How To Understand Data Theory

Size: px
Start display at page:

Download "How To Understand Data Theory"

Transcription

1 Predictive Analytics & Business Insights 2015, Chicago Mudit Mangal Project Lead, Data Analytics, Supply Chain Sears Holdings Corporation 06/11/2015

2 Agenda WHAT IS HAPPENING WHAT ARE BENEFITS AND CHALLENGES WITH ANALYTICS WHY DATA FOUNDATION HOW TO APPROACH HOW DATA GOVERNANCE IS ACHIEVED WHAT ARE SECURITY ISSUES AND SOLUTIONS WITH DATA USE CASE WHAT IS NEXT QUSESTIONS

3 New Data Frontiers Fueled by growing demand for anytime anywhere access to information, technology is disrupting all areas of enterprise, driving myriad opportunities and challenges. Enormous opportunities exist for enterprises to take advantage of connected devices enabled by the Internet of Things to capture vast amounts of information. Digital transformation is changing business models pricing strategies, processes, relationship between businesses and customers. Declining PC usage and increasing mobile device adoption is driving a mobile first world. However, the evolution of the digital enterprise also presents significant challenges, including new competition, changing customer engagement and business models, unprecedented transparency, privacy concerns and cybersecurity threats.

4 Digital Frontiers

5 Understanding Analytics

6 360-degree view 360-degree view of all the data is important to know what s happening in a marketplace the combination of structured information, human interactions, and machine-to-machine data.

7 360-degree view in practice In IT operations management, a 360-degree view allows to see logs, performance,it also lets you see what the test team said to the app dev team, what the customers said to the help desk, and what the app support team said to the help desk. In security management, a 360-degree view lets you see security alerts from the network, applications, and infrastructure, while human interaction data allows you to see security threats in s. In retail, a 360-degree view allows you to analyze sales in stores and online, as well as understand consumers expectations,social sentiment regarding the store. What do people think about your service compared to that of your competitors?

8 Dark Data By its definition : Data that was previously ignored because of technology limitations examples includes unstructured data that companies have struggled to analyze in the past, documents, social data, customer surveys, web logs, and a lot of dark structured data.

9 Data Torturing Are you still torturing your data to get what you want?

10 Data Foundation Data is the foundation of all information solutions, BI and analytical decisions and choosing the right technology is important. The data foundation encompasses the integration of data from multiple, disparate sources into a trusted, understandable form for use in analytics and making data as an enterprise asset. The escalating volume, variety, and velocity of information that is being generated today present with many critical challenges. However, this overabundance of information can be an important asset to those organizations that choose to capitalize on it.

11 Components of data foundation

12 Benefits of robust data foundation A robust data foundation provides an organization with tremendous benefits in terms of efficiency and effectiveness in decision making. One-stop shopping for data: Most significant uses of time in decision making is getting the data in usable format. A robust data foundation changes the 80 percent time spent on gathering to 80 percent time spent on analyzing the data. Single version of the truth: Getting different answers to same questions is frustrating experience for decision makers. A robust data foundation provide single version of truth on which everyone can rely. Drives common understanding across the enterprise: One of the key objectives of data foundation is to integrate data from disparate sources. A robust data foundation provides the structure and enforcement of these, resulting everyone in organization working on same page.

13 Consequences of the lack of a robust data foundation Multiple answers to same questions Making less optimal business decisions Wasted time finding, collecting, summarizing data for use in analytics

14 Getting Started: Building Out Analyzing data often requires a transformational approach to many critical IT processes. Ask yourself what data points do I need, how I am going to get them, and what am I going to do with them once I have them? Try building a Distributed platform that is small, low cost, fluent in all forms of data and analytics. E.g. data in motion. Next, identify a low impact use case for implementation. Your application should be a good candidate for Distributed Data Computing. If so, a successful POC will be assured.

15 From Data Lakes To Data Swamps By its definition, a data lake accepts any data, without governance. Without metadata and a mechanism to maintain it, the data lake risks turning into a data swamp and leads to hardest problem of data quality.

16 Big Data without Governance Dumping data into Big Data Lake without repeatable processes and data governance will create messy, uncontrollable data environment. Insights harvested from ungoverned data lake is not reliable and trustworthy, so cannot make business decisions confidently. In an industry where data is the most valuable asset, data integrity is essential. If the data is compromised, it can have vast consequences. Data must be physically safe. Whether data is stored internally or within the cloud, Disaster recovery, security and other actions must be taken to ensure the physical integrity of data. Humans make mistakes. Maintaining data integrity is difficult when humans enter free-form text into software systems.

