 2010

Econ Pro Valuation Methods - General recap and pitfalls. October 1, 2010 Econ Pro Valuation Methods - General recap and pitfalls October 1, 2010 1 Agenda Valuation Dimensions & Applications Valuation Methods Market method Cost method Income method Income method for Intangible

More information

Governance, Risk, and Compliance (GRC) White Paper

Governance, Risk, and Compliance (GRC) White Paper Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:

More information

Credit Research & Risk Measurement

Credit Research & Risk Measurement Credit Research & RISK MEASUREMENT Credit Research & Risk Measurement Leverage the market standard in credit analysis and utilize the latest risk management technology to improve the efficiency of your

More information

The digital future for retail, hospitality and travel.

The digital future for retail, hospitality and travel. Digital transformation resets customer expectations. The digital future for retail, hospitality and travel. Technology is fundamentally changing how retail, hospitality and travel businesses operate. Businesses

More information

Intellectual Property Valuation Techniques

Intellectual Property Valuation Techniques By Daryl Martin and David Drews* IPmetrics LLC INTRODUCTION Unlike many of the other assets found on a company s balance sheet, the intangible assets, such as patents, trademarks and copyrights, are among

More information

Summary. U.S. Retail Cyber Monday Report 2014

Summary. U.S. Retail Cyber Monday Report 2014 U.S. Retail Report 2014 IBM DIGITAL ANALYTICS BENCHMARK 2 Summary Heading back to work, consumers clicked their way to the best deals on which remained the busiest online shopping day of the holiday season.

More information

2013 Letter from Our Chairman & CEO

2013 Letter from Our Chairman & CEO 2013 Letter from Our Chairman & CEO In fiscal 2013, we extended our track record of creating exceptional shareholder value. Pierre Nanterme Chairman & CEO Delivering in fiscal 2013 In fiscal 2013, Accenture

More information

Is Your Company Ready for a Big Data Breach?

Is Your Company Ready for a Big Data Breach? Is Your Company Ready for a Big Data Breach? The Second Annual Study on Data Breach Preparedness Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication

More information

IBM Business Analytics: Finance and Integrated Risk Management (FIRM) solution

IBM Business Analytics: Finance and Integrated Risk Management (FIRM) solution IBM Sales and Distribution Solution Brief Banking IBM Business Analytics: Finance and Integrated Risk Management (FIRM) solution Risk transparency across the enterprise 2 IBM Business Analytics: Finance

More information

Using a Multichannel Strategy to Deliver an Exceptional Customer Experience

Using a Multichannel Strategy to Deliver an Exceptional Customer Experience Using a Multichannel Strategy to Deliver an Exceptional Customer Experience 10 things to consider when building a multichannel strategy to improve the customer experience Jesús Hoyos CRM industry analyst,

More information

IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE. Copyright 2012, SAS Institute Inc. All rights reserved.

IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE. Copyright 2012, SAS Institute Inc. All rights reserved. IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE ABOUT THE PRESENTER Marc has been with SAS for 10 years and leads the information management practice for canada. Marc s area of specialty

More information

How do you transform risk into high performance? An Overview of Moody s Analytics

How do you transform risk into high performance? An Overview of Moody s Analytics How do you transform risk into high performance? An Overview of Moody s Analytics Essential insight serving global financial markets Moody s Analytics offers award-winning solutions and best practices

More information

ORACLE SOCIAL ENGAGEMENT AND MONITORING CLOUD SERVICE

ORACLE SOCIAL ENGAGEMENT AND MONITORING CLOUD SERVICE ORACLE SOCIAL ENGAGEMENT AND MONITORING CLOUD SERVICE KEY FEATURES Global social media, web, and news feed data Market-leading listening quality Automatic categorization Configurable dashboards, drill-down

More information

Chief Data Officer Center of Excellence. Develop an Enterprise CoE to Drive Business Decision Making and Growth

Chief Data Officer Center of Excellence. Develop an Enterprise CoE to Drive Business Decision Making and Growth Chief Data Officer Center of Excellence Develop an Enterprise CoE to Drive Business Decision Making and Growth CJ Nakamura & Vikram Anand Cerner Health Services September, 2015 hello who why what how q&a

