MANAGING CROSS-AGENCY DATA IN TAX COMPLIANCE JIM BLAIR TERADATA SR. CONSULTANT

Size: px
Start display at page:

Download "MANAGING CROSS-AGENCY DATA IN TAX COMPLIANCE JIM BLAIR TERADATA SR. CONSULTANT"

Transcription

1 MANAGING CROSS-AGENCY DATA IN TAX COMPLIANCE JIM BLAIR TERADATA SR. CONSULTANT

2 Agenda Defining The Problem Cross Agency Opportunity Governance for Cross Agency Use case Wrap-Up / Q & A 2 Confidential Do Not Distribute Without Permission

3 from Many Agencies Structured and Unstructured Dept of Human Services Dept of Health Dept of Labor i.e. Audit and Fraud Leads Dept of Justice Dept of Revenue Professional Licenses 3 Confidential Do Not Distribute Without Permission

4 Harsh Reality about Many Decisions Recognize the data challenges 47% No confidence in data 59% Missing information 42% Use the wrong information Gartner, Forrester, B-eye-Network 4 Confidential Do Not Distribute Without Permission

5 The Won t Manage Itself The problem: Independent agencies have deployed disparate systems without attention to the impact on overall crossagency data architecture and integrity The result: The business is unable to answer cross-agency business questions The business has less confidence in the quality of the data and the decisions based on the data Technology complexity and costs become excessive It is challenging to comply with regulatory policies Establishing a trusted, integrated view of information requires more than technology; it requires political will and agency involvement! 5 Confidential Do Not Distribute Without Permission

6 Cross Agency Governance Cross Agency makes Governance even more important (privacy, access, controls, commonality) Cross Agency requires new Steward roles (DOH Steward, DOJ Steward, DVM Steward. Governance decisions around Cross Agency > Who is the sponsor for Governance around Cross Agency? > Who has Support for which data? > How long do I keep the data? > Who can look at the data? > What data can be used? Dept. of Justice Dept of Human Services Professional Licenses > What if asked to delete the data? 6 Confidential Do Not Distribute Without Permission

7 Challenges of Cross Agency without Governance No single strategy for use No consistent prioritization No visibility into Inter-dependence End to end takes to long = Shadow projects! Limited accounting for operational disruption New silos create their own decisions Outcomes clouded across life cycle continuum Planning, development, implementation, Operationalization, reuse 7 Confidential Do Not Distribute Without Permission

8 Governance Considerations for Cross Agency Strategy with business value ROI, Time to Market, Risk Organizational Model Stakeholders, Stewards Policies and Processes Privacy, Risk, Retention Owners Measure and Monitor Completeness, Timeliness Technologies What platforms does the data come from Information Lifecycle (SDLC controls) Birth to death - How will the data live When it comes to Governance.. Cross Agency has all the characteristics of other data, Except Complexity is expanded and Variety of channels increases 8 Confidential Do Not Distribute Without Permission

9 Agency Alignment with Cross Agency Governance Tie to business value to New enabling technologies Incorporate tools, processes, and technology to manage Big Continue maturation of Tools such as Quality, Profiling Establish Fit for Purpose perspective Classify ALL data according to Business Use IT and the Business must collaborate Assign owners How will the data be accessed, stored, secured, backed-up, retained, deleted 9 Confidential Do Not Distribute Without Permission

10 New people in Cross Agency Governance Stakeholders & Owners Dept. of Justice Dept. of Human Services DMV Dept. of Labor Dept. of Revenue Stewards For each of the above Identification of erroneous - fix or not? Acceptable use of Cross Agency Job Roles and Descriptions for all new roles (formal) 10 Confidential Do Not Distribute Without Permission

11 Enterprise Management Framework for Cross Agency EDM Framework 1. Quality Ensure data is fit for its intended business use. 2. Integration Ensure data is provisioned and combined from different systems to create and deliver an integrated view of data regardless of source. 3. Security and Privacy - Ensure data is secure and confidential. 4. Metadata Management Ensure data is provided with consistent, accurate and complete contextual information. 5. Master Management Ensure a single view of reference data across the enterprise. 6. Modelling Ensure data is selected and organized in an effective and purposeful way. Master Mgmt. Governance Modeling Metadata Mgmt. Integrated and Trusted Information Quality Security and Privacy Stewardship People, Processes, and Technology Integration EDM delivers integrated and trusted information 11 Confidential Do Not Distribute Without Permission

12 3 Key components for Cross Agency Commonality EDM Framework Governance Modeling Quality Quality Master Mgmt. Integrated and Trusted Information Integration Metadata Mgmt. Security and Privacy Security Stewardship People, Processes, and Technology 12 Confidential Do Not Distribute Without Permission

