1. Understanding Big Data

Size: px
Start display at page:

Download "1. Understanding Big Data"

Transcription

1 Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd Deloitte Belgium - European Privacy Academy 2 Definition & Characteristics Big Data is the collection of large and complex data sets that are difficult to process using traditional database management tools or data processing applications. Big Data is the new raw material of business. The Economist BUT As Dan Ariely, Professor at Duke University said Big Data is like teenage sex: everyone talks about it, nobody really knows how to do it, everyone thinks everyone else is doing it, so everyone claims they are doing it Deloitte Belgium - European Privacy Academy 3 1

2 Definition & Characteristics Big Data generally refers to a set of technologies and initiatives involving data that is too fast changing (velocity), massive (volume) or too diverse (variety) for conventional technologies, skills and infrastructure to handle efficiently. Velocity 90% of the data in the world today has been created in the last 2 years Batch to streaming data Volume Every day, we create more then 2,5 quintillion bytes of data Terabytes to Zettabytes Variety Diversity of data sources and formats Structured to Semi-Structured to Unstructured Analytics on almost all types of data Virtualization architecture Often distributed large-scale (cloud) infrastructures 2016 Deloitte Belgium - European Privacy Academy 4 A different set up No one to one relationship of server to data storage Reliance on virtualization architecture, needed to be able to draw from large content stores and archives as a single global resource Big Data environments often rely on distributed large-scale (cloud) infrastructures a diversity of data sources and a high volume + frequency of data migration between different (cloud) environments 5 Big Data Analytics Collecting, organizing and analyzing Large sets of data Better decisions Competitive advantage To discover patterns and other useful information 6 2

3 Analytics Opportunities Big Data Analytics represents tremendous opportunities, both for the private and public sector : As a business asset: can serve to understand customers at a whole new level. To improve health care: can help deliver effective health care to patients faster and earlier (e.g. predictive medicine). To improve service: analytics can be used by governments to improve their citizens experience with administration by anticipating their needs. To strengthen security : Potential for new security insights and enhanced detection and prevention systems provided that the challenges and risks are properly mitigated 7 Gathering information Profile content Browser history Online surveys European Privacy Academy 8 Gathering information Geolocalisation Geolocalisation Many apps request the user s location in order to give more accurate search results (e.g. nearest restaurant or shop of a certain company) content The content of the s sent and received through Gmail are scanned by an automated software of Google. This information is then combined with other information of the Google profile of the users to display more relevant ads. European Privacy Academy 9 3

4 Gathering information Online surveys Data gathered through online surveys are used by companies to gain more insight about their clients (e.g. average age of people consuming their products) Browser history Several service providers combine the browsing history of an individual user with the knowledge gathered about other users following a similar browsing path to give more accurate search results or advertising (e.g. Amazon and FNAC s books suggestions, YouTube s videos suggestions, etc) Other sources European Privacy Academy data about the purchases made by a customer with its loyalty card, sensors in a car to determine the driving style of an individual, etc. 10 Big Data in perspective: General Data Protection Regulation Privacy by Design Privacy by Default Privacy Impact Assessment Records of Processing Activities Data Security of Processing Breach Notification Data Protection Officer 2016 Deloitte Belgium - European Privacy Academy Big Data vs. Security & Privacy 2016 Deloitte Belgium - European Privacy Academy 12 4

5 Big Data vs. Security & Privacy Privacy Challenges Accuracy Outsourcing/ Transfers Transparency Big Data User Rights Privacy by Design Lawfulness 13 Big Data vs. Security & Privacy Privacy Challenges Creating entirely new challenges we have not encountered before: Data linkages: Powerful analytics solutions can link data sets to reveal someone s lifestyle, consumer habits, social networks and more even if no single data set reveals this personal information. Profiling: the use of identifiable data to profile individuals in order to analyze, predict and influence their behaviour. 14 Big Data vs Security & Privacy Security Challenges BIG DATA TRADITIONAL SECURITY Access to huge volumes Difficult to protect and monitor Complex environments Lack of granular audit trails Variety of data Difficulty to verify access 15 5