More information

How To Transform It Risk Management

How To Transform It Risk Management The transformation of IT Risk Management kpmg.com The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help

More information

The Challenge for HR Professionals:

The Challenge for HR Professionals: The Challenge for HR Professionals: Using workforce analytics to support business strategy and fact-based decision-making 2015 National EMSI Conference September 23, 2015 Welcome Lindsay Scott Principal,

More information

Perceptions about Self-Encrypting Drives: A Study of IT Practitioners

Perceptions about Self-Encrypting Drives: A Study of IT Practitioners Perceptions about Self-Encrypting Drives: A Study of IT Practitioners Executive Summary Sponsored by Trusted Computing Group Independently conducted by Ponemon Institute LLC Publication Date: April 2011

More information

CONSULTING IMAGE PLACEHOLDER

CONSULTING IMAGE PLACEHOLDER CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization

More information

Information security due diligence

Information security due diligence web applications and websites W A T S O N H A L L Watson Hall Ltd London 020 7183 3710 Edinburgh 0131 510 2001 info@watsonhall.com www.watsonhall.com Identifying information security risk for web applications

More information

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT TELERAN SOLUTION BRIEF Building Better Intelligence APPLICATION COMPLIANCE AUDIT & ENFORCEMENT For Exadata and Oracle 11g Data Warehouse Environments BUILDING BETTER INTELLIGENCE WITH BI/DW COMPLIANCE

More information

Strategies for assessing cloud security

Strategies for assessing cloud security IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

How to Maximize the Value When Selling Your Management Company

How to Maximize the Value When Selling Your Management Company WHITE PAPER How to Maximize the Value When Selling Your Management Company INSIDE THIS REPORT Rational for Selling Management Company Valuation Acquisition Deal Structure Tips to Optimize Your Exit Value

More information

A Benchmark Study of Multinational Organizations

A Benchmark Study of Multinational Organizations A Benchmark Study of Multinational Organizations Research Report Independently Conducted by Ponemon Institute LLC January 2011 The True Cost of Compliance Benchmark Study of Multinational Organizations

More information

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:

More information

IBM Software A Journey to Adaptive MDM

IBM Software A Journey to Adaptive MDM IBM Software A Journey to Adaptive MDM What is Master Data? Why is it Important? A Journey to Adaptive MDM Contents 2 MDM Business Drivers and Business Value 4 MDM is a Journey 7 IBM MDM Portfolio An Adaptive

More information

2012 Letter from Our Chief Executive Officer

2012 Letter from Our Chief Executive Officer 2012 Letter from Our Chief Executive Officer Our strong performance in fiscal 2012 demonstrates that our growth strategy enabled us to further differentiate Accenture in the marketplace and deliver significant

More information

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security Securing business data CNS White Paper Cloud for Enterprise Effective Management of Data Security Jeff Finch, Head of Business Development, CNS Mosaic 2nd July 2015 Contents 1 Non-Disclosure Statement...

More information

FINANCIAL REPORTING COUNCIL FRC STUDY: ACCOUNTING FOR ACQUISITIONS

FINANCIAL REPORTING COUNCIL FRC STUDY: ACCOUNTING FOR ACQUISITIONS FINANCIAL REPORTING COUNCIL FRC STUDY: ACCOUNTING FOR ACQUISITIONS JANUARY 2010 Contents Page One Introduction 1 Two Summary of results 3 Three Review of compliance by area 3.1 Business review commentary

More information

Shaping. Business Strategy. Through. Competitive Intelligence. Strategic Use of. Intellectual Property Information

Shaping. Business Strategy. Through. Competitive Intelligence. Strategic Use of. Intellectual Property Information Shaping This project is funded by the EU Business Strategy Through Competitive Intelligence Strategic Use of Intellectual Property Information Strategic Planning Process Business Strategy Definition This