17 Governance Disciplines

18 Evolving Data Governance

19 Security Risk for Big Data As cyber threats continue to multiply, it is becoming harder to safeguard data, intellectual property, and personal information. Greater use of the internet, smartphones and tablets in combination with bring-your-own-device policies has made organizations data more accessible and vulnerable. More data implies higher risk of exposure. New data types may give rise to new security breach scenarios.

20 Data Lake Security Solutions

21 Evolving Data Security Apache Knox : Perimeter/ Network Security Apache Ranger : Data Protection, Authorization, Audit tracking Apache Sentry : Authorization

22 Retail Use Case Let s face it: when it comes to giving business users the information they need, retail is as tough. With multiple stores, myriad, ever-changing products and constant transactions, every day is a new challenge. Most retailers already have systems in place to provide business users with information. The question is, can to do better? Web-based retail analytic applications extend existing business reporting and analytic solutions. Helps in understanding Customers. Sears has a very intensive big data program to drive customer loyalty, Sears is doing amazing things with technology and Competes On Big Data.

23 Predicting Future

24 Future of Data What kind of data will be Big Data in the future? Structured data - This is the data companies store today: sales transactions, maintenance details. Since Big Data technology allows us to store more data and analyze it much faster, there will be increase in amount of details stored,in the time period for which data is kept. Human interaction data - Unstructured data refers to the data of human interactions: s, phone conversations, video, pictures, documents, social media interactions on Twitter, Facebook and other communities. This type of data represents 90 percent of useful data. Machine to machine data - By 2020 there will have been a massive increase in the number of connected smart devices. Cooktops, shopping carts, home thermostats, cars, bicycles, and refrigerators will run applications that connect to the emerging Internet of Things. These devices will generate huge amounts of data. Collecting and analyzing this data will lead to new insights.

25 Conclusion Reporting and Analytics can be transformational for an organization. However, having the proper data foundation that provides trusted, well-integrated and well-managed data is essential to realize the desired reporting and analytical capabilities. Mapping out a strategy and plan to establish the data foundation is time well spent and will provide a return many times over.

26 Questions?

Optimized for the Industrial Internet: GE s Industrial Data Lake Platform

Optimized for the Industrial Internet: GE s Industrial Data Lake Platform Optimized for the Industrial Internet: GE s Industrial Lake Platform Agenda The Opportunity The Solution The Challenges The Results Solutions for Industrial Internet, deep domain expertise 2 GESoftware.com

More information

Reducing Cyber Risk in Your Organization

Reducing Cyber Risk in Your Organization Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than

More information

!!!!! White Paper. Understanding The Role of Data Governance To Support A Self-Service Environment. Sponsored by

!!!!! White Paper. Understanding The Role of Data Governance To Support A Self-Service Environment. Sponsored by White Paper Understanding The Role of Data Governance To Support A Self-Service Environment Sponsored by Sponsored by MicroStrategy Incorporated Founded in 1989, MicroStrategy (Nasdaq: MSTR) is a leading

More information

data driven government

data driven government Position paper data driven government preparing for the age of the citizen Insights for tomorrow s world Governments are awash with information, and they face a deluge of data as far into the future as

More information

White paper. Ensuring Big Data Security with Identity and Access Management

White paper. Ensuring Big Data Security with Identity and Access Management White paper Ensuring Big Security with Identity and Access Management Summary: Enterprises today are collecting more data than ever before, from a huge variety of sources. This Big presents both an opportunity

More information

Apache Hadoop Patterns of Use

Apache Hadoop Patterns of Use Community Driven Apache Hadoop Apache Hadoop Patterns of Use April 2013 2013 Hortonworks Inc. http://www.hortonworks.com Big Data: Apache Hadoop Use Distilled There certainly is no shortage of hype when

More information

Busin i ess I n I t n e t ll l i l g i e g nce c T r T e r nds For 2013

Busin i ess I n I t n e t ll l i l g i e g nce c T r T e r nds For 2013 Business Intelligence Trends For 2013 10 Trends The last few years the change in Business Intelligence seems to accelerate under the pressure of increased business demand and technology innovations. Here