6 Big Data vs. Security & Privacy Security Challenges Big Opportunities: Big Data is now often regarded as most critical enterprise asset, focusing attention on performance and collection of data, not security. Big Attackers: Big Data attracts a new class of hackers & attacks. Threat landscape has altered radically. 16 Big Data vs. Security & Privacy Opportunity example Using Big Data to analyse, predict and prevent security incidents Big Data provides the opportunity to consolidate and analyse logs automatically from multiple sources rather than in isolation Potential for new insights and enhanced detection and prevention systems through continual adjustment and effectively learning good and bad behaviours 17 Big Data vs. Security & Privacy Challenge example Securing the organisation and customers information Information classification and data ownership become more critical Encryption and access controls based on data attributes rather than storage environment 18 6

7 3. Conclusive remarks 2016 Deloitte Belgium - European Privacy Academy 19 Conclusive remarks From a classic data protection governance model to an agile one The Big Data security challenges will require a more agile security governance model including: More attention to detail :A holistic privacy/security strategy A migration from point products to a more unified security architecture Open and scalable Big Data security tools and approach A strengthening of SOC s (Security Operations Centre) data science skills A more extensive leverage on external threat intelligence A more pragmatic focus on (breach) incident as well as identity and access management 20 Conclusive remarks From a classic data protection governance model to an agile one In addition, a more agile governance model should address the main privacy challenges of Big Data: Invest in IT security governance, not only security products Manage the security/privacy paradox and use an integrated security/privacy approach (e.g. monitoring versus anonymization) Clearly define privacy (and security) responsibilities Ongoing monitoring and audits (eg privacy impact assessments) Focus on the obtaining consent of the data subject: opt-in, not opt-out Make sure that processing remains compatible with purpose of collection(eg secondary use issue) Engage in harmonization and standardization Transparency towards data subject regarding its (GDPR) rights 21 7

8 Conclusive remarks A holistic risk based approach across the (big) data lifecycle Effective data protection looks across the data lifecycle to allow an enterprise to tailor policy in a way that keeps information safe, yet available to those authorized to access it. Without knowing the lifecycle of data flowing through your organisation, it is impossible to be sure that it is all managed appropriately. Creating a personal data inventory and/or personal data flow maps will allow to understand and analyze the scope of privacy in your organization. Data lifecycle Specific risks General risks Retention & Collection Storage Use Sharing Destruction Inconsistent Distributed Improper Unnecessary Misuse methods storage access/sharing retention Inappropriate Data distributed Improper Accidental Partial deletion classification across network duplication loss Inappropriate Unnecessary Inappropriate thirdparty controls deletion Accidental Theft or breach security controls retention Classify: Inconsistent/unclear data classification scheme to understand the type of data that exists throughout the organization Discover: Insufficient understanding of where data is stored and how it is used Control: Lack of user awareness of individual and organizational responsibilities surrounding data protection Access: Unauthorized access to data across the data lifecycle Audit: Insufficient capability to audit the usage of data or monitor the effectiveness of implemented controls 2016 Deloitte Belgium - European Privacy Academy 22 Thank you for your attention Any questions? Erik Luysterborg Partner, CIPP BE Cyber Risk Services Leader EMEA Data Protection & Privacy Leader Direct: Mobile: Deloitte Belgium - European Privacy Academy 23 Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ( DTTL ), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as Deloitte Global ) does not provide services to clients. Please see for a more detailed description of DTTL and its member firms. Deloitte provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries. With a globally connected network of member firms in more than 150 countries and territories, Deloitte brings world-class capabilities and high-quality service to clients, delivering the insights they need to address their most complex business challenges. Deloitte s more than 200,000 professionals are committed to becoming the standard of excellence. This communication contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or their related entities (collectively, the Deloitte Network ) is, by means of this communication, rendering professional advice or services. No entity in the Deloitte network shall be responsible for any loss whatsoever sustained by any person who relies on this communication For information, contact Deloitte Belgium 2016 Deloitte Belgium - European Privacy Academy 24 8

Cloud Computing. Making legal aspects less cloudy. Erik Luysterborg Partner Cyber Security & Privacy Belgium EMEA Data Protection & Privacy Leader