More information

The economics of IT risk and reputation

The economics of IT risk and reputation Global Technology Services Research Report Risk Management The economics of IT risk and reputation What business continuity and IT security really mean to your organization Findings from the IBM Global

More information

Valuation Practice. ICM Advisors. Intellectual Property & Intangible Assets. Leverage the intangible assets INTELLECTUAL CAPITAL MANAGEMENT

Valuation Practice. ICM Advisors. Intellectual Property & Intangible Assets. Leverage the intangible assets INTELLECTUAL CAPITAL MANAGEMENT Valuation Practice Intellectual Property & Intangible Assets ICM Advisors INTELLECTUAL CAPITAL MANAGEMENT Leverage the intangible assets Business needs drive IP Valuation Intellectual Property (IP) and

More information

Risk Considerations for Internal Audit

Risk Considerations for Internal Audit Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

Promotion Collaboration

Promotion Collaboration IBM Software Industry Solutions Promotion Collaboration Five steps to success Promotion Collaboration The game changes when trading partners truly collaborate on promotions Retailers and manufacturers

More information

Privilege Gone Wild: The State of Privileged Account Management in 2015

Privilege Gone Wild: The State of Privileged Account Management in 2015 Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...

More information

The Big Deal about Big Data. Mike Skinner, CPA CISA CITP HORNE LLP

The Big Deal about Big Data. Mike Skinner, CPA CISA CITP HORNE LLP The Big Deal about Big Data Mike Skinner, CPA CISA CITP HORNE LLP Mike Skinner, CPA CISA CITP Senior Manager, IT Assurance & Risk Services HORNE LLP Focus areas: IT security & risk assessment IT governance,

More information

Learning Objectives: Quick answer key: Question # Multiple Choice True/False

Learning Objectives: Quick answer key: Question # Multiple Choice True/False 0 Learning Objectives: 11.1 Describe the advantages and disadvantages of the most common forms of business ownership. 11.2 Identify the stakeholders of a business and describe why they are important. 11.3

More information

Solve your toughest challenges with data mining

Solve your toughest challenges with data mining IBM Software IBM SPSS Modeler Solve your toughest challenges with data mining Use predictive intelligence to make good decisions faster Solve your toughest challenges with data mining Imagine if you could

More information

Optimizing government and insurance claims management with IBM Case Manager

Optimizing government and insurance claims management with IBM Case Manager Enterprise Content Management Optimizing government and insurance claims management with IBM Case Manager Apply advanced case management capabilities from IBM to help ensure successful outcomes Highlights

More information

Using Predictive Analytics to Increase Profitability Part II

Using Predictive Analytics to Increase Profitability Part II Using Predictive Analytics to Increase Profitability Part II Jay Roy Chief Strategy Officer Practical Intelligence for Ensuring Profitability Fall 2011 Dallas, TX Table of Contents A Brief Review of Part

More information

How to Deliver Measurable Business Value with the Enterprise CMDB

How to Deliver Measurable Business Value with the Enterprise CMDB How to Deliver Measurable Business Value with the Enterprise CMDB James Moore jdmoore@us.ibm.com Product Manager, Business Service, Netcool/Impact 2010 IBM Corporation Agenda What is a CMDB? What are CMDB

More information

Information Governance

Information Governance WHITE PAPER Information Governance Irrelevant, overhead or central to survival? Setting the information governance agenda Table of Contents Introduction... 1 Defining the importance of information governance...

More information

Why Finance Should Automate Management & Regulatory Reporting Processes

Why Finance Should Automate Management & Regulatory Reporting Processes May 25, 2016 Why Finance Should Automate Management & Regulatory Reporting Processes connecting senior-level financial executives since 1931 CPE Credits Today s webcast is worth 1 Continuing Professional

More information

Valuation Services. Global Capabilities Delivered Locally KPMG LLP

Valuation Services. Global Capabilities Delivered Locally KPMG LLP Valuation Services Global Capabilities Delivered Locally KPMG LLP Today s global environment has elevated the importance of valuations that support financial reporting, tax planning, litigation, and mergers