More information

Whitepaper. How to Implement a Strong BYOD Policy. BYOD on the Rise - But with Challenges

Whitepaper. How to Implement a Strong BYOD Policy. BYOD on the Rise - But with Challenges How to Implement a Strong BYOD Policy Mobility carries with it promises of convenience, productivity, and remarkable amounts of information at everyone s fingertips. While smartphones and other devices

More information

Big Data, Big Risk, Big Rewards. Hussein Syed

Big Data, Big Risk, Big Rewards. Hussein Syed Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data

More information

white paper Big Data for Small Business Why small to medium enterprises need to know about Big Data and how to manage it Sponsored by:

white paper Big Data for Small Business Why small to medium enterprises need to know about Big Data and how to manage it Sponsored by: white paper Big Data for Small Business Why small to medium enterprises need to know about Big Data and how to manage it Sponsored by: Big Data is the ability to collect information from diverse sources

More information

Secure Data Transmission Solutions for the Management and Control of Big Data

Secure Data Transmission Solutions for the Management and Control of Big Data Secure Data Transmission Solutions for the Management and Control of Big Data Get the security and governance capabilities you need to solve Big Data challenges with Axway and CA Technologies. EXECUTIVE

More information

The Power of Risk, Compliance & Security Management in SAP S/4HANA

The Power of Risk, Compliance & Security Management in SAP S/4HANA The Power of Risk, Compliance & Security Management in SAP S/4HANA OUR AGENDA Key Learnings Observations on Risk & Compliance Management Current State Current Challenges The SAP GRC and Security Solution

More information

CONTENTS. Introduction 3. IoT- the next evolution of the internet..3. IoT today and its importance..4. Emerging opportunities of IoT 5

CONTENTS. Introduction 3. IoT- the next evolution of the internet..3. IoT today and its importance..4. Emerging opportunities of IoT 5 #924, 5 A The catchy phrase Internet of Things (IoT) or the Web of Things has become inevitable to the modern world. Today wireless technology has reached its zenith making it possible to interact with

More information

Optimized for the Industrial Internet: GE s Industrial Data Lake Platform

Optimized for the Industrial Internet: GE s Industrial Data Lake Platform Optimized for the Industrial Internet: GE s Industrial Lake Platform Agenda Opportunity Solution Challenges Result GE Lake 2 GESoftware.com @GESoftware #IndustrialInternet Big opportunities with Industrial

More information

WhitePaper. Private Cloud Computing Essentials

WhitePaper. Private Cloud Computing Essentials Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....

More information

REDEFINE BIG DATA: BECOMING A DATA-DRIVEN BUSINESS WITH THE EMC BUSINESS DATA LAKE CHRIS HARROLD, GLOBAL CTO, BIG DATA SOLUTIONS

REDEFINE BIG DATA: BECOMING A DATA-DRIVEN BUSINESS WITH THE EMC BUSINESS DATA LAKE CHRIS HARROLD, GLOBAL CTO, BIG DATA SOLUTIONS 1 REDEFINE BIG DATA: BECOMING A DATA-DRIVEN BUSINESS WITH THE EMC BUSINESS DATA LAKE CHRIS HARROLD, GLOBAL CTO, BIG DATA SOLUTIONS 2 REDEFINE BIG DATA: BECOMING A DATA-DRIVEN BUSINESS WITH THE #ULTRADATAFORTRESS

More information

MES and Industrial Internet

MES and Industrial Internet October 7, 2014 MES and Industrial Internet Jan Snoeij Board Member, MESA International Principal Consultant, CGI Do you know MESA? Agenda Introduction Internet of Things Big Data Smart Factory or Smart

More information

The Need is Now: Incorrect or insufficient data about any product means it s instantly out of the running.

The Need is Now: Incorrect or insufficient data about any product means it s instantly out of the running. A CG T W h i t e p a p e r The Need is Now: Meeting Retail Demand for Digital Content Today s retail marketplace is all about the empowered consumer, and much of that power comes from access to information.

More information

DATAOPT SOLUTIONS. What Is Big Data?

DATAOPT SOLUTIONS. What Is Big Data? DATAOPT SOLUTIONS What Is Big Data? WHAT IS BIG DATA? It s more than just large amounts of data, though that s definitely one component. The more interesting dimension is about the types of data. So Big

More information

The New Normal: Get Ready for the Era of Extreme Information Management. John Mancini President, AIIM @jmancini77 DigitalLandfill.