Cloud Computing. Making legal aspects less cloudy. Erik Luysterborg Partner Cyber Security & Privacy Belgium EMEA Data Protection & Privacy Leader Cloud Computing Making legal aspects less cloudy Erik Luysterborg Partner Cyber Security & Privacy Belgium EMEA Data Protection & Privacy Leader 30 September 2014 1 Contents A. Introduction: a short walk

More information

Securing tomorrow today Achieving enterprise technology and 'big data' solutions that support the tax lifecycle

Securing tomorrow today Achieving enterprise technology and 'big data' solutions that support the tax lifecycle Securing tomorrow today Achieving enterprise technology and 'big data' solutions that support the tax lifecycle Bernadette Pinamont, Vertex Robert Shields, Vertex Conrad Young, Deloitte Albert Fleming,

More information

Rosemary M. Amato, CISA Deloitte Accountants B.V.

Rosemary M. Amato, CISA Deloitte Accountants B.V. Rosemary M. Amato, CISA Deloitte Accountants B.V. ABOUT THE PRESENTER Rosemary M. Amato ramato@deloitte.nl Director within the Netherlands member firm of Deloitte, based in Amsterdam Program Director for

More information

EMEA TMC client conference Using global tax management systems to improve visibility and enhance control. The Crystal, London 9-10 June 2015

EMEA TMC client conference Using global tax management systems to improve visibility and enhance control. The Crystal, London 9-10 June 2015 EMEA TMC client conference Using global tax management systems to improve visibility and enhance control The Crystal, London 9-10 June 2015 1 Agenda Managing global compliance and reporting Why are people

More information

5 th ISACA Athens Chapter Conference

5 th ISACA Athens Chapter Conference Rosemary M. Amato Director, Deloitte 5 th ISACA Athens Chapter Conference Big Data and Advanced Data Visualization Rosemary M. Amato ISACA International Vice President 23 November 2015 WELCOME INTRODUCTION

More information

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture BladeLogic Software-as-a- Service (SaaS) Solution Help reduce operating cost, improve security compliance, strengthen cybersecurity posture February 20, 2014 Contents The Configuration Security Compliance

More information

Cyber intelligence exchange in business environment : a battle for trust and data

Cyber intelligence exchange in business environment : a battle for trust and data Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building

More information

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015 Identity & Management The Cloud Perspective Andrea Themistou 08 October 2015 Agenda Cloud Adoption Benefits & Risks Security Evolution for Cloud Adoption Securing Cloud Applications with IAM Securing Cloud

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

Deloitte Risk Services B.V. Cyber & Privacy Advisory. Deloitte Cyber & Privacy Risk Services Data Breach Management

Deloitte Risk Services B.V. Cyber & Privacy Advisory. Deloitte Cyber & Privacy Risk Services Data Breach Management Deloitte Risk Services B.V. Cyber & Privacy Advisory Deloitte Cyber & Privacy Risk Services Data Breach Management 2 Index Cover pages & Index 1-3 Data breach management 4 Challenges and opportunities

More information

Benchmarking study of electricity prices between Belgium and neighboring countries. Press Conference. April 2016

Benchmarking study of electricity prices between Belgium and neighboring countries. Press Conference. April 2016 Benchmarking study of electricity prices between Belgium and neighboring countries Press Conference April 2016 Benchmarking study of power prices in Belgium and surrounding countries Objectives and scope

More information

European Commission initiatives on e- and mhealth

European Commission initiatives on e- and mhealth European Commission initiatives on e- and mhealth Fundamental Rights Forum, 22 June 2016 WG 24: E-health: improving rights fulfilment through innovation Claudia Prettner, Unit for Health and Well-Being,

More information

Deloitte Discovery Caribbean & Bermuda Territory Guide

Deloitte Discovery Caribbean & Bermuda Territory Guide Deloitte Discovery Caribbean & Bermuda Territory Guide Deloitte Discovery Overview The complexity and volume of data in today s corporate climate means businesses in the Caribbean & Bermuda Countries (

More information

The big data revolution

The big data revolution The big data revolution Expert report in partnership with Big data, big challenges Big data is changing the world a hundred terabytes at a time. It allows marketers to make highly informed and effective

More information

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc. Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value

More information

Take the right steps 9 principles for building the Risk Intelligent Enterprise

Take the right steps 9 principles for building the Risk Intelligent Enterprise Take the right steps 9 principles for building the Risk Intelligent Enterprise Contents 9 principles for building a Risk Intelligent Enterprise 2 The Risk Intelligent Framework 4 1. Is risk a threat or

