Information Governance 2.0 A DOCULABS WHITE PAPER
|
|
|
- Wendy Ruby Fox
- 10 years ago
- Views:
Transcription
1 Information Governance 2.0 A DOCULABS WHITE PAPER
2 Information governance is the control of an organization s information to meet its regulatory, litigation, and risk objectives. Effectively managing and governing information requires that an organization know what information it has, where it is stored, and how it is shared. When it comes to information governance, many financial services firms focus primarily on risk reduction and in the process, they fail to realize the intrinsic value of their information. In this white paper, Doculabs outlines a framework for how firms can dramatically improve their control functions and make information governance a source of competitive advantage. ype here] [T
3 Next-Generation Information Governance Financial services firms face a unique set of challenges in putting information governance (IG) in place. IG efforts tend to be tactical across the various control functions, with siloed work functions and inconsistent processes, roles, standards, and metrics across these areas. The result is many firms struggle to ensure that their records are not just secure, but also easy to locate and access. Business Functions Control Functions Information Governance Structure: The Ideal State Doculabs has worked with the leading financial services firms, and we contend that IG can serve as a source of competitive advantage and deliver significant strategic value. Many firms do not understand the true value of their information. Having focused their IG efforts primarily on risk reduction, they have failed to realize the intrinsic value of the information itself (including brand, customer data, knowledge from research and product development efforts, etc.) information that can be leveraged to generate revenue, improve operational efficiency, and increase competitive advantage. This white paper outlines Doculabs framework for next-generation information governance: an approach to IG that allows the lower levels of the organization to achieve additional utility from information management, and, as a derivative, enable additional governance. We provide an overview of the framework for an aligned program for information governance, looking at each of its constituent categories and current best practices for each. Then we close by helping you make the business case for an IG initiative in your own organization. 3
4 Three Keys to Success 1. Make information management an embedded part of operational excellence. Improving information management can improve operational efficiency for business processes, while also positioning the business for improved information governance. Just as quality was recognized as critically important to operational excellence in the 1980s, so too must information management competencies be recognized today. 2. Integrate the autonomous, and sometimes redundant, activities across the compliance, risk, information security, privacy, and records management functions. The processes employed for each function are similar in nature (e.g. interrogate data, identify vulnerabilities or gaps, remediate, etc.), and can be better coordinated to become more effective and less disruptive to the business. 3. Discern the valuable and/or risky information and prioritize efforts and investment. Information security today protects all systems and data indiscriminately, using monitoring, firewalls, endpoint protection, etc. The current approaches are not sustainable, given the growth of information and the explosion of access points due to mobile users. Identifying the most valuable information and that which presents greatest risk enables the Information Security function to prioritize its efforts and invest its time and resources appropriately. Program Evolution: Creating Value The overall goal for maturing an information governance program is to evolve from a cost of doing business (satisfactory), to an efficient operation, to one providing business value. Efficiency can be achieved by delivering the same service with far fewer resource (e.g. through consolidation and elimination of redundancy) or by using third-party service providers that enable a portion of costs to be variabilized instead of fixed increasing and decreasing as demand for services fluctuates. Value can be achieved by showing how information governance enables core business processes. For example, sales teams find the latest proposal to collaborate upon, client data is maintained in the customer service system to make access simpler, and marketing teams don t waste resources recreating digital assets. 4
5 Doculabs Information Governance Framework Within any financial services firm, a wide range of constituents or domains are involved in information governance. The list below identifies these constituents and their respective roles within the information governance framework: 5
6 Improving information governance (IG) requires much more than just policies or technology. It also requires elements such as organizational resources, structure, standard practices, and communications and training. As many firms have learned, implementing technology without sufficient attention to these other areas will hinder adoption. Doculabs has identified eight key categories of an overall information governance framework for many firms: Doculabs consulting engagements address all of the categories of the IG Framework. The following subsections address these categories, defining the role that each plays in information governance and some of the key challenges it presents, with high-level recommendations for how to address those challenges in your own organization. 6
7 INFORMATION ARCHITECTURE Information Architecture: The manner in which information is organized. This includes a content taxonomy or organizational hierarchy, a records plan and retention schedule, and a content map of the organization s electronically stored information (ESI) and of its content repositories. Most financial services firms have many different systems and applications in use, making it far too cumbersome for users to store and manage their data and content. There are too many steps, and in many instances the taxonomies used don t make sense to users. In addition, poor information architecture makes it more difficult for Information Security to monitor and protect high-risk, high-value corporate information. Doculabs recommends that a firm standardize on a very small set of global metadata fields (i.e. tags) that are automatically assigned or which require minimal effort for users to add. Then configure systems to inherit metadata values and to pre-populate user-required metadata fields where possible. Finally, we recommend mapping information security metadata fields (e.g. PII/PCI flags, confidentiality level) to other metadata fields (e.g. document type, department ID) to allow for automatic assignment of information. The benefits of putting an information architecture in place include improved end user satisfaction, as users can find information more easily. From the risk standpoint, the information architecture enables better visibility into the information security risk of the firm s information, as well as improved ability to manage high-value, high-risk information according to information security policies and procedures. And because all information can be tagged according to records management criteria, it can more easily be evaluated to meet retention and disposition requirements. Core Elements of an Information Architecture 7