13 Quality Core Dimensions Accuracy data represents reality correctly Completeness data gaps are minimized and data subjects are covered adequately Timeliness data is stored in system within an acceptable time from the business event Consistency data is defined and reported with the same meaning and values across the enterprise Master Mgmt Architecture Metadata Mgmt Governance Integrated and Trusted Information Stewardship Quality Security and Privacy Integration Governance determines the focus of data quality improvements based on business value Stewards provide business understanding of assigned data domains 13 Confidential Do Not Distribute Without Permission

14 Quality Improvement Process Step 1: Select/Define Step 2: Profile Step 3: Analyze????? No. of Errors Value Step 6: Monitor/Trend Step 5: Fix Root Causes Step 4: Trace Root Causes Error count Time People Process Information Technology Ensure is fit for it s intended use! 14 Confidential Do Not Distribute Without Permission

15 Security Core Dimensions Security Policies and Procedures Certification and Accreditation Auditing and Monitoring Network Security Internal & external, Intrusion Detection and Protection Vulnerability Management Base Security Authentication, Access Rights, Encryption Master Mgmt Architecture Metadata Mgmt Governance Integrated and Trusted Information Quality Security Integration Stewardship Security and Privacy Corporate organization determines level of security Owners determines the level of Access Stewards monitor access 15 Confidential Do Not Distribute Without Permission

16 Commonality Across Agencies: a.k.a. Master Management Adding new Agencies as sources Often causes overlapping data Inconsistent means of identification and classification across agencies Achieving a single view of the cross agency data is difficult without governance Common format issues Common definition issues Common Transformation issues Master Mgmt Architecture Metadata Mgmt Governance Integrated and Trusted Information Stewardship SOLUTION = Centralized data governance Quality Security Integration Management of COMMON data from cross agencies is the most frequent source of inconsistency and poor quality data due to lack of governance. Security and Privacy 16 Confidential Do Not Distribute Without Permission

17 What about BIG in a Tax Agency? Structured and Unstructured Call Center Web Logs i.e. Audit Leads Nexus Payments Work Papers Customs Case Notes Correspondence & s 17 Confidential Do Not Distribute Without Permission

18 Governance applies even more to Big Ø Must have New Owners Ø Decide access, quality levels, retention policies, etc Ø Must have Stewards Ø Act on data quality issues Ø EDM components stay the same and are all considered Ø Ø Ø Ø Ø Ø Quality Integration (What gets consolidated and integrated Security (new levels, more data, personal data) Meta (a must have!) Master (to include or Not to include) Modeling (or recognition of lack thereof) Ø Must be Measured and Monitored Ø New Technology considerations Ø Information Lifecycle controls Ø Birth to death - How will the data live When it comes to Governance.. BIG DATA has all the characteristics of CROSS AGENCY data, Except technology AND Complexity is expanded 18 Confidential Do Not Distribute Without Permission

19 Technology connects Cross Agency data across Networks, Clouds, External servers and Firewalls DHS DOJ Dept of Revenue Professional Licenses DMV Warehouse 19 Confidential Do Not Distribute Without Permission

20 Sharing via Enterprise Warehouse The EDW enables the linking of data across multiple data sets and the sharing of data among multiple State Departments. Department of Community Health (MDCH) Department of Human Services (DHS) Department of Corrections State Police State Court Administrators Office Department of Natural Resources Department of Licensing and Regulator Affairs Secretary of State Department of Treasury 20 Confidential Do Not Distribute Without Permission

21 Big Saving Real Dollars: State-wide Consolidation and Analytics in Michigan Impact Michigan s Teradata Enterprise Warehouse (EDW) consolidates data from many separate Michigan agencies. Michigan s EDW generates millions in annual savings utilizing analytics. One example: reduced administrative costs for the Medicaid program by 25%. 21 Confidential Do Not Distribute Without Permission

22 Advanced Analytics and Operational BI Applications: Michigan Using the Enterprise Warehouse: Michigan s has implemented innovative fraud detection methods. EDW assisted in the identification of more than $70 million dollars in fraudulent child care. With the addition of new advanced analytical software tools, such as Predictive Analytics and IBM s Initiate Master Patient Index (MPI), the State is positioned to gain even more value from the EDW to address our challenges. 22 Confidential Do Not Distribute Without Permission

23 Sharing via Enterprise Warehouse: Michigan Department of Treasury Uses of EDW Evaluate legislative tax proposal to determine tax revenue implications to Michigan. Running tax simulations to evaluate possible revenue replacements Identify and track revenue collections patterns, trends, and anomalies. Ensure tax compliance. Their tax auditors now review over 452,000 returns annually. Before using the warehouse, they were only able to review of 6,000 paper files. 23 Confidential Do Not Distribute Without Permission