More information

Vision on Mobile Security and BYOD BYOD Seminar

Vision on Mobile Security and BYOD BYOD Seminar Vision on Mobile Security and BYOD BYOD Seminar Brussel, 25 september 2012 Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl +31 610 999 199 1

More information

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Seven Things To Consider When Evaluating Privileged Account Security Solutions Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

Enterprise Data Management for SAP. Gaining competitive advantage with holistic enterprise data management across the data lifecycle

Enterprise Data Management for SAP. Gaining competitive advantage with holistic enterprise data management across the data lifecycle Enterprise Data Management for SAP Gaining competitive advantage with holistic enterprise data management across the data lifecycle By having industry data management best practices, from strategy through

More information

Big Data Architectures. Lessons Learned from Industrializing Big Data. Kenan Mujkic, PhD 23 June 2016

Big Data Architectures. Lessons Learned from Industrializing Big Data. Kenan Mujkic, PhD 23 June 2016 Big Data Architectures Lessons Learned from Industrializing Big Data Kenan Mujkic, PhD 23 June 2016 Deloitte Making an impact that matters for clients, for our people, and for society. We serve clients

More information

SAP Solution Brief SAP Solutions for Sustainability. Pave the Way for IT Innovation by Reducing Cost, Risk, and Energy Use

SAP Solution Brief SAP Solutions for Sustainability. Pave the Way for IT Innovation by Reducing Cost, Risk, and Energy Use SAP Brief SAP s for Sustainability Objectives Pave the Way for IT Innovation by Reducing Cost, Risk, and Energy Use Charting the course for sustainable IT Charting the course for sustainable IT IT organizations

More information

A Pragmatic Guide to Big Data & Meaningful Privacy. kpmg.be

A Pragmatic Guide to Big Data & Meaningful Privacy. kpmg.be A Pragmatic Guide to Big Data & Meaningful Privacy kpmg.be From predicting criminal behavior to medical breakthroughs, from location-based restaurant recommendations to customer churn predictions, the

More information

Privacy & data protection in big data: Fact or Fiction?

Privacy & data protection in big data: Fact or Fiction? Privacy & data protection in big data: Fact or Fiction? Athena Bourka ENISA ISACA Athens Conference 24.11.2015 European Union Agency for Network and Information Security Agenda 1 Privacy challenges in

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from

More information

Deloitte Analytics Uncommon insights

Deloitte Analytics Uncommon insights Deloitte Analytics Uncommon insights Contents The dangers of data mismanagement...2 Making the business case...3 How we can help: Deep industry business knowledge...4 ii Deloitte Analytics Uncommon insights

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

Repave the Cloud-Data Breach Collision Course

Repave the Cloud-Data Breach Collision Course Repave the Cloud-Data Breach Collision Course Using Netskope to enable the cloud while mitigating the risk of a data breach BACKGROUND Two important IT trends are on a collision course: Cloud adoption

More information

Adopting Cloud Apps? Ensuring Data Privacy & Compliance. Varun Badhwar Vice President of Product Strategy CipherCloud

Adopting Cloud Apps? Ensuring Data Privacy & Compliance. Varun Badhwar Vice President of Product Strategy CipherCloud Adopting Cloud Apps? Ensuring Data Privacy & Compliance Varun Badhwar Vice President of Product Strategy CipherCloud Agenda Cloud Adoption & Migration Challenges Introduction to Cloud Computing Cloud Security

More information

Credit management services Because a sale is a gift until it is paid

Credit management services Because a sale is a gift until it is paid Credit management services Because a sale is a gift until it is paid Introduction In times of crisis, working capital and cash are high on the agenda. They are key to ensuring your business runs smoothly

More information

Privacy & Big Data: Enable Big Data Analytics with Privacy by Design. Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014

Privacy & Big Data: Enable Big Data Analytics with Privacy by Design. Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014 Privacy & Big Data: Enable Big Data Analytics with Privacy by Design Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014 Agenda? What is 'Big Data'? Privacy Implications Privacy

More information

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential

More information

NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation

NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation Market Offering: Package(s): Oracle Authors: Rick Olson, Luke Tay Date: January 13, 2012 Contents Executive summary

More information

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS BUSINESS BENEFITS Use of the Certified Partner seal and the Secured by RSA brand on product packaging and advertising Exposure in the Secured by RSA

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Result of Crisis Management Survey Deloitte Touche Tohmatsu LLC Crisis Management Service

Result of Crisis Management Survey Deloitte Touche Tohmatsu LLC Crisis Management Service Deloitte Touche Tohmatsu LLC Crisis Management Service Table of contents Introduction 3 Executive Summary 7 Analysis of respondents 10 Analysis of domestic subsidiaries respondents 18 Analysis of foreign

More information

Temporary support for your HR department A made-to-measure solution

Temporary support for your HR department A made-to-measure solution Temporary support for your HR department A made-to-measure solution Organisations now expect HR not only to be efficient in their delivery of core services but also to set the talent agenda and to drive

More information

Key Cyber Risks at the ERP Level

Key Cyber Risks at the ERP Level Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche

More information

Planning ahead Hot topics facing Financial Services organisations in IT Internal Audit

Planning ahead Hot topics facing Financial Services organisations in IT Internal Audit Planning ahead Hot topics facing Financial Services organisations in IT Internal Audit 2013 During Q4 2012, we surveyed Heads of IT Internal Audit at 22 global Financial Services organisations to identify

More information

Big Data, Big Risk, Big Rewards. Hussein Syed

Big Data, Big Risk, Big Rewards. Hussein Syed Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data

More information

Pragmatic cloud computing Six keys to successfully using the cloud

Pragmatic cloud computing Six keys to successfully using the cloud Pragmatic cloud computing Six keys to successfully using the cloud It is imperative to develop a clear cloud strategy that is based on facts, that articulates the benefits and risks and that is holistic

More information

Healthcare Data in the Cloud A Gathering Storm of Governance. Erik Pupo Senior Manager, Deloitte

Healthcare Data in the Cloud A Gathering Storm of Governance. Erik Pupo Senior Manager, Deloitte Healthcare Data in the Cloud A Gathering Storm of Governance Erik Pupo Senior Manager, Deloitte Objectives for this Webinar Explain what the healthcare cloud really means Highlight emerging challenges

More information

Statistical Challenges with Big Data in Management Science

Statistical Challenges with Big Data in Management Science Statistical Challenges with Big Data in Management Science Arnab Kumar Laha Indian Institute of Management Ahmedabad Analytics vs Reporting Competitive Advantage Reporting Prescriptive Analytics (Decision

More information

Consulting. The importance of optimizing maintenance management for efficient operations

Consulting. The importance of optimizing maintenance management for efficient operations Consulting The importance of optimizing maintenance management for efficient operations 2 Executive summary Based on our optimization project experience both globally and in Russia, Deloitte has identified

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Protect the data that drives our customers business. Data Security. Imperva s mission is simple: The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent

More information

Succeeding with new hospital developments Laying the right technology foundation

Succeeding with new hospital developments Laying the right technology foundation Succeeding with new hospital developments Laying the right technology foundation Focusing on the right elements Information technology is changing how people use clinical spaces. In the digital hospital,

More information

3 MUST-HAVES IN PUBLIC SECTOR INFORMATION GOVERNANCE

3 MUST-HAVES IN PUBLIC SECTOR INFORMATION GOVERNANCE EXECUTIVE SUMMARY Information governance incorporates the policies, controls and information lifecycle management processes organizations and government agencies utilize to control cost and risk. With

More information

Making Data Work. Florida Department of Transportation October 24, 2014

Making Data Work. Florida Department of Transportation October 24, 2014 Making Data Work Florida Department of Transportation October 24, 2014 1 2 Data, Data Everywhere. Challenges in organizing this vast amount of data into something actionable: Where to find? How to store?

More information

Consulting. Cost cutting Methodology and tools

Consulting. Cost cutting Methodology and tools Consulting Cost cutting Methodology and tools Table of contents Cost cutting in a company. Methodology and tools Cost cutting in a company. Methodology and tools 1. Assessment of cost reduction potential

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT

CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT ABSTRACT Identity and access governance should be deployed across all types of users associated with an organization -- not just regular users

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and

More information

egovernment - a Digital Transformation Trends, progress, initiatives Sebastiaan van der Peijl, 14-10-2015

egovernment - a Digital Transformation Trends, progress, initiatives Sebastiaan van der Peijl, 14-10-2015 egovernment - a Digital Transformation Trends, progress, initiatives Sebastiaan van der Peijl, 14-10-2015 Contents Key trends in egovernment Digital Transformation Findings from the Deloitte Global Survey

More information

Global Tax and Legal September 2014. OECD s BEPS initiative a global survey Multinational survey results

Global Tax and Legal September 2014. OECD s BEPS initiative a global survey Multinational survey results Global Tax and Legal September 2014 OECD s BEPS initiative a global survey Multinational survey results OECD s BEPS initiative Multinational survey results The purpose of Deloitte s recent survey, OECD

More information

Information Life Cycle Management (ILM)

Information Life Cycle Management (ILM) Information Life Cycle Management (ILM) Finding business value in Information Life Cycle Management (ILM): Proactive information management through ILM can reduce cost and risk while creating tangible

More information

Deloitte Advisory Services for Financial Institutions. Advisory services for banks and other financial institutions

Deloitte Advisory Services for Financial Institutions. Advisory services for banks and other financial institutions Deloitte Advisory Services for Financial Institutions Advisory services for banks and other financial institutions Contents Current trends in the banking sector of Azerbaijan About our services Why Deloitte?

More information

4th Annual ISACA Kettle Moraine Spring Symposium

4th Annual ISACA Kettle Moraine Spring Symposium www.pwc.com 4th Annual ISACA Kettle Moraine Spring Symposium Session 2 Big Data May 14th, 2014 Session Objective Learn about governance, risks, and compliance considerations that become particularly important

More information

Simplification of work: Knowledge management as a solution

Simplification of work: Knowledge management as a solution Simplification of work: Knowledge management as a solution Second line optional lorem ipsum B Subhead lorem ipsum, date quatueriure 2 Content 4 Simplification of work: Knowledge management as a solution

More information

Asia Pacific. Tax Management Consulting Why and What?

Asia Pacific. Tax Management Consulting Why and What? Asia Pacific Tax Management Consulting Why and What? In an increasingly demanding and global environment, managing tax is becoming more complex. The world s leading tax departments integrate business strategy

More information

IBM Software Top tips for securing big data environments

IBM Software Top tips for securing big data environments IBM Software Top tips for securing big data environments Why big data doesn t have to mean big security challenges 2 Top Comprehensive tips for securing data big protection data environments for physical,

More information

Enterprise Risk Services. Aware vs. committed where do you stand? Business continuity management

Enterprise Risk Services. Aware vs. committed where do you stand? Business continuity management Enterprise Risk Services vs. committed where do you stand? Business continuity management Business continuity management 1 Contents here Initial findings from the Deloitte 1 Global Business Continuity

More information

Thailand Tomorrow Tech Trends 2015 What is the catch?

Thailand Tomorrow Tech Trends 2015 What is the catch? Thailand Tomorrow Tech Trends 2015 What is the catch? Commercial Advisory and Due Diligence March 2014 The Internet of Things Proliferation across connected devices 1 Thailand Tomorrow Tech Trends 2015

More information

BEST PRACTICES IN MARKETING DATA GOVERNANCE

BEST PRACTICES IN MARKETING DATA GOVERNANCE BEST PRACTICES IN MARKETING DATA GOVERNANCE CMA Customer Insights & Analytics Council Paul Tyndall Council Chair and Director, Client Knowledge & Insights RBC Royal Bank Alexis Zamkow General Manager Data

More information

Creating the Conditions for Change

Creating the Conditions for Change Creating the Conditions for Change The power of collective action in strategy execution 4-5 October 2012 2 The essential pre-conditions for change Business Value is the the anticipated end state outcome

More information

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Securing the Cloud infrastructure with IBM Dynamic Cloud Security Securing the Cloud infrastructure with IBM Dynamic Cloud Security Ngo Duy Hiep Security Brand Manager Cell phone: +84 912216753 Email: hiepnd@vn.ibm.com 12015 IBM Corporation Cloud is rapidly transforming

More information

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely

More information

BIG DATA FUNDAMENTALS

BIG DATA FUNDAMENTALS BIG DATA FUNDAMENTALS Timeframe Minimum of 30 hours Use the concepts of volume, velocity, variety, veracity and value to define big data Learning outcomes Critically evaluate the need for big data management

More information

Big Data overview. Livio Ventura. SICS Software week, Sept 23-25 Cloud and Big Data Day

Big Data overview. Livio Ventura. SICS Software week, Sept 23-25 Cloud and Big Data Day Big Data overview SICS Software week, Sept 23-25 Cloud and Big Data Day Livio Ventura Big Data European Industry Leader for Telco, Energy and Utilities and Digital Media Agenda some data on Data Big Data

More information

Information Stewardship: Moving From Big Data to Big Value

Information Stewardship: Moving From Big Data to Big Value Information Stewardship: Moving From Big Data to Big Value By John Burke Principal Research Analyst, Nemertes Research Executive Summary Big data stresses tools, networks, and storage infrastructures.

More information

Logging In: Auditing Cybersecurity in an Unsecure World

Logging In: Auditing Cybersecurity in an Unsecure World About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that

More information

STAND THE. Data Center Optimization. Q&A with an Industry Leader

STAND THE. Data Center Optimization. Q&A with an Industry Leader Q&A with an Industry Leader Government is faced with exploding demand to provide services to end users, be they ordinary citizens or war fighters. The data center is a primary resource that overworked

More information

www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14

www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14 www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the

More information

Sarbanes-Oxley Compliance for Cloud Applications

Sarbanes-Oxley Compliance for Cloud Applications Sarbanes-Oxley Compliance for Cloud Applications What Is Sarbanes-Oxley? Sarbanes-Oxley Act (SOX) aims to protect investors and the general public from accounting errors and fraudulent practices. For this

More information

CFOs and CIOs: How do you know when to reach for the clouds?

CFOs and CIOs: How do you know when to reach for the clouds? CFOs and CIOs: How do you know when to reach for the clouds? I would like to have a way to allow many different users to have access to data and to have better analytic capabilities should we just move

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

Demystifying Big Data Government Agencies & The Big Data Phenomenon

Demystifying Big Data Government Agencies & The Big Data Phenomenon Demystifying Big Data Government Agencies & The Big Data Phenomenon Today s Discussion If you only remember four things 1 Intensifying business challenges coupled with an explosion in data have pushed

More information

Data Classification Technical Assessment

Data Classification Technical Assessment Data Classification Update: February 13th, 2015 Statement of Confidentiality This Confidential Information is being provided to Customer ABC as a deliverable of this consulting engagement. The sole purpose

More information

IBM i2 Enterprise Insight Analysis for Cyber Analysis

IBM i2 Enterprise Insight Analysis for Cyber Analysis IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics

More information

Keys to success in multi-channel marketing in Japan

Keys to success in multi-channel marketing in Japan Keys to success in multi-channel marketing in Japan Abstract In the US and Europe, we have seen a drastic decline in the number of MRs and a rapid shift towards non-traditional multi-channel marketing

More information

IBM SECURITY QRADAR INCIDENT FORENSICS

IBM SECURITY QRADAR INCIDENT FORENSICS IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise

More information

The Business Benefits of Logging

The Business Benefits of Logging WHITEPAPER The Business Benefits of Logging Copyright 2000-2011 BalaBit IT Security All rights reserved. www.balabit.com 1 Table of Content Introduction 3 The Business Benefits of Logging 4 Security as

More information

IAB Report on Online Advertising Spend The Netherlands Q1 2015. July 2015 DRAFT

IAB Report on Online Advertising Spend The Netherlands Q1 2015. July 2015 DRAFT IAB Report on Online Advertising Spend The Netherlands Q1 2015 July 2015 DRAFT Introduction Since 2010, IAB and Deloitte are publishing the Online Ad Spend Report for the Netherlands. The content of this

More information

How Does Big Data Change Your Way of Managing Information?

How Does Big Data Change Your Way of Managing Information? How Does Big Data Change Your Way of Managing Information? A Best-Practices Guide for Data Managers By Erian Laperi, Director Enterprise Data Management and Business Enablement at AT&T How Does Big Data

More information

Information Technology Policy

Information Technology Policy Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review RA-ITCentral@pa.gov

More information

Using AWS in the context of Australian Privacy Considerations October 2015

Using AWS in the context of Australian Privacy Considerations October 2015 Using AWS in the context of Australian Privacy Considerations October 2015 (Please consult https://aws.amazon.com/compliance/aws-whitepapers/for the latest version of this paper) Page 1 of 13 Overview

More information

Personal Information Threats & Risks: Responding to an Evolving Landscape with an Integrated Data Protection Approach

Personal Information Threats & Risks: Responding to an Evolving Landscape with an Integrated Data Protection Approach Personal Information Threats & Risks: Responding to an Evolving Landscape with an Integrated Data Protection Approach Don MacPherson January 2012 Discussion Items 1. Threats and risks to personal information

More information

Third Party Security: Are your vendors compromising the security of your Agency?

Third Party Security: Are your vendors compromising the security of your Agency? Third Party Security: Are your vendors compromising the security of your Agency? Wendy Nather, Texas Education Agency Michael Wyatt, Deloitte & Touche LLP TASSCC Annual Conference 3 August 2010 Agenda

More information

Big Data better business benefits

Big Data better business benefits Big Data better business benefits Paul Edwards, HouseMark 2 December 2014 What I ll cover.. Explain what big data is Uses for Big Data and the potential for social housing What Big Data means for HouseMark

More information

The Next Wave of Data Management. Is Big Data The New Normal?

The Next Wave of Data Management. Is Big Data The New Normal? The Next Wave of Data Management Is Big Data The New Normal? Table of Contents Introduction 3 Separating Reality and Hype 3 Why Are Firms Making IT Investments In Big Data? 4 Trends In Data Management

More information

Breast Cancer Awareness Campaign Privacy Policy

Breast Cancer Awareness Campaign Privacy Policy Effective Date: September 11, 2015 Breast Cancer Awareness Campaign Privacy Policy The Estée Lauder Companies ( we, us, or our ) respect your concerns about privacy and value the relationship we have with

More information

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data

More information

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance 3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security

More information

WHITE PAPER OCTOBER 2014. Unified Monitoring. A Business Perspective

WHITE PAPER OCTOBER 2014. Unified Monitoring. A Business Perspective WHITE PAPER OCTOBER 2014 Unified Monitoring A Business Perspective 2 WHITE PAPER: UNIFIED MONITORING ca.com Table of Contents Introduction 3 Section 1: Today s Emerging Computing Environments 4 Section

More information

YOUR PRIVACY IS IMPORTANT TO SANDERSONS ARCHIVING SOLUTIONS LIMITED

YOUR PRIVACY IS IMPORTANT TO SANDERSONS ARCHIVING SOLUTIONS LIMITED YOUR PRIVACY IS IMPORTANT TO SANDERSONS ARCHIVING SOLUTIONS LIMITED SANDERSONS ARCHIVING SOLUTIONS LIMITED WEB SITE PRIVACY POLICY Policy last updated: 22 nd December 2014 This Policy is adopted by Sandersons

More information

Future Threat Landscape - How will technology evolve and what does it mean for cyber security?

Future Threat Landscape - How will technology evolve and what does it mean for cyber security? James Hanlon CISSP, CISM Security Strategist Office of the CTO EMEA Future Threat Landscape - How will technology evolve and what does it mean for cyber security? Think > What does the future of technology

More information

A Guide to MAM and Planning for BYOD Security in the Enterprise

A Guide to MAM and Planning for BYOD Security in the Enterprise A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.

More information

Big Data, Integration and Governance: Ask the Experts

Big Data, Integration and Governance: Ask the Experts Big, Integration and Governance: Ask the Experts January 29, 2013 1 The fourth dimension of Big : Veracity handling data in doubt Volume Velocity Variety Veracity* at Rest Terabytes to exabytes of existing

More information

Dematerialisation and document collaboration

Dematerialisation and document collaboration Dematerialisation and document collaboration Marc Halmes Partner Technology & Enterprise Application Deloitte André-Louis Jadot Senior Manager Deloitte Letters, contracts, invitations, invoices, advertising

More information