8 INFORMATION MANAGEMENT POLICIES AND PROCEDURES Policies and Procedures: The organization s rules for how information will be managed and governed. These include the policies that the organization and its employees must follow (the what ) and the accompanying procedures for complying with the policy (the how ). While the financial services firms we work with expect all employees to be aware of and comply with all information management policies and procedures that pertain to their work, we also find that the relevant policies and procedures for information management aren t organized systematically, and there may be gaps and overlaps in how they cover compliance and risk requirements. And, increasingly, we see policies and procedures that are outdated either they address technologies that firms no longer widely use, or they fail to address emerging technologies whose use is proliferating. Best practices for information management policies and procedures include using a comprehensive matrix of policies and procedures that explicitly prioritizes compliance requirements, identifies gaps and overlaps in requirements, and maps the requirements to existing and required policies and procedures. We recommend starting with the most demanding regulatory, security, and privacy requirements industry standard requirements that comprehensively cover more specific requirements. Then develop and/or remediate policies and procedures to address any remaining gaps, consolidating them according to a lifecycle development and maintenance methodology for policies and procedures. Key Framework Artifacts PROCESSES Processes: The overall processes used to support IG. These include processes to evaluate the maturity of various IG domains (e.g. records RIM, information security, and compliance) and remediate any control gaps, as well as more specialized processes such as e- discovery. At most financial services firms, the privacy, risk, compliance, and information management functions each have their own independent processes process that are likely to be partially redundant. And each of these functions engages the business functions, inquiring about the nature of the data and content they produce, manage, and consume, toward determining whether it contains PII, how long it should it be retained, and whether it s subject to legal hold. The problem is that business units tend to consider their information management needs narrowly i.e. considering the minimum needed to meet requirements today because they typically don t have the skills or processes in place to fully vet their long-term opportunities. 8
9 Doculabs recommends consolidating processes associated with privacy, risk, and records, as well as information security and compliance, to the extent possible. We further recommend coordinating the process through which the control functions interact with the business in order to present a more holistic view of what the business areas should be prepared to provide and minimize disruption. Future State Processes for Information Governance TECHNOLOGY Technology: The tools and technologies used or leveraged for managing information and enabling its retention, accessibility, security, and protection, and disposition. These can include technologies and capabilities for data quality, RIM, management, data archiving, information security, DLP, and e-discovery, among others. Where information governance is concerned, the current technology landscape offers tolls with overlapping tools, in various stages of maturity. The technologies at many financial services firms today are a direct reflection of this fractured landscape. Making matters worse, the investments made in software and the maintenance for these heterogeneous systems are neither scalable nor sustainable. Moreover, none of these capabilities are truly integrated into the business processes they support, resulting in swivel chair integration as users must jump from system to system to complete a process, which introduces manual steps as well as opportunities for error. The following figure shows Doculabs recommended technology stack, as a guide for where to make portfolio investments over the next 3 years. Specifically, we recommend investing in the foundational capabilities first, such as content and data management and information security, then augmenting them with more advanced records and GRC capabilities. Depending on your firm s maturity in unstructured content, you may need to focus on areas such as content analytics and content tagging systems and protocols within the Capture and Access components. Finally, use your information security tools to protect valuable information, as opposed to low-value, low-risk data. Many firms dilute the value of these tools because they use them to protect all information, whether valuable or worthless, at the same level. 9
10 Information Technology Solutions: An Integrated View ROLES AND RESPONSIBILITIES Roles and Responsibilities: The organizational structure and roles for the IG program and the various IT subdomains, and the roles and responsibilities for the individual business units as they pertain to the IG disciplines. Many firms present critical shortcomings in their current roles and responsibilities for Information Governance, with undefined data and information ownership, system administration, and custodial discipline within business units. At some firms, a further problem is the lack of enterprise resources to assist business units in determining their information governance and information management needs. Doculabs recommends consolidating the various control functions Risk, Compliance, Privacy, and Records at the enterprise level to assist business units with their various control responsibilities. (Note, however, that records coordinators should continue to reside within the business functions.) In general, Risk, Privacy, and Compliance will each have a team lead. Legal should remain in the corporate litigation group, with a dotted line into the control group. 10
