MANAGING CROSS-AGENCY DATA IN TAX COMPLIANCE JIM BLAIR TERADATA SR. CONSULTANT
|
|
- Amice Stanley
- 8 years ago
- Views:
Transcription
1 MANAGING CROSS-AGENCY DATA IN TAX COMPLIANCE JIM BLAIR TERADATA SR. CONSULTANT
2 Agenda Defining The Problem Cross Agency Opportunity Governance for Cross Agency Use case Wrap-Up / Q & A 2 Confidential Do Not Distribute Without Permission
3 from Many Agencies Structured and Unstructured Dept of Human Services Dept of Health Dept of Labor i.e. Audit and Fraud Leads Dept of Justice Dept of Revenue Professional Licenses 3 Confidential Do Not Distribute Without Permission
4 Harsh Reality about Many Decisions Recognize the data challenges 47% No confidence in data 59% Missing information 42% Use the wrong information Gartner, Forrester, B-eye-Network 4 Confidential Do Not Distribute Without Permission
5 The Won t Manage Itself The problem: Independent agencies have deployed disparate systems without attention to the impact on overall crossagency data architecture and integrity The result: The business is unable to answer cross-agency business questions The business has less confidence in the quality of the data and the decisions based on the data Technology complexity and costs become excessive It is challenging to comply with regulatory policies Establishing a trusted, integrated view of information requires more than technology; it requires political will and agency involvement! 5 Confidential Do Not Distribute Without Permission
6 Cross Agency Governance Cross Agency makes Governance even more important (privacy, access, controls, commonality) Cross Agency requires new Steward roles (DOH Steward, DOJ Steward, DVM Steward. Governance decisions around Cross Agency > Who is the sponsor for Governance around Cross Agency? > Who has Support for which data? > How long do I keep the data? > Who can look at the data? > What data can be used? Dept. of Justice Dept of Human Services Professional Licenses > What if asked to delete the data? 6 Confidential Do Not Distribute Without Permission
7 Challenges of Cross Agency without Governance No single strategy for use No consistent prioritization No visibility into Inter-dependence End to end takes to long = Shadow projects! Limited accounting for operational disruption New silos create their own decisions Outcomes clouded across life cycle continuum Planning, development, implementation, Operationalization, reuse 7 Confidential Do Not Distribute Without Permission
8 Governance Considerations for Cross Agency Strategy with business value ROI, Time to Market, Risk Organizational Model Stakeholders, Stewards Policies and Processes Privacy, Risk, Retention Owners Measure and Monitor Completeness, Timeliness Technologies What platforms does the data come from Information Lifecycle (SDLC controls) Birth to death - How will the data live When it comes to Governance.. Cross Agency has all the characteristics of other data, Except Complexity is expanded and Variety of channels increases 8 Confidential Do Not Distribute Without Permission
9 Agency Alignment with Cross Agency Governance Tie to business value to New enabling technologies Incorporate tools, processes, and technology to manage Big Continue maturation of Tools such as Quality, Profiling Establish Fit for Purpose perspective Classify ALL data according to Business Use IT and the Business must collaborate Assign owners How will the data be accessed, stored, secured, backed-up, retained, deleted 9 Confidential Do Not Distribute Without Permission
10 New people in Cross Agency Governance Stakeholders & Owners Dept. of Justice Dept. of Human Services DMV Dept. of Labor Dept. of Revenue Stewards For each of the above Identification of erroneous - fix or not? Acceptable use of Cross Agency Job Roles and Descriptions for all new roles (formal) 10 Confidential Do Not Distribute Without Permission
11 Enterprise Management Framework for Cross Agency EDM Framework 1. Quality Ensure data is fit for its intended business use. 2. Integration Ensure data is provisioned and combined from different systems to create and deliver an integrated view of data regardless of source. 3. Security and Privacy - Ensure data is secure and confidential. 4. Metadata Management Ensure data is provided with consistent, accurate and complete contextual information. 5. Master Management Ensure a single view of reference data across the enterprise. 6. Modelling Ensure data is selected and organized in an effective and purposeful way. Master Mgmt. Governance Modeling Metadata Mgmt. Integrated and Trusted Information Quality Security and Privacy Stewardship People, Processes, and Technology Integration EDM delivers integrated and trusted information 11 Confidential Do Not Distribute Without Permission
12 3 Key components for Cross Agency Commonality EDM Framework Governance Modeling Quality Quality Master Mgmt. Integrated and Trusted Information Integration Metadata Mgmt. Security and Privacy Security Stewardship People, Processes, and Technology 12 Confidential Do Not Distribute Without Permission
13 Quality Core Dimensions Accuracy data represents reality correctly Completeness data gaps are minimized and data subjects are covered adequately Timeliness data is stored in system within an acceptable time from the business event Consistency data is defined and reported with the same meaning and values across the enterprise Master Mgmt Architecture Metadata Mgmt Governance Integrated and Trusted Information Stewardship Quality Security and Privacy Integration Governance determines the focus of data quality improvements based on business value Stewards provide business understanding of assigned data domains 13 Confidential Do Not Distribute Without Permission
14 Quality Improvement Process Step 1: Select/Define Step 2: Profile Step 3: Analyze????? No. of Errors Value Step 6: Monitor/Trend Step 5: Fix Root Causes Step 4: Trace Root Causes Error count Time People Process Information Technology Ensure is fit for it s intended use! 14 Confidential Do Not Distribute Without Permission
15 Security Core Dimensions Security Policies and Procedures Certification and Accreditation Auditing and Monitoring Network Security Internal & external, Intrusion Detection and Protection Vulnerability Management Base Security Authentication, Access Rights, Encryption Master Mgmt Architecture Metadata Mgmt Governance Integrated and Trusted Information Quality Security Integration Stewardship Security and Privacy Corporate organization determines level of security Owners determines the level of Access Stewards monitor access 15 Confidential Do Not Distribute Without Permission
16 Commonality Across Agencies: a.k.a. Master Management Adding new Agencies as sources Often causes overlapping data Inconsistent means of identification and classification across agencies Achieving a single view of the cross agency data is difficult without governance Common format issues Common definition issues Common Transformation issues Master Mgmt Architecture Metadata Mgmt Governance Integrated and Trusted Information Stewardship SOLUTION = Centralized data governance Quality Security Integration Management of COMMON data from cross agencies is the most frequent source of inconsistency and poor quality data due to lack of governance. Security and Privacy 16 Confidential Do Not Distribute Without Permission
17 What about BIG in a Tax Agency? Structured and Unstructured Call Center Web Logs i.e. Audit Leads Nexus Payments Work Papers Customs Case Notes Correspondence & s 17 Confidential Do Not Distribute Without Permission
18 Governance applies even more to Big Ø Must have New Owners Ø Decide access, quality levels, retention policies, etc Ø Must have Stewards Ø Act on data quality issues Ø EDM components stay the same and are all considered Ø Ø Ø Ø Ø Ø Quality Integration (What gets consolidated and integrated Security (new levels, more data, personal data) Meta (a must have!) Master (to include or Not to include) Modeling (or recognition of lack thereof) Ø Must be Measured and Monitored Ø New Technology considerations Ø Information Lifecycle controls Ø Birth to death - How will the data live When it comes to Governance.. BIG DATA has all the characteristics of CROSS AGENCY data, Except technology AND Complexity is expanded 18 Confidential Do Not Distribute Without Permission
19 Technology connects Cross Agency data across Networks, Clouds, External servers and Firewalls DHS DOJ Dept of Revenue Professional Licenses DMV Warehouse 19 Confidential Do Not Distribute Without Permission
20 Sharing via Enterprise Warehouse The EDW enables the linking of data across multiple data sets and the sharing of data among multiple State Departments. Department of Community Health (MDCH) Department of Human Services (DHS) Department of Corrections State Police State Court Administrators Office Department of Natural Resources Department of Licensing and Regulator Affairs Secretary of State Department of Treasury 20 Confidential Do Not Distribute Without Permission
21 Big Saving Real Dollars: State-wide Consolidation and Analytics in Michigan Impact Michigan s Teradata Enterprise Warehouse (EDW) consolidates data from many separate Michigan agencies. Michigan s EDW generates millions in annual savings utilizing analytics. One example: reduced administrative costs for the Medicaid program by 25%. 21 Confidential Do Not Distribute Without Permission
22 Advanced Analytics and Operational BI Applications: Michigan Using the Enterprise Warehouse: Michigan s has implemented innovative fraud detection methods. EDW assisted in the identification of more than $70 million dollars in fraudulent child care. With the addition of new advanced analytical software tools, such as Predictive Analytics and IBM s Initiate Master Patient Index (MPI), the State is positioned to gain even more value from the EDW to address our challenges. 22 Confidential Do Not Distribute Without Permission
23 Sharing via Enterprise Warehouse: Michigan Department of Treasury Uses of EDW Evaluate legislative tax proposal to determine tax revenue implications to Michigan. Running tax simulations to evaluate possible revenue replacements Identify and track revenue collections patterns, trends, and anomalies. Ensure tax compliance. Their tax auditors now review over 452,000 returns annually. Before using the warehouse, they were only able to review of 6,000 paper files. 23 Confidential Do Not Distribute Without Permission
24 Sharing via Enterprise Warehouse: Michigan Judicial Warehouse Name Search Application an indispensable part of the management of Michigan s Court System. Users include: Department of Corrections Michigan State Police Prosecutors Attorney General County Sheriff Departments Department of Labor and Economic Growth Friend of the Court DHS Inspector General DHS Child Welfare Services DCH Medicaid fraud 24 Confidential Do Not Distribute Without Permission
25 Sharing via Enterprise Warehouse: Michigan s RESULTS Michigan has achieved concrete and impressive business results from its innovative use of the EDW to > Manage Fraud > Reduce costs > Streamline operations > Manage problems The EDW is intricately and integrally woven into the data of more than 7,000,000 Michigan citizens State and Court employees, Michigan program beneficiaries External vendors and providers 25 Confidential Do Not Distribute Without Permission
26 HOWEVER..avoid another fine mess! Without a proper Governance Process for Cross Agency. The zest to spearhead new projects can unleash a mess of trouble misleading data and unexpected costs! "That's another fine mess you've gotten us into." Oliver Hardy, of Laurel and Hardy fame 26 Confidential Do Not Distribute Without Permission
27 Thank You!! What will you do different TOMORROW? Questions?? 27 Confidential Do Not Distribute Without Permission
Enterprise Data Management
Enterprise Data Management - The Why/How/Who - The business leader s role in data management Maria Villar, Managing Partner Business Data Leadership Introduction Good Data is necessary for all business
More informationDATA GOVERNANCE AND DATA QUALITY
DATA GOVERNANCE AND DATA QUALITY Kevin Lewis Partner Enterprise Management COE Barb Swartz Account Manager Teradata Government Systems Objectives of the Presentation Show that Governance and Quality are
More informationMICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of
More informationMaster Data Management
Master Data Management Patrice Latinne ULB 30/3/2010 Agenda Master Data Management case study Who & services roadmap definition data How What Why technology styles business 29/03/2010 2 Why Master Data
More informationMICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, C.P.A., C.I.A. AUDITOR GENERAL ENTERPRISE DATA WAREHOUSE
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT PERFORMANCE AUDIT OF THE ENTERPRISE DATA WAREHOUSE DEPARTMENT OF TECHNOLOGY, MANAGEMENT, AND BUDGET August 2014 Doug A. Ringler, C.P.A., C.I.A. AUDITOR
More informationExisting Technologies and Data Governance
Existing Technologies and Data Governance Adriaan Veldhuisen Product Manager Privacy & Security Teradata, a Division of NCR 10 June, 2004 San Francisco, CA 6/10/04 1 My Assumptions for Data Governance
More informationEXPLORING THE CAVERN OF DATA GOVERNANCE
EXPLORING THE CAVERN OF DATA GOVERNANCE AUGUST 2013 Darren Dadley Business Intelligence, Program Director Planning and Information Office SIBI Overview SIBI Program Methodology 2 Definitions: & Governance
More informationEnterprise Data Governance
Enterprise Aligning Quality With Your Program Presented by: Mark Allen Sr. Consultant, Enterprise WellPoint, Inc. (mark.allen@wellpoint.com) 1 Introduction: Mark Allen is a senior consultant and enterprise
More informationBig Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
More informationWhite Paper. An Overview of the Kalido Data Governance Director Operationalizing Data Governance Programs Through Data Policy Management
White Paper An Overview of the Kalido Data Governance Director Operationalizing Data Governance Programs Through Data Policy Management Managing Data as an Enterprise Asset By setting up a structure of
More informationUniversity of Michigan Medical School Data Governance Council Charter
University of Michigan Medical School Data Governance Council Charter 1 Table of Contents 1.0 SIGNATURE PAGE 2.0 REVISION HISTORY 3.0 PURPOSE OF DOCUMENT 4.0 DATA GOVERNANCE PROGRAM FOUNDATIONAL ELEMENTS
More informationEnabling Data Quality
Enabling Data Quality Establishing Master Data Management (MDM) using Business Architecture supported by Information Architecture & Application Architecture (SOA) to enable Data Quality. 1 Background &
More informationData Integration Initiative Semi Annual Report April 2009. State of North Carolina Office of the State Controller
Data Integration Initiative Semi Annual Report April 2009 State of North Carolina Office of the State Controller David McCoy, State Controller April 1, 2009 Table of Contents I. Background... 1 II. BEACON
More informationCertified Identity and Access Manager (CIAM) Overview & Curriculum
Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management
More informationInformation Governance Workshop. David Zanotta, Ph.D. Vice President, Global Data Management & Governance - PMO
Information Governance Workshop David Zanotta, Ph.D. Vice President, Global Data Management & Governance - PMO Recognition of Information Governance in Industry Research firms have begun to recognize the
More informationPresented By: Leah R. Smith, PMP. Ju ly, 2 011
Presented By: Leah R. Smith, PMP Ju ly, 2 011 Business Intelligence is commonly defined as "the process of analyzing large amounts of corporate data, usually stored in large scale databases (such as a
More informationMaster Data Management Architecture
Master Data Management Architecture Version Draft 1.0 TRIM file number - Short description Relevant to Authority Responsible officer Responsible office Date introduced April 2012 Date(s) modified Describes
More informationBeyond the Single View with IBM InfoSphere
Ian Bowring MDM & Information Integration Sales Leader, NE Europe Beyond the Single View with IBM InfoSphere We are at a pivotal point with our information intensive projects 10-40% of each initiative
More informationLeveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management. Category: Cross Boundary Collaboration
Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management Category: Cross Boundary Collaboration Initiation date: August 2011 Completion date: October 2013 Nomination submitted
More informationState of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
More informationSecurity Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
More informationIT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
More informationMetrics that Matter Security Risk Analytics
Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa rskinner@brinqa.com April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk
More informationWhitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff
Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff The Challenge IT Executives are challenged with issues around data, compliancy, regulation and making confident decisions on their business
More informationData Warehouse. Richard Burgis Manager, Database Area Supporting DHS/CSES Department of Information Technology, State of Michigan
Click Michigan s to add Statewide text Data Warehouse Richard Burgis Manager, Database Area Supporting DHS/CSES Department of Information Technology, State of Michigan 6/23/2008 MDW: A Critical Statewide
More informationWashington State s Use of the IBM Data Governance Unified Process Best Practices
STATS-DC 2012 Data Conference July 12, 2012 Washington State s Use of the IBM Data Governance Unified Process Best Practices Bill Huennekens Washington State Office of Superintendent of Public Instruction,
More informationIRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE. Copyright 2012, SAS Institute Inc. All rights reserved.
IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE ABOUT THE PRESENTER Marc has been with SAS for 10 years and leads the information management practice for canada. Marc s area of specialty
More informationData Integration in North Carolina - Overview
Strategic Plan for Data Integration October 2011 North Carolina Office of the State Controller David McCoy, State Controller Executive Summary... 1 North Carolina Strategic Plan for Data Integration...
More information4.10 Information Management Policy
Policy Statement Information is a strategic business resource that the must manage as a public trust on behalf of Nova Scotians. Effective information management makes program and service delivery more
More informationIBM Information Governance
Information Governance Practice IBM Information Governance Michel Bouma Information Governance Practice Leader Europe Data Stewardship at Social Services Agency Questions from Legislature How many children
More informationData Governance Best Practices
Data Governance Best Practices Rebecca Bolnick Chief Data Officer Maya Vidhyadharan Data Governance Manager Arizona Department of Education Key Issues 1. What is Data Governance and why is it important?
More informationHarness the value of information throughout the enterprise. IBM InfoSphere Master Data Management Server. Overview
IBM InfoSphere Master Data Management Server Overview Master data management (MDM) allows organizations to generate business value from their most important information. Managing master data, or key business
More informationSAP Thought Leadership Business Intelligence IMPLEMENTING BUSINESS INTELLIGENCE STANDARDS SAVE MONEY AND IMPROVE BUSINESS INSIGHT
SAP Thought Leadership Business Intelligence IMPLEMENTING BUSINESS INTELLIGENCE STANDARDS SAVE MONEY AND IMPROVE BUSINESS INSIGHT Your business intelligence strategy should take into account all sources
More informationSECURITY IMPLICATIONS OF CROSS- AGENCY BIG DATA APPROACHES FOR TAX COMPLIANCE
SECURITY IMPLICATIONS OF CROSS- AGENCY BIG DATA APPROACHES FOR TAX COMPLIANCE Les McMonagle (CISSP, CISA, ITIL) Director & Principal Consultant Teradata InfoSec COE July 2013 Agenda Defining The Problem
More informationQ1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
More informationHow the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )
The Electronic Discovery Reference Model (EDRM) How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) December 2011
More informationThe Business in Business Intelligence. Bryan Eargle Database Development and Administration IT Services Division
The Business in Business Intelligence Bryan Eargle Database Development and Administration IT Services Division Defining Business Intelligence (BI) Agenda Goals Identify data assets Transform data and
More informationBig Data: trends and governance
Big Data: trends and governance Carlos Gil Director TELUS Security Architecture Presented at: 15 th Annual Privacy & Security Conference Victoria, BC February 6, 2014 Agenda TELUS internal corporate context
More informationThe IBM data governance blueprint: Leveraging best practices and proven technologies
May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and
More informationBIG DATA KICK START. Troy Christensen December 2013
BIG DATA KICK START Troy Christensen December 2013 Big Data Roadmap 1 Define the Target Operating Model 2 Develop Implementation Scope and Approach 3 Progress Key Data Management Capabilities 4 Transition
More informationHow To Transform Health And Human Services With Data Analytics
Experience the commitment WHITE PAPER Turning data into reality Seizing the opportunity for transformation using big data analytics in human services September 2013 cgi.com /stateandlocal 2013 CGI GROUP
More informationManagement Update: The Cornerstones of Business Intelligence Excellence
G00120819 T. Friedman, B. Hostmann Article 5 May 2004 Management Update: The Cornerstones of Business Intelligence Excellence Business value is the measure of success of a business intelligence (BI) initiative.
More informationApplication Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
More informationEnable Business Agility and Speed Empower your business with proven multidomain master data management (MDM)
Enable Business Agility and Speed Empower your business with proven multidomain master data management (MDM) Customer Viewpoint By leveraging a well-thoughtout MDM strategy, we have been able to strengthen
More informationHuman Services Decision Support System Data and Knowledge Management
Title: Category: State: Human Services Decision Support System Data and Knowledge Management Michigan Contact Information: Jim Hogan Information Officer Michigan Department of Technology, Management and
More informationData Governance. Unlocking Value and Controlling Risk. Data Governance. www.mindyourprivacy.com
Data Governance Unlocking Value and Controlling Risk 1 White Paper Data Governance Table of contents Introduction... 3 Data Governance Program Goals in light of Privacy... 4 Data Governance Program Pillars...
More informationGovernment Data Analytics Center
Government Data Analytics Center NC Juvenile Reentry Reform Task Force - August 24, 2015 GDAC Program Consultant: Carol Burroughs OFFICE OF INFORMATION TECHNOLOGY SERVICES 8/24/2015 Agenda History GDAC
More informationUS Treasury Data Transparency Town Hall September 26, 2014
US Treasury Data Transparency Town Hall September 26, 2014 Collaboration & Transformation Financial Management Committee DATA Act Co-Leads: Herschel Chandler, Herschel.Chandler@iui.com KC McHargue, KMcHargue@e3federal.com
More informationWelcome to the Data Analytics Toolkit PowerPoint presentation on data governance. The complexity of healthcare delivery, the exploding demand for
Welcome to the Data Analytics Toolkit PowerPoint presentation on data governance. The complexity of healthcare delivery, the exploding demand for actionable information, pressure for greater public accountability,
More informationData Management. Arkansas Approach
Data Management Arkansas Approach Executive Summary Data is the oil of the 21st century. These succinct words by Peter Sondergaard, head of Gartner Research, reflects the growing importance accorded to
More informationTurning Data into Reality:
WHITE PAPER Turning Data into Reality: Seizing the Opportunity for Transformation Using Big Data Analytics in Human Services May 2013 1 cgi.com 2013 CGI GROUP INC. Introduction The chatter around big data
More information4th Annual ISACA Kettle Moraine Spring Symposium
www.pwc.com 4th Annual ISACA Kettle Moraine Spring Symposium Session 2 Big Data May 14th, 2014 Session Objective Learn about governance, risks, and compliance considerations that become particularly important
More informationUsing SAP Master Data Technologies to Enable Key Business Capabilities in Johnson & Johnson Consumer
Using SAP Master Data Technologies to Enable Key Business Capabilities in Johnson & Johnson Consumer Terry Bouziotis: Director, IT Enterprise Master Data Management JJHCS Bob Delp: Sr. MDM Program Manager
More informationEffective Data Governance
perspective Effective Data Governance Abstract Data governance is no more just another item that is good to talk about and nice to have, for global data management organizations. This PoV looks into why
More information5 Reasons Master Data Management (MDM) is Critical to The Success of a Data Driven Health System & Accountable Care Organization (ACO)
5 Reasons Master Data Management (MDM) is Critical to The Success of a Data Driven Health System & Accountable Care Organization (ACO) 1. Prologue There s no denying that people are an organization s #1
More informationMaster Your Data and Your Business Using Informatica MDM. Ravi Shankar Sr. Director, MDM Product Marketing
Master Your and Your Business Using Informatica MDM Ravi Shankar Sr. Director, MDM Product Marketing 1 Driven Enterprise Timely Trusted Relevant 2 Agenda Critical Business Imperatives Addressed by MDM
More informationCloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015
Cloud Computing Mike Bourgeois Platform as a Service Point of View September 17, 2015 Agenda Cloud Computing Definition Platform as a Service Business Drivers and Benefits Technology Drivers and Benefits
More informationSecurity and Cloud Computing
Security and Cloud Computing Martin Borrett, Lead Security Architect NE Europe, WW Service Management Tiger Team IBM Software Optimising the World s Infrastructure 27th May - London Agenda Brief Introduction
More informationTerrence Coan, CRM - Baker Robbins & Company 1
Life Cycle Management of Records in a Matter Centric Environment ILTA Records Management Peer Group Terrence Coan, CRM Orlando, Florida 2006 Baker Robbins & Company Agenda Current reality Why manage the
More informationFrom Information Management to Information Governance: The New Paradigm
From Information Management to Information Governance: The New Paradigm By: Laurie Fischer Overview The explosive growth of information presents management challenges to every organization today. Retaining
More informationHow To Manage Data
A Flash-light into the Dark: The Starters Guide to Data Governance Steven Adler IBM Data Governance Solutions adler1@us.ibm.com http://www.ibm.com/itsolutions/datagovernance Audience Question 2 Agenda
More informationJOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
More informationThe Computerworld Honors Program
The Computerworld Honors Program Honoring those who use Information Technology to benefit society Status: Laureate Final Copy of Case Study Year: 2013 Organization Name: Cybersecurity and Infrastructure
More informationWhat is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
More informationWhy You Still Need to Master Your Data Before You Master Your Business (Intelligence) Business Imperatives Addressed By Reliable, Integrated View
Why You Still Need to Master Your Data Before You Master Your Business (Intelligence) Business Imperatives Addressed By Reliable, Integrated View David Jordan Data Management Product Specialist 1 2 A simple
More informationThe Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
More informationImplement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.
Security solutions To support your business objectives Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. For an On Demand Business, security
More informationGovernance Is an Essential Building Block for Enterprise Information Management
Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways
More informationExpanding Data Governance Into EIM Governance. Gwen.Thomas@DataGovernance.com 321-438-0774. The Data Governance Institute page 1
Gwen Thomas President, page 1 has three arms: 1. Training/consulting 2. Membership (The Data Governance & Stewardship Community of Practice) ce) at www.datastewardship.com 3. Information services, publishing
More informationThe SharePoint Customer Journey Turn SharePoint into a Broadly Adopted Compliance and Security Asset
The SharePoint Customer Journey Turn SharePoint into a Broadly Adopted Compliance and Security Asset Eric Darbe Vice President of Marketing HiSoftware Agenda What if? The compliance and security case for
More informationInformation Governance
Information Governance The Why? The Who? The How? Summary Next steps Wikipedia defines Information governance as: an emerging term used to encompass the set of multi-disciplinary structures, policies,
More informationIBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk
Amir Jaibaji - Product Management Program Director IBM Information Lifecycle Governance IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk Enterprise big
More informationPRIVY COUNCIL OFFICE. Audit of Information Technology (IT) Security. Final Report
An asterisk appears where sensitive information has been removed in accordance with the Access to Information Act and Privacy Act. PRIVY COUNCIL OFFICE Audit of Information Technology (IT) Security Audit
More informationWhite Paper. Enterprise Information Governance. Date Released: September 2014. Author/s: Astral Consulting. www.astral.com.au.
White Paper Enterprise Information Governance Date Released: September 2014 Author/s: Astral Consulting Disclaimer This White Paper is published for general information purposes only. Nothing in the White
More informationCompliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
More information2008 NASCIO Award Submission. Utilizing PCI Compliance to Improve Enterprise Risk Management
Section A Cover Page 2008 NASCIO Award Submission Utilizing PCI Compliance to Improve Enterprise Risk Management Information Security and Privacy Michigan Section B - Executive Summary Michigan has implemented
More informationWhat to Look for When Selecting a Master Data Management Solution
What to Look for When Selecting a Master Data Management Solution What to Look for When Selecting a Master Data Management Solution Table of Contents Business Drivers of MDM... 3 Next-Generation MDM...
More informationState of Montana. Office Of Public Instruction IT Strategic Plan 2014. 1. Executive Summary
State of Montana Office Of Public Instruction IT Strategic Plan 2014 1. Executive Summary 1 The IT Division has experienced dramatic growth of its supported environment in the past three to four years.
More informationMicrosoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
More informationIBM Software A Journey to Adaptive MDM
IBM Software A Journey to Adaptive MDM What is Master Data? Why is it Important? A Journey to Adaptive MDM Contents 2 MDM Business Drivers and Business Value 4 MDM is a Journey 7 IBM MDM Portfolio An Adaptive
More informationCreating a Business Intelligence Competency Center to Accelerate Healthcare Performance Improvement
Creating a Business Intelligence Competency Center to Accelerate Healthcare Performance Improvement Bruce Eckert, National Practice Director, Advisory Group Ramesh Sakiri, Executive Consultant, Healthcare
More informationCreating a Corporate Integrated Data Environment through Stewardship
The Open Group Creating a Corporate Integrated Data Environment through Stewardship Enterprise Architecture Practitioners Conference Given January 2007 San Diego Presented by: Robert (Bob) Weisman CGI
More informationTest Data Management in the New Era of Computing
Test Data Management in the New Era of Computing Vinod Khader IBM InfoSphere Optim Development Agenda Changing Business Environment and Data Management Challenges What is Test Data Management Best Practices
More informationSIEM Implementation Approach Discussion. April 2012
SIEM Implementation Approach Discussion April 2012 Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual
More informationData Governance Maturity Model Guiding Questions for each Component-Dimension
Data Governance Maturity Model Guiding Questions for each Component-Dimension Foundational Awareness What awareness do people have about the their role within the data governance program? What awareness
More informationThe Key Components of a Data Governance Program. John R. Talburt, PhD, IQCP University of Arkansas at Little Rock Black Oak Analytics, Inc
The Key Components of a Data Governance Program John R. Talburt, PhD, IQCP University of Arkansas at Little Rock Black Oak Analytics, Inc My Background Currently University of Arkansas at Little Rock Acxiom
More informationTitle V Preventing Fraud and Abuse. Subtitle A- Establishment of New Health and Human Services and Department of Justice Health Care Fraud Positions
Title V Preventing Fraud and Abuse Subtitle A- Establishment of New Health and Human Services and Department of Justice Health Care Fraud Positions Sec. 501. Health and Human Services Senior Advisor There
More informationFIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
More informationData Governance 8 Steps to Success
Data Governance 8 Steps to Success Anne Marie Smith, Ph.D. Principal Consultant Asmith @ alabamayankeesystems.com http://www.alabamayankeesystems.com 1 Instructor Background Internationally recognized
More informationStakeholder Engagement Initiative: Customer Relationship Management
for the Stakeholder Engagement Initiative: December 10, 2009 Contact Point Christine Campigotto Private Sector Office Policy 202-612-1623 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department
More informationThe Informatica Solution for Improper Payments
The Informatica Solution for Improper Payments Reducing Improper Payments and Improving Fiscal Accountability for Government Agencies WHITE PAPER This document contains Confidential, Proprietary and Trade
More informationThe Importance of Data Governance in Healthcare
WHITE PAPER The Importance of Data Governance in Healthcare By Bill Fleissner; Kamalakar Jasti; Joy Ales, MHA, An Encore Point of View October 2014 BSN, RN; Randy Thomas, FHIMSS AN ENCORE POINT OF VIEW
More informationData Governance. David Loshin Knowledge Integrity, inc. www.knowledge-integrity.com (301) 754-6350
Data Governance David Loshin Knowledge Integrity, inc. www.knowledge-integrity.com (301) 754-6350 Risk and Governance Objectives of Governance: Identify explicit and hidden risks associated with data expectations
More informationData Governance Best Practice
Data Governance Best Practice Business Connexion Michelle Grimley Senior Manager EIM +27 (0)11 266 6499 Michelle.Grimley@bcx.co.za Inri Möller Master Data Manager +27 (0)11 266 5146 Inri.Möller@bcx.co.za
More informationGenerally Accepted Recordkeeping Principles
Generally Accepted Recordkeeping Principles Information Governance Maturity Model Information is one of the most vital strategic assets any organization possesses. Organizations depend on information to
More information!!!!! White Paper. Understanding The Role of Data Governance To Support A Self-Service Environment. Sponsored by
White Paper Understanding The Role of Data Governance To Support A Self-Service Environment Sponsored by Sponsored by MicroStrategy Incorporated Founded in 1989, MicroStrategy (Nasdaq: MSTR) is a leading
More informationApproach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera
Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help
More informationOperational Excellence for Data Quality
Operational Excellence for Data Quality Building a platform for operational excellence to support data quality. 1 Background & Premise The concept for an operational platform to ensure Data Quality is
More informationAgile enterprise content management and the IBM Information Agenda.
Transforming your content into a trusted, strategic asset Agile enterprise content management and the IBM Information Agenda. Delivering a common information framework for uncommon business agility Highlights
More informationData Quality Assessment. Approach
Approach Prepared By: Sanjay Seth Data Quality Assessment Approach-Review.doc Page 1 of 15 Introduction Data quality is crucial to the success of Business Intelligence initiatives. Unless data in source
More information