24 Sharing via Enterprise Warehouse: Michigan Judicial Warehouse Name Search Application an indispensable part of the management of Michigan s Court System. Users include: Department of Corrections Michigan State Police Prosecutors Attorney General County Sheriff Departments Department of Labor and Economic Growth Friend of the Court DHS Inspector General DHS Child Welfare Services DCH Medicaid fraud 24 Confidential Do Not Distribute Without Permission

25 Sharing via Enterprise Warehouse: Michigan s RESULTS Michigan has achieved concrete and impressive business results from its innovative use of the EDW to > Manage Fraud > Reduce costs > Streamline operations > Manage problems The EDW is intricately and integrally woven into the data of more than 7,000,000 Michigan citizens State and Court employees, Michigan program beneficiaries External vendors and providers 25 Confidential Do Not Distribute Without Permission

26 HOWEVER..avoid another fine mess! Without a proper Governance Process for Cross Agency. The zest to spearhead new projects can unleash a mess of trouble misleading data and unexpected costs! "That's another fine mess you've gotten us into." Oliver Hardy, of Laurel and Hardy fame 26 Confidential Do Not Distribute Without Permission

27 Thank You!! What will you do different TOMORROW? Questions?? 27 Confidential Do Not Distribute Without Permission

Enterprise Data Management

Enterprise Data Management Enterprise Data Management - The Why/How/Who - The business leader s role in data management Maria Villar, Managing Partner Business Data Leadership Introduction Good Data is necessary for all business

More information

DATA GOVERNANCE AND DATA QUALITY

DATA GOVERNANCE AND DATA QUALITY DATA GOVERNANCE AND DATA QUALITY Kevin Lewis Partner Enterprise Management COE Barb Swartz Account Manager Teradata Government Systems Objectives of the Presentation Show that Governance and Quality are

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of

More information

Master Data Management

Master Data Management Master Data Management Patrice Latinne ULB 30/3/2010 Agenda Master Data Management case study Who & services roadmap definition data How What Why technology styles business 29/03/2010 2 Why Master Data

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, C.P.A., C.I.A. AUDITOR GENERAL ENTERPRISE DATA WAREHOUSE

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, C.P.A., C.I.A. AUDITOR GENERAL ENTERPRISE DATA WAREHOUSE MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT PERFORMANCE AUDIT OF THE ENTERPRISE DATA WAREHOUSE DEPARTMENT OF TECHNOLOGY, MANAGEMENT, AND BUDGET August 2014 Doug A. Ringler, C.P.A., C.I.A. AUDITOR

More information

Existing Technologies and Data Governance

Existing Technologies and Data Governance Existing Technologies and Data Governance Adriaan Veldhuisen Product Manager Privacy & Security Teradata, a Division of NCR 10 June, 2004 San Francisco, CA 6/10/04 1 My Assumptions for Data Governance

More information

EXPLORING THE CAVERN OF DATA GOVERNANCE

EXPLORING THE CAVERN OF DATA GOVERNANCE EXPLORING THE CAVERN OF DATA GOVERNANCE AUGUST 2013 Darren Dadley Business Intelligence, Program Director Planning and Information Office SIBI Overview SIBI Program Methodology 2 Definitions: & Governance

More information

Enterprise Data Governance

Enterprise Data Governance Enterprise Aligning Quality With Your Program Presented by: Mark Allen Sr. Consultant, Enterprise WellPoint, Inc. (mark.allen@wellpoint.com) 1 Introduction: Mark Allen is a senior consultant and enterprise

More information

Big Data, Big Risk, Big Rewards. Hussein Syed

Big Data, Big Risk, Big Rewards. Hussein Syed Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data

More information

White Paper. An Overview of the Kalido Data Governance Director Operationalizing Data Governance Programs Through Data Policy Management

White Paper. An Overview of the Kalido Data Governance Director Operationalizing Data Governance Programs Through Data Policy Management White Paper An Overview of the Kalido Data Governance Director Operationalizing Data Governance Programs Through Data Policy Management Managing Data as an Enterprise Asset By setting up a structure of

More information

University of Michigan Medical School Data Governance Council Charter

University of Michigan Medical School Data Governance Council Charter University of Michigan Medical School Data Governance Council Charter 1 Table of Contents 1.0 SIGNATURE PAGE 2.0 REVISION HISTORY 3.0 PURPOSE OF DOCUMENT 4.0 DATA GOVERNANCE PROGRAM FOUNDATIONAL ELEMENTS

More information

Enabling Data Quality

Enabling Data Quality Enabling Data Quality Establishing Master Data Management (MDM) using Business Architecture supported by Information Architecture & Application Architecture (SOA) to enable Data Quality. 1 Background &

More information

Data Integration Initiative Semi Annual Report April 2009. State of North Carolina Office of the State Controller

Data Integration Initiative Semi Annual Report April 2009. State of North Carolina Office of the State Controller Data Integration Initiative Semi Annual Report April 2009 State of North Carolina Office of the State Controller David McCoy, State Controller April 1, 2009 Table of Contents I. Background... 1 II. BEACON

More information

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Certified Identity and Access Manager (CIAM) Overview & Curriculum Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management

More information

Information Governance Workshop. David Zanotta, Ph.D. Vice President, Global Data Management & Governance - PMO

Information Governance Workshop. David Zanotta, Ph.D. Vice President, Global Data Management & Governance - PMO Information Governance Workshop David Zanotta, Ph.D. Vice President, Global Data Management & Governance - PMO Recognition of Information Governance in Industry Research firms have begun to recognize the

More information

Presented By: Leah R. Smith, PMP. Ju ly, 2 011

Presented By: Leah R. Smith, PMP. Ju ly, 2 011 Presented By: Leah R. Smith, PMP Ju ly, 2 011 Business Intelligence is commonly defined as "the process of analyzing large amounts of corporate data, usually stored in large scale databases (such as a

More information

Master Data Management Architecture

Master Data Management Architecture Master Data Management Architecture Version Draft 1.0 TRIM file number - Short description Relevant to Authority Responsible officer Responsible office Date introduced April 2012 Date(s) modified Describes

More information

Beyond the Single View with IBM InfoSphere

Beyond the Single View with IBM InfoSphere Ian Bowring MDM & Information Integration Sales Leader, NE Europe Beyond the Single View with IBM InfoSphere We are at a pivotal point with our information intensive projects 10-40% of each initiative

More information

Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management. Category: Cross Boundary Collaboration

Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management. Category: Cross Boundary Collaboration Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management Category: Cross Boundary Collaboration Initiation date: August 2011 Completion date: October 2013 Nomination submitted

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

Metrics that Matter Security Risk Analytics

Metrics that Matter Security Risk Analytics Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa rskinner@brinqa.com April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk

More information

Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff

Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff The Challenge IT Executives are challenged with issues around data, compliancy, regulation and making confident decisions on their business

More information

Data Warehouse. Richard Burgis Manager, Database Area Supporting DHS/CSES Department of Information Technology, State of Michigan

Data Warehouse. Richard Burgis Manager, Database Area Supporting DHS/CSES Department of Information Technology, State of Michigan Click Michigan s to add Statewide text Data Warehouse Richard Burgis Manager, Database Area Supporting DHS/CSES Department of Information Technology, State of Michigan 6/23/2008 MDW: A Critical Statewide

More information

Washington State s Use of the IBM Data Governance Unified Process Best Practices

Washington State s Use of the IBM Data Governance Unified Process Best Practices STATS-DC 2012 Data Conference July 12, 2012 Washington State s Use of the IBM Data Governance Unified Process Best Practices Bill Huennekens Washington State Office of Superintendent of Public Instruction,

More information

IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE. Copyright 2012, SAS Institute Inc. All rights reserved.

IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE. Copyright 2012, SAS Institute Inc. All rights reserved. IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE ABOUT THE PRESENTER Marc has been with SAS for 10 years and leads the information management practice for canada. Marc s area of specialty

More information

Data Integration in North Carolina - Overview

Data Integration in North Carolina - Overview Strategic Plan for Data Integration October 2011 North Carolina Office of the State Controller David McCoy, State Controller Executive Summary... 1 North Carolina Strategic Plan for Data Integration...

More information

4.10 Information Management Policy

4.10 Information Management Policy Policy Statement Information is a strategic business resource that the must manage as a public trust on behalf of Nova Scotians. Effective information management makes program and service delivery more

More information

IBM Information Governance

IBM Information Governance Information Governance Practice IBM Information Governance Michel Bouma Information Governance Practice Leader Europe Data Stewardship at Social Services Agency Questions from Legislature How many children

More information

Data Governance Best Practices

Data Governance Best Practices Data Governance Best Practices Rebecca Bolnick Chief Data Officer Maya Vidhyadharan Data Governance Manager Arizona Department of Education Key Issues 1. What is Data Governance and why is it important?

More information

Harness the value of information throughout the enterprise. IBM InfoSphere Master Data Management Server. Overview

Harness the value of information throughout the enterprise. IBM InfoSphere Master Data Management Server. Overview IBM InfoSphere Master Data Management Server Overview Master data management (MDM) allows organizations to generate business value from their most important information. Managing master data, or key business

More information

SAP Thought Leadership Business Intelligence IMPLEMENTING BUSINESS INTELLIGENCE STANDARDS SAVE MONEY AND IMPROVE BUSINESS INSIGHT

SAP Thought Leadership Business Intelligence IMPLEMENTING BUSINESS INTELLIGENCE STANDARDS SAVE MONEY AND IMPROVE BUSINESS INSIGHT SAP Thought Leadership Business Intelligence IMPLEMENTING BUSINESS INTELLIGENCE STANDARDS SAVE MONEY AND IMPROVE BUSINESS INSIGHT Your business intelligence strategy should take into account all sources

More information

SECURITY IMPLICATIONS OF CROSS- AGENCY BIG DATA APPROACHES FOR TAX COMPLIANCE

SECURITY IMPLICATIONS OF CROSS- AGENCY BIG DATA APPROACHES FOR TAX COMPLIANCE SECURITY IMPLICATIONS OF CROSS- AGENCY BIG DATA APPROACHES FOR TAX COMPLIANCE Les McMonagle (CISSP, CISA, ITIL) Director & Principal Consultant Teradata InfoSec COE July 2013 Agenda Defining The Problem

More information

Q1 Labs Corporate Overview

Q1 Labs Corporate Overview Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,

More information

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) The Electronic Discovery Reference Model (EDRM) How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) December 2011

More information

The Business in Business Intelligence. Bryan Eargle Database Development and Administration IT Services Division

The Business in Business Intelligence. Bryan Eargle Database Development and Administration IT Services Division The Business in Business Intelligence Bryan Eargle Database Development and Administration IT Services Division Defining Business Intelligence (BI) Agenda Goals Identify data assets Transform data and

More information

Big Data: trends and governance

Big Data: trends and governance Big Data: trends and governance Carlos Gil Director TELUS Security Architecture Presented at: 15 th Annual Privacy & Security Conference Victoria, BC February 6, 2014 Agenda TELUS internal corporate context

More information

The IBM data governance blueprint: Leveraging best practices and proven technologies

The IBM data governance blueprint: Leveraging best practices and proven technologies May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and

More information

BIG DATA KICK START. Troy Christensen December 2013

BIG DATA KICK START. Troy Christensen December 2013 BIG DATA KICK START Troy Christensen December 2013 Big Data Roadmap 1 Define the Target Operating Model 2 Develop Implementation Scope and Approach 3 Progress Key Data Management Capabilities 4 Transition

More information

How To Transform Health And Human Services With Data Analytics

How To Transform Health And Human Services With Data Analytics Experience the commitment WHITE PAPER Turning data into reality Seizing the opportunity for transformation using big data analytics in human services September 2013 cgi.com /stateandlocal 2013 CGI GROUP

More information

Management Update: The Cornerstones of Business Intelligence Excellence

Management Update: The Cornerstones of Business Intelligence Excellence G00120819 T. Friedman, B. Hostmann Article 5 May 2004 Management Update: The Cornerstones of Business Intelligence Excellence Business value is the measure of success of a business intelligence (BI) initiative.

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

Enable Business Agility and Speed Empower your business with proven multidomain master data management (MDM)

Enable Business Agility and Speed Empower your business with proven multidomain master data management (MDM) Enable Business Agility and Speed Empower your business with proven multidomain master data management (MDM) Customer Viewpoint By leveraging a well-thoughtout MDM strategy, we have been able to strengthen

More information

Human Services Decision Support System Data and Knowledge Management

Human Services Decision Support System Data and Knowledge Management Title: Category: State: Human Services Decision Support System Data and Knowledge Management Michigan Contact Information: Jim Hogan Information Officer Michigan Department of Technology, Management and

More information

Data Governance. Unlocking Value and Controlling Risk. Data Governance. www.mindyourprivacy.com

Data Governance. Unlocking Value and Controlling Risk. Data Governance. www.mindyourprivacy.com Data Governance Unlocking Value and Controlling Risk 1 White Paper Data Governance Table of contents Introduction... 3 Data Governance Program Goals in light of Privacy... 4 Data Governance Program Pillars...

More information

Government Data Analytics Center

Government Data Analytics Center Government Data Analytics Center NC Juvenile Reentry Reform Task Force - August 24, 2015 GDAC Program Consultant: Carol Burroughs OFFICE OF INFORMATION TECHNOLOGY SERVICES 8/24/2015 Agenda History GDAC

More information

US Treasury Data Transparency Town Hall September 26, 2014

US Treasury Data Transparency Town Hall September 26, 2014 US Treasury Data Transparency Town Hall September 26, 2014 Collaboration & Transformation Financial Management Committee DATA Act Co-Leads: Herschel Chandler, Herschel.Chandler@iui.com KC McHargue, KMcHargue@e3federal.com

More information

Welcome to the Data Analytics Toolkit PowerPoint presentation on data governance. The complexity of healthcare delivery, the exploding demand for

Welcome to the Data Analytics Toolkit PowerPoint presentation on data governance. The complexity of healthcare delivery, the exploding demand for Welcome to the Data Analytics Toolkit PowerPoint presentation on data governance. The complexity of healthcare delivery, the exploding demand for actionable information, pressure for greater public accountability,

More information

Data Management. Arkansas Approach

Data Management. Arkansas Approach Data Management Arkansas Approach Executive Summary Data is the oil of the 21st century. These succinct words by Peter Sondergaard, head of Gartner Research, reflects the growing importance accorded to

More information

Turning Data into Reality:

Turning Data into Reality: WHITE PAPER Turning Data into Reality: Seizing the Opportunity for Transformation Using Big Data Analytics in Human Services May 2013 1 cgi.com 2013 CGI GROUP INC. Introduction The chatter around big data

More information

4th Annual ISACA Kettle Moraine Spring Symposium

4th Annual ISACA Kettle Moraine Spring Symposium www.pwc.com 4th Annual ISACA Kettle Moraine Spring Symposium Session 2 Big Data May 14th, 2014 Session Objective Learn about governance, risks, and compliance considerations that become particularly important

More information

Using SAP Master Data Technologies to Enable Key Business Capabilities in Johnson & Johnson Consumer

Using SAP Master Data Technologies to Enable Key Business Capabilities in Johnson & Johnson Consumer Using SAP Master Data Technologies to Enable Key Business Capabilities in Johnson & Johnson Consumer Terry Bouziotis: Director, IT Enterprise Master Data Management JJHCS Bob Delp: Sr. MDM Program Manager

More information

Effective Data Governance

Effective Data Governance perspective Effective Data Governance Abstract Data governance is no more just another item that is good to talk about and nice to have, for global data management organizations. This PoV looks into why

More information

5 Reasons Master Data Management (MDM) is Critical to The Success of a Data Driven Health System & Accountable Care Organization (ACO)

5 Reasons Master Data Management (MDM) is Critical to The Success of a Data Driven Health System & Accountable Care Organization (ACO) 5 Reasons Master Data Management (MDM) is Critical to The Success of a Data Driven Health System & Accountable Care Organization (ACO) 1. Prologue There s no denying that people are an organization s #1

More information

Master Your Data and Your Business Using Informatica MDM. Ravi Shankar Sr. Director, MDM Product Marketing

Master Your Data and Your Business Using Informatica MDM. Ravi Shankar Sr. Director, MDM Product Marketing Master Your and Your Business Using Informatica MDM Ravi Shankar Sr. Director, MDM Product Marketing 1 Driven Enterprise Timely Trusted Relevant 2 Agenda Critical Business Imperatives Addressed by MDM

More information

Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015

Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015 Cloud Computing Mike Bourgeois Platform as a Service Point of View September 17, 2015 Agenda Cloud Computing Definition Platform as a Service Business Drivers and Benefits Technology Drivers and Benefits

More information

Security and Cloud Computing

Security and Cloud Computing Security and Cloud Computing Martin Borrett, Lead Security Architect NE Europe, WW Service Management Tiger Team IBM Software Optimising the World s Infrastructure 27th May - London Agenda Brief Introduction

More information

Terrence Coan, CRM - Baker Robbins & Company 1

Terrence Coan, CRM - Baker Robbins & Company 1 Life Cycle Management of Records in a Matter Centric Environment ILTA Records Management Peer Group Terrence Coan, CRM Orlando, Florida 2006 Baker Robbins & Company Agenda Current reality Why manage the

More information

From Information Management to Information Governance: The New Paradigm

From Information Management to Information Governance: The New Paradigm From Information Management to Information Governance: The New Paradigm By: Laurie Fischer Overview The explosive growth of information presents management challenges to every organization today. Retaining

More information

How To Manage Data

How To Manage Data A Flash-light into the Dark: The Starters Guide to Data Governance Steven Adler IBM Data Governance Solutions adler1@us.ibm.com http://www.ibm.com/itsolutions/datagovernance Audience Question 2 Agenda

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

The Computerworld Honors Program

The Computerworld Honors Program The Computerworld Honors Program Honoring those who use Information Technology to benefit society Status: Laureate Final Copy of Case Study Year: 2013 Organization Name: Cybersecurity and Infrastructure

More information

What is Security Intelligence?

What is Security Intelligence? 2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the

More information

Why You Still Need to Master Your Data Before You Master Your Business (Intelligence) Business Imperatives Addressed By Reliable, Integrated View

Why You Still Need to Master Your Data Before You Master Your Business (Intelligence) Business Imperatives Addressed By Reliable, Integrated View Why You Still Need to Master Your Data Before You Master Your Business (Intelligence) Business Imperatives Addressed By Reliable, Integrated View David Jordan Data Management Product Specialist 1 2 A simple

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. Security solutions To support your business objectives Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. For an On Demand Business, security

More information

Governance Is an Essential Building Block for Enterprise Information Management

Governance Is an Essential Building Block for Enterprise Information Management Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways

More information

Expanding Data Governance Into EIM Governance. Gwen.Thomas@DataGovernance.com 321-438-0774. The Data Governance Institute page 1

Expanding Data Governance Into EIM Governance. Gwen.Thomas@DataGovernance.com 321-438-0774. The Data Governance Institute page 1 Gwen Thomas President, page 1 has three arms: 1. Training/consulting 2. Membership (The Data Governance & Stewardship Community of Practice) ce) at www.datastewardship.com 3. Information services, publishing

More information

The SharePoint Customer Journey Turn SharePoint into a Broadly Adopted Compliance and Security Asset

The SharePoint Customer Journey Turn SharePoint into a Broadly Adopted Compliance and Security Asset The SharePoint Customer Journey Turn SharePoint into a Broadly Adopted Compliance and Security Asset Eric Darbe Vice President of Marketing HiSoftware Agenda What if? The compliance and security case for

More information

Information Governance

Information Governance Information Governance The Why? The Who? The How? Summary Next steps Wikipedia defines Information governance as: an emerging term used to encompass the set of multi-disciplinary structures, policies,

More information

IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk

IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk Amir Jaibaji - Product Management Program Director IBM Information Lifecycle Governance IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk Enterprise big

More information

PRIVY COUNCIL OFFICE. Audit of Information Technology (IT) Security. Final Report

PRIVY COUNCIL OFFICE. Audit of Information Technology (IT) Security. Final Report An asterisk appears where sensitive information has been removed in accordance with the Access to Information Act and Privacy Act. PRIVY COUNCIL OFFICE Audit of Information Technology (IT) Security Audit

More information

White Paper. Enterprise Information Governance. Date Released: September 2014. Author/s: Astral Consulting. www.astral.com.au.

White Paper. Enterprise Information Governance. Date Released: September 2014. Author/s: Astral Consulting. www.astral.com.au. White Paper Enterprise Information Governance Date Released: September 2014 Author/s: Astral Consulting Disclaimer This White Paper is published for general information purposes only. Nothing in the White

More information

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2. ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework

More information

2008 NASCIO Award Submission. Utilizing PCI Compliance to Improve Enterprise Risk Management

2008 NASCIO Award Submission. Utilizing PCI Compliance to Improve Enterprise Risk Management Section A Cover Page 2008 NASCIO Award Submission Utilizing PCI Compliance to Improve Enterprise Risk Management Information Security and Privacy Michigan Section B - Executive Summary Michigan has implemented

More information

What to Look for When Selecting a Master Data Management Solution

What to Look for When Selecting a Master Data Management Solution What to Look for When Selecting a Master Data Management Solution What to Look for When Selecting a Master Data Management Solution Table of Contents Business Drivers of MDM... 3 Next-Generation MDM...

More information

State of Montana. Office Of Public Instruction IT Strategic Plan 2014. 1. Executive Summary

State of Montana. Office Of Public Instruction IT Strategic Plan 2014. 1. Executive Summary State of Montana Office Of Public Instruction IT Strategic Plan 2014 1. Executive Summary 1 The IT Division has experienced dramatic growth of its supported environment in the past three to four years.

More information

Microsoft s Compliance Framework for Online Services

Microsoft s Compliance Framework for Online Services Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft

More information

IBM Software A Journey to Adaptive MDM

IBM Software A Journey to Adaptive MDM IBM Software A Journey to Adaptive MDM What is Master Data? Why is it Important? A Journey to Adaptive MDM Contents 2 MDM Business Drivers and Business Value 4 MDM is a Journey 7 IBM MDM Portfolio An Adaptive

More information

Creating a Business Intelligence Competency Center to Accelerate Healthcare Performance Improvement

Creating a Business Intelligence Competency Center to Accelerate Healthcare Performance Improvement Creating a Business Intelligence Competency Center to Accelerate Healthcare Performance Improvement Bruce Eckert, National Practice Director, Advisory Group Ramesh Sakiri, Executive Consultant, Healthcare

More information

Creating a Corporate Integrated Data Environment through Stewardship

Creating a Corporate Integrated Data Environment through Stewardship The Open Group Creating a Corporate Integrated Data Environment through Stewardship Enterprise Architecture Practitioners Conference Given January 2007 San Diego Presented by: Robert (Bob) Weisman CGI

More information

Test Data Management in the New Era of Computing

Test Data Management in the New Era of Computing Test Data Management in the New Era of Computing Vinod Khader IBM InfoSphere Optim Development Agenda Changing Business Environment and Data Management Challenges What is Test Data Management Best Practices

More information

SIEM Implementation Approach Discussion. April 2012

SIEM Implementation Approach Discussion. April 2012 SIEM Implementation Approach Discussion April 2012 Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual

More information

Data Governance Maturity Model Guiding Questions for each Component-Dimension

Data Governance Maturity Model Guiding Questions for each Component-Dimension Data Governance Maturity Model Guiding Questions for each Component-Dimension Foundational Awareness What awareness do people have about the their role within the data governance program? What awareness

More information

The Key Components of a Data Governance Program. John R. Talburt, PhD, IQCP University of Arkansas at Little Rock Black Oak Analytics, Inc

The Key Components of a Data Governance Program. John R. Talburt, PhD, IQCP University of Arkansas at Little Rock Black Oak Analytics, Inc The Key Components of a Data Governance Program John R. Talburt, PhD, IQCP University of Arkansas at Little Rock Black Oak Analytics, Inc My Background Currently University of Arkansas at Little Rock Acxiom

More information

Title V Preventing Fraud and Abuse. Subtitle A- Establishment of New Health and Human Services and Department of Justice Health Care Fraud Positions

Title V Preventing Fraud and Abuse. Subtitle A- Establishment of New Health and Human Services and Department of Justice Health Care Fraud Positions Title V Preventing Fraud and Abuse Subtitle A- Establishment of New Health and Human Services and Department of Justice Health Care Fraud Positions Sec. 501. Health and Human Services Senior Advisor There

More information

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely

More information

Data Governance 8 Steps to Success

Data Governance 8 Steps to Success Data Governance 8 Steps to Success Anne Marie Smith, Ph.D. Principal Consultant Asmith @ alabamayankeesystems.com http://www.alabamayankeesystems.com 1 Instructor Background Internationally recognized

More information

Stakeholder Engagement Initiative: Customer Relationship Management

Stakeholder Engagement Initiative: Customer Relationship Management for the Stakeholder Engagement Initiative: December 10, 2009 Contact Point Christine Campigotto Private Sector Office Policy 202-612-1623 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department

More information

The Informatica Solution for Improper Payments

The Informatica Solution for Improper Payments The Informatica Solution for Improper Payments Reducing Improper Payments and Improving Fiscal Accountability for Government Agencies WHITE PAPER This document contains Confidential, Proprietary and Trade

More information

The Importance of Data Governance in Healthcare

The Importance of Data Governance in Healthcare WHITE PAPER The Importance of Data Governance in Healthcare By Bill Fleissner; Kamalakar Jasti; Joy Ales, MHA, An Encore Point of View October 2014 BSN, RN; Randy Thomas, FHIMSS AN ENCORE POINT OF VIEW

More information

Data Governance. David Loshin Knowledge Integrity, inc. www.knowledge-integrity.com (301) 754-6350

Data Governance. David Loshin Knowledge Integrity, inc. www.knowledge-integrity.com (301) 754-6350 Data Governance David Loshin Knowledge Integrity, inc. www.knowledge-integrity.com (301) 754-6350 Risk and Governance Objectives of Governance: Identify explicit and hidden risks associated with data expectations

More information

Data Governance Best Practice

Data Governance Best Practice Data Governance Best Practice Business Connexion Michelle Grimley Senior Manager EIM +27 (0)11 266 6499 Michelle.Grimley@bcx.co.za Inri Möller Master Data Manager +27 (0)11 266 5146 Inri.Möller@bcx.co.za

More information

Generally Accepted Recordkeeping Principles

Generally Accepted Recordkeeping Principles Generally Accepted Recordkeeping Principles Information Governance Maturity Model Information is one of the most vital strategic assets any organization possesses. Organizations depend on information to

More information

!!!!! White Paper. Understanding The Role of Data Governance To Support A Self-Service Environment. Sponsored by

!!!!! White Paper. Understanding The Role of Data Governance To Support A Self-Service Environment. Sponsored by White Paper Understanding The Role of Data Governance To Support A Self-Service Environment Sponsored by Sponsored by MicroStrategy Incorporated Founded in 1989, MicroStrategy (Nasdaq: MSTR) is a leading

More information

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help

More information

Operational Excellence for Data Quality

Operational Excellence for Data Quality Operational Excellence for Data Quality Building a platform for operational excellence to support data quality. 1 Background & Premise The concept for an operational platform to ensure Data Quality is

More information

Agile enterprise content management and the IBM Information Agenda.

Agile enterprise content management and the IBM Information Agenda. Transforming your content into a trusted, strategic asset Agile enterprise content management and the IBM Information Agenda. Delivering a common information framework for uncommon business agility Highlights

More information

Data Quality Assessment. Approach

Data Quality Assessment. Approach Approach Prepared By: Sanjay Seth Data Quality Assessment Approach-Review.doc Page 1 of 15 Introduction Data quality is crucial to the success of Business Intelligence initiatives. Unless data in source

More information