The New Normal: Get Ready for the Era of Extreme Information Management. John Mancini President, AIIM @jmancini77 DigitalLandfill. The New Normal: Get Ready for the Era of Extreme Information Management John Mancini President, AIIM @jmancini77 DigitalLandfill.org Giving Credit Where Credit is Due I didn t make up the term Extreme

More information

Splunk Company Overview

Splunk Company Overview Copyright 2015 Splunk Inc. Splunk Company Overview Name Title Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected

More information

Addressing Big Data Security Challenges: The Right Tools for Smart Protection

Addressing Big Data Security Challenges: The Right Tools for Smart Protection Addressing Big Data Security Challenges: The Right Tools for Smart Protection Trend Micro, Incorporated A Trend Micro White Paper September 2012 EXECUTIVE SUMMARY Managing big data and navigating today

More information

Assessing the strength of your security operating model

Assessing the strength of your security operating model www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems

More information

A strategic approach to fraud

A strategic approach to fraud A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for

More information

Cybersecurity and internal audit. August 15, 2014

Cybersecurity and internal audit. August 15, 2014 Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices

More information

IBM Data Security Services for endpoint data protection endpoint encryption solution

IBM Data Security Services for endpoint data protection endpoint encryption solution Protecting data on endpoint devices and removable media IBM Data Security Services for endpoint data protection endpoint encryption solution Highlights Secure data on endpoint devices Reap benefits such

More information

Big Data overview. Livio Ventura. SICS Software week, Sept 23-25 Cloud and Big Data Day

Big Data overview. Livio Ventura. SICS Software week, Sept 23-25 Cloud and Big Data Day Big Data overview SICS Software week, Sept 23-25 Cloud and Big Data Day Livio Ventura Big Data European Industry Leader for Telco, Energy and Utilities and Digital Media Agenda some data on Data Big Data

More information

Big Data Comes of Age: Shifting to a Real-time Data Platform

Big Data Comes of Age: Shifting to a Real-time Data Platform An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SAP April 2013 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Table of Contents Introduction... 1 Drivers of Change...

More information

Secure Enterprise Mobility Management. Cloud-Based Enterprise Mobility Management. White Paper: soti.net

Secure Enterprise Mobility Management. Cloud-Based Enterprise Mobility Management. White Paper: soti.net Secure Enterprise Mobility Management White Paper: Cloud-Based Enterprise Mobility Management soti.net Background Facing a business environment of constant change and increasing complexity, enterprises

More information

Web Protection for Your Business, Customers and Data

Web Protection for Your Business, Customers and Data WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision

More information

The Cloud for Insights

The Cloud for Insights The Cloud for Insights A Guide for Small and Medium Business As the volume of data grows, businesses are using the power of the cloud to gather, analyze, and visualize data from internal and external sources

More information

DATAMEER WHITE PAPER. Beyond BI. Big Data Analytic Use Cases

DATAMEER WHITE PAPER. Beyond BI. Big Data Analytic Use Cases DATAMEER WHITE PAPER Beyond BI Big Data Analytic Use Cases This white paper discusses the types and characteristics of big data analytics use cases, how they differ from traditional business intelligence

More information

7 Megatrends Driving the Shift to Cloud Business Intelligence

7 Megatrends Driving the Shift to Cloud Business Intelligence 7 Megatrends Driving the Shift to Cloud Business Intelligence Cloud business intelligence has the potential to unify all data, make it available to everyone and enable highly agile decision-making. Here

More information

W H I T E P A P E R. Deriving Intelligence from Large Data Using Hadoop and Applying Analytics. Abstract

W H I T E P A P E R. Deriving Intelligence from Large Data Using Hadoop and Applying Analytics. Abstract W H I T E P A P E R Deriving Intelligence from Large Data Using Hadoop and Applying Analytics Abstract This white paper is focused on discussing the challenges facing large scale data processing and the

More information

Simplifying Security & Compliance Innovating IT Managed Services. Data Security Threat Landscape and IT General Controls

Simplifying Security & Compliance Innovating IT Managed Services. Data Security Threat Landscape and IT General Controls Simplifying Security & Compliance Innovating IT Managed Services Data Security Threat Landscape and IT General Controls Audit Standards and IT General Controls General IT controls discussed in AUC Section

More information

BEAT THE ELITE HOW TO USE CRM TO OUT COMPETE YOUR RIVALS.

BEAT THE ELITE HOW TO USE CRM TO OUT COMPETE YOUR RIVALS. BEAT THE ELITE HOW TO USE CRM TO OUT COMPETE YOUR RIVALS. 1 CONTENTS INTRODUCTION 2 ACHIEVE TARGETED MARKETING 6 CUSTOMER SERVICE AND SATISFACTION 3 EMPOWER STAFF WITH MOBILE CRM 7 DON T RELY ON SPREAD

More information

Torquex Customer Engagement Analytics. End to End View of Customer Interactions and Operational Insights

Torquex Customer Engagement Analytics. End to End View of Customer Interactions and Operational Insights Torquex Customer Engagement Analytics End to End View of Customer Interactions and Operational Insights Rob Witthoft Torquex {Pty) Ltd 10/1/2015 Torquex Customer Engagement Analytics Torquex Customer Engagement

More information

Teradata and Protegrity High-Value Protection for High-Value Data

Teradata and Protegrity High-Value Protection for High-Value Data Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:

More information

The Cloud for Insights

The Cloud for Insights The Cloud for Insights A Guide for Small and Midsize Business As the volume of data grows, businesses are using the power of the cloud to gather, analyze, and visualize data from internal and external

More information

Splunk Operational Visibility

Splunk Operational Visibility Copyright 2015 Splunk Inc. Splunk Operational Visibility Matthias Maier Sales Engineer, CISSP Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding

More information

Big Data: How can it enhance your strategy?

Big Data: How can it enhance your strategy? 7 Big Data: How can it enhance your strategy? Practice Area: IT Strategy Topic Area: Big Data Connecting the data dots for better strategic decisions Data is essential for organisations looking for answers

More information

Under the Digital Dome: State IT Priorities, Trends and Perspectives

Under the Digital Dome: State IT Priorities, Trends and Perspectives Under the Digital Dome: State IT Priorities, Trends and Perspectives Best Practices Exchange 2014 Conference Montgomery, Alabama November 19, 2014 Doug Robinson, Executive Director National Association

More information

Seven Simple steps. For Mobile Device Management (MDM) 1. Why MDM? Series

Seven Simple steps. For Mobile Device Management (MDM) 1. Why MDM? Series Series Seven Simple steps For Mobile Device Management (MDM) Mobile device management (MDM) has become a necessity across the globe due to the ever expanding and developing world of technology; Technavio

More information

1. Understanding Big Data

1. Understanding Big Data Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte

More information

Sources: Summary Data is exploding in volume, variety and velocity timely

Sources: Summary Data is exploding in volume, variety and velocity timely 1 Sources: The Guardian, May 2010 IDC Digital Universe, 2010 IBM Institute for Business Value, 2009 IBM CIO Study 2010 TDWI: Next Generation Data Warehouse Platforms Q4 2009 Summary Data is exploding

More information

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

2011 Cyber Security and the Advanced Persistent Threat A Holistic View 2011 Cyber and the Advanced Persistent Threat A Holistic View Thomas Varney Cybersecurity & Privacy BM Global Business Services 1 31/10/11 Agenda The Threat We Face A View to Addressing the Four Big Problem

More information

Three Tech Trends that will drive Retail and how GS1 is part of them

Three Tech Trends that will drive Retail and how GS1 is part of them Three Tech Trends that will drive Retail and how GS1 is part of them Gernot Gutjahr Partner KPMG AG CIO & Sourcing Advisory September 2014 KPMG is convinced digital disruption for Retail will grow KEY

More information

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious

More information

Information Security in Business: Issues and Solutions

Information Security in Business: Issues and Solutions Covenant University Town & Gown Seminar 2015 Information Security in Business: Issues and Solutions A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information

More information

White Label Reseller Program

White Label Reseller Program White Label Reseller Program www.ireachapps.com/reseller 1 Start Your Own Mobile App Company ireach Apps is making mobile apps affordable and simple for small businesses. We re a do-it-yourself iphone,

More information

OECD PROJECT ON CYBER RISK INSURANCE

OECD PROJECT ON CYBER RISK INSURANCE OECD PROJECT ON CYBER RISK INSURANCE Introduction 1. Cyber risks pose a real threat to society and the economy, the recognition of which has been given increasingly wide media coverage in recent years.

More information

Italy. EY s Global Information Security Survey 2013

Italy. EY s Global Information Security Survey 2013 Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information

More information

Cyber Situational Awareness for Enterprise Security

Cyber Situational Awareness for Enterprise Security Cyber Situational Awareness for Enterprise Security Tzvi Kasten AVP, Business Development Biju Varghese Director, Engineering Sudhir Garg Technical Architect The security world is changing as the nature

More information

The disruptive power of big data

The disruptive power of big data Business white paper How big data analytics is transforming business The disruptive power of big data Table of contents 3 Executive overview: The big data revolution 4 The big data imperative 4 Why big

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Industry Impact of Big Data in the Cloud: An IBM Perspective

Industry Impact of Big Data in the Cloud: An IBM Perspective Industry Impact of Big Data in the Cloud: An IBM Perspective Inhi Cho Suh IBM Software Group, Information Management Vice President, Product Management and Strategy email: inhicho@us.ibm.com twitter: @inhicho

More information

Key Cyber Risks at the ERP Level

Key Cyber Risks at the ERP Level Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche

More information

Mind Commerce. http://www.marketresearch.com/mind Commerce Publishing v3122/ Publisher Sample

Mind Commerce. http://www.marketresearch.com/mind Commerce Publishing v3122/ Publisher Sample Mind Commerce http://www.marketresearch.com/mind Commerce Publishing v3122/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

Cybersecurity. Considerations for the audit committee

Cybersecurity. Considerations for the audit committee Cybersecurity Considerations for the audit committee Insights on November 2012 governance, risk and compliance Fighting to close the gap Ernst & Young s 2012 Global Information Security Survey 2012 Global

More information

Elevate Customer Experience and Engagement in the New Digital World

Elevate Customer Experience and Engagement in the New Digital World Elevate Customer Experience and Engagement in the New Digital World John Chan CRM Solutions Lead, Microsoft Business Solutions Microsoft Asia Customer buying behavior has fundamentally changed therefore,

More information

Datacenter Hosting - The Best Form of Protection

Datacenter Hosting - The Best Form of Protection Datacenter Hosting Scalable Technology and Insurance for Your Business nsacom.com Datacenter Hosting Scalable Technology and Insurance for Your Business Datacenter Hosting Gives You the Best of Both Worlds

More information

Zero-in on business decisions through innovation solutions for smart big data management. How to turn volume, variety and velocity into value

Zero-in on business decisions through innovation solutions for smart big data management. How to turn volume, variety and velocity into value Zero-in on business decisions through innovation solutions for smart big data management How to turn volume, variety and velocity into value ON THE LOOKOUT FOR NEW SOURCES OF VALUE CREATION WHAT WILL DRIVE

More information

White paper. The Big Data Security Gap: Protecting the Hadoop Cluster

White paper. The Big Data Security Gap: Protecting the Hadoop Cluster The Big Data Security Gap: Protecting the Hadoop Cluster Introduction While the open source framework has enabled the footprint of Hadoop to logically expand, enterprise organizations face deployment and

More information

Multichannel Customer Care

Multichannel Customer Care Multichannel Customer Care The changing landscape in customer communication provides a unique opportunity to combine the assets of our outsource services division (call center and network) with our social

More information

White Paper. Growing your business with APIs.

White Paper. Growing your business with APIs. White Paper Growing your business with APIs. Mobile and digital technologies have changed the way we live. Consumers are doing business with all kinds of companies via apps and mobile devices. We expect

More information

Opportunity of cloud computing for logistics

Opportunity of cloud computing for logistics Opportunity of cloud computing for logistics Michele Colajanni Università di Modena e Reggio Emilia http://weblab.ing.unimo.it/people/colajanni/ http://cris.unimore.it Logistics is movement and communication

More information

EMPOWERING YOUR BI INVESTMENT

EMPOWERING YOUR BI INVESTMENT EMPOWERING YOUR BI INVESTMENT BI Costs Containment, Risk Mitigation In today's economic climate, the importance of cost containment and risk mitigation has increased, even as staffing levels have been

More information

Enhancing Cybersecurity with Big Data: Challenges & Opportunities

Enhancing Cybersecurity with Big Data: Challenges & Opportunities Enhancing Cybersecurity with Big Data: Challenges & Opportunities Independently Conducted by Ponemon Institute LLC Sponsored by Microsoft Corporation November 2014 CONTENTS 2 3 6 9 10 Introduction The

More information

Forces of Change: Perspectives and Trends on State Information Technology 2015 Annual NAJIS Conference October 6, 2015

Forces of Change: Perspectives and Trends on State Information Technology 2015 Annual NAJIS Conference October 6, 2015 Forces of Change: Perspectives and Trends on State Information Technology 2015 Annual NAJIS Conference October 6, 2015 Doug Robinson, Executive Director National Association of State Chief Information

More information

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG ON POWERFUL RELEVANT PERFORMANCE SOLUTION CLOU IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN VI

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG ON POWERFUL RELEVANT PERFORMANCE SOLUTION CLOU IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN VI ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG ON POWERFUL RELEVANT PERFORMANCE SOLUTION CLOU IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN VI WHITE PAPER Business and Revenue Challenges of Big Data

More information

How To Understand The Power Of The Internet Of Things

How To Understand The Power Of The Internet Of Things Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,

More information

How To Monitor Your Business

How To Monitor Your Business IT as a Business Game Changer 7 Keys to Get You There 1 IT as a Business Game Changer may in Monitoring your 7 Keys find company. yourself network If you have systems recognized and applications the need

More information

30 BILLION RISKS AND REWARDS OF CONNECTED DEVICES THE INTERNET OF THINGS CYBER LANDSCAPE TODAY

30 BILLION RISKS AND REWARDS OF CONNECTED DEVICES THE INTERNET OF THINGS CYBER LANDSCAPE TODAY RISKS AND REWARDS OF CONNECTED DEVICES THE HIDDEN INTERNET OF THINGS ISACA 2015 IT RISK / REWARD BAROMETER The Internet of Things paints a vision of a carefree, seamlessly connected world where interconnected

More information

Big Data: Overview and Roadmap. 2015 eglobaltech. All rights reserved.

Big Data: Overview and Roadmap. 2015 eglobaltech. All rights reserved. Big Data: Overview and Roadmap 2015 eglobaltech. All rights reserved. What is Big Data? Large volumes of complex and variable data that require advanced techniques and technologies to enable capture, storage,

More information

Evaluate the Usability of Security Audits in Electronic Commerce

Evaluate the Usability of Security Audits in Electronic Commerce Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka

More information

Under control 2015 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint

Under control 2015 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint Under control 2015 Hot topics for IT internal audit in financial services An Internal Audit viewpoint Introduction Welcome to our fourth annual review of the IT hot topics for IT internal audit in financial

More information

Telecommunications Point of View October 2014

Telecommunications Point of View October 2014 for a Smarter Planet Telecommunications Point of View October 2014 Peter Harrison Smarter Planet Industry Solutions Leader Central and Eastern Europe IBM Software Group Peter.Harrison@pl.ibm.com +48 693

More information

Deploying Big Data to the Cloud: Roadmap for Success

Deploying Big Data to the Cloud: Roadmap for Success Deploying Big Data to the Cloud: Roadmap for Success James Kobielus Chair, CSCC Big Data in the Cloud Working Group IBM Big Data Evangelist. IBM Data Magazine, Editor-in- Chief. IBM Senior Program Director,

More information

Cloud security architecture

Cloud security architecture ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide

More information

FIVE INDUSTRIES. Where Big Data Is Making a Difference

FIVE INDUSTRIES. Where Big Data Is Making a Difference FIVE INDUSTRIES Where Big Data Is Making a Difference To understand how Big Data can transform businesses, we have to understand its nature. Although there are numerous definitions of Big Data, many will

More information

BIG DATA FUNDAMENTALS

BIG DATA FUNDAMENTALS BIG DATA FUNDAMENTALS Timeframe Minimum of 30 hours Use the concepts of volume, velocity, variety, veracity and value to define big data Learning outcomes Critically evaluate the need for big data management

More information

Sage 300 ERP 2014 Get more done.

Sage 300 ERP 2014 Get more done. Sage 300 ERP 2014 Get more done. Get more done by connecting your business, providing a better customer experience, and increasing revenue. New web and mobile functionality: driving better customer experiences

More information

The cloud - ULTIMATE GAME CHANGER ===========================================

The cloud - ULTIMATE GAME CHANGER =========================================== The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud

More information

What Data? I m A Trucking Company!

What Data? I m A Trucking Company! What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 marc.tucker@smithmoorelaw.com Presented by: Rob D. Moseley, Jr. 2 West

More information

www.pwc.com Cybersecurity and Privacy Hot Topics 2015

www.pwc.com Cybersecurity and Privacy Hot Topics 2015 www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets

More information

Guide to Information Governance: A Holistic Approach

Guide to Information Governance: A Holistic Approach E-PAPER DECEMBER 2014 Guide to Information Governance: A Holistic Approach A comprehensive strategy allows agencies to create more reliable processes for ediscovery, increase stakeholder collaboration,

More information

Top 4 Common Mistakes Made by IT Managers in Financial Services

Top 4 Common Mistakes Made by IT Managers in Financial Services Top 4 Common Mistakes Made by IT Managers in Financial Services www.axcient.com A trend affecting companies everywhere but especially in financial services is the explosion of data. As stated in Accenture

More information

TECHNOLOGY IT ROADMAP SERVICE CORE

TECHNOLOGY IT ROADMAP SERVICE CORE BE FREE BE FREE OF TECHNOLOGY IT ROADMAP SERVICE CORE TALK TO OUR EXPERTS 1.877.222.8615 www.bestit.com WHY GET AN IT ROADMAP? Enterprise competitive performance is a critical differentiator in today s

More information

2012 NCSA / Symantec. National Small Business Study

2012 NCSA / Symantec. National Small Business Study 2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National

More information

Addressing Open Source Big Data, Hadoop, and MapReduce limitations

Addressing Open Source Big Data, Hadoop, and MapReduce limitations Addressing Open Source Big Data, Hadoop, and MapReduce limitations 1 Agenda What is Big Data / Hadoop? Limitations of the existing hadoop distributions Going enterprise with Hadoop 2 How Big are Data?

More information

Top 10 Business Intelligence Trends - 2013

Top 10 Business Intelligence Trends - 2013 Enclosed is the white paper you requested. Top 10 Business Intelligence Trends - 2013 This whitepaper compliments of: Empower Business Solutions www.em-powered.com 3900 Industrial Park Drive Suite 5 Altoona,

More information

BlackBerry Business Solutions. Welcome to a world where your

BlackBerry Business Solutions. Welcome to a world where your BlackBerry Business Solutions Welcome to a world where your business goes with you. What you ll find inside: BlackBerry Business Solutions In an ideal world, your business would be everywhere you are.

More information

Business Analytics In a Big Data World Ted Malone Solutions Architect Data Platform and Cloud Microsoft Federal

Business Analytics In a Big Data World Ted Malone Solutions Architect Data Platform and Cloud Microsoft Federal Business Analytics In a Big Data World Ted Malone Solutions Architect Data Platform and Cloud Microsoft Federal Information has gone from scarce to super-abundant. That brings huge new benefits. The Economist

More information

Always Worry About Cyber Security. Always. Track 4 Session 8

Always Worry About Cyber Security. Always. Track 4 Session 8 Always Worry About Cyber Security. Always. Track 4 Session 8 Mark Stevens SVP, Global Services and Support Digital Guardian MStevens@DigitalGuardian.com 781-902-7818 www.digitalguardian.com 2 Abstract

More information

Big Data Integration: A Buyer's Guide

Big Data Integration: A Buyer's Guide SEPTEMBER 2013 Buyer s Guide to Big Data Integration Sponsored by Contents Introduction 1 Challenges of Big Data Integration: New and Old 1 What You Need for Big Data Integration 3 Preferred Technology

More information

Look around any workplace and you see Information Technology (IT) assets. If you are working in an average office environment, you probably have a

Look around any workplace and you see Information Technology (IT) assets. If you are working in an average office environment, you probably have a 1 Look around any workplace and you see Information Technology (IT) assets. If you are working in an average office environment, you probably have a computer monitor with a CPU at your desk along with

More information

Big Data Challenges and Success Factors. Deloitte Analytics Your data, inside out

Big Data Challenges and Success Factors. Deloitte Analytics Your data, inside out Big Data Challenges and Success Factors Deloitte Analytics Your data, inside out Big Data refers to the set of problems and subsequent technologies developed to solve them that are hard or expensive to

More information

Stay ahead of insiderthreats with predictive,intelligent security

Stay ahead of insiderthreats with predictive,intelligent security Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz sarah.cucuz@spyders.ca IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent

More information