More information

Financial applications for brand valuation

Financial applications for brand valuation Financial applications for brand valuation Delivering value beyond the number Creating and managing brand value TM $ $ $ $$ $ $ $ $ $ Interbrand Pg. 2 Financial applications for brand valuation Delivering

More information

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:

More information

Zak Khan Director, Advanced Cyber Defence

Zak Khan Director, Advanced Cyber Defence Securing your data, intellectual property and intangible assets from cybercrime Zak Khan Director, Advanced Cyber Defence Agenda (16 + optional video) Introduction (2) Context Global Trends Strategic Impacts

More information

Middle East I.T. Security Business Survey

Middle East I.T. Security Business Survey Middle East I.T. Security Business Survey A quiet security revolution gathering pace A report by GISEC Powered by GISEC Analytics Partner Middle East I.T. Security Business Survey About the report: The

More information

Smart Machines Lead to Smarter Service: Remote Intelligence Signals Profitable Resolution

Smart Machines Lead to Smarter Service: Remote Intelligence Signals Profitable Resolution Smart Machines Lead to Smarter Service: Remote Intelligence Signals Profitable Resolution The emergence of machine-to-machine (M2M) enabled equipment is driving a large growth of Field Service-based data

More information

Benefits of Using Data Loss Prevention Technology

Benefits of Using Data Loss Prevention Technology The Essentials Series: Email-Centric Data Loss Prevention Benefits of Using Data Loss Prevention Technology sponsored by by Dan Sullivan Benefits of Using Data Loss Prevention Technology...1 Need for Automated

More information

The Business Case for Information Security. White Paper

The Business Case for Information Security. White Paper The Business Case for Information Security White Paper Version 1.0 Background Creating a compelling business case for information security can be a challenge. It s sometimes difficult to identify or articulate

More information

An Overview of icims

An Overview of icims An Overview of icims January 2015 FORWARD LOOKING INFORMATION This document contains statements that constitute forward- looking statements, including but not limited to icims outlook for icims financial

More information

Steel supply chain transformation challenges Key learnings

Steel supply chain transformation challenges Key learnings IBM Global Business Services White Paper Industrial Products Steel supply chain transformation challenges Key learnings 2 Steel supply chain transformation challenges Key learnings Introduction With rising

More information

Branding: Functional and Psychological Value

Branding: Functional and Psychological Value Branding: Functional and Psychological Value Session 9 Marketing Management Prof. Natalie Mizik "Our company's name and trademarks are by far our most valuable assets. Johnson and Johnson Corporate Management

More information

Quality management across the product and application life cycle

Quality management across the product and application life cycle IBM Software Product and application life cycle June 2011 Quality across the product and application life cycle IBM solutions for a Smarter Planet 2 Quality across the product and application life cycle

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com SURVEY Impact of Training: Functional Excellence Leads to Operational Productivity Cushing Anderson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

IBM Digital Analytics Benchmark. Black Friday Report 2013

IBM Digital Analytics Benchmark. Black Friday Report 2013 Report 2013 1 2 Summary US Holiday shoppers once again shopped online early for the best deals with Thanksgiving Day online sales increasing by 19.7 percent over 2012. This momentum set the stage for a

More information

Security for a Smarter Planet. 2011 IBM Corporation All Rights Reserved.

Security for a Smarter Planet. 2011 IBM Corporation All Rights Reserved. Security for a Smarter Planet The Smarter Planet Our world is getting Instrumented Our world is getting Interconnected Our world is getting Intelligent Growing Security Challenges on the Smarter Planet

More information

Do You Need to be a Data Scientist to Analyze Text? Fern Halper

Do You Need to be a Data Scientist to Analyze Text? Fern Halper Do You Need to be a Data Scientist to Analyze Text? Fern Halper TDWI Research Director for Advanced Analytics May 29, 2013 Sponsor Speakers Fern Halper Research Director, Advanced Analytics, TDWI Judson

More information

IBM Digital Analytics Benchmark. Cyber Monday Report 2013

IBM Digital Analytics Benchmark. Cyber Monday Report 2013 Report 2013 1 2 Summary U.S. shoppers made the biggest online shopping day in history with a 20.6 percent increase in online sales. also capped the highest five day online sales period on record from Thanksgiving

More information

Webinar: Digital Media M&A at the Halfway Mark

Webinar: Digital Media M&A at the Halfway Mark Webinar: Digital M&A at the Halfway Mark JEANNE DIXON DATTILO Sr. Valuation Analyst JED WILLIAMS Vice President, Consulting LEM LLOYD CRO, Fixya August 7, 2013 Today s Agenda INTRODUCTION TO: LOCAL MEDIA

More information

Data Sheet: PCI DSS Compliant ecommerce Hosting

Data Sheet: PCI DSS Compliant ecommerce Hosting Where every interaction matters. Data Sheet: PCI DSS Compliant ecommerce Hosting PCI Compliant Infrastructure Multiple ecommerce Platforms Maximum Speed and Reliability Every millisecond and every transaction

More information

WHITE PAPER WHY ORGANIZATIONS NEED LTO-6 TECHNOLOGY TODAY

WHITE PAPER WHY ORGANIZATIONS NEED LTO-6 TECHNOLOGY TODAY WHITE PAPER WHY ORGANIZATIONS NEED LTO-6 TECHNOLOGY TODAY CONTENTS Storage and Security Demands Continue to Multiply.......................................3 Tape Keeps Pace......................................................................4

More information

Information Governance & Records Management for Today's World

Information Governance & Records Management for Today's World May 19-22, 2014, Toronto ON Canada Information Governance & Records Management for Today's World Presented by Colin Cahill LI22 5/20/2014 1:15 PM - 2:45 PM The handouts and presentations attached are copyright

More information

Exceptional Customer Experience AND Credit Risk Management: How to Achieve Both

Exceptional Customer Experience AND Credit Risk Management: How to Achieve Both Exceptional Customer Experience AND Credit Risk Management: How to Achieve Both Lynn Brunner Experian and the marks used herein are service marks or registered trademarks of Experian Information Solutions,

More information

A Benchmark Study of Multinational Organizations. Research Report. Independently Conducted by Ponemon Institute LLC

A Benchmark Study of Multinational Organizations. Research Report. Independently Conducted by Ponemon Institute LLC A Benchmark Study of Multinational Organizations Research Report Independently Conducted by Ponemon Institute LLC January 2011 $5,838,781 DIFFERENCE Compliance Cost $3,529,570 Non-Compliance Cost $9,368,351

More information

The case for cloud-based data backup

The case for cloud-based data backup IBM Global Technology Services IBM SmartCloud IBM Managed Backupi The case for cloud-based data backup IBM SmartCloud Managed Backup offers significant improvement over traditional data backup methods

More information

IBM Tealeaf CX. A leading information source for online Customer Experience Management. Highlights

IBM Tealeaf CX. A leading information source for online Customer Experience Management. Highlights IBM Tealeaf CX A leading information source for online Customer Experience Management Highlights Passively captures network traffic without impacting site performance. Provides breakthrough visibility

More information

Aligning Your Strategic Initiatives with a Realistic Big Data Analytics Roadmap

Aligning Your Strategic Initiatives with a Realistic Big Data Analytics Roadmap Aligning Your Strategic Initiatives with a Realistic Big Data Analytics Roadmap 3 key strategic advantages, and a realistic roadmap for what you really need, and when 2012, Cognizant Topics to be discussed

More information

How To Use Social Media To Improve Your Business

How To Use Social Media To Improve Your Business IBM Software Business Analytics Social Analytics Social Business Analytics Gaining business value from social media 2 Social Business Analytics Contents 2 Overview 3 Analytics as a competitive advantage

More information

How To Understand Data Theory

How To Understand Data Theory Predictive Analytics & Business Insights 2015, Chicago Mudit Mangal Project Lead, Data Analytics, Supply Chain Sears Holdings Corporation 06/11/2015 Agenda WHAT IS HAPPENING WHAT ARE BENEFITS AND CHALLENGES

More information

IBM Solution for Pharmaceutical Track & Trace

IBM Solution for Pharmaceutical Track & Trace Secure and responsive supply chains IBM Solution for Pharmaceutical Track & Trace The underlying problem: Complexity in the pharmaceutical supply chain At its core, the pharmaceutical industry is about

More information

FIVE PRACTICAL STEPS

FIVE PRACTICAL STEPS WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND

More information

UNLOCKING VALUE IN OPERATIONAL ASSETS

UNLOCKING VALUE IN OPERATIONAL ASSETS UNLOCKING VALUE IN OPERATIONAL ASSETS Can asset monetization benefit your company? By Bill Miller and Rich Wightman, ISG Directors www.isg-one.com INTRODUCTION Asset monetization is a business transaction

More information

INTELLECTUAL PROPERTY VALUATIONS

INTELLECTUAL PROPERTY VALUATIONS INTELLECTUAL PROPERTY VALUATIONS WISE, BLACKMAN LLP Canada ctremblay@wiseblackman.com AGENDA Intangible asset categories When is a valuation required? Components of fair market value Fair value for financial

More information

Chapter 4 Valuation Methods in Intellectual Asset-Based. Management Evaluation Finance

Chapter 4 Valuation Methods in Intellectual Asset-Based. Management Evaluation Finance Chapter 4 Valuation Methods in Intellectual Asset-Based Management Evaluation Finance (Supplemental Discussion) This chapter explains one way of thinking for valuation methods in intellectual asset-based

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

YARDI Investment ManagementTM

YARDI Investment ManagementTM YARDI Investment ManagementTM A solution that fully automates the real estate asset and investment management lifecycle and helps drive investor value. Investment Management Key Benefits Structure, scale

More information

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. Security solutions To support your business objectives Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. For an On Demand Business, security

More information

ByteMobile Insight. Subscriber-Centric Analytics for Mobile Operators

ByteMobile Insight. Subscriber-Centric Analytics for Mobile Operators Subscriber-Centric Analytics for Mobile Operators ByteMobile Insight is a subscriber-centric analytics platform that provides mobile network operators with a comprehensive understanding of mobile data

More information

2008 Annual Study: U.S. Enterprise Encryption Trends

2008 Annual Study: U.S. Enterprise Encryption Trends 2008 Annual Study: U.S. Enterprise Encryption Trends Leading IT organizations continue shift to strategic encryption approach A study analyzing survey results from 975 U.S. business and IT managers about

More information

Content Marketing The art of selling without selling!

Content Marketing The art of selling without selling! Content Marketing The art of selling without selling! PRESENTED BY David Searns Today s AGENDA I m not a fan How to go 16 years without making a cold call Six quick case studies Content marketing 101 Four

More information

IBM Tealeaf CX. A leading data capture for online Customer Behavior Analytics. Advantages. IBM Software Data Sheet

IBM Tealeaf CX. A leading data capture for online Customer Behavior Analytics. Advantages. IBM Software Data Sheet IBM Tealeaf CX A leading data capture for online Customer Behavior Analytics Advantages Passively captures network traffic without impacting site performance Provides breakthrough visibility into customer

More information

Information Security & Privacy Solutions Enabling Information Governance

Information Security & Privacy Solutions Enabling Information Governance Information Security & Privacy Solutions Enabling Information Governance LYNDA KEITANY IM SALES SPECIALIST July 11, 2012 What s at Stake? Damage to company reputation Brand equity damage; negative publicity

More information

INFORMATION PROTECTION

INFORMATION PROTECTION INFORMATION PROTECTION Johan Celis Principal Security Consultant Symantec Benelux SYMANTEC ENTERPRISE SECURITY STRATEGY Users Data Cyber Security Services Monitoring, Incident Response, Simulation, Adversary

More information

Human Capital Financial Statements

Human Capital Financial Statements Presents: Human Capital Financial Statements April 19, 2011 About Human Capital Management Institute The Human Capital Management Institute (HCMI) was founded on the belief that organizations can and must,

More information