11 PROGRAM GOVERNANCE Program Governance: The definition of the overall strategy and approach for oversight of corporate information, and the decision rights across all IG subdomains, including prioritization, resolving conflicts among IG subdomains, and budget approval processes such as e-discovery. Many firms do not have in place the various coordinating activities that ensure priorities and funding are applied to the stated objectives around information compliance and risk. In particular, they lack an overall strategy for addressing the various control functions. In the absence of such a strategy, each business has developed its own priorities in light of corporate mandates, but with different levels of investment and different processes and responsibilities. Doculabs recommends establishing a cross-functional steering committee to set the overall budget for the program and allocation of resources between enterprise and business-lead projects. Just as important, the business areas need direct line-of-sight into the enterprise objectives and priorities, via regular communications and involvement in monthly and quarterly meetings. FINANCIALS AND METRICS Financials and Metrics: The overall financial management and planning for the IG function, and the tracking of defined metrics within the program; the valuation of information as an asset. At many firms, business units view the costs of information governance as a corporate tax, with little ability to control the costs as they improve their information management capabilities. The problem is further complicated by the fact that few metrics exist on the efficiency of governance functions. But it s also the case that, in the financial service industry as a whole, the value of information is neither well understood nor differentiated. For example, we ve often seen content associated with critical new product development comingled with dated interdepartmental correspondence, with no differentiation in the manner in which the more valuable information is handled or managed. Doculabs recommends that firms identify a set of primary metrics to monitor the performance of the different governance functions both proactive (e.g. number of training sessions, number of individuals certified, etc.) as well as outcomes (number of incidents, number of audit findings, etc.). Recognize that units of work are very difficult to define for compliance, risk, information security, and privacy so focus on simple tasks (e.g. system enhancements, projects, events) to develop a baseline from which initial statistics can be measured. Sample Metrics 11
12 Also identify the broad categories of information under management. Differentiate the systems that house valuable information and/or accessrestricted information from those housing less valuable/less restricted information; then focus information management improvements on the systems housing the more valuable information. Finally, introduce information utilization into managerial metrics. Business unit managers will need to understand both the costs and benefits of more effective management of information. Many managers understand systems costs (allocations for desktops, specific applications, etc.), but information flowing through the systems is not typically assigned a value or cost. Use Information Utilization measurement (percentage of data managed appropriately with systems). COMMUNICATIONS AND TRAINING Communications and Training: The mechanisms used to educate the user community and improve adoption of the solutions, practices, and guidelines for information and knowledge management and collaboration. Training on tools at most firms tends to consist of one-time events or onesize-fits-all training, with insufficient guidance for users to help them after the initial training. Doculabs recommends adding new resources to provide more day-to-day guidance and reinforcement, giving users access to people who can give them practical guidance in the context of the work they do. It s also important to create a structured onboarding process for new hires, to establish expectations upfront. For reinforcement, focus on ongoing communication of information in smaller chunks, such as checklists, tips, and user guidelines focused on particular tasks (e.g. documents and ) or aspects of using key systems and business applications. Keeping the communications drum-beat going also reminds users that they have resources available to help them. Once the information governance program has been operationalized, the program will include multiple communication mechanisms and touch points, and will involve participants at different levels in the program. The table on the next page presents Doculabs recommendations for program-level communications. Regular communications are critical to operationalizing an IG program, as well as for ongoing reinforcement of new practices. 12
13 When Who What Annual Program Review Annual Program Planning Quarterly Program-level Reviews Monthly Operational Reviews Annual Vendor Reviews Monthly Health Check Reviews Quarterly Health Check Reviews Information Governance Steering Committee/Board Governance Program Management members Governance Program Management (IT Leads) Governance Program Management (IT Leads) Execution Teams Governance Program Management (IT Leads) IT Leads Data Owners Doc Controllers IT Leads Business Sponsors Review strategic plan and direction for the Information Governance program Review program-level accomplishments and key metrics Address any organizational alignment requirements or issues related to areas such as Legal, Records Management, and Information Security Confirm resource requirements Finalize strategic plan and roadmap for the year Aggregate metrics and reporting for Governance Board annual review Identify issues and opportunities to address with the Governance Board Maintain and refresh the strategic roadmap as needed Review Information Governance program and system metrics; identify concerns and risks; agree upon mitigation plans Review Information Governance procedures and usage guidelines; ensure alignment with legal and records management requirements Communicate gaps, needs, and planned changes to the Information Governance architecture Review Information Governance project delivery and solution provisioning metrics for the month Review resource utilization and current workload; agree upon resource adjustments as needed Review Information Governance project pipeline and forecast; determine resource requirements and impacts Discuss and document gaps, needs, and planned changes to the IG architecture Meet with vendors and suppliers to review performance and service levels Brief vendors on FinServCo's strategic direction and priorities for the year Gather details from vendors on their strategic direction and product roadmaps Review key metrics (usage, user volumes, content growth, migrated content volumes, etc.) Review and approve any content quarantine, suspension, or disposition actions Address any other issues and challenges encountered at the business operational level Review key metrics (usage, user volumes, content growth, migrated content volumes, etc.) Address any other issues and challenges encountered from a business management standpoint Program-level Communications Recommendations 13
14 The Business Case for Information Governance This white paper makes the case for implementing a program for information governance that aligns the interests of both the control functions and the business. But for financial services firms, the harddollar benefits for IG are substantial, and the return on investment (ROI) can be significant. Overall, the major benefits of implementing an aligned program for information governance include: Eliminating non-compliance (and thus avoiding fines, penalties, and reputational damage to the firm) with efficient, natural processes Reduced overall costs for the various governance disciplines and activities through consolidation, reduced overlap, and reduced impact on the business Opportunities to leverage investments in improved information management for business value On the investment side, following are the categories of investment an organization should expect to make to implement the IG framework: Systems: The one-time capital and ongoing maintenance costs for systems, software, and infrastructure Program Staff: Any incremental headcount added as a result of the program Implementation Services: Primarily the internal IT staff costs associated with the program Third-Party Consulting: External resources specialized in certain tasks or having certain skills Training and Communications: Includes external costs (resources and marketing communication materials) and internal costs (primarily resources currently on staff) 14
15 The Final Word Sample IG Framework To see a sample IG 2.0 Framework, visit the Doculabs web site. IG 2.0 Framework Sample Doculabs IG Consulting Services To learn more about Doculabs consulting services, visit the Services page of our web site. Looking at each of the categories of the framework, where does your own organization stand? Where is there room for improvement at your firm? Doculabs has worked with all of the nation s leading financial services firms. We can conduct an assessment of the maturity of information governance at your organization. We ll take a look at organizational resources, structure, standard practices, and communications and training, as well as existing policies and procedures and technology. Then, based on empirical data from our work with the leading firms in the financial services industry, we ll give you an assessment of where you rank with respect to each of the framework categories. Then, based on those assessments, we will work with you to craft a go-forward strategy for implementing next-generation IG complete with a roadmap with the initiatives you ll need to roll out the framework at your firm. For financial services organizations, aligning the autonomous and sometimes redundant control functions is one of the biggest benefits of Doculabs framework. Integrating these activities across the compliance, risk, information security, privacy, and records management functions enables greater coordination and effectiveness, as well as decreasing disruption to the business. But improving information governance can also deliver significant strategic value, enabling your organization to capitalize on the value inherent in the information itself and positioning you to leverage that information for competitive advantage. Just as organizations derived significant value by focusing on quality in the 1980s, they can derive value by focusing on information management competencies today. Isn t it time to roll out IG 2.0 in your organization? 15
16 About Doculabs We are experts in content management. We help our clients by delivering highly actionable and comprehensive strategic plans and roadmaps, helping our clients achieve their business goals and create competitive advantage. Our consulting services also help our clients improve their records management and information governance approaches to facilitate compliance, reduce risk, and reduce the cost of e-discovery. Founded in 1993, Doculabs has an established track record in helping its clients bring content under control and improving the ways they collaborate. Our engagements focus on guiding our clients with our expertise, analysis, and in-depth market knowledge. And we re independent; we don t sell software or implementation services, so our clients can be sure that our recommendations are objective. Our consultants are highly experienced, averaging more than 20 years of relevant professional background and many years of working together as part of the Doculabs team. We re recognized thought leaders in the industry, frequent speakers at industry events and webinars, and active contributors to leading publications, social media sites, and organizations such as AIIM. Hundreds of Fortune 1000 organizations have turned to Doculabs for assistance with their information management strategies. To learn more about our services, visit the web site at or call (312)
Real World Strategies for Migrating and Decommissioning Legacy Applications
Real World Strategies for Migrating and Decommissioning Legacy Applications Final Draft 2014 Sponsored by: Copyright 2014 Contoural, Inc. Introduction Historically, companies have invested millions of
ECM as a Shared Service: The New Frontier
Doculabs White Paper: ECM as a Shared Service: The New Frontier Organizations are struggling with the increasing growth of unstructured content: all the word processing files, e-mail, spreadsheets, web
Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015
Breaking Down the Silos: A 21st Century Approach to Information Governance May 2015 Introduction With the spotlight on data breaches and privacy, organizations are increasing their focus on information
Enterprise 2.0 and SharePoint 2010
Enterprise 2.0 and SharePoint 2010 Doculabs has many clients that are investigating their options for deploying Enterprise 2.0 or social computing capabilities for their organizations. From a technology
From Information Management to Information Governance: The New Paradigm
From Information Management to Information Governance: The New Paradigm By: Laurie Fischer Overview The explosive growth of information presents management challenges to every organization today. Retaining
Data Lifecycle Management and Information Governance A DOCULABS WHITE PAPER
Data Lifecycle Management and Information Governance A DOCULABS WHITE PAPER How do you purge your data? Are your data management practices in compliance with recordkeeping conventions and with legal standards?
How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )
The Electronic Discovery Reference Model (EDRM) How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) December 2011
The Role of Microsoft SharePoint in a Records Management Strategy. A Docula bs Wh i te Pa pe r
The Role of Microsoft SharePoint in a Records Management Strategy A Docula bs Wh i te Pa pe r 2009 Doculabs, 200 West Monroe Street, Suite 2050, Chicago, IL 60606 (312) 433-7793 [email protected]. Reproduction
Certified Information Professional 2016 Update Outline
Certified Information Professional 2016 Update Outline Introduction The 2016 revision to the Certified Information Professional certification helps IT and information professionals demonstrate their ability
How to Plan and Implement Information Governance
Doculabs White Paper: How to Plan and Implement Information Governance Information governance (IG) is the control of information to meet your legal, regulatory, and business risk objectives. The primary
Agenda. You are not in the business to manage records
Global Records and Information Management Risk: Proactive and Practical Approaches to Effective Records Management September 16, 2014 Maura Dunn, MLS, CRM Lee Karas, MBA Agenda Drivers for your Records
Bridging The Gap: Solving the Challenge of Compliance & Data Governance
Bridging The Gap: Solving the Challenge of Compliance & Data Governance Banks are struggling to keep up with the data demands of regulators. New global regulations require Bank Compliance groups to provide
Leveraging a Maturity Model to Achieve Proactive Compliance
Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................
SAME PRINCIPLES APPLY, BUT NEW MANDATES FOR CHANGE
Information is an organization s most important strategic asset the lifeblood of the organization s knowledge, processes, transactions, and decisions. With information continuing to grow exponentially,
Business Analysis Standardization & Maturity
Business Analysis Standardization & Maturity Contact Us: 210.399.4240 [email protected] Copyright 2014 Enfocus Solutions Inc. Enfocus Requirements Suite is a trademark of Enfocus Solutions Inc.
Agile Master Data Management A Better Approach than Trial and Error
Agile Master Data Management A Better Approach than Trial and Error A whitepaper by First San Francisco Partners First San Francisco Partners Whitepaper Executive Summary Market leading corporations are
Top 5 reasons to choose HP Information Archiving
Technical white paper Top 5 reasons to choose HP Information Archiving Intelligent, scalable, and proven archiving solutions Table of Contents The value of intelligent archiving... 2 Top 5 reasons to choose
SharePoint Governance: Planning, Strategy and Adoption
Thinking SharePoint? Think Jornata. SharePoint Governance: Planning, Strategy and Adoption Scott Jamison Managing Partner & CEO Jornata LLC [email protected] About Scott Jamison CEO of Jornata,
Growing Vendor Management
V E N D O R M A N A G E M E N T P R O F I L E S E R I E S A Wh it e Pap e r by Ve n d or I NS I G HT an d C MPG, L L C Growing Vendor Management as a Sustainable Business Process with Automated Vendor
Enterprise Data Governance
DATA GOVERNANCE Enterprise Data Governance Strategies and Approaches for Implementing a Multi-Domain Data Governance Model Mark Allen Sr. Consultant, Enterprise Data Governance WellPoint, Inc. 1 Introduction:
Director, Value Engineering
Director, Value Engineering April 25 th, 2012 Copyright OpenText Corporation. All rights reserved. This publication represents proprietary, confidential information pertaining to OpenText product, software
Certified Identity and Access Manager (CIAM) Overview & Curriculum
Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management
Table of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise
Best practices in open source governance Managing the selection and proliferation of open source software across your enterprise Table of contents The importance of open source governance... 2 Executive
Compliance Requirements and Social Media Usage: FINRA and SEC
Compliance Requirements and Social Media Usage: FINRA and SEC About Doculabs 2 Doculabs consultants are experts in enterprise social collaboration and content management. We deliver highly actionable and
A new paradigm for EHS information systems: The business case for moving to a managed services solution
White Paper A new paradigm for EHS information systems: The business case for moving to a managed services solution Business solutions through information technology TM Entire contents 2005 by CGI Group
Realizing business flexibility through integrated SOA policy management.
SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished
Governance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
Preventing Fraud: Assessing the Fraud Risk Management Capabilities of Today s Largest Organizations
Preventing Fraud: Assessing the Fraud Risk Management Capabilities of Today s Largest Organizations Overview In late 2006 and 2007, Protiviti commissioned a study to gauge the fraud risk management (FRM)
WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity
WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity Sponsored by: EMC Corporation Laura DuBois August 2010 Vivian Tero EXECUTIVE SUMMARY Global Headquarters: 5 Speen Street
Business Intelligence and Analytics: Leveraging Information for Value Creation and Competitive Advantage
PRACTICES REPORT BEST PRACTICES SURVEY: AGGREGATE FINDINGS REPORT Business Intelligence and Analytics: Leveraging Information for Value Creation and Competitive Advantage April 2007 Table of Contents Program
OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.
OPTIMUS SBR CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. Optimizing Results with Business Intelligence Governance This paper investigates the importance of establishing a robust Business Intelligence (BI)
IT Governance Overview
IT Governance Overview Contents Executive Summary... 3 What is IT Governance?... 4 Strategic Vision and IT Guiding Principles... 4 Campus-Wide IT Strategic Vision... 4 IT Guiding Principles... 4 The Scope
Cohasset Associates, Inc. NOTES. 2014 Managing Electronic Records Conference 1.1. The discipline of analyzing the. Value Costs and Risks
Understanding Today s Economics of Information Get Your Act Together Now! Sylvan Sibito H Morley III IBM Worldwide Director Information Lifecycle Governance Information Economics: The discipline of analyzing
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R L e v e r a g e R e c o r d s M a n a g e m e n t B e s t P r a c t i c e s t
Fundamentals of Information Governance:
Fundamentals of Information Governance: More than just records management PETER KURILECZ CRM CA IGP Hard as I try, I simply cannot make myself understand how Information Governance isn t just a different
EBS. Remote Infrastructure Managed Services. EBS Ltd. 12, Mihail Tenev Str. 1784 Sofia Bulgaria +359 2 400 700 [email protected] www.ebs.
EBS Remote Infrastructure Managed Services EBS Ltd. 12, Mihail Tenev Str. 1784 Sofia Bulgaria +359 2 400 700 [email protected] www.ebs.bg IT departments are responsible for ensuring the performance and availability
EMC PERSPECTIVE. Information Management Shared Services Framework
EMC PERSPECTIVE Information Management Shared Services Framework Reader ROI Information management shared services can benefit life sciences businesses by improving decision making by increasing organizational
Certified Information Professional (CIP) Certification Maintenance Form http://www.aiim.org/certification
Certified Information Professional (CIP) Certification Maintenance Form http://www.aiim.org/certification Name: Title: Company: Address: City: State/Province: ZIP/Postal Code: Country: Email Address: Telephone:
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
An RCG White Paper The Data Governance Maturity Model
The Dataa Governance Maturity Model This document is the copyrighted and intellectual property of RCG Global Services (RCG). All rights of use and reproduction are reserved by RCG and any use in full requires
Implementing an Information Governance Program CIGP Installment 2: Building Your IG Roadmap by Rick Wilson, Sherpa Software
Implementing an Information Governance Program CIGP Installment 2: Building Your IG Roadmap by Rick Wilson, Sherpa Software www.sherpasoftware.com 1.800.255.5155 @sherpasoftware [email protected]
HP and netforensics Security Information Management solutions. Business blueprint
HP and netforensics Security Information Management solutions Business blueprint Executive Summary Every day there are new destructive cyber-threats and vulnerabilities that may limit your organization
Washington State s Use of the IBM Data Governance Unified Process Best Practices
STATS-DC 2012 Data Conference July 12, 2012 Washington State s Use of the IBM Data Governance Unified Process Best Practices Bill Huennekens Washington State Office of Superintendent of Public Instruction,
W H I T E P A P E R E X E C U T I V E S U M M AR Y S I T U AT I O N O V E R V I E W. Sponsored by: EMC Corporation. Laura DuBois May 2010
W H I T E P A P E R E n a b l i n g S h a r e P o i n t O p e r a t i o n a l E f f i c i e n c y a n d I n f o r m a t i o n G o v e r n a n c e w i t h E M C S o u r c e O n e Sponsored by: EMC Corporation
A Practical Guide for Creating an Information Management Strategy and Strategic Information Management Roadmap
A Practical Guide for Creating an Information Management Strategy and Strategic Information Management Roadmap Principal Author Sam McCollum, CRM, MBA Director of End User Consulting Parity Research LLC
Designing an Operational Risk Program for a Community Bank Stephan Salvador Managing Director, Risk Management Consulting
Consulting and Professional Services Designing an Operational Risk Program for a Community Bank Stephan Salvador Managing Director, Risk Management Consulting Designing an Operational Risk Program for
How To Be An Architect
February 9, 2015 February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 3 Typical Common Responsibilities for the ure Role... 4 Typical Responsibilities for Enterprise ure...
fs viewpoint www.pwc.com/fsi
fs viewpoint www.pwc.com/fsi June 2013 02 11 16 21 24 Point of view Competitive intelligence A framework for response How PwC can help Appendix It takes two to tango: Managing technology risk is now a
Cisco SAFE: A Security Reference Architecture
Cisco SAFE: A Security Reference Architecture The Changing Network and Security Landscape The past several years have seen tremendous changes in the network, both in the kinds of devices being deployed
Business Architecture Scenarios
The OMG, Business Architecture Special Interest Group Business Architecture Scenarios Principal Authors William Ulrich, President, TSG, Inc. Co chair, OMG BASIG [email protected] Neal McWhorter, Principal,
Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.
Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able
EMC ADVERTISING ANALYTICS SERVICE FOR MEDIA & ENTERTAINMENT
EMC ADVERTISING ANALYTICS SERVICE FOR MEDIA & ENTERTAINMENT Leveraging analytics for actionable insight ESSENTIALS Put your Big Data to work for you Pick the best-fit, priority business opportunity and
Presented By: Leah R. Smith, PMP. Ju ly, 2 011
Presented By: Leah R. Smith, PMP Ju ly, 2 011 Business Intelligence is commonly defined as "the process of analyzing large amounts of corporate data, usually stored in large scale databases (such as a
White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA
White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:
Maximizing Business Value Through Effective IT Governance
Cognizant 0-0 Insights Maximizing Business Value Through Effective IT Implementing a holistic IT governance model not only helps IT deliver business value but also advances confidence with business. Executive
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER Integrated Application Life-Cycle Management: Accelerating Innovation, Reducing Costs, and Improving Quality Sponsored by: SAP Melinda-Carol Ballou April 2010 Global Headquarters: 5 Speen Street
Business resilience: The best defense is a good offense
IBM Business Continuity and Resiliency Services January 2009 Business resilience: The best defense is a good offense Develop a best practices strategy using a tiered approach Page 2 Contents 2 Introduction
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing
Fortune 500 Medical Devices Company Addresses Unique Device Identification
Fortune 500 Medical Devices Company Addresses Unique Device Identification New FDA regulation was driver for new data governance and technology strategies that could be leveraged for enterprise-wide benefit
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE ABSTRACT Changing regulatory requirements, increased attack surfaces and a need to more efficiently deliver access to the business
Top 5 reasons to choose HP Information Archiving
Technical white paper Top 5 reasons to choose HP Information Archiving Proven, market-leading archiving solutions The value of intelligent archiving The requirements around managing information are becoming
Whitepaper: Creating an ECM Advisory Board and Program Charter
Whitepaper: Creating an ECM Advisory Board and Program Charter By: Ronda Ringo November 2013 The Problem A year ago, Todd, an IT Director, and Melanie, a Director of Business Process Improvement, had been
Metrics that Matter Security Risk Analytics
Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa [email protected] April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk
ORACLE ENTERPRISE GOVERNANCE, RISK, AND COMPLIANCE MANAGER FUSION EDITION
ORACLE ENTERPRISE GOVERNANCE, RISK, AND COMPLIANCE MANAGER FUSION EDITION KEY FEATURES AND BENEFITS Manage multiple GRC initiatives on a single consolidated platform Support unique areas of operation with
How Global Data Management (GDM) within J&J Pharma is SAVE'ing its Data. Craig Pusczko & Chris Henderson
How Global Data Management (GDM) within J&J Pharma is SAVE'ing its Data Craig Pusczko & Chris Henderson Abstract See how J&J Pharma organizational alignment drove the evolution of Global Data Management
Information Security Managing The Risk
Information Technology Capability Maturity Model Information Security Managing The Risk Introduction Information Security continues to be business critical and is increasingly complex to manage for the
Simply Sophisticated. Information Security and Compliance
Simply Sophisticated Information Security and Compliance Simple Sophistication Welcome to Your New Strategic Advantage As technology evolves at an accelerating rate, risk-based information security concerns
Generally Accepted Recordkeeping Principles
Generally Accepted Recordkeeping Principles Information Governance Maturity Model Information is one of the most vital strategic assets any organization possesses. Organizations depend on information to
Best Practices for Protecting Your IBM FileNet P8 Information
Best Practices for Protecting Your IBM FileNet P8 Information Introduction There are dozens of articles and white papers outlining the most critical steps organizations can take to minimize the risk of
Role of Analytics in Infrastructure Management
Role of Analytics in Infrastructure Management Contents Overview...3 Consolidation versus Rationalization...5 Charting a Course for Gaining an Understanding...6 Visibility into Your Storage Infrastructure...7
IBM Unstructured Data Identification and Management
IBM Unstructured Data Identification and Management Discover, recognize, and act on unstructured data in-place Highlights Identify data in place that is relevant for legal collections or regulatory retention.
Using SAP Master Data Technologies to Enable Key Business Capabilities in Johnson & Johnson Consumer
Using SAP Master Data Technologies to Enable Key Business Capabilities in Johnson & Johnson Consumer Terry Bouziotis: Director, IT Enterprise Master Data Management JJHCS Bob Delp: Sr. MDM Program Manager
Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.
Security solutions To support your business objectives Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. For an On Demand Business, security
How Effectively Are Companies Using Business Analytics? DecisionPath Consulting Research October 2010
How Effectively Are Companies Using Business Analytics? DecisionPath Consulting Research October 2010 Thought-Leading Consultants in: Business Analytics Business Performance Management Business Intelligence
Information & Asset Protection with SIEM and DLP
Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the
building a business case for governance, risk and compliance
building a business case for governance, risk and compliance contents introduction...3 assurance: THe last major business function To be integrated...3 current state of grc: THe challenges... 4 building
Software Asset Management on System z
Software Asset Management on System z Mike Zelle Tivoli WW IT Asset Management Marketing SAM in SHARE Project Manager [email protected] Agenda Why Software Asset Management (SAM) The Discipline of Software
TDWI strives to provide course books that are content-rich and that serve as useful reference documents after a class has ended.
Previews of TDWI course books offer an opportunity to see the quality of our material and help you to select the courses that best fit your needs. The previews cannot be printed. TDWI strives to provide
Reduce Cost, Time, and Risk ediscovery and Records Management in SharePoint
Reduce Cost, Time, and Risk ediscovery and Records Management in SharePoint David Tappan SharePoint Consultant C/D/H [email protected] Twitter @cdhtweetstech Don Miller Vice President of Sales Concept Searching
Talent Management: Why It s Critical for Business Success
Talent Management: Why It s Critical for Business Success Integrated talent management drives measurable results by aligning employee development to your business goals. Learn how. Contents Aligning Individual
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager
Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager Contents INTRODUCTION: UNDERSTANDING HOW ALIGNING DESKTOP SECURITY AND
How To Improve Your Business
IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends
Executive summary... 3 Overview of S&OP and financial planning processes... 4 An in-depth discussion... 5
Table of contents Executive summary... 3 Overview of S&OP and financial planning processes... 4 An in-depth discussion... 5 What are the benefits of S&OP and financial planning integration?... 5 Why is
Managing Information for E-discovery Readiness. A Docula bs Wh i te Pa pe r
Managing Information for E-discovery Readiness A Docula bs Wh i te Pa pe r 2009 Doculabs, 200 West Monroe Street, Suite 2050, Chicago, IL 60606 (312) 433-7793 [email protected]. Reproduction in whole or
Enterprise Information Management Services Managing Your Company Data Along Its Lifecycle
SAP Solution in Detail SAP Services Enterprise Information Management Enterprise Information Management Services Managing Your Company Data Along Its Lifecycle Table of Contents 3 Quick Facts 4 Key Services
Compliance and Security Solutions
Content-aware Compliance and Security Solutions for Microsoft SharePoint SharePoint and the ECM Challenge The numbers tell the story. According to the consulting firm Doculabs, 80 percent of the information
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER The IT Manager's Role in Proactive Information Retention and Disposition Management: Balancing ediscovery and Compliance Obligations with IT Operational and Budget Constraints Sponsored by:
