<Insert Picture Here> The Elements of a Data Governance Program: People, Practices, Policies and Technology

Size: px
Start display at page:

Download "<Insert Picture Here> The Elements of a Data Governance Program: People, Practices, Policies and Technology"

Transcription

1 <Insert Picture Here> The Elements of a Data Governance Program: People, Practices, Policies and Technology Joseph Alhadeff, VP Global Public Policy, Chief Privacy Strategist, Oracle Victoria/Privacy and Security/2012

2 The Roadmap The next frontier The Issues/Lessons of TAS 3 The accountable organization/governance, Canadian Style Focus on Technology in support of Compliance The Whole is greater than the sum of the parts

3 Global Data Flows/Big Data The Digital Economy and Information Society have enabled business to distribute functions across geographies (payment processing, credit verification, customer service, support, data centers, follow-the-sun service models) New services are driving even more increased information flows and customers may enter the system across multiple channels/devices, from many jurisdictions, and in multiple roles Consumers as content creators, application developers and publishers Big Data Big Brother OR something really cool and marvelous that happens when you get enough data together (Jeff Jonas) The new continuum Raw data, context, correlation, analytics, actionable information learning and responsible information management over the data lifecycle

4 Continuum: Individual, System, and Ecosystem

5 Privacy question across the generations 2001 HAL: Where is my information? Who controls it? Who has access? How is being used? Who is it being shared with? Who is looking out for my interests? 2012 LIZ* : Do you have an accountable privacy program Organizational policies, practices, technology components Ecosystem? Measurement Continuous improvement *Questions are pan-canadian

6 The Story Addressing today's security and privacy challenges can be summarized as getting the right data to the right people at the right time. Security and privacy challenges can also be summarized as preventing unauthorized access throughout the data lifecycle. This implies simplifying access for the right people while making access by the wrong people cumbersome, expensive and easily detected. Success in this endeavor depends on a combination of people, processes and technology. Technology is designed to facilitate authorized access in a repeatable and auditable fashion, and the systems themselves can be designed to promote data governance in a way that enhances accountability for the organizations that build and manage them. Sun Technical White Paper, Engineering for Data Protection and Accountability, May 2007,

7 Stop looking for the Silver Bullet. Accountability and Governance Policies Procedures Contracts Compliance Technology- Systems Architecture Privacy by Design People Thomas Richard, Data Protection in the European Union, Promising Themes for Reform, European Privacy and data Protection Commissioners Conference, Edinburgh, 24 April

8 Trusted Architecture for Securely Shared Services FP7 Project The collaborative and interactive development of technology, law and policy in support of privacy, security and trust. Technology assures the first hop, law and policy fill ecosystem and value chain gaps

9 Trusted Architecture for Securely Shared Services TAS 3 Contractual and Governance Framework FP7 Project The collaborative and interactive development of technology, law and policy in support of privacy, security and trust. Technology assures the first hop, law and policy fill ecosystem and value chain gaps

10 Benefits of a Coordinated Approach Policies Sticky Policies Technology Legal Requirements Data Hubs, HR, Health Care all facets are relying on information from multiple sources Better understand controls, policies, reliability and requirements related to shared information Clarity of use and security models Source and integrity issues Developing trust to enable sharing

11 Risk Management: Accountable Privacy, Policy and Legal processes User interface Effective preference/profile management as opposed to numbing micromanagement Legal Chain of accountability Individual, system and ecosystem T s and C s Uses privacy limits Security levels, technology Jurisdiction Applicable law Business Need Why is an Essential Driver How is the way you comply Organizational Competence Program organization, oversight and buy in Staffing/resources Practices & Policies Credible response Evaluation and measurement Training, testing and oversight Continuous improvement

12 New Governance Paradigm Responsible Information Management Stewardship of information Transparency Controls Proof/Audit/Testing Information Lifecycle Training Learning Organization Oversight Compliance Incident management Disaster recovery

13 Privacy by Design Not Always Apparent Understand the role of system and ecosystem Privacy also has to be designed into processes and inculcated into people Privacy is a team sport Privacy as enabler not barrier Every compliance requirement is an opportunity

14 Compliance As Opportunity (PIA ) Privacy and security requirements often make you generate system information, review and test controls and develop methods of oversight and reporting How can you use the new information generated How can you better understand your system through analyzing controls and how they work How much will this improve security How can this help you understand your overhead and efficiency to make you more effective Make the reports useful to you as well as oversight function When is less actually more?

15 The Opportunity: 1+1= 3 The new math is not a zero sum game Security and Privacy need to be considered together as mutually reinforcing and can be optimized together. Security and privacy regulation is overlapping in jurisdiction and impact Security and privacy professionals don t always know how to interact or speak the same language New compliance solution for each problem makes no sense 70-80% common solution

16 Compliance Methodology Outline the rule(s) Identify and assemble the team Identify / classify the information Map the information and flows Broad understanding of the technology possibilities Develop polices, practices and procedures Identify needed controls and possible control points Optimize the processes Implement the technology

17 Technology in support of compliance; IDM Canada, Leading by example Pan Canadian Strategy for IDM and Authentication BC claims based IDM Leveraging identity Getting to critical mass SecureKey/FS orgs Federating Credentials eventually Identity What level of trust in the credential, required for the service The New Chokhani/Ford Straw man?? Authenticating the individual to the system and transaction

18 Allocating rights and responsibilities beyond authentication Governance beyond the first hop Once authenticated, how do you associate rights and priviledges Who controls those decisions Are they Application specific How do you accomplish this across domains How do you build in challenges and safeguards? Oversight, audit and investigatory needs???

19 Oracle Solution Flavours Data Masking Identity Analytics Identity Federation Transient Federation Account mapping/linking Attribute Federation Adaptive Access Manager Risk based access control multi factor authentication proactive real-time fraud prevention Entitlements server Apps level security management Policy information/decision Points

20 Questions

21

Security It s an ecosystem thing

Security It s an ecosystem thing Security It s an ecosystem thing Joseph Alhadeff Vice President Global Public Policy, Chief Privacy Strategist The Security challenge in the before time. Today s Threat Environment

More information

The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap

The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap AAMVA Region I Conference E-ID, DLDV, and Privacy Conducting Business Securely

More information

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after

More information

How To Ensure Health Information Is Protected

How To Ensure Health Information Is Protected pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

CoP Template, Version 1.4 20 Jun 2011 1

CoP Template, Version 1.4 20 Jun 2011 1 Use of IDM Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be read in conjunction with this document. http://www.ed.ac.uk/schools-departments/information-services/about/policiesandregulations/security-policies/security-policy

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT TELERAN SOLUTION BRIEF Building Better Intelligence APPLICATION COMPLIANCE AUDIT & ENFORCEMENT For Exadata and Oracle 11g Data Warehouse Environments BUILDING BETTER INTELLIGENCE WITH BI/DW COMPLIANCE

More information

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Page 1 of 7 The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Domain I provides a solid foundation for the governance of

More information

IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE. Copyright 2012, SAS Institute Inc. All rights reserved.

IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE. Copyright 2012, SAS Institute Inc. All rights reserved. IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE ABOUT THE PRESENTER Marc has been with SAS for 10 years and leads the information management practice for canada. Marc s area of specialty

More information

Company size matters: Perspectives on IT Governance

Company size matters: Perspectives on IT Governance www.pwc.com/ca/technology-consulting Company size matters: Perspectives on IT Governance versus large Canadian organizations and IT Governance PwC conducted research for the 4th edition of the IT Governance

More information

Recommendations for the PIA. Process for Enterprise Services Bus. Development

Recommendations for the PIA. Process for Enterprise Services Bus. Development Recommendations for the PIA Process for Enterprise Services Bus Development A Report by the Data Privacy and Integrity Advisory Committee This report reflects the consensus recommendations provided by

More information

BLUEPRINT FOR THE FEDERATION OF IDENTITY MANAGEMENT

BLUEPRINT FOR THE FEDERATION OF IDENTITY MANAGEMENT BLUEPRINT FOR THE FEDERATION OF IDENTITY MANAGEMENT Identity Policy and Programs (IPP) June 7, 2010 - Draft Page 1 of 29 TABLE OF CONTENTS BLUEPRINT FOR THE...4 Executive Summary...4 FEDERATION OF IDENTITY

More information

Information & Asset Protection with SIEM and DLP

Information & Asset Protection with SIEM and DLP Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the

More information

Defining, Modeling & Costing IT Services Integrating Service Level, Configuration & Financial Management Processes

Defining, Modeling & Costing IT Services Integrating Service Level, Configuration & Financial Management Processes Defining, Modeling & Costing IT Services Integrating Service Level, Configuration & Financial Management Processes In our cost driven economy IT is facing increasing pressure to account for and reduce

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

how can I improve performance of my customer service level agreements while reducing cost?

how can I improve performance of my customer service level agreements while reducing cost? SOLUTION BRIEF CA Business Service Insight for Service Level Management how can I improve performance of my customer service level agreements while reducing cost? agility made possible By automating service

More information

The Business Case for Cloud: Critical Legal, Business & Diligence Considerations

The Business Case for Cloud: Critical Legal, Business & Diligence Considerations The Business Case for Cloud: Critical Legal, Business & Diligence Considerations Presented by Janine Anthony Bowen, Esq., CIPP/US jbowen@jack-law.com (678) 823-6611 Janine Anthony Bowen, Esq., CIPP/US

More information

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential

More information

Delivery date: 18 October 2014

Delivery date: 18 October 2014 Genomic and Clinical Data Sharing Policy Questions with Technology and Security Implications: Consensus s from the Data Safe Havens Task Team Delivery date: 18 October 2014 When the Security Working Group

More information

Department of Information Technology Database Administration Management Audit Final Report

Department of Information Technology Database Administration Management Audit Final Report Department of Information Technology Database Administration Management Audit Final Report October 2009 promoting efficient & effective local government Executive Summary Much of the county s data is stored

More information

Public Sector Chief Information Officer Council

Public Sector Chief Information Officer Council Report to Public Sector Chief Information Officer Council White Paper on a Pan Canadian Opportunities for Collaboration Project Goal Two Report: Outline and Approach Draft v1.0 Submitted by: Stuart Culbertson

More information

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM GENERAL: The Technology department is responsible for the managing of electronic devices and software for the District, as well as the Help Desk for resolution of employee-created help tickets. The subgroups

More information

Blending Corporate Governance with. Information Security

Blending Corporate Governance with. Information Security Blending Corporate Governance with Information Security WHAT IS CORPORATE GOVERNANCE? Governance has proved an issue since people began to organise themselves for a common purpose. How to ensure the power

More information

Marathon Information Management Program

Marathon Information Management Program Case Study: Implementing Enterprise Content Management at Marathon Oil Reid G. Smith ECM Director & IT Upstream Services Manager Marathon Oil Corporation March 12, 2012 Who we are Global independent exploration

More information

RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES

RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES PURPOSE Records and information are important strategic assets of an organization and, like other organizational assets (people, capital and technology), must be managed to maximize their value. Information

More information

COMMUNIQUE. Information Technology (IT) Governance Guidance

COMMUNIQUE. Information Technology (IT) Governance Guidance COMMUNIQUE 14-COM-002 July 14, 2014 Information Technology (IT) Governance Guidance The Credit Union Prudential Supervisors Association (CUPSA) has established an IT Risk Working Group to focus on IT governance

More information

www.pwc.com PwC The Path Forward for Data Analysis and Continuous Auditing May 2011

www.pwc.com PwC The Path Forward for Data Analysis and Continuous Auditing May 2011 www.pwc.com The Path Forward for Data Analysis and Continuous Auditing May 2011 Agenda What are we hearing in the market? The CA Maturity Path Where to start? What is the difference between CA & CCM? Best

More information

Bringing Strategy to Life Using an Intelligent Data Platform to Become Data Ready. Informatica Government Summit April 23, 2015

Bringing Strategy to Life Using an Intelligent Data Platform to Become Data Ready. Informatica Government Summit April 23, 2015 Bringing Strategy to Life Using an Intelligent Platform to Become Ready Informatica Government Summit April 23, 2015 Informatica Solutions Overview Power the -Ready Enterprise Government Imperatives Improve

More information

The problem of cloud data governance

The problem of cloud data governance The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in

More information

Third Party Approval & Risk Management

Third Party Approval & Risk Management Third Party Approval & Risk Management Rivo Software Solution Layer enables organizations to manage the third party approval process, identify and assess third party risk across vendors, contractors and

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

An Oracle White Paper November 2011. Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime

An Oracle White Paper November 2011. Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime An Oracle White Paper November 2011 Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime Disclaimer The following is intended to outline our general product direction.

More information

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into 1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any

More information

GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT. January 7, 2011

GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT. January 7, 2011 APPENDIX 1 GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT January 7, 2011 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto TABLE OF CONTENTS

More information

The Unique Alternative to the Big Four. Identity and Access Management

The Unique Alternative to the Big Four. Identity and Access Management The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing

More information

Using Trusted Identity Across Domains

Using Trusted Identity Across Domains Using Trusted Identity Across Domains Hilary L. Ward Director, Global Information Services Citi Why do we have an identity problem? An increasing number of high-value transactions and information exchange

More information

Toward global Interoperable Identity Management

Toward global Interoperable Identity Management ITU-T Joint Meeting on the IdM Focus Group Reports Toward global Interoperable Identity Management Anthony-Michael Rutkowski Vice-President, VeriSign Chair, ITU-T IdM FG Requirements WG Geneva, 10-11 September

More information

OCIO Strategy 2014. Page 1 CTZ-2014-00129

OCIO Strategy 2014. Page 1 CTZ-2014-00129 OCIO Strategy 2014 Page 1 Table of contents 03 Message from the GCIO & Strategy Steering Committee 05 Introduction and context 07 Our Vision and Mission 08 Our stakeholders 09 Our Roles 11 Our Values 12

More information

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014 CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION Architecture Framework Advisory Committee November 4, 2014 1 Agenda TIME TOPICS PRESENTERS 9:00 9:15 Opening Remarks and Introductions Shirley Ivan,

More information

ENABLING ENTERPRISE AVEPOINT ONLINE SERVICES. For Microsoft Office 365 COLLABORATION. For how you work, where you work

ENABLING ENTERPRISE AVEPOINT ONLINE SERVICES. For Microsoft Office 365 COLLABORATION. For how you work, where you work ENABLING ENTERPRISE COLLABORATION For how you work, where you work AVEPOINT ONLINE SERVICES For Microsoft Office 365 1 AVEPOINT ONLINE SERVICES FOR MICROSOFT OFFICE 365 Microsoft Office 365 gives users

More information

Privacy and Security Framework, February 2010

Privacy and Security Framework, February 2010 Privacy and Security Framework, February 2010 Updated April 2014 Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development and maintenance of comprehensive and

More information

Why Consider Cloud-Based Applications?

Why Consider Cloud-Based Applications? Abstract Achieving success for today s compliance professional is both tougher and easier than ever. On one hand, there are more regulations and standards at almost every level, on the other, there are

More information

ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES

ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES THIS POLICY SETS OUT THE REQUIREMENTS FOR SAFEGUARDING COMPANY ASSETS AND RESOURCES TO PROTECT PATIENTS, STAFF, PRODUCTS, PROPERTY AND

More information

Policy Brief: Protecting Privacy in Cloud-Based Genomic Research

Policy Brief: Protecting Privacy in Cloud-Based Genomic Research Policy Brief: Protecting Privacy in Cloud-Based Genomic Research Version 1.0 July 21 st, 2015 Suggested Citation: Adrian Thorogood, Howard Simkevitz, Mark Phillips, Edward S Dove & Yann Joly, Policy Brief:

More information

Big Data, Big Risk? Data Management and Privacy. Presented by: Timothy Banks, Heather Innes, and Colonel Vihar Joshi

Big Data, Big Risk? Data Management and Privacy. Presented by: Timothy Banks, Heather Innes, and Colonel Vihar Joshi Big Data, Big Risk? Data Management and Privacy Presented by: Timothy Banks, Heather Innes, and Colonel Vihar Joshi Data Management & Privacy Compliance Heather Innes Chief Privacy Officer, General Motors

More information

Identity Governance Evolution

Identity Governance Evolution Identity Governance Evolution Paola Marino Principal Sales Consultant Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform Agenda Oracle

More information

NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing

NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing Purpose of the Workshop In October 2014, the President s Council of Advisors on Science

More information

On Premise Vs Cloud: Selection Approach & Implementation Strategies

On Premise Vs Cloud: Selection Approach & Implementation Strategies On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile

More information

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement

More information

July 6, 2015. Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263

July 6, 2015. Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263 July 6, 2015 Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263 Re: Security Over Electronic Protected Health Information Report 2014-S-67

More information

Richard Gadsden Information Security Office Office of the CIO Information Services

Richard Gadsden Information Security Office Office of the CIO Information Services Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO Information Services Sharon Knowles Information Assurance Compliance MUSC Medical Center

More information

The Performance Exchange Thursday November 26th 2015 The CN Tower

The Performance Exchange Thursday November 26th 2015 The CN Tower The Performance Exchange Thursday November 26th 2015 The CN Tower Re-Thinking Cloud Computing Is my Organization Ready? Patrick Hickey, VP of Professional Services Performance Analytics What is the Cloud?

More information

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely

More information

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value. Security management White paper Develop effective user management to demonstrate compliance efforts and achieve business value. September 2008 2 Contents 2 Overview 3 Understand the challenges of user

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

Auditor General s Office. Governance and Management of City Computer Software Needs Improvement

Auditor General s Office. Governance and Management of City Computer Software Needs Improvement Auditor General s Office Governance and Management of City Computer Software Needs Improvement Transmittal Report Audit Report Management s Response Jeffrey Griffiths, C.A., C.F.E Auditor General, City

More information

Privacy by Design Setting a new standard for privacy certification

Privacy by Design Setting a new standard for privacy certification Privacy by Design Setting a new standard for privacy certification Privacy by Design is a framework based on proactively embedding privacy into the design and operation of IT systems, networked infrastructure,

More information

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance 3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security

More information

HIPAA/HITECH Compliance Using VMware vcloud Air

HIPAA/HITECH Compliance Using VMware vcloud Air Last Updated: September 23, 2014 White paper Introduction This paper is intended for security, privacy, and compliance officers whose organizations must comply with the Privacy and Security Rules of the

More information

Enterprise Data Governance

Enterprise Data Governance Enterprise Aligning Quality With Your Program Presented by: Mark Allen Sr. Consultant, Enterprise WellPoint, Inc. (mark.allen@wellpoint.com) 1 Introduction: Mark Allen is a senior consultant and enterprise

More information

IDIM Privacy Enhancing Features Summary Identity Information Management Project (IDIM) Integration Infrastructure Program (IIP) Office of the CIO

IDIM Privacy Enhancing Features Summary Identity Information Management Project (IDIM) Integration Infrastructure Program (IIP) Office of the CIO IDIM Privacy Enhancing Features Summary Identity Information Management Project (IDIM) Integration Infrastructure Program (IIP) Contact: Peter Watkins Phone: 250 387-2184 Email: Peter.Watkins@gov.bc.ca

More information

Branch Human Resources

Branch Human Resources Introduction The Human Resources Branch provides strategies, programs, services and consultation to attract and retain a diverse, engaged, innovative and skilled workforce to build a great city. Recruitment

More information

Agile Governance. Charlie Rudd SollutionsIQ. Copyright 2011 SolutionsIQ. All rights reserved.

Agile Governance. Charlie Rudd SollutionsIQ. Copyright 2011 SolutionsIQ. All rights reserved. Agile Governance Charlie Rudd SollutionsIQ Speaker Introduction: Charlie Rudd CEO of SolutionsIQ, an Agile company that provides Agile services including consulting, training, software development and

More information

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology Establishing A Multi-Factor Authentication Solution Report to the Joint Legislative Oversight Committee on Information Technology Keith Werner State Chief Information Officer Department of Information

More information

Audit & Inspection Management. Enterprise Cloud Audit & Inspection Management Solution

Audit & Inspection Management. Enterprise Cloud Audit & Inspection Management Solution Enterprise Cloud Solution is an end-to-end solution for the planning, execution and reporting of corporate external and internal audit and inspections across enterprise risk, safety, security and sustainability.

More information

Enterprise Data Governance

Enterprise Data Governance DATA GOVERNANCE Enterprise Data Governance Strategies and Approaches for Implementing a Multi-Domain Data Governance Model Mark Allen Sr. Consultant, Enterprise Data Governance WellPoint, Inc. 1 Introduction:

More information

Key Roles of User Experience Monitoring (UEM) Solutions in Enabling Performance Management Strategies

Key Roles of User Experience Monitoring (UEM) Solutions in Enabling Performance Management Strategies Key Roles of User Experience Monitoring (UEM) Solutions in Enabling Performance Management Strategies Market context TRAC's 2013 APM Spectrum shows that the quality of user experience for application performance

More information

INFOWAY EHRI PRIVACY & SECURITY CONCEPTUAL ARCHITECTURE V1.1

INFOWAY EHRI PRIVACY & SECURITY CONCEPTUAL ARCHITECTURE V1.1 INFOWAY EHRI PRIVACY & SECURITY CONCEPTUAL ARCHITECTURE V1.1 Review and Recommendation Report to the Ontario Health Informatics Standards Council (OHISC) By: Ontario Privacy & Security Architecture January

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

API Management Introduction and Principles

API Management Introduction and Principles API Management Introduction and Principles by Vijay Alagarasan, Principal Architect, Enterprise Architecture and Strategy of Asurion Abstract: This article is focused on providing solutions for common

More information

How To Improve Your Business

How To Improve Your Business IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends

More information

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk Xerox Litigation Services In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk Your Highest Priority is also Your Greatest Challenge Data breaches are not just

More information

Data Governance Baseline Deployment

Data Governance Baseline Deployment Service Offering Data Governance Baseline Deployment Overview Benefits Increase the value of data by enabling top business imperatives. Reduce IT costs of maintaining data. Transform Informatica Platform

More information

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cybersecurity in the States 2012: Priorities, Issues and Trends Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State

More information

PRIVACY IMPACT ASSESSMENT FROM A REGULATOR S S POINT OF VIEW

PRIVACY IMPACT ASSESSMENT FROM A REGULATOR S S POINT OF VIEW 29e CONFÉRE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS CONFERE #62036 1 PRIVACY IMPACT ASSESSMENT FROM

More information

Achieving Security through Compliance

Achieving Security through Compliance Achieving Security through Compliance Policies, plans, and procedures Table of Contents This white paper was written by: McAfee Foundstone Professional Services Overview...3 The Rock Foundation...3 Governance...3

More information

Securing and protecting the organization s most sensitive data

Securing and protecting the organization s most sensitive data Securing and protecting the organization s most sensitive data A comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered

More information

ISO 27001 COMPLIANCE WITH OBSERVEIT

ISO 27001 COMPLIANCE WITH OBSERVEIT ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk

More information

ICS for LAUSD EOC and DOC Operation

ICS for LAUSD EOC and DOC Operation ICS for LAUSD EOC and DOC Operation Below is some background information on the Incident Command System (used at our schools and in other field operations) and how it applies in an EOC environment. From

More information

Securing the Microsoft Cloud

Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed

More information

The University of Texas at San Antonio. Business Affairs 2016 STRATEGIC PLAN 2007-2016 December 2007

The University of Texas at San Antonio. Business Affairs 2016 STRATEGIC PLAN 2007-2016 December 2007 The University of Texas at San Antonio Business Affairs 2016 STRATEGIC PLAN 2007-2016 December 2007 Table of Contents Page 1. Introduction... 3 2. Business Affairs Mission, Vision and Core Values 3 3.

More information

IT Governance. What is it and how to audit it. 21 April 2009

IT Governance. What is it and how to audit it. 21 April 2009 What is it and how to audit it 21 April 2009 Agenda Can you define What are the key objectives of How should be structured Roles and responsibilities Key challenges and barriers Auditing Scope Test procedures

More information

Ensuring Cloud Security Using Cloud Control Matrix

Ensuring Cloud Security Using Cloud Control Matrix International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 9 (2013), pp. 933-938 International Research Publications House http://www. irphouse.com /ijict.htm Ensuring

More information

BEST PRACTICES IN MARKETING DATA GOVERNANCE

BEST PRACTICES IN MARKETING DATA GOVERNANCE BEST PRACTICES IN MARKETING DATA GOVERNANCE CMA Customer Insights & Analytics Council Paul Tyndall Council Chair and Director, Client Knowledge & Insights RBC Royal Bank Alexis Zamkow General Manager Data

More information

ETSI -Standards in the cloud Mobile internet and cloud computing. Adam Heywood Senior Director, Europe Technical Sales

ETSI -Standards in the cloud Mobile internet and cloud computing. Adam Heywood Senior Director, Europe Technical Sales ETSI -Standards in the cloud Mobile internet and cloud computing Adam Heywood Senior Director, Europe Technical Sales Presenter Biography Adam Heywood Adam Heywood is Senior Director of Technical Presales

More information

Cyber Security: Finding Synergy Between Industry and Government

Cyber Security: Finding Synergy Between Industry and Government Cyber Security: Finding Synergy Between Industry and Government Tuesday, 20 Sept 2011 Jeff G. Chief, Cyber Security Architect CIA Agenda Drivers Issues & Challenges Efficiencies Loss of Control What Users

More information

Big Data in Government: What Are the Talent Needs? McMaster University Big Data Forum 2014-09-24

Big Data in Government: What Are the Talent Needs? McMaster University Big Data Forum 2014-09-24 Big Data in Government: What Are the Talent Needs? McMaster University Big Data Forum 2014-09-24 Big data in government The Canadian government holds large amounts of administrative and transactional,

More information

SRG Security Services Technology Report Cloud Computing and Drop Box April 2013

SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 1 Cloud Computing In the Industry Introduction to Cloud Computing The term cloud computing is simply the use of computing

More information

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet

More information

Global Efforts to Secure Cloud Computing

Global Efforts to Secure Cloud Computing April 2012 Global Efforts to Secure Cloud Computing Jim Reavis Executive Director Cloud: ushering in IT Spring Technology consumerization and its offspring Cloud: Compute as a utility Smart Mobility: Compute

More information

Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements

Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements Joint White Paper: Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements Submitted Date: April 10, 2013 Submitted

More information

Compliance by Design (CbD)

Compliance by Design (CbD) Compliance by Design (CbD) Building an Effective & Sustainable Compliance Program Dale Skivington Executive Director, Global Compliance and Privacy Dell today Technology has always been about enabling

More information

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better

More information

Achieving Security through Compliance

Achieving Security through Compliance White Paper Achieving Security through Compliance Policies, plans, and procedures Part I By Jeff Tucker, Principal Security Consultant McAfee Foundstone Professional Services Table of Contents Overview

More information

Microsoft s Compliance Framework for Online Services

Microsoft s Compliance Framework for Online Services Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft

More information

Harnessing the Data Flood: Oracle s Visionary Platform from Device to Data Center. Chris Baker Senior Vice President Worldwide ISV/OEM Java Sales

Harnessing the Data Flood: Oracle s Visionary Platform from Device to Data Center. Chris Baker Senior Vice President Worldwide ISV/OEM Java Sales Harnessing the Data Flood: Oracle s Visionary Platform from Device to Data Center Chris Baker Senior Vice President Worldwide ISV/OEM Java Sales Canvas Lumber Compass Sextant 1851 America s Cup The oldest

More information

Achieving HIPAA Compliance with Identity and Access Management

Achieving HIPAA Compliance with Identity and Access Management Achieving HIPAA Compliance with Identity and Access Management A Healthcare Case Study Stephen A. Whicker Manager Security Compliance HIPAA Security Officer AHIS/St. Vincent Health DISCLAIMER: